{"id":4847,"date":"2015-05-01T00:14:33","date_gmt":"2015-05-01T04:14:33","guid":{"rendered":"http:\/\/www.kaspersky.co.in\/blog\/?p=4847"},"modified":"2020-02-26T20:28:40","modified_gmt":"2020-02-26T14:58:40","slug":"hacking-the-robotic-surgeons-hands-and-eyes","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/hacking-the-robotic-surgeons-hands-and-eyes\/4847\/","title":{"rendered":"Hacking the Robotic Surgeon&#8217;s Hands and Eyes"},"content":{"rendered":"<div class=\"entry-content\">\n<div>\n<p>A group of academic security researchers remotely hacked and took\u00a0control of a robot designed to perform telesurgery, <a href=\"http:\/\/www.technologyreview.com\/view\/537001\/security-experts-hack-teleoperated-surgical-robot\/\" target=\"_blank\" rel=\"noopener nofollow\">according to the MIT Technology Review<\/a>.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2015\/05\/05084735\/doct_FB-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8576\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2015\/05\/05084735\/doct_FB-1.png\" alt=\"Researchers hack and totally hijack Raven II remote surgery system\" width=\"800\" height=\"800\"><\/a><\/p>\n<p>Telesurgery \u2014 perhaps better known as remote surgery \u2014 is exactly what it sounds like. Simply put, a doctor sits on a computer (fixed with highly specialized software and hardware) somewhere in the world and controls a robot performing surgery in some other part of the world. Perhaps not surprising to anyone who\u2019s ever looked at a surgical bill, human-guided, robot performed surgeries are actually less expensive than human-only operations, particularly when travel is involved.<\/p>\n<p>Therefore, telesurgery offers highly-trained doctors the ability to perform critical surgeries on patients living in parts of the world that lack highly-trained surgeons \u2014 without having to travel. This technology opens up an large\u00a0revenue potential for (relatively) cheap medical procedures all around the world. However, <a href=\"https:\/\/www.kaspersky.com\/blog\/internet-of-crappy-things-2\/\" target=\"_blank\" rel=\"noopener nofollow\">as you may have guessed<\/a>, certain telesurgery devices and protocols are vulnerable to dangerous electronic attacks.<\/p>\n<div class=\"pullquote\">The researchers not only found it possible to monitor or disrupt remotely performed surgeries but to completely hijack them as well<\/div>\n<p>In this case, the University of Washington researchers, led by cyber-physical interaction expert Tamara Bonaci, targeted the communication technologies necessary to perform telesurgery. The researchers not only found it possible to monitor or disrupt remotely performed surgeries but to completely hijack them as well.<\/p>\n<p>As the MIT Technology Review notes, early telesurgery was performed via dedicated fiber lines. This tactic is simultaneously secure, assuming all the machines involved are malware free, and wildly expensive. Unfortunately, the monetary benefits of telesurgery all but disappear when there is a direct, dedicated line between surgeon and patient. In order for telesurgery to work well, financially speaking, tele-surgeons have had to experiment with cheaper communication solutions, like the Internet.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Security Experts Hack Teleoperated Surgical Robot <a href=\"http:\/\/t.co\/WiK6Efh05e\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/WiK6Efh05e<\/a><\/p>\n<p>\u2014 MIT Technology Review (@techreview) <a href=\"https:\/\/twitter.com\/techreview\/status\/591618875935956994?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">April 24, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br>\nTo this point there have been no real-world attacks targeting tele-surgical operations, but <a href=\"https:\/\/www.kaspersky.com\/blog\/internet-of-crappy-things\/\" target=\"_blank\" rel=\"noopener nofollow\">we all know the Internet is just not that secure<\/a>. So Bonaci and friends went to work attacking the Raven II surgical robot. On the doctor\u2019s end there\u2019s a mechanical apparatus through which the surgeon can watch and control the robot performing the surgery on the other end. In addition to the video, the advanced console also offers touch-based sensory feedback to the surgeon so he or she can have a real-world feel for the operation.<\/p>\n<p>The largely <a href=\"https:\/\/www.kaspersky.com\/blog\/security-is-6\/\" target=\"_blank\" rel=\"noopener nofollow\">Linux based system<\/a> on the doctor\u2019s side and the Robot Operating system on the other communicate over the public Internet using a specially designed protocol called the the Interoperable Telesurgery Protocol.<\/p>\n<p>The researchers told the MIT Technology Review that taking complete control of the telesurgery device was fairly simple because the Interoperable Telesurgery Protocol is completely open and publicly available. Beyond that, the researchers were also able to delay signals to the robotic device or make it act erratically by modifying signals from the surgeon as they were sent\u00a0over\u00a0the Internet. In a number of cases, the researchers were able to trigger the robot\u2019s automatic stop safety mechanisms, performing what amounts to a denial of service attack.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Researchers #hack and totally #hijack Raven II remote #surgery system:<\/p>\n<p><a class=\"btn btn-twhite\" href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FY6Fr&amp;text=Researchers+%23hack+and+totally+%23hijack+Raven+II+remote+%23surgery+system%3A\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/p><\/blockquote>\n<p>Perhaps most surprisingly, video for Raven II\u2019s telesurgery operations were broadcasting publicly over the Internet <a href=\"https:\/\/www.kaspersky.com\/blog\/cameron-against-encryption\/\" target=\"_blank\" rel=\"noopener nofollow\">without encryption<\/a>, meaning anyone could watch the footage.<\/p>\n<p>In a test case, the researchers built encryption into the telesurgery protocol for commands. It had no material negative impact, financial or performance, on the Raven II\u2019s capacity to perform surgery. However, they say that encrypted video would not be feasible for Raven II systems, as they often attempt to perform surgeries in remote parts of the world with somewhat restricted data networking equipment.<\/p>\n<p>The MIT Technology Review is reporting that the sale of tele-operated medical devices is increasing at a rate\u00a0of 20 percent per year.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A group of academic security researchers remotely hacked and took\u00a0control of a robot designed to perform telesurgery, according to the MIT Technology Review. Telesurgery \u2014 perhaps better known as remote<\/p>\n","protected":false},"author":42,"featured_media":4848,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1038,868,634,769,1039,43,1021,97],"class_list":{"0":"post-4847","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-encription","9":"tag-hack","10":"tag-internet-of-things","11":"tag-iot","12":"tag-medical","13":"tag-privacy","14":"tag-robots","15":"tag-security-2"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/hacking-the-robotic-surgeons-hands-and-eyes\/4847\/"},{"hreflang":"zh","url":"https:\/\/www.kaspersky.com.cn\/blog\/hacking-the-robotic-surgeons-hands-and-eyes\/2931\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/encription\/","name":"encription"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/4847","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=4847"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/4847\/revisions"}],"predecessor-version":[{"id":19275,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/4847\/revisions\/19275"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/4848"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=4847"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=4847"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=4847"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}