Why Compromised OT Units are the Largest Cyber Threat for Hospitals

Editorial Team
7 Min Read


Sıla Özeren, Safety Analysis engineer at Picus Safety

When a hospital’s related units are compromised, it’s extra than simply information or {dollars} at danger — it’s affected person lives. In recent times, operational know-how (OT) units, reminiscent of infusion pumps, ventilators and imaging programs, have turn out to be important to medical operations. Sadly, flaws in these units and the broader networks they connect with proceed to show hospitals to devastating assaults.

Latest discoveries of vulnerabilities in Siemens and Advantech units underscore the dangers hospitals face. Siemens imaging and management programs had been discovered to include flaws that might let attackers bypass authentication or crash gear. Advantech’s extensively deployed industrial and IoT platforms had distant code execution vulnerabilities that researchers confirmed could possibly be exploited. These are the identical sorts of units embedded in hospital environments, forming the spine of affected person monitoring, constructing administration and medical imaging.

Vulnerabilities open the door to devastating ransomware assaults. Through the DCH Well being ransomware occasion, ambulances had been diverted from essential care sufferers. The CommonSpirit incident delayed therapies and appointments for weeks throughout a number of states. In each case, the consequence was disruption to hospital operations that immediately impacted affected person security and belief.

Rising threats to healthcare

Healthcare is a prime goal for cyber criminals. Defensive testing, as outlined within the Picus Blue Report, reveals that even when healthcare organizations deploy a number of layers of safety controls, detection and prevention gaps persist. Particularly, controls designed to observe east-west site visitors inside hospital networks usually miss lateral motion, making it simpler for attackers to pivot from compromised OT units into digital well being document programs or administrative platforms.

A number of components converge to make healthcare uniquely uncovered:

  • Legacy programs: Many OT units run on outdated programs and software program that may’t be patched with out interrupting medical use. This challenge contributed to WannaCry’s influence on the NHS.
  • Lengthy refresh cycles: Excessive-value gear reminiscent of MRI machines could stay operational for many years, properly past typical IT lifecycles.
  • Flat networks: In lots of hospitals, medical units and company programs are interconnected, enabling attackers to pivot from compromised OT gear to digital well being data or billing platforms.
  • Operational constraints: In contrast to in different industries, taking a tool offline for updates or testing can immediately influence affected person care.

These circumstances create an ideal storm: an increasing assault floor that’s troublesome to handle with conventional approaches, simple to use and deeply intertwined with affected person outcomes. Attackers additionally perceive the excessive stakes. Risk teams intentionally goal healthcare as a result of they know hospitals usually tend to pay ransoms shortly to revive service. 

A brand new strategy to healthcare safety

Given these challenges, healthcare CISOs and their groups should rethink how they handle cyber danger. Conventional patch-everything methods can’t maintain tempo. As an alternative, organizations have to modernize their cyber defenses to include steady validation and risk-based prioritization.

  • Validate constantly. Conventional vulnerability administration usually assumes that each high-severity CVE is harmful. However because the Picus Publicity Validation analysis reveals, lower than 2% of vulnerabilities labeled excessive or essential are exploitable in a given atmosphere. Safety groups ought to simulate real-world assaults throughout OT and IT environments to know which vulnerabilities will be exploited inside their networks. By constantly testing safety controls in opposition to real-world assault methods, hospitals can see which vulnerabilities are neutralized and which require pressing consideration, stopping wasted effort on points already mitigated by present controls.
  • Prioritize primarily based on danger and context. Not each CVE deserves a crisis-level response. Hospitals ought to weigh asset criticality, exploitability and present controls earlier than deciding the place to focus. A flaw on an remoted lab system could also be much less pressing than a vulnerability in affected person monitoring software program operating on the principle medical community.
  • Shore up compensating controls. When patching just isn’t possible, safety groups ought to apply different mitigations reminiscent of up to date intrusion prevention guidelines or endpoint detection signatures. This buys time with out exposing sufferers to pointless danger.
  • Test resilience constantly. Breach and assault simulation and purple/blue crew workouts assist reveal blind spots that scanners and audits miss. By mapping assault paths throughout OT and IT networks, hospitals can determine and shut potential pivot factors earlier than attackers exploit them.
  • Achieve buy-in and alignment with stakeholders throughout the group. CISOs ought to work carefully with medical and operational leaders to make sure primary safety consciousness and cyber hygiene are supported. Clear reporting, together with evidence-based publicity scores, will help foster understanding and alignment round funding and implementation of profitable cyber protection methods that help affected person care somewhat than hinder it.

Cyber Protection that permits affected person care

Healthcare safety leaders face immense strain: constrained budgets, complicated regulatory necessities and what could look like a endless barrage of cyberattacks. It’s vital they concentrate on lowering actual danger, restoring management and guaranteeing continuity of care. By shifting to steady validation, context-aware prioritization and layered defenses, healthcare organizations can scale back their publicity, reinforce affected person security and strengthen belief.

Each minute of downtime issues when affected person lives are on the road. By modernizing vulnerability administration and securing OT units, hospitals can defend not solely their programs and information but in addition the sufferers who depend upon them.


About Sila Özeren

Sıla Özeren is an affiliate safety analysis engineer at Picus Safety. She holds an MSc in cryptography from the Institute of Utilized Arithmetic at METU, the place she accomplished her thesis on the PQC algorithm referred to as CRYSTALS-Kyber and its masked implementations.

Share This Article