<p>Bengaluru: A cybersecurity flaw on the website of a well-known hospital chain in <a href="https://www.bing.com/ck/a?!&&p=d9155672e2582078JmltdHM9MTcyNDAyNTYwMCZpZ3VpZD0yNzVhOTk3Yi1jMjU0LTY3ZTctMTc4My04ZDlhYzNlNjY2NGMmaW5zaWQ9NTIyNA&ptn=3&ver=2&hsh=3&fclid=275a997b-c254-67e7-1783-8d9ac3e6664c&psq=bengaluru+deccan+herald&u=a1aHR0cHM6Ly93d3cuZGVjY2FuaGVyYWxkLmNvbS9iZW5nYWx1cnUta2FybmF0YWthLWluZGlh&ntb=1">Bengaluru </a>put confidential patient data at risk of exploitation by cybercriminals, according to a complaint filed with the Indian Computer Emergency Response Team (CERT-In). </p><p>On August 12, CERT-In registered the complaint after Sourajeet Majumder, a cybersecurity researcher, flagged the vulnerability in a sub-domain of the Sagar Hospitals website. Separately, the National Critical Information Infrastructure Protection Centre (NCIIPC) acknowledged the issue in an August 9 communication with Majumder and promised a resolution. </p><p><em>DH</em> has reviewed the emailed responses from the two agencies. </p>.<p>The vulnerability could have given hackers access to diagnosis reports, containing patients’ confidential information, including name, phone number, age, gender, Unique Health Identifier (UHID), bed and ward number and detailed test results. Even confidential reports of minors and senior citizens were at risk. </p><p>The vulnerability existed in an extension to the hospital’s official website. Majumder detected it after scanning the QR code in the physical lab report of a friend admitted to the hospital’s Jayanagar branch. </p><p>When scanned, the QR code would direct the patient to a section of the hospital website from where soft copies of lab reports could be downloaded without OTP or other verification.</p><p>According to Majumder, hundreds of patient reports were at risk of potential misuse. </p>.Bengaluru: BBMP’s ‘compromised deal’ lights up safety concerns.<p>With branches in Jayanagar and Kumaraswamy Layout, Sagar Hospitals is accredited by the National Accreditation Board for Hospitals and Healthcare Providers (NABH) and the National Accreditation Board for Testing and Calibration Laboratories (NABL), according to its website. </p>.<p><strong>What’s the vulnerability?</strong></p><p>According to Majumder, the vulnerability is called Insecure Direct Object Reference (IDOR). </p><p>“It is a type of access control vulnerability that occurs when an application provides direct access to objects (such as files, database records, etc) based on user-supplied input, without sufficient validation or access control checks,” he told <em>DH</em>. “This vulnerability can allow an attacker to gain unauthorised access to objects or data.” </p><p>Using this vulnerability, a hacker could have downloaded unmasked soft copies of lab reports. After <em>DH</em> contacted the hospital on August 14, it disabled access to the sub-domain. </p>.<p><strong>Implications</strong></p><p>For a layperson, the vulnerability may seem technical but not for hackers, who, according to Majumder, can use tools to discover sub-domains associated with the primary website and exploit them. </p><p>“Sometimes patients share their lab reports on social media or public forums, not realising the risks,” he said, recommending that hospitals introduce two-factor authentication (password and OTP verification) to safeguard the data. </p>.<p><strong>What hospital says</strong></p><p>“We have connect (sic) with our legal team and they will internally investigate the whole thing and will get back to you,” said Jaba M Roy, general manager (branding, media and communication), Sagar Hospitals.</p>
<p>Bengaluru: A cybersecurity flaw on the website of a well-known hospital chain in <a href="https://www.bing.com/ck/a?!&&p=d9155672e2582078JmltdHM9MTcyNDAyNTYwMCZpZ3VpZD0yNzVhOTk3Yi1jMjU0LTY3ZTctMTc4My04ZDlhYzNlNjY2NGMmaW5zaWQ9NTIyNA&ptn=3&ver=2&hsh=3&fclid=275a997b-c254-67e7-1783-8d9ac3e6664c&psq=bengaluru+deccan+herald&u=a1aHR0cHM6Ly93d3cuZGVjY2FuaGVyYWxkLmNvbS9iZW5nYWx1cnUta2FybmF0YWthLWluZGlh&ntb=1">Bengaluru </a>put confidential patient data at risk of exploitation by cybercriminals, according to a complaint filed with the Indian Computer Emergency Response Team (CERT-In). </p><p>On August 12, CERT-In registered the complaint after Sourajeet Majumder, a cybersecurity researcher, flagged the vulnerability in a sub-domain of the Sagar Hospitals website. Separately, the National Critical Information Infrastructure Protection Centre (NCIIPC) acknowledged the issue in an August 9 communication with Majumder and promised a resolution. </p><p><em>DH</em> has reviewed the emailed responses from the two agencies. </p>.<p>The vulnerability could have given hackers access to diagnosis reports, containing patients’ confidential information, including name, phone number, age, gender, Unique Health Identifier (UHID), bed and ward number and detailed test results. Even confidential reports of minors and senior citizens were at risk. </p><p>The vulnerability existed in an extension to the hospital’s official website. Majumder detected it after scanning the QR code in the physical lab report of a friend admitted to the hospital’s Jayanagar branch. </p><p>When scanned, the QR code would direct the patient to a section of the hospital website from where soft copies of lab reports could be downloaded without OTP or other verification.</p><p>According to Majumder, hundreds of patient reports were at risk of potential misuse. </p>.Bengaluru: BBMP’s ‘compromised deal’ lights up safety concerns.<p>With branches in Jayanagar and Kumaraswamy Layout, Sagar Hospitals is accredited by the National Accreditation Board for Hospitals and Healthcare Providers (NABH) and the National Accreditation Board for Testing and Calibration Laboratories (NABL), according to its website. </p>.<p><strong>What’s the vulnerability?</strong></p><p>According to Majumder, the vulnerability is called Insecure Direct Object Reference (IDOR). </p><p>“It is a type of access control vulnerability that occurs when an application provides direct access to objects (such as files, database records, etc) based on user-supplied input, without sufficient validation or access control checks,” he told <em>DH</em>. “This vulnerability can allow an attacker to gain unauthorised access to objects or data.” </p><p>Using this vulnerability, a hacker could have downloaded unmasked soft copies of lab reports. After <em>DH</em> contacted the hospital on August 14, it disabled access to the sub-domain. </p>.<p><strong>Implications</strong></p><p>For a layperson, the vulnerability may seem technical but not for hackers, who, according to Majumder, can use tools to discover sub-domains associated with the primary website and exploit them. </p><p>“Sometimes patients share their lab reports on social media or public forums, not realising the risks,” he said, recommending that hospitals introduce two-factor authentication (password and OTP verification) to safeguard the data. </p>.<p><strong>What hospital says</strong></p><p>“We have connect (sic) with our legal team and they will internally investigate the whole thing and will get back to you,” said Jaba M Roy, general manager (branding, media and communication), Sagar Hospitals.</p>