Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
26
27
28
29
30
31
1
2
4
5
6
7
8
10
11
12
12:00 AM - PFF Summit 2015
13
14
15
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
4
5
6
NextEdge Health Experience Summit
2015-11-03 - 2015-11-04    
All Day
With a remarkable array of speakers and panelists, the Next Edge: Health Experience Summit is shaping-up to be an event that attracts healthcare professionals who [...]
mHealthSummit 2015
2015-11-08 - 2015-11-11    
All Day
Anytime, Anywhere: Engaging Patients and ProvidersThe 7th annual mHealth Summit, which is now part of the HIMSS Connected Health Conference, puts new emphasis on innovation [...]
24th Annual Healthcare Conference
2015-11-09 - 2015-11-11    
All Day
The Credit Suisse Healthcare team is delighted to invite you to the 2015 Healthcare Conference that takes place November 9th-11th in Arizona. We have over [...]
PFF Summit 2015
2015-11-12 - 2015-11-14    
All Day
PFF Summit 2015 will be held at the JW Marriott in Washington, DC. Presented by Pulmonary Fibrosis Foundation Visit the www.pffsummit.org website often for all [...]
2nd International Conference on Gynecology & Obstetrics
2015-11-16 - 2015-11-18    
All Day
Welcome Message OMICS Group is esteemed to invite you to join the 2nd International conference on Gynecology and Obstetrics which will be held from November [...]
Events on 2015-11-03
NextEdge Health Experience Summit
3 Nov 15
Philadelphia
Events on 2015-11-08
mHealthSummit 2015
8 Nov 15
National Harbor
Events on 2015-11-09
Events on 2015-11-12
PFF Summit 2015
12 Nov 15
Washington, DC
Events on 2015-11-16
Latest News

Modat Finds 1.2M Healthcare Devices Exposed, Patient Data at Risk

THE HAGUE, Netherlands, Aug. 07, 2025 (GLOBE NEWSWIRE) — New research from European cybersecurity firm Modat reveals over 1.2 million internet-connected healthcare devices and systems are exposed, putting patient data at risk. The study identified more than 81,000 exposed systems in Ireland and over 77,000 in Great Britain, with most cases found across Europe, the U.S., and the MENA region.

The research was carried out using Modat’s proprietary internet scanning platform, Modat Magnify. It examined over 70 types of medical devices and systems, including MRI, CT, X-ray machines, DICOM viewers, blood test systems, hospital management systems, and other accessible medical equipment. The main causes of vulnerabilities were misconfigurations, insecure management settings, default or weak passwords, and unpatched firmware or software flaws.

Researchers found many systems lacked basic authentication, with some still using factory-default or weak passwords like “admin” or “123456.” Additionally, outdated or unpatched software left critical devices open to exploitation. These security gaps threaten patient confidentiality and could enable cybercriminals to conduct fraud, extortion, or network breaches.

One scan, for example, exposed a patient’s chest and brain MRI results, including names and medical histories. The records contained highly sensitive Protected Health Information (PHI) and Personally Identifiable Information (PII). Researchers also found various other medical images, such as optician eye exams, dental X-rays, blood test results, and detailed lung MRIs often used to support lung cancer patients.

Modat promptly contacted international partners Health-ISAC and Dutch CERT Z-CERT to begin the Responsible Disclosure process. These organizations will reach out to affected entities to help address and resolve the security vulnerabilities.

The findings highlight that cybersecurity in healthcare is not just an IT issue but a critical patient safety concern.

These systems should never be accessible directly via the internet. Modat CEO Soufian El Yadmani said, “The real question is: Why are MRI scanners connected to the internet without proper security measures?”

He added, “The main risk comes from unnecessary network exposure. Medical devices should only be connected to secure, well-configured networks when remote access is clinically necessary.”

Recommendations include conducting regular security assessments, maintaining detailed asset inventories, and continuously monitoring network-connected devices to detect potential exposures, misconfigurations, or new vulnerabilities.

Modat Magnify, designed specifically for cybersecurity professionals, was used to identify the misconfigured and vulnerable devices. This platform scans and catalogs internet-connected devices, assigning each a unique profile in its database to aid in vulnerability and configuration management.

By running a Modat Magnify query using the ‘device DNA’ tag HEALTHCARE, researchers identified over 1.2 million devices accessible on the open internet. Although the data may include some honeypots, the findings are still alarming. Many devices are exposed due to security weaknesses, misconfigurations, or lack of proper authentication. The query results provide detailed information on device types, IP addresses, geographic locations, and more.

Geographically, the top 10 countries with the highest numbers (at the time of the scan) were:

  • United States (174K+)
  • South Africa (172K+)
  • Australia (111K+)
  • Brazil (82K+)
  • Germany (81K+)
  • Ireland (81K+)
  • Great Britain (77K+)
  • France (75K+)
  • Sweden (74K+)
  • Japan (48K+)

Researchers were able to delve deeper into the data by specifically searching for MRI scanners with unintended access points.

Because many scanners were not securely configured, they uncovered brain scan images that included patients’ names and scan dates. Using this approach, they also accessed various other medical images such as optician eye exams, dental X-rays, blood test results, and detailed lung MRIs often used to support lung cancer patients—revealing a disturbingly large number of exposed medical records.

In some cases, these systems had no authentication in place at all; in others, weak or default manufacturer-set credentials were used. Additionally, misconfigurations allowed excessive access to devices vulnerable to zero-day attacks or known exploits. Some of the devices were legacy systems still in use despite being out of support.