INFORMATION TECHNOLOGY ADVISORY

INFORMATION TECHNOLOGY ADVISORY

Information on Orangeworm vulnerability

April 30, 2018

Bayer Radiology has performed an assessment of the below listed Orangeworm vulnerability and, based on the current understanding and our internal research, we have determined that there is no immediate safety or security threat to Bayer Radiology medical devices, including Medrad® Stellant and Medrad® MRXperion control room units (Certegra® Workstations), Certegra® and VirtualCare® devices, Medrad® Intego and Certegra® Connect CT. This is due to the fact that the current primary attack vector is through phishing techniques, which are not supported on these Bayer Radiology medical devices. Bayer Radiology medical devices are not a primary entry point for a phishing-based attack such as Orangeworm, but are highly dependent on the strength of the network on which they are deployed. Bayer Radiology recommends regular network maintenance and patch updates to mitigate vulnerabilities, such as Orangeworm

The Bayer Radiology Radimetrics Enterprise Platform is not impacted by this vulnerability, as it is a Linux-based system, and does not rely on MS Windows.

We will continue to monitor the situation and the associated activity and provide updates, as needed.

Potential Orangeworm vulnerability:
Trojan.Kwampirs
Trojan type virus affecting MS Windows systems, and may open a back door on the compromised system and download potentially malicious files.

 

Information on Meltdown and Spectre Security Issue

January 15, 2018

Information on Meltdown and Spectre Security Issue

Bayer Radiology is committed to product safety and security, and an integral element of the Bayer cyber response process is the ongoing global monitoring for cybersecurity signals. Bayer Radiology maintains a testing and monitoring infrastructure, complete with assessment and vulnerability analysis tools, that enables continuous awareness of industry threats. Currently our Bayer Radiology CyberSecurity team is conducting risk and vulnerability assessments of the recently discovered Meltdown and Spectre vulnerabilities, in order to determine potential impact on Bayer Radiology products.

Bayer Radiology will continue to monitor activity and updates associated with the Meltdown and Spectre vulnerabilities, including mitigation solutions being released by various entities. Bayer will continue to post updates regarding this security issue on this website. Customers requiring further assistance should call Bayer at 1-877-229-3767.

 

Information on “WannaCry” Ransomware

March 9, 2018

All Bayer devices which may have been affected by the Ransonware known as “WannaCry” have been patched remotely or by an on-site visit by Bayer between June 2017 and August 2017 and the issue has been resolved. No further action is needed. Customers requiring further assistance should call Bayer at 1-877-229-3767.


May 26, 2017

Bayer continues to deploy the certified Microsoft (MS) Security Patch to address the Ransomware known as "WannaCry". You may have received an email from us with instructions to power off and re-start your Medrad® Stellant control room unit (Certegra Workstation) if it is connected to Virtual Care Remote Support.
Please click here to see the power off and re-start instructions.

If you are not connected to our VirtualCare Remote Support solution, please be advised that Bayer will contact you directly to install the patch if required for your device. Bayer will continue to post updates regarding this malware event on this website. Customers requiring further assistance should call Bayer at 1-877-229-3767.


May 19, 2017

As a follow up to our May 17th Information Technology Advisory below, Bayer has now certified the Microsoft (MS) security patch and has started to deploy the update. If you have an identified Bayer Windows-based device, Bayer will contact you with instructions for application of the patch.

Bayer will continue to post updates regarding this malware event on this website. Customers requiring further assistance should call Bayer at 1-877-229-3767.


May 17, 2017

Bayer is aware of ransomware ("WannaCry") that is exploiting vulnerabilities in Microsoft (MS) Windows. If a hospital's network is compromised by the malware attack, the virus can spread through the hospital's information technology (IT) network. In this event, Bayer's Windows-based devices that are connected to the network may be impacted. These devices include: Medrad® Stellant and Medrad® MRXperion control room units (Certegra® Workstations), Certegra® and VirtualCare devices, Medrad® Intego RDMS and Certegra® Connect.CT.

Bayer actively monitors for malware that may affect the operation of our devices. In response to this latest global cyber-attack, Bayer will provide a certified MS security patch for deployment on the devices listed above.

If a hospital network has been impacted by this malware, customers should immediately unplug the Ethernet cable from the network jack on the listed devices above.

If the network has NOT been impacted, Bayer recommends working with hospital IT/Security teams to determine the best course of action until a Bayer certified MS security patch is provided. An action a hospital IT/Security team may consider is to unplug the Ethernet cable from the hospital network jack on the listed devices above which will take these devices offline.

In the event that the hospital opts to take these devices offline:

  • Bayer and/or Medrad-branded injector(s) will continue to support contrast-enhanced procedures based on the hospital's established protocols through the control room unit.
  • Contrast injection data will not transfer to PACS, speech recognition, Radimetrics, or other systems and is not retrievable.
  • Remote service of Bayer Radiology devices through VirtualCare will also be deactivated.

Bayer will post updates regarding this malware event on this website and will reach out to customers when the Bayer approved Microsoft Security patch is available.

Customers requiring further assistance should contact their local service team for support.