{"id":7903,"date":"2017-06-09T07:10:05","date_gmt":"2017-06-09T15:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/06\/09\/news-1684\/"},"modified":"2017-06-09T07:10:05","modified_gmt":"2017-06-09T15:10:05","slug":"news-1684","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/06\/09\/news-1684\/","title":{"rendered":"Please stop posting your X-rays to social media"},"content":{"rendered":"<p><strong>Credit to Author: William Tsing| Date: Fri, 09 Jun 2017 14:00:36 +0000<\/strong><\/p>\n<p>Social media is fun. Posting pictures and sharing them with friends is a great technology. But please, we beg you, stop posting your medical imaging results to Instagram, Twitter, and Facebook. Why? What if you get a gnarly fracture from a really awesome snowboarding stunt and you want to share your battle wounds? Let&#8217;s start small and see where an X-ray or MRI can take us.<\/p>\n<p>&nbsp;<\/p>\n<h3>Personally Identifiable Information<\/h3>\n<p> <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/please-stop-posting-your-x-rays-to-social-media\/#gallery-18187-1-slideshow\">Click to view slideshow.<\/a> <\/p>\n<p>Depending on the facility, your X-ray or MRI might have your full name, date of birth, social security number, name, and the name\u00a0of the facility in question. This much information is good when your doctor needs to know with 100% certainty that you are you and are tied to your medical records. It&#8217;s bad when it&#8217;s on Twitter.<\/p>\n<p>&nbsp;<\/p>\n<h3>Doxxing<\/h3>\n<p> <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/please-stop-posting-your-x-rays-to-social-media\/#gallery-18187-2-slideshow\">Click to view slideshow.<\/a> <\/p>\n<p>Disclosure of one piece of personal information feels inconsequential. But multiple, low-value pieces of information disclosed on multiple platforms can yield an analytic chain that can uncover more serious data. For an X-ray, your name, and the name of a hospital seem fairly trivial and non-threatening. But the hospital name provides your probable city of residence, which in conjunction with your name, often provide property, tax, and voting records. Public data brokers often organize their best guess matching name and phone number by the city.<\/p>\n<p>Meaning: a bad guy holding his target&#8217;s X-ray can have hard validation on the city of residence, which in turn allows him to validate anything else of yours he steals to exclude other people with the same name. It&#8217;s a neat trick, with the only real defense being to not post personal information online if its something you can&#8217;t change easily. (Your fingerprint, city of residence, name, etc.)<\/p>\n<h3>Endangering your hospital\/doctor&#8217;s entire network<\/h3>\n<p>And sometimes the machines taking the pictures can be networked. (Yes, there is an absolute landslide of issues surrounding why and how an X-ray machine should be\u00a0connected to a network, but that is a series of blogs for another time.) Take a look at this X-ray:<\/p>\n<div id=\"attachment_18251\" style=\"width: 487px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-18251\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/networkXray-477x600.jpeg\" alt=\"\" width=\"477\" height=\"600\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/networkXray-477x600.jpeg 477w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/networkXray-239x300.jpeg 239w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/networkXray.jpeg 880w\" sizes=\"auto, (max-width: 477px) 100vw, 477px\" \/><\/p>\n<p class=\"wp-caption-text\">Public facing server redacted<\/p>\n<\/div>\n<p>This person has wisely cropped out their own name, but if you check out the bottom right corner, you&#8217;ll see the active user account in the program. Not extremely alarming, but further is &#8220;Server: [redacted].&#8221; Very, very alarming! Perhaps the server receiving the image is a local machine that&#8217;s aair-gapped from the Internet but needs to receive images from multiple machines in an office or hospital. (If you are a security professional reading this, we know that this is extremely unlikely.) So, taking the server name and plugging it into a public metadata search tool, we find:<\/p>\n<ul>\n<li>The image was taken in 2014, but the server is still active as of writing<\/li>\n<li>The server is web facing<\/li>\n<li>The WHOIS on the web server is public<\/li>\n<li>All of the server&#8217;s subdomains are enumerated<\/li>\n<li>Traversing the subnet reveals what is most likely a medical record server<\/li>\n<\/ul>\n<p>Yikes. Medical infrastructure security has problems. A lot of problems. But while the responsibility for an insecure network lies with the organization running it, posting photos that have exploitable information is also not a great thing. Given that vulnerabilities in the medical space can have <a href=\"https:\/\/www.theregister.co.uk\/2017\/05\/12\/nhs_hospital_shut_down_due_to_cyber_attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">catastrophic consequences<\/a>, we should take extra care before exposing any data from inside a hospital or doctor&#8217;s office.<\/p>\n<h3>But I really, really want to post pics!<\/h3>\n<p>Use a crop tool. On a Mac, Command+Shift+4 brings up a resizable frame that can be used to crop out data that is none of the Internet&#8217;s business. On a PC,\u00a0Select the <strong>Start\u00a0<\/strong>button, type <strong>snipping tool<\/strong> in the search box on the taskbar, and then select <strong>Snipping Tool<\/strong> from the list of results. Remember that you are not only cropping out your information, but also the medical facility&#8217;s.<\/p>\n<p> <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/please-stop-posting-your-x-rays-to-social-media\/#gallery-18187-3-slideshow\">Click to view slideshow.<\/a> <\/p>\n<p>On Instagram, you can follow the instructions <a href=\"https:\/\/help.instagram.com\/117838865078314?ref=related\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a> to crop your photo. On Twitter, maybe you just shouldn&#8217;t, unless your account is private.<\/p>\n<p>A good question to ask before you post is &#8220;Do I want people I don&#8217;t know to have this information, and do whatever they want with it, for as long as they want?&#8221; If the answer is no, take a pause before hitting submit and check out <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/02\/how-do-i-secure-my-social-media-profile\/\" target=\"_blank\" rel=\"noopener noreferrer\">our post here<\/a> on securing your social media profile.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/please-stop-posting-your-x-rays-to-social-media\/\">Please stop posting your X-rays to social media<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/please-stop-posting-your-x-rays-to-social-media\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: William Tsing| Date: Fri, 09 Jun 2017 14:00:36 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/please-stop-posting-your-x-rays-to-social-media\/' title='Please stop posting your X-rays to social media'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/06\/socialmediagroup.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Many people post unredacted medical images to Twitter and Instagram. They shouldn&#8217;t because the details included on the image often can compromise personal identity online and in rare instances, lead to a possible attack on an exposed piece of medical IT infrastructure.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/privacy\/\" rel=\"category tag\">Privacy<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/doxxing\/\" rel=\"tag\">doxxing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hacking\/\" rel=\"tag\">hacking<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/health-records\/\" rel=\"tag\">health records<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/medical-records\/\" rel=\"tag\">medical records<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mri\/\" rel=\"tag\">MRI<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/privacy\/\" rel=\"tag\">privacy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-engineering\/\" rel=\"tag\">Social Engineering<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/social-media\/\" rel=\"tag\">social media<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/x-ray\/\" rel=\"tag\">X-Ray<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/please-stop-posting-your-x-rays-to-social-media\/' title='Please stop posting your X-rays to social media'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/06\/please-stop-posting-your-x-rays-to-social-media\/\">Please stop posting your X-rays to social media<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[4503,12600,3919,1243,1244,12601,5897,10510,1932,12602],"class_list":["post-7903","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cybercrime","tag-doxxing","tag-hacking","tag-health-records","tag-medical-records","tag-mri","tag-privacy","tag-social-engineering","tag-social-media","tag-x-ray"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7903"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7903\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7903"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}