Case Study: St. Jude Pacemaker Recall

18 August 2020 by Phillip Johnston • Last updated 15 August 2023465,000 U.S. patients were been told to visit a clinic to receive a firmware update for their St. Jude pacemakers. The firmware contains a security flaw which allows hackers within radio range to take control of a vulnerable pacemaker. Identified attacks include: “Crash attacks”, which involve broadcasting a combination of signals that place cardiac devices into a state of malfunction “Battery drain attacks”, which generates signals from the Merlin@home device to run down batteries in a Cardiac Device at a “greatly accelerated rate”. While St. Jude and other parties, …

To access this content, you must purchase a Membership - check out the different options here. If you're a member, log in.