Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Using Malicious DICOM codes in HL7 messages

HL7-health (Health Level 7)是一個醫療通訊的標準,但他本身沒有加密也沒有驗證跟安全控制,所以有人利用醫療數位影像傳輸協定 (DICOM, Digital Imaging and Communications in Medicine) 的 code 建構了一個後門,而醫療資訊包含全名、地址、出生地、親屬等訊息。

https://www.sans.org/white-papers/38010/

DICOM 用於傳輸管理 ultrasounds, MRIs, X-rays, CT scans 醫學圖像,設計標準時他被允許在尾巴塞可執行文件,所以符合HIPAA標準外醫生在看時也不會導致圖錯誤,但是系統還能被執行

https://securityboulevard.com/2020/11/dicom-file-security-how-malware-can-hide-behind-hipaa-protected-images/

Reference

https://otx.alienvault.com/pulse/60db4b438d9f133b4a6a5271

Back To Top
error: 內容被保護 !!
Buy Me A Coffee
歡迎贊助 sectools.tw 讓這個網站更好~!