Mitigating Security Threats in the Sharing of Medical Data

A Comprehensive Review

Authors

DOI:

https://doi.org/10.26512/lstr.v17i2.57418

Keywords:

Cybersecurity. Medical data. Healthcare applications. Data breaches. Ransomware.

Abstract

[Purpose] The medical field is one of the most regular targets of cybersecurity assaults, which occur extensively worldwide. Medical data security is of extreme importance. Medical data, often stored electronically, faces frequent attacks from both internal and external sources during transmission and storage. Data breaches are an important concern in the healthcare industry. Attackers may target medical data for financial gain or identity theft. Even a single breach can expose sensitive patient information.

[Methodology/approach/design] Cybersecurity measures are critical for safeguarding patient information and maintaining the integrity of healthcare applications in an increasingly digital healthcare landscape.

[Findings] Legal software systems with updated software are essential, along with ensuring that the medical data is only accessible to authorised persons.

[Practical implications] This paper explores the areas of cybersecurity relevant to healthcare applications, emphasizing the risks posed by well-known threats such as WannaCry, Medjack, NotPetya, and brainjacking.

Author Biographies

  • Akhil Sekharan, APJ Abdul Kalam Technological University, Thiruvananthapuram, India

    Research Scholar at APJ Abdul Kalam Technological University, Thiruvananthapuram, India. Address: Department of Computer Science and Engineering, St. Joseph’s College of Engineering and Technology, Palai (Autonomous), Choondacherry Post – 686579, Kerala. E-mail: akhilsekharan@gmail.com.

  • Joby P.P., St. Joseph’s College of Engineering and Technology, Palai

    Professor, Department of Computer Science and Engineering at St. Joseph’s College of Engineering and Technology, Palai. E-mail: jobymone@gmail.com.

  • Praseetha V.M., St. Joseph’s College of Engineering and Technology, Palai

    Professor, Department of Computer Science and Engineering at St. Joseph’s College of Engineering and Technology, Palai. E-mail: praseethasunil@gmail.com.

References

Abd Elminaam, D., Abdual Kader, H.M. and Hadhoud, M.M. (2010) Evaluation of the Performance of Symmetric Encryption Algorithms. International Journal of Network Security, 10, 216-222.

Ahmad Almogren, Irfan Mohiuddin, Ikram Ud Din, Hisham Al Majed, and Nadra Guizani. Ftm-iomt: Fuzzy-based trust management for preventing sybil attacks in internet of medical things. IEEE Internet of Things Journal, 2020.

Akbanov, M., Vassilakis, V. G., & Logothetis, M. D. (2019a). WannaCry Ransomware: Analysis of infection, persistence, recovery prevention and propagation mechanisms. Journal of Telecommunications and Information Technology, 1(2019), 113-124. https://doi.org/10.26636/jtit.2019.130218

Akbanov, M., Vassilakis, V. G., & Logothetis, M. D. (2019b). Ransomware detection and mitigation using software-defined networking: The case of WannaCry. Computers & Electrical Engineering, 76, 111-121. https://doi.org/10.1016/j.compeleceng.2019.03.012

Akbanov, M., Vassilakis, V., Moscholios, I. D., & Logothetis, M. D. (2018). Static and dynamic analysis of WannaCry ransomware. ResearchGate. https://www.researchgate.net/publication/332144343_Static_and_Dynamic_Analysis_of_WannaCry_Ransomware

Ali, A.; Pasha, M.F.; Ali, J.; Fang, O.H.; Masud, M.; Jurcut, A.D.; Alzain, M.A. Deep learning based homomorphic secure search-able encryption for keyword search in blockchain healthcare system: A novel approach to cryptography. Sensors 2022, 22, 528.

Almalawi, A., Khan, A. I., Alsolami, F., Abushark, Y. B., & Alfakeeh, A. S. (2023). Managing security of healthcare data for a modern healthcare system. Sensors, 23(7), 3612. https://doi.org/10.3390/s23073612

Alsubaei, F. S., Abuhussein, A., Shandilya, V., & Shiva, S. G. (2019). IOMT-SAF: Internet of Medical Things Security Assessment Framework. Internet of Things, 8, 100123. https://doi.org/10.1016/j.iot.2019.100123

Anuradha, M., Jayasankar, T., Prakash, N. B., Sikkandar, M. Y., Hemalakshmi, G. R., Bharatiraja, C., & Britto, A. S. F. (2021). IoT enabled cancer prediction system to enhance the authentication and security using cloud computing. Microprocessors and Microsystems, 80, 103301. https://doi.org/10.1016/j.micpro.2020.103301

Berr, J. (2017, May 16). "WannaCry" ransomware attack losses could reach $4 billion. CBS News. https://www.cbsnews.com/news/wannacry-ransomware-attacks-wannacry-virus-losses/

Betafred,Msmbaldwin,Justinha,tfosmark,martyav,Microsoft Security Bulletin MS17-010 - Critical.,2017

Butson, Christopher R., et al. "Patient-specific analysis of the volume of tissue activated during deep brain stimulation." Neuroimage 34.2 (2007): 661-670.

Cabaj, K., & Mazurczyk, W. (2016). Using Software-Defined networking for ransomware mitigation: the case of CryptoWall. IEEE Network, 30(6), 14-20. https://doi.org/10.1109/mnet.2016.1600110nm

ÇELİKTAŞ, Barış. (2018) "ISTANBUL TECHNICAL UNIVERSITY★ INFORMATICS INSTITUTE." .

Chaudhury, D. (2020). Brainjacking - The Shocking Cyber Security Threat in Healthcare. ITSecurityWire. https://itsecuritywire.com/featured/brainjacking-cybersecurity-threat/

Cisomag. (2022, February 28). How brainjacking became a new cybersecurity risk in health care. CISO MAG | CyberSecurity Magazine. https://cisomag.com/how-brainjacking-became-a-new-cybersecurity-risk-in-health-care/

Contreras, L. M., Truong, N. D., Eshraghian, J. K., Xu, Z., Huang, Z., Nikpour, A., & Kavehei, O. (2023). Neuromorphic Neuromodulation: Towards the next generation of on-device AI-revolution in electroceuticals. arXiv (Cornell University). https://doi.org/10.48550/arxiv.2307.12471

D. Storm, MEDJACK, Hackers hijacking medical devices to create backdoors in hospital networks, Comput.World,(2015),p.8 https://www.computerworld.com/article/2932371/cybercrime-hacking/medjack-hackers-hijacking-medical-devices-to-create-backdoors-in-hospital-networks.html (Accessed 19 February 2018).

Greenberg, A. (2019, November 5). How the Worst Cyberattack in History Hit American Hospitals. Slate Magazine. https://slate.com/technology/2019/11/sandworm-andy-greenberg-excerpt-notpetya-hospitals.html

Hamouda, B. E. H. H. (2020). Comparative study of different cryptographic algorithms. Journal of Information Security, 11(03), 138-148. https://doi.org/10.4236/jis.2020.113009

Haque, Nur Imtiazul, et al. "A novel framework for threat analysis of machine learning-based smart healthcare systems." arXiv preprint arXiv:2103.03472 (2021).

Hockey, A. (2020). Uncovering the cyber security challenges in healthcare. Network Security, 2020(4), 18-19. https://doi.org/10.1016/s1353-4858(20)30046-5

I. Thompson, "Everything you need to know about the Petya, er, NotPetya nasty trashing PCs worldwide," The Register, 28-Jun-2017. [Online] Available: https://www.theregister.co.uk/2017/06/28/petya_notpetya_ransomware/

Jones, S. (2017, May 12). What is WannaCry and how can it be stopped? Financial Times. https://www.ft.com/content/af74e3f4-373d-11e7-99bd-13beb0903fa3

Jump, Michelle. "Fighting cyberthreats with technology solutions." Biomedical instrumentation & technology 53.1 (2019): 38-43.

Karule, K.P. and Nagrale, N.V. (2016) Comparative Analysis of Encryption Algorithms for Various Types of Data Files for Data Security. International Journal of Scientific Engineering and Applied Science, 2, 495-498.

Kirsch, Zach, and Ming Chow. "Quantum computing: The risk to existing encryption methods." Retrieved from URL: http://www. cs. tufts. edu/comp/116/archive/fall2015/zkir sch. pdf (2015).

Koujalagi, Ashok, Shweta Patil, and Praveen Akkimaradi. "The wannacry ransomeware, a mega cyber attack and their consequences on the modern india." International Journal of Management Information Technology and Engineering 6.4 (2018): 1-4.

L. Pycroft, S.G. Boccard, S.L.F. Owen, J.F. Stein, J.J. Fitzgerald, A.L. Green, T.Z. Aziz, Brainjacking implant security issues in invasive neuromodulation, World Neurosurg. 92 (2016)454-462, http://dx.doi.org/10.1016/j.wneu.2016.05.010

L.Evenstad, NHS trust recovers after cyber-attack, Comput. Wkly, (2016) http://www.computerweekly.com/news/450402278/NHS-trust-recovers-after-cyber-attack (Accessed 19 February 2018).

Laiphrakpam, D. S., and Khumanthem, M. S.,Medical image encryption based on improved ElGamal encryption technique. Optik 147:88-102, 2017.

Lika, Reyner Aranta, et al. "NotPetya: cyber attack prevention through awareness via gamification." 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE). IEEE, 2018.

M. Smith, MEDJACK 2: Old malware used in new medical device hijacking attacks to breach hospitals, Network World. (2016). https://www.csoonline.com/article/556739/medjack-2-old-malware-used-in-new-medical-device-hijacking-attacks-to-breach-hospitals.html

Meggitt, Sinclair. "Medjack attacks: The scariest part of the hospital." (2018).

Mohurle, S., & Patil, M. (2017). A brief study of Wannacry Threat: Ransomware Attack 2017. International Journal of Advanced Research in Computer Science, 8(5), 1938-1940. https://doi.org/10.26483/ijarcs.v8i5.4021

Monday's Ransomware Attack Fails to Dent India, Says Minister: 10 Facts. (n.d.). NDTV.com.,2017 https://www.ndtv.com/india-news/ransomware-wannacry-surfaces-in-kerala-bengal-10-facts-1693806

N.C.S. Centre, 10 Steps to Cyber Security, (2016).

National Audit Office. Investigation: WannaCry cyber-attack and the NHS. https://www.nao.org.uk/wp-content/uploads/2017/10/Investigation-WannaCry-cyber-attack-and-the-NHS.pdf (2017).

OGU, R. E. "MITIGATING THE HARMFUL EFFECTS OF RANSOMWARE: THE AMALGAMATED APPROACH."

P. Farrell, The Medicare machine: patient details of any Australian for sale on darknet, Guard, (2017) https://www.theguardian.com/australia-news/2017/jul/04/the-medicare-machine-patient-details-of-any-australian-for-sale-on-darknet (Accessed 2 March 2018).

Pycroft, L., Boccard, S., Owen, S., Stein, J., FitzGerald, J. J., Green, A. L., & Aziz, T. Z. (2016). Brainjacking: Implant security issues in invasive neuromodulation. World Neurosurgery, 92, 454-[472. https://doi.org/10.1016/j.wneu.2016.05.010

Rashmi V Deshmukh and Kailas K Devadkar. Understanding ddos attack & its effect in cloud environment. Procedia Computer Science, 49:202- 210, 2015.

Rathore, H., Al-Ali, A., Mohamed, A., Du, X., & Guizani, M. (2017). DLRT: Deep Learning Approach for Reliable Diabetic Treatment. GLOBECOM 2017-2017 IEEE Global Communications Conference. https://doi.org/10.1109/glocom.2017.8255028

Rathore, H., Wenzel, L., Al-Ali, A., Mohamed, A., Du, X., & Guizani, M. (2018). Multi-Layer Perceptron model on chip for secure diabetic treatment. IEEE Access, 6, 44718-44730. https://doi.org/10.1109/access.2018.2854822

Seh, A. H., Zarour, M., Alenezi, M., Sarkar, A. K., Agrawal, A., Kumar, R., & Khan, R. A. (2020). Healthcare data breaches: Insights and implications. Healthcare, 8(2), 133. https://doi.org/10.3390/healthcare8020133

Shankar K. and Eswaran P. (2018). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Commun Vol. 14 No. 2,118-130.

Shankar, K., and Eswaran, P., Sharing a secret image with encapsulated shares in visual cryptography. Procedia Comput. Sci. 70: 462-468, 2015.

Staff, R. (2017, June 21). Honda halts Japan car plant after WannaCry virus hits computer network. U.S. https://www.reuters.com/article/us-honda-cyberattack-idUSKBN19C0EI

Storm D. MEDJACK: Hackers hijacking medical devices to create backdoors in hospital networks. https://www.computerworld.com/article/2932371/medjack-hackers-hijacking-medical-devices-to-create-backdoors-in-hospital-networks.html (2015). Accessed 15 Dec 2020.

T. Wehbe, V. Mooney, A. Javaid, and O. Inan. A novel physiological features-assisted architecture for rapidly distinguishing health problems from hardware trojan attacks and errors in medical devices. In IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 106-109, 2017.

Thilagam, K., Beno, A., Lakshmi, M., Wilfred, C. B., George, S. M., Karthikeyan, M., Vijayakumar, P., Ramesh, C., & Karunakaran, P. (2022). Secure IoT Healthcare Architecture with Deep Learning-Based Access Control System. Journal of Nanomaterials, 2022, 1-8. https://doi.org/10.1155/2022/2638613

Vahab Pournaghshband, Majid Sarrafzadeh, and Peter Reiher. Securing legacy mobile medical devices. In International Conference on Wireless Mobile Communication and Healthcare, pages 163-172. Springer, 2012

What is WannaCry ransomware? (2023, July 6). www.kaspersky.com. https://www.kaspersky.com/resource-center/threats/ransomware-wannacry

Wikipedia contributors. (2023). WannaCry ransomware attack. Wikipedia. https://en.wikipedia.org/wiki/WannaCry_ransomware_attack#Affected_organisations

Downloads

Published

2025-10-01

How to Cite

Mitigating Security Threats in the Sharing of Medical Data: A Comprehensive Review. Law, State and Telecommunications Review, [S. l.], v. 17, n. 2, p. 134–151, 2025. DOI: 10.26512/lstr.v17i2.57418. Disponível em: https://periodicostestes.bce.unb.br/index.php/RDET/article/view/57418. Acesso em: 15 jan. 2026.