SERVERS that control robots working in hospitals were found to have major gaps in security coding.

The robots perform menial tasks like delivering medications and transporting materials across hospitals but could be exploited to do harm.

The healthcare sector is becoming increasingly accepting of robots undertaking tasks normally done by humans

1

The healthcare sector is becoming increasingly accepting of robots undertaking tasks normally done by humans

Aethon TUG smart autonomous robots are a cost-effective way for hospitals and other businesses to delegate simple tasks away from busy human employees.

They can lift hundreds of pounds, clean floors and execute other maintenance-adjacent tasks.

To navigate, the TUG robot uses radio waves to tap into a given hospital’s network of motion sensor doors and elevators.

Because of their ability to bypass security clearances and access medicines or rooms not afforded to a regular visitor, the thousands of TUG robots in US hospitals are a keen target for hackers.

Anonymous leaks '776GB of Kremlin files' after hacking Russian database
1 BILLION iPhone users urged to change settings now over cyber fears

A major security vulnerability was first flagged by Cynerio, a cybersecurity company that works specifically in the healthcare sector.

Cynerio dubbed the collection of five different security gaps JekyllBot:5.

JekyllBot:5 is what computer scientists call a “zero-day vulnerability” – a term for a flaw that has no existing patch.

The Independent quoted the head of Cynerio’s cyber network analysis saying “These zero-day vulnerabilities required a very low skill set for exploitation, no special privileges, and no user interaction to be successfully leveraged in an attack.”

Most read in Tech

The TUG robots most at risk were the ones actively connected to the internet.

Cynerio published a report on JekyllBot:5’s capabilities divided the risks into two categories: risk of unauthorized control of the robots and risk of malware installation.

The company wrote that the robots could have been used to give hackers “an access point to laterally move through hospital networks, perform reconnaissance, and eventually carry out ransomware attacks, breaches, and other threats.”

The robots were taken offline to prevent hackers from accessing them and work on applying fixes.

Subway suspect's sister reveals moment she found out he is wanted for attack
Two kids found dead with arms, legs, and neck tied after hang-up 911 calls

Hospitals using TUG robots are advised to see that their bots are patched with the latest firmware and software available.

Peter Seiff, the CEO of ST Engineering Aethon, refused to answer questions posed by TechCrunch regarding the progress of security patch installation.

We pay for your stories!

Do you have a story for The US Sun team?

This post first appeared on Thesun.co.uk

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

Are aliens real? Sightings and conspiracy theories explained

DO aliens really exist? This question has caused debate and controversy among…

Here’s why your Instagram DMs keep disappearing – and how to fix it

IF YOUR Instagram DMs have been disappearing lately, here’s what you can…

Search your Android phone for three ‘dangerous’ icons right now – there’s no time to lose

SMARTPHONES are full of icons and symbols and we learn some more…

Black Friday 2020: the best early deals and bargains

Some of the discounts UK retailers such as Tesco, Asda, Argos and…