CyberSecurity news

FlagThis - #patients

@www.fda.gov - 27d
The Cybersecurity and Infrastructure Security Agency (CISA) and the Food and Drug Administration (FDA) have issued warnings regarding a critical security flaw in Contec CMS8000 patient monitors. These monitors, manufactured by a Chinese company, contain a hidden backdoor that allows for unauthorized remote access. This backdoor enables the devices to connect to a hard-coded IP address located at a third-party university in China, potentially allowing the download and execution of unverified files. The vulnerability, tracked as CVE-2025-0626 and CVE-2025-0683, impacts all analyzed firmware versions of the device.

The discovered backdoor poses a significant risk to patient safety and data privacy. It allows malicious actors to modify device settings, execute arbitrary code, and alter displayed vital signs. Furthermore, patient data, including personal and health information, is being sent in plain text to the hardcoded IP address. This unauthorized exfiltration of sensitive information and the potential for device manipulation could lead to improper medical responses and endanger patient well-being. CISA has stated that the backdoor is unlikely to be a normal update mechanism, noting it lacks any integrity-checking or version tracking, making it difficult for hospitals to detect compromised devices.

Recommended read:
References :
  • BleepingComputer: The US Cybersecurity and Infrastructure Security Agency (CISA) is warning that Contec CMS8000 devices, a widely used healthcare patient monitoring device, include a backdoor that quietly sends patient data to a remote IP address and downloads and executes files on the device.
  • : CISA : CISA has an 11 page warning that a patient monitor known as Contec CMS8000 has an embedded backdoor with a hardcoded IP address which enables patient data spillage, or remote code execution (CISA puts forth a scenario where the device is altered to display inaccurate patient vital signs, which poses a serious risk to patient's safety).
  • BleepingComputer: Backdoor found in two healthcare patient monitors, linked to IP in China
  • www.bleepingcomputer.com: The US Cybersecurity and Infrastructure Security Agency (CISA) is warning that Contec CMS8000 devices, a widely used healthcare patient monitoring device, include a backdoor that quietly sends patient data to a remote IP address and downloads and executes files on the device.
  • www.helpnetsecurity.com: Patient monitors with backdoor are sending info to China, CISA warns
  • socradar.io: CISA Warns of Backdoor in Contec CMS8000 Patient Monitors
  • The Hacker News: CISA and FDA Warn of Critical Backdoor in Contec CMS8000 Patient Monitors
  • cyberinsider.com: CISA issues a warning about a backdoor in Contec CMS8000 patient monitors, highlighting the risk of remote code execution and patient data exfiltration.
  • Help Net Security: Patient monitors with backdoor are sending info to China, CISA warns.
  • thecyberexpress.com: Critical Flaws in Contec CMS8000 Allow Remote Code Execution and Patient Data Theft
  • CyberInsider: Contec Monitors Used in U.S. Hospitals Carry Chinese Backdoor
  • securityaffairs.com: The U.S. CISA and the FDA warned of a hidden backdoor in Contec CMS8000 and Epsimed MN-120 patient monitors.
  • : Information about the backdoor found in Contec patient monitors.
  • securityonline.info: The Contec CMS8000 patient monitors are vulnerable to remote attacks.
  • ciso2ciso.com: Backdoor in Chinese-made healthcare monitoring device leaks patient data – Source: www.csoonline.com
  • securityboulevard.com: Critical ‘Backdoor’ Discovered in Widely Used Healthcare Patient Monitors
  • www.csoonline.com: Contec CMS8000 patient monitors are found to have a hidden backdoor that transmits patient data to a hardcoded IP address and executes files remotely.
  • Security Boulevard: Critical ‘Backdoor’ Discovered in Widely Used Healthcare Patient Monitors
  • therecord.media: CyberScoop article about the vulnerabilities in the monitors.
  • Pyrzout :vm:: Contec CMS8000 patient monitors contain a hidden backdoor – Source: securityaffairs.com
  • ciso2ciso.com: Contec CMS8000 patient monitors contain a hidden backdoor – Source: securityaffairs.com
  • securityboulevard.com: Healthcare Crisis Emerges: Cybersecurity Vulnerabilities in Patient Monitors Confirmed by FDA
  • Vulnerability-Lookup: A new bundle, CISA Releases Fact Sheet Detailing Embedded Backdoor Function of Contec CMS8000 Firmware, has been published on Vulnerability-Lookup:
  • securityonline.info: The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical security alert regarding the Contec CMS8000 patient monitors.
  • securityonline.info: CISA Warns of Hidden Backdoor in Contec CMS8000 Patient Monitors
  • www.cysecurity.news: The U.S. Food and Drug Administration (FDA) has issued a safety communication highlighting cybersecurity vulnerabilities in certain patient monitors manufactured by Contec and relabeled by Epsimed.
  • ciso2ciso.com: This news alert brings light to a critical backdoor discovered in widely used healthcare patient monitors.
  • ciso2ciso.com: Critical ‘Backdoor’ Discovered in Widely Used Healthcare Patient Monitors
  • Security Boulevard: CISA/FDA Warn: Chinese Patient Monitors Have BAD Bugs
  • securityboulevard.com: CISA/FDA Warn: Chinese Patient Monitors Have BAD Bugs
  • claroty.com: Do the CONTEC CMS8000 Patient Monitors Contain a Chinese Backdoor? The Reality is More Complicated…
  • www.heise.de: Medical surveillance monitor: Backdoor discovered in Contec CMS8000 Attackers can attack medical hardware from Contec. This can result in malicious code getting onto devices. There has been no security update to date.
  • : Claroty : There was increased interest in healthcare industry's patient monitors after CISA warned on 31 January 2025 that . Claroty's Team82 actually previously investigated the firmware and reached the conclusion that it is most likely not a hidden backdoor, but instead an insecure/vulnerable design that introduces great risk to the patient monitor users and hospital networks. Their conclusion is mainly based on the fact that the vendor—and resellers who re-label and sell the monitor—list the IP address in their manuals and instruct users to configure the Central Management System (CMS) with this IP address within their internal networks. h/t: ; cc: Note: there's associated vulnerabilities: (CVSSv4: 7.7/v3.1: 7.5 high) Hidden Functionality vulnerability in Contec Health CMS8000 Patient Monitor (CVSSv4: 8.2 high/v3.1: 5.9 medium) Exposure of Private Personal Information to an Unauthorized Actor vulnerability in Contec Health CMS8000 Patient Monitor

@www.maine.gov - 62d
American Addiction Centers, a substance abuse treatment provider, has confirmed a significant data breach impacting 422,424 individuals. The breach, which occurred in September, involved unauthorized access to internal servers, leading to the exfiltration of sensitive personal information. This incident was initially reported to have affected 410,747 people, but the total number of impacted individuals was later revised upwards. The compromised data includes names, birthdates, phone numbers, email addresses, Social Security numbers, medical record numbers, and health insurance details.

The breach is believed to be linked to the Rhysida ransomware operation, which claimed to have exfiltrated approximately 2.8 TB of data. Following unsuccessful extortion attempts, the ransomware group leaked much of the stolen data. American Addiction Centers has notified affected individuals and offered identity theft protection services through Transunion/CyberScout for 12 months, while also confirming that no payment card or treatment data were impacted in the attack.

Recommended read:
References :
  • www.scworld.com: Toll of American Addiction Centers hack surpasses 422K
  • thecyberexpress.com: 422,000+ Impacted in American Addiction Centers Cybersecurity Incident
  • osint10x.com: Nearly half a million people had data stolen after cyberattack on American Addiction Centers
  • therecord.media: A September ransomware attack on American Addiction Centers exposed the sensitive healthcare information of more than 400,000 people

@www.bleepingcomputer.com - 19d
Hospital Sisters Health System (HSHS) has notified over 882,000 patients about a significant data breach stemming from a cyberattack in August 2023. The breach exposed the personal and health information of these individuals, raising concerns about data security within the healthcare sector. HSHS, established in 1875, operates a network of 15 local hospitals across Illinois and Wisconsin and works with over 2,200 physicians.

The health system discovered the security breach on August 27, 2023, after detecting unauthorized access to its network. Following the discovery, HSHS initiated an investigation to assess the scope and impact of the incident. The notification sent to patients confirmed that the cyberattack led to the compromise of their personal data, emphasizing the importance of vigilance regarding potential misuse of the exposed information.

Recommended read:
References :
  • BleepingComputer: Hospital Sisters Health System notified over 882,000 patients that an August 2023 cyberattack led to a data breach that exposed their personal and health information.
  • securityaffairs.com: The cyberattack on Hospital Sisters Health System in 2023 compromised the personal information of 883,000 individuals.
  • www.bleepingcomputer.com: US health system notifies 882,000 patients of August 2023 breach
  • BleepingComputer: Hospital Sisters Health System notified over 882,000 patients that an August 2023 cyberattack led to a data breach that exposed their personal and health information.
  • Anonymous ???????? :af:: Hospital Sisters Health System notified over 882,000 patients that an August 2023 cyberattack led to a data breach that exposed their personal and health information.
  • BleepingComputer: Hospital Sisters Health System notified over 882,000 patients that an August 2023 cyberattack led to a data breach.

CISO2CISO Editor 2@ciso2ciso.com - 25d
Community Health Center (CHC), a major healthcare provider in Connecticut, has announced a significant data breach impacting over 1 million patients. The organization, which offers primary care, dental, behavioral health, and specialty services, discovered the breach on January 2nd, 2025, revealing that threat actors had gained unauthorized access to their network in mid-October 2024. This cyberattack has resulted in the exposure of sensitive patient data, including names, birth dates, contact details, diagnoses, treatments, test results, Social Security numbers, and health insurance information. The healthcare provider has begun notifying the affected patients.

The breach was reportedly carried out by a skilled cybercriminal, according to CHC. The notification to patients stated that while the hackers did not delete or lock any data, they were able to steal a significant amount of information. CHC also clarified that the criminal's actions did not impact their daily operations and access to their systems was quickly cut off within hours. CHC has taken action by enhancing its security measures and implementing monitoring software. They also assured patients that there is no evidence to suggest any data has been misused.

Recommended read:
References :
  • ciso2ciso.com: Community Health Center data breach impacted over 1 million patients – Source: securityaffairs.com
  • BleepingComputer: Community Health Center (CHC), a leading Connecticut healthcare provider, is notifying over 1 million patients that their personal and health information was stolen in an October breach -
  • securityaffairs.com: Community Health Center data breach impacted over 1 million patients
  • www.bleepingcomputer.com: Community Health Center (CHC), a leading Connecticut healthcare provider, is notifying over 1 million patients that their personal and health information was stolen in an October breach
  • ciso2ciso.com: Community Health Center data breach impacted over 1 million patients – Source: securityaffairs.com
  • ciso2ciso.com: Hundreds of Thousands Hit by Data Breaches at Healthcare Firms in Colorado, North Carolina – Source: www.securityweek.com
  • ciso2ciso.com: Hundreds of Thousands Hit by Data Breaches at Healthcare Firms in Colorado, North Carolina

@claroty.com - 23d
The FDA and CISA have issued warnings regarding cybersecurity vulnerabilities found in Contec CMS8000 and Epsimed MN-120 patient monitors. These monitors, often used for remote patient care in homes and hospice settings, present potential risks when connected to the internet. The agencies advise users to disconnect these devices from the network where possible.

These vulnerabilities could allow unauthorized access and manipulation of the devices. CISA discovered a backdoor function with a hard-coded IP address in all analyzed firmware versions of the Contec CMS8000. The identified risks include the potential for unauthorized transmission of patient data and remote code execution, with one vulnerability scoring a critical 9.8 CVSS. These patient monitors display vital patient information including temperature, heartbeat and blood pressure.

Recommended read:
References :
  • ciso2ciso.com: Critical ‘Backdoor’ Discovered in Widely Used Healthcare Patient Monitors  – Source: securityboulevard.com
  • securityboulevard.com: CISA/FDA Warn: Chinese Patient Monitors Have BAD Bugs
  • www.heise.de: Medical surveillance monitor: Backdoor discovered in Contec CMS8000