Medical images and health data belonging to millions of Americans, including X-rays, MRIs and CT scans, are sitting unprotected on the internet and available to anyone with basic computer expertise.
The records cover more than 5 million patients in the US and millions more around the world. In some cases, a snoop could use free software programs – or just a typical web browser – to view the images and private data, an investigation by ProPublica and the German broadcaster Bayerischer Rundfunk found.
We identified 187 servers – computers that are used to store and retrieve medical data – in the US that were unprotected by passwords or basic security precautions. The computer systems, from Florida to California, are used in doctors’ offices, medical imaging centres and mobile X-ray services.
The insecure servers we uncovered add to a growing list of medical records systems that have been compromised in recent years. Unlike some of the more infamous recent security breaches, in which hackers circumvented a company’s cyber defenses, these records were often stored on servers that lacked the security precautions that long ago became standard for businesses and government agencies.
“It’s not even hacking,” said Jackie Singh, a cybersecurity researcher and chief executive of the consulting firm Spyglass Security. “It’s walking into an open door.” Some medical providers started locking down their systems after we told them what we had found.
Our review found that the extent of the exposure varies, depending on the health provider and what software they use. For instance, the server of US company MobilexUSA displayed the names of more than a million patients – all by typing in a simple data query. Their dates of birth, doctors and procedures were also included.
Alerted by ProPublica, MobilexUSA tightened its security last week. The company takes mobile X-rays and provides imaging services to nursing homes, rehabilitation hospitals, hospice agencies and prisons. “We promptly mitigated the potential vulnerabilities identified by ProPublica and immediately began an ongoing, thorough investigation,” MobilexUSA’s parent company said in a statement.
Another imaging system, tied to a physician in Los Angeles, allowed anyone on the internet to see his patients’ echocardiograms. The doctor did not respond to inquiries from ProPublica.
All told, medical data from more than 16 million scans worldwide was available online, including names, birthdates and, in some cases, Social Security numbers.
Experts say it’s hard to pinpoint who’s to blame for the failure to protect the privacy of medical images. Under US law, health care providers and their business associates are legally accountable for securing the privacy of patient data. Several experts said such exposure of patient data could violate the Health Insurance Portability and Accountability Act, the 1996 law that requires health care providers to keep Americans’ health data confidential and secure.
Although ProPublica found no evidence that patient data was copied from these systems and published elsewhere, the consequences of unauthorised access to such information could be devastating. “Medical records are one of the most important areas for privacy because they’re so sensitive,” said Cooper Quintin, a security researcher and senior staff technologist with the Electronic Frontier Foundation, a digital-rights group. “Medical knowledge can be used against you in malicious ways: to shame people, to blackmail people. This is so utterly irresponsible.”
The issue should not be a surprise to medical providers. For years, one expert has tried to warn about the casual handling of personal health data. Oleg Pianykh, the director of medical analytics at Massachusetts General Hospital’s radiology department, said medical imaging software has traditionally been written with the assumption that patients’ data would be secured by the customer’s computer security systems.
But as those networks at hospitals and medical centres became more complex and connected to the internet, the responsibility for security shifted to network administrators who assumed safeguards were in place. “Suddenly, medical security has become a do-it-yourself project,” Pianykh wrote in a 2016 research paper he published in a medical journal.
ProPublica’s investigation built upon findings from Greenbone Networks, a security firm based in Germany that identified problems in at least 52 countries on every inhabited continent. Greenbone’s Dirk Schrader first shared his research with Bayerischer Rundfunk after discovering some patients’ health records were at risk. The German journalists then approached ProPublica to explore the extent of the exposure in the US.
Schrader found five servers in Germany and 187 in the US that made patients’ records available without a password. ProPublica and Bayerischer Rundfunk also scanned Internet Protocol addresses and identified, when possible, which medical provider they belonged to.
ProPublica independently determined how many patients could be affected in America, and found some servers ran outdated operating systems with known security vulnerabilities. Schrader said that data from more than 13.7 million medical tests in the US were available online, including more than 400,000 in which X-rays and other images could be downloaded.
The privacy problem traces back to the medical profession’s shift from analogue to digital technology. Long gone are the days when film X-rays were displayed on fluorescent light boards. Today, imaging studies can be instantly uploaded to servers and viewed over the internet by doctors in their offices.
In the early days of this technology, as with much of the internet, little thought was given to security. The passage of the Health Insurance Portability and Accountability Act required patient information to be protected from unauthorised access. Three years later, the medical imaging industry published its first security standards.
Our reporting indicated that large hospital chains and academic medical centres did put security protections in place. Most of the cases of unprotected data we found involved independent radiologists, medical imaging centres or archiving services.
One German patient, Katharina Gaspari, got an MRI three years ago and said she normally trusts her doctors. But after Bayerischer Rundfunk showed Gaspari her images available online, she said: “Now, I am not sure if I still can.” The German system that stored her records was locked down last week.
We found that some systems used to archive medical images also lacked security precautions. Denver-based Offsite Image left open the names and other details of more than 340,000 human and veterinary records, including those of a large cat named Marshmellow, ProPublica found. An Offsite Image executive told ProPublica the company charges clients $50 for access to the site and then $1 per study. “Your data is safe and secure with us,” Offsite Image’s website says.
The company referred ProPublica to its tech consultant, who at first defended Offsite Image’s security practices and insisted that a password was needed to access patient records. The consultant, Matthew Nelms, then called a ProPublica reporter a day later and acknowledged Offsite Image’s servers had been accessible but were now fixed.
“We were just never even aware that there was a possibility that could even happen,” Nelms said.
In 1985, an industry group that included radiologists and makers of imaging equipment created a standard for medical imaging software. The standard, which is now called DICOM, spelt out how medical imaging devices talk to each other and share information.
We shared our findings with officials from the Medical Imaging & Technology Alliance, the group that oversees the standard. They acknowledged that there were hundreds of servers with an open connection on the internet, but suggested the blame lay with the people who were running them.
“Even though it is a comparatively small number,” the organisation said in a statement, “it may be possible that some of those systems may contain patient records. Those likely represent bad configuration choices on the part of those operating those systems.”
Meeting minutes from 2017 show that a working group on security learned of Pianykh’s findings and suggested meeting with him to discuss them further. That action item was listed for several months, but Pianykh said he never was contacted. The medical imaging alliance told ProPublica last week that the group did not meet with Pianykh because the concerns that they had were sufficiently addressed in his article. They said the committee concluded its security standards were not flawed.
Pianykh said that misses the point. It’s not a lack of standards; it’s that medical device makers don’t follow them. “Medical-data security has never been soundly built into the clinical data or devices, and is still largely theoretical and does not exist in practice,” Pianykh wrote in 2016.
ProPublica’s latest findings follow several other major breaches. In 2015, US health insurer Anthem Inc revealed that private data belonging to more than 78 million people was exposed in a hack. In the last two years, US officials have reported that more than 40 million people have had their medical data compromised, according to an analysis of records from the US Department of Health and Human Services.
Joy Pritts, a former Health and Human Services privacy official, said the government isn’t tough enough in policing patient privacy breaches. She cited an April announcement from Health and Human Services that lowered the maximum annual fine, from $1.5 million to $250,000, for what’s known as “corrected willful neglect” – the result of conscious failures or reckless indifference that a company tries to fix. She said that large firms would not only consider those fines as just the cost of doing business but that they could also negotiate with the government to get them reduced. A ProPublica examination in 2015 found few consequences for repeat Health Insurance Portability and Accountability Act offenders.
A spokeswoman for Health and Human Services’ Office for Civil Rights, which enforces Health Insurance Portability and Accountability Act violations, said it wouldn’t comment on open or potential investigations.
“What we typically see in the health care industry is that there is Band-Aid upon Band-Aid applied” to legacy computer systems, said Singh, the cybersecurity expert. She said it’s a shared responsibility among manufacturers, standards makers and hospitals to ensure computer servers are secured.
“It’s 2019,” she said. “There’s no reason for this.”
How can you know?
If you are a patient:
If you have had a medical imaging scan – such as an x-ray, CT scan, MRI, ultrasound – ask the health care provider or your doctor that did the scan if access to your images requires a login and password. Ask your doctor if their office or the medical imaging provider to which they refer patients conducts a regular security assessment as required by Health Insurance Portability and Accountability Act violations.
If you are a medical imaging provider or doctor’s office:
Researchers have found that picture archiving and communication systems (PACS) servers implementing the DICOM standard may be at risk if they are connected directly to the internet without a VPN or firewall, or if access to them does not require a secure password. You or your IT staff should make sure that your PACS server cannot be accessed via the internet without a VPN connection and password.
Doris Burke contributed reporting. Additional reporting by Hakan Tanriverdi, Maximilian Zierer, Steffen Kühne and Oliver Schnuck of Bayerischer Rundfunk.
This article first appeared on ProPublica.
Limited-time offer: Big stories, small price. Keep independent media alive. Become a Scroll member today!
Our journalism is for everyone. But you can get special privileges by buying an annual Scroll Membership. Sign up today!