.

Human Brain Hacking - How Human Brains Could Be Hacked

Human Brain Hacking.



Following recent cyber attacks that have occurred in all types of stage and hacking tests in unconventional architectures such as: the attempt to hack a satellite, Drone, Automobile (Black Hat - DefCon - 2013), Flight (Planesploit) etc. I think so far we can confirm that no man-made structure has a full security.Then we will test one of the most complex systems exist: The human. In this small post, we'll keep a detailed procedure in which our object of our study will be the vulnerabilities of a Human. Pues without going into details, let's start our investigation.



Objective analysis procedure.



1. Vulnerability of Being Human.


The human has hundreds of vulnerabilities (referring to the full theme as a human being). But this time it does to a human being vulnerable to possible cyber attacks, the answer is simple, with the passage of years man has slowly been relying on some electronic devices to manage some metabolic processes itself (Homeostasis ). The metabolism with the passage of time can have some difficulties to perform tasks that are essential for life in humans.




Scanning vulnerabilities.



 There are many devices that help the human to maintain a stable homeostasis. Within the different devices we find:


    Pacemaker
    
Implantable glucose sensors such
    
Infusion pumps implanted
    
Gastric simulators
    
Deep brain simulators
    O
cular implants
    S
mart pills
    P
rosthesis




With the aforementioned list, we can establish that if such electronic devices practically are supporting the survival of a person who carries, the task performed by this device is very delicate, but even when these devices may suffer some sort of attack by an outer body.

As all research process, after using a scanner for possible vulnerabilities, we proceed to investigate each of them for later or possible exploitation. As the post must be as brief possible only will have to be studied first two vulnerabilities from the perspective of a possible atacannte.

Automatic Implantable Defibrillators - Pacemakers


An implantable cardioverter defibrillator (ICD) is an active implantable medical device, which one of its functions is to detect if the heartbeat is in an abnormal condition in a patient, later to automatically revert to its normal rhythm. The DAI manage a high-energy shock or shock of a previously programmed mode.



There are a wide variety of possibilities covering defibrillators treatment for each patient. The decisipon of which is the most appropriate defibrillator is taken by your doctor, which will be based on the analysis of the arrhythmia and his heart disease. But equally important is the choice and implementation of the defibrillator, as its setting and monitoring. therefore, your cardiologist will periodically review the DAI fastened and sometimes will change some functions.

Basically we talk about two types of pacemakers which are:


    Unicameral pacemaker.
    
Dual-chamber pacemaker.


Defibrillators - Pacemakers.




The four major types of pacemaker are: atrial (AAI), ventricular (VVI) and atrioventricular (VDD and DDD). The AAI, VVI, etc acronyms are universal codes to designate the type of pacemaker clearly.

Parties pacemaker (general structure)



    Gauge of cardiac activity.
    
Heart electrode connection.
    
Data processor.
    B
attery.



Structure of the heart (Our field of study).



 
Sinoatrial node (SA): A structure where the electrical impulse that gives rise to a heartbeat originates.Atrioventricular node (AV): Used to filter the too rapid activity of the atria. AV node stream is transmitted, which is destined to reach the ventricles.


Performance


1. exchanges information with the heart dede generator sending pulses to the heart so that it shrinks at a frequency determined by the doctor.

2. Intermambia information with the heart to receive information from the heart to the generator for the latter detects if the heart beats itself to jurisdiction in that case and sending stimulus if need be.



Types of Pacemaker.



Pacemakers unicameral


Consists of a generator and stimulating a single cable and a single cavity cardíaca. Afecta detects only the atrium or the ventricle at a rate determined by programming. Stimulation own pace cease when the patient occurs.






Bicameral pacemaker.


The generator is connected to two cables cables.Uno is located in the right atrium and another in the ventricle derecho.El enables sequential dual chamber pacemaker stimulation of the two chambers. You may also be inhibited in periods in which both chambers beat normally.




Note: Here we will give more specific details about the different types of pacemakers. If the reader has so far had little problems on understanding the post, recommend ignore and not get into details, because instead of clearing their doubts they can to lead to more.

If the reader has prior knowledge, I recommend entering such details that follow because with this you can have more vision to audition for a more specific attack depending on the type of pacemaker.





Additional information - Advanced



Unicameral pacemaker.


Affect only the atrium or the ventricle, may be the AAI or VVI.


Unicameral pacemaker Headset

It is used primarily for sinus node disease prevalence of bradycardia or slow pace. It is understood that the rest of the conduction system is normal. The electrode contacts the wall of the right atrium, detects whether or not heartbeat own handset and if there is not at the desired frequency, sends an electrical stimulus generator to the atrium contracts. This stimulus reaches the atrioventricular node that transmits it to the ventricles.

Ventricular Pacemaker unicameral.

It is used mainly for complete atrioventricular block and bradycardia in those cases where it is not possible to implement the VDD or DDD pacemaker. The electrode contacts the wall of the right ventricle, and detects whether or not ventricular beat itself and if none sends an electrical stimulus generator ventricle contracts totally independent of atrial contraction that is normally performed by stimulation of the sinus node.







Bicameral defibrillator.

Affect only the atrium or the ventricle, may be the VDD or DDD.


Atrioventricular pacing (VDD)


It is used mainly for complete atrioventricular block. Consists of a generator and an electrode which contacts the atria that detects operation (if contracted or not) but which can not stimulate, and the ventricle that can be detected (if contracted or not) and which can stimulate. The stimulus that originates in the sinus node "travels through the atrial wall" to the atrioventricular node where it stops or crashes. In his "headset trip" stimulus sinus node is detected by the electrode pacemaker in his earpiece contact and transmits it to the generator that automatically issues a stimulus to the ventricle through the electrode in ventricular contact, so that the electrical stimulus arrives finally to the ventricle at a similar time that the stimulus would if normally transmitted by the atrioventricular node




Atrioventricular pacemaker (DDD)


Their use is mandatory in cases of injury to both the sinus node and atrioventricular and alternatively in complete atrioventricular block. It consists of an electrode contacting the atrium from which detects activity (if contracted or not) but which does not stimulate, and the ventricle which can detect (if contracted or not) and which can stimulate. Stimulation sinusual node is detected by the pacing lead in the atrial contact and trasmiite generator which automatically emits a stimulus to the ventricle through the electrode into ventricular contact so that the stimulation through both electrodes achieves atrioventricular contraction synchronously. This pacemaker is the most complete and physiological because it can function as AAI, VVI, DDD VDD and finally.


Well so far we have studied the functioning of the heart from a more general level, this has been done to give the reader a better perspective of the many possible attacks that can run.

Here we will focus on our goal of study, which is the operation of the pacemaker itself, ie the input data it receives to run them on their duties as scheduled.


Vulnerability Scanning - Pacemakers



As had already been mentioned above, the pacemaker pulse generator is an electronic equipment, and rhythmically pushes artificial heart when the natural pacemaker of the heart can not keep up and the appropriate frequency. Besides these devices monitor the spontaneous cardiac electrical activity and triggered by electrical or non-programming pulses.

A modern pacemaker has an estimated population of between 5 and 12 years life. Can then be changed easily through standardization (IS-1 standard) of electrode connections.



The new pacemakers have other functions:

  • Synchronization, by a communication problem between the atrium and ventricle (lock-AV).
  • Changing the frequency of beats to suit carrier body activity (rate adaptive pacemakers)
  • Helps prevent rhythm problems by atrial overdrive pacing.
  • Recording or monitoring of cardiac rhythm disturbances.
  • Improving the pumping function of the heart by stimulation of the left ventricle or both in case of a malfunction of the left ventricle and lack of irrigation (cardiac resynchronization therapy).



Structure of origin and channeling impulses.



The whole structure either from where the impulse to where the electrodes come in contact with the walls of the heart is born, you are divided into 3 specific parts.


1. Pacemaker itself: 

This is where the pulses are generated, which are duly processed under strict data information which has been properly analyzed.

2. Power cables: 

It is connected to one end of the pacemaker (properly) and it is for them where impulses travel up to the electrodes.




3. Electrodes:

The part of the pacing system that transmits the electrical impulse from the generator to the myocardium. The electrode material must be conductor, must be isolated and their size should be appropriate to enter the venous system. The electrodes can be unipolar or bipolar, the electrodes similarly may be active or passive fixation, as the method of attachment to the endocardium.


 Active Fixation


Passive fixation



Note: Many generators include polarity as a programmable parameter, being possible to program the unipolar pacing, which allows better visualization of the spicules on a surface ECG and bipolar sensing to reduce the risk of interference.


Evolution of pacemakers

Over the years, the advance of technology in the medical sector, pacemakers have undergone various changes to improve control and quality that is offered to the patient. It is obvious that the changes have brought improvements, either as the device size, maybe it could be mentioned as a weakness function internet which could.




 Wireless pacemaker.



At present there are different types of DAIC almost all manufacturers have introduced their own version of remote monitoring systems, so as Biotronik BIOTRONIK Home Monitoring introduced, Medtronic® (CareLink® Network), Patient Management system Latitude® systems Boston Scientific ® St. Paul USA, and Merlin.netTM of St Jude Medical, Sylmar USA.




But the problem that arises is afloat reliability they have come to choose many companies to connect their devices (pacemakers) to the Internet. This output for connection to the internet has been done in order to minimize costs in some way by the patient, and also to lead a management and administration of the behavior of the heart in real time by the patient's physician.


Process monitoring and remote patient monitoring with automatic desfibrilidar - Pacemakers

The BIOTRONIK Home Monitoring system allows monitoring of cardiac devices and is integrated into the MP, CRT, ICD, CRT-D. This system information is sent via telemetry, since the antenna is in the head of the device, which is received by a transmitter known as CardioMessenger, which must be located at a distance of 20 cm to 2 m from the patient; itself, is a mobile phone that transmits information received from the device to a testing center located in Berlin, Germany, through the Global System for Mobile Communication (GSM) network, that information is processed and sent to a doctor responsible or the hospital via the Internet.




Messages that are generated can be of three types:

a). Newspapers messages, which are transmitted daily to a schedule.
b). Posts in the form of warning, which are by events detected in the device, who can suffer failures in receiving programming as it is out of range or arrhythmic events, which a message is always sent will air activated and when the patient is within the reception area CardioMessenger; exist some problems with reception, with being close to the proper functioning transmission is activated.
c). Message activated by the patient by applying a magnet over the device.

Note: Certain devices can send an intracavitary electrogram (EGM) for an event or a newspaper electrogram, this thanks to the new CardioMessenger II.




Electrogram (EGM) intracavitary: The recording of intracardiac electrical signal. It is a representation of those who actually detects the pacemaker and therefore all the latter's reply will come marked by the signal. It is a very useful tool for monitoring query Pacemakers, both in the execution of the test detection and capture. Likewise, its interpretation helps us to detect and analyze complex situcaicones. Útlima generation pacemakers incorporate technology based on the anitaquicardia device, allowing you to store EGM intercavitarios which are diagnostic of great help in valoració patient clinic.




The CardioMessenger II may in some way to convey this information, which is very sensitive and important to monitor patients and that optimizes scheduling parameters pacemaker.





After implanting the devices, BIOTRONIK Home Monitoring system was fitted with a fixed transmission time for all patients, which was at six o'clock; while instructed about their operation both the patient and family. The transmission of reports scheduled daily and chose to send email alerts for display on a web page, to thus be able to analyze information in detail.




Here we can see the status of each patient, according to the traffic lights; in this case a yellow status for review is observed, while there is a report of the event and the type of implanted device.

Important note: You can observe each device has an identifier for each patient, this identifier could be very important because as attacker we could obtain privileges to access this information and use it when you want to run a specific attack under the conditions which a patient is. The identifiers and serial numbers of each device will somehow classify targets.


Exploiting vulnerabilities



Well now reaching this point and with all previous knowledge about how a pacemaker and important role around the direction of traffic vital to the device user information works. Then we will try to simulate a possible attack device.The target of the attack will be to reprogram the instructions that the device has inherited based on the patient's condition and also to be able to capture the traffic that sends a second device to a distant point of patient X.


Attack scenario

As mentioned above, pacemakers are programmed from the start, and whose parameters are entered deacuerdo the patient's condition (state of the heart). Ie the device runs normally validating each small electrical impulse by a strange little reaction from any section of the heart.




Dispotivos alternate detection.

The CardioMessenger is the device that comes into direct contact with the pacemaker, such contact is established by a wireless medium. Both devices must distance itself from 20cm to 2 meters at most to be a free flow of information.





Attack of the medium Pacemaker - CardioMessenger.

The role of CardioMessenger (General) is to monitor all activities undertaken pacemaker and according to whether their progamación can design very detailed reports (EGM), which will be sent from the device to the central service, which will be redirected to the doctor who made the request.




 Reverse Engineering


By this method we will be able to capture the traffic that is transmitted between the pacemaker and CardioMessenger.



To perform this atque we'll have to trabajr in physical layer level and need to have some deficiones and instruments.
  •     Transmission Radio Frequency (RF) about 175kHz.

  •     2-FSK modulation.

FSK modulation: A technique transisión digital binary information (ones and zeros) using two different frequencies. The modulating signal varies only between two discrete voltage values ​​forming a pulse train where 1 represents a "1" or "brand" and the other represents the "0" or "space". While the carrier is sinusoidal signal ua.






Note: I recommend reading more about FSK modulation.

    
DBPSK modulation: A form of digital modulation, where the binary input information consists of the difference between two successive phases of signaling elements, not the absolute phase. Receiver implementation is inexpensive, so it is widely used in wireless communications. In the DPSK system, the digital input stream is differentially encoded and then is modulated by binary PSK.






Note: I recommend reading more about DPSK modulation and DPSK receiver.
  • We will use known plaintexts for decoders. No retormar zeros invested with bit stuffing.



  • Communication device
1- magnetic field introduced.
2. Implantable cardioverter defibrillator (ICD).
3. Implantable cardioverter defibrillator (ICD Programmer)




Note: An attack to capture the outgoing information CardioMessenger device would be a more complex and strategic attack, either by the network used for sending information - Global System for Mobile Communication (GSM).

Capture Information 


Passive Attack mode.

As we know the information travels through a wireless medium is usually a very unstable (distance) and insecure. Therefore the capture of information will be either entirely possible by various techniques.

As a result of the executed attack we will begin to have the information.




The information we receive will depend on the programming which was held the device.



Sniffing Out vital signs.




Attack in Active mode.




1. Attacks Replay: A form of network attack in which a valid data transmission is maliciously or fraudulently repeated. Is carried out by the author or by an adversary who intercepts and re transmits information, possibly as part of a masked attack.


  • Re-transmission of the captured.



2. Request for ICD and patient data.





3. Energy Drain.


  • Constantly activate the ICD for energy consumption.



4. Change device configuration.
  • Change settings CIE, eg date.
  • Change Patient / Settings Therapy



    Inducing an electric shock using the headset-test mode.



After all detailed explanation of pacemaker function, we can deduce that a small change in programming or cause a small change in the intencidad the electric impulse, even if we do the device to create reactions that are not compatible with heart condition .





The consequences of such attacks could be fatal for the wearer of the device.


Security and Privacy




 1. One point to make is fundamentally the Authorisation.
  • Custom Authorization: Access the device information in the physical presence of the carrier.
  • Role-based authorization.
  • Prevent accidental or intentional wrong use: Contact the patient immediately the case of a possible device failure or attack.
  • Having cryptographic systems to enhance safety and to have support from other media either emergencies.



Expanding the range of attacks.




With new technologies today, in which a mobile today is practically what some years ago was a laptop. This avanze brings freedom to exercise a more active attacks and less suspicious appropriate.


Following security conferences that have been made around the world and in which many systems have been breached with only one mobile and applications.





For our post and able to somehow extend the distance of serious attack using or disposing of a directional antenna which will improve the signal strength of your wireless router (Cell) and quality to increase wireless coverage.




Conclusions:

1. There is no free systems which are free from attacks, either computer systems or more complex systems.

2. types of pacemakers is I detail by the fact that in order to carry out an attack whose effectiveness is 100%, it is necessary to have all possible information from the target, the more detailed information becomes available, we will be able to decide what kind of modifications can be carried out in order that there is no uncertainty error when running it.

3.- to have sensitive information can lead to not pleasant event for an entity.




Note: I want to thank a person, and thanks to their contributions and research has to do the post. Barnaby JaCk - Black Hat 2013. As we know our friend and colleague has left a big gap between all related to information security community. For me it has been a boost to keep going. Thanks Barnaby JaCk - R.I.P.



DefCoN 2013: Vegas - Nevada




Well I think we've reached the end of the post, and I'd just like to add that will share more in the next post interesting publications. Well time to say good bye.

Previous
Next Post »

1 comments:

Write comments
felisha green
AUTHOR
24 December 2020 at 02:38 delete

Are you willing to know who your spouse really is, if your spouse is cheating just contact cybergoldenhacker he is good at hacking into cell phones,changing school grades and many more this great hacker has also worked for me and i got results of spouse whats-app messages,call logs, text messages, viber,kik, Facebook, emails. deleted text messages and many more this hacker is very fast cheap and affordable he has never disappointed me for once contact him if you have any form of hacking problem am sure he will help you THANK YOU.
contact: cybergoldenhacker at gmail dot com

Reply
avatar