April 28, 2015 By Shane Schick 2 min read

Security threats against desktops and smartphones are so overwhelming that few would want to contemplate the possibility of medical device malware, which means a product that could track it based on power consumption could be just what the doctor ordered.

According to a recent story on The Register, a startup called Virta Labs is quietly signing up health care organizations to pilot WattsUpDoc, a platform that uses machine learning to detect medical device malware via the power footprints of websites or other feedback over AC. In demonstrations at the recent RSA Conference, the firm demonstrated how this technology could work, though the two most recent U.S. hospitals among the trial group were not mentioned by name.

Though they might not be considered a high-risk endpoint today from the perspective of a chief information security officer, devices such as heart-rate monitors can collect and transmit considerable amounts of sensitive information and are sometimes connected to back-end hospital systems and medical records. In fact, InformationWeek suggested it might be relatively easy for medical device malware to find its target since default passwords are often set to things such as “admin” or can’t be changed at all.

One of the things that complicate this particular attack vector is the role of regulators such as the Food and Drug Administration (FDA), according to Government Health IT. Though the FDA has issued guidance around cybersecurity, there have historically been restrictions on how such hardware can be changed, even if it’s to provide a patch against medical device malware. Some suggest more standards are needed in this area.

The notion of using AC power to monitor and mitigate threats isn’t limited to medical device malware, of course. An in-depth feature on CSO Online explored how tools similar to WattsUpDoc are being deployed to fend off cybercriminals from industrial control systems or supervisory control and data acquisition (SCADA) systems. The latter could be a particularly interesting test case, given that recent research said SCADA systems are among the areas where cybersecurity activity is on the rise.

Of course, nothing beats prevention, and medical device malware is no exception. As Healthcare IT News pointed out, manufacturers need to build security into the design of products instead of dealing with the fallout when a cybercriminal strikes. Otherwise, technologies such as WattsUpDoc may be making a lot of house calls.

Image Source: iStock

More from

FYSA — VMware Critical Vulnerabilities Patched

< 1 min read - SummaryBroadcom has released a security bulletin, VMSA-2025-0004, addressing and remediating three vulnerabilities that, if exploited, could lead to system compromise. Products affected include vCenter Server, vRealize Operations Manager, and vCloud Director.Threat TopographyThreat Type: Critical VulnerabilitiesIndustry: VirtualizationGeolocation: GlobalOverviewX-Force Incident Command is monitoring activity surrounding Broadcom’s Security Bulletin (VMSA-2025-0004) for three potentially critical vulnerabilities in VMware products. These vulnerabilities, identified as CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, have reportedly been exploited in attacks. X-Force has not been able to validate those claims. The vulnerabilities…

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today