The Healthcare Threat Landscape

Change Healthcare
22M ransom paid after living off the land attack affected 1/3 of Americans’ health records.

Anthem
78.8 million patient records stolen using legitimate admin tools, with attackers living in the network for months before detection.

Medical Device Campaigns
Nation-state reconnaissance targeting Medtronic, Boston Scientific, and Stryker using legitimate device management software for IP theft.
Why Medical Devices Are Vulnerable
Medical devices often use:
- Standard networking protocols for remote monitoring
- Default or weak authentication credentials
- Legitimate remote access software for maintenance
- Unencrypted communications for device management
Attackers exploit these same channels, making malicious activity indistinguishable from legitimate device operation.
Nodal’s Healthcare Approach
Non-invasive monitoring that detects threats without impacting patient care:
- Patient Safety First: No agents on medical devices, no network disruption
- Real-time Detection: Identify threats using legitimate medical device protocols
- Surgical Response: Precise threat mitigation preserves critical care operations
- HIPAA Compliance: Full audit trails and incident documentation
- Medical Device Visibility: Monitor IoT and legacy devices traditional tools miss