On-Prem

Public Sector

Uncle Sam to inject $50M into auto-patcher for hospital IT

Boffins, why not simply invent an algorithm that autonomously fixes flaws, thereby ending ransomware forever


The US government's Advanced Research Projects Agency for Health (ARPA-H) has pledged more than $50 million to fund the development of technology that aims to automate the process of securing hospital IT environments.

ARPA-H has called this program Universal PatchinG and Remediation for Autonomous DEfense, or UPGRADE for short. The agency basically wants techies to get together and build a suite of software tools that can scan for vulnerabilities and weaknesses in hospital computer systems, and then automatically deploy patches for identified threats, developing and testing fixes and mitigations as needed.

As such, the agency this week invited teams to apply for funding totaling tens of millions of dollars to create UPGRADE and see it through to completion.

Modern medical facilities typically use a lot of internet or network-connected devices, and taking these offline to patch or protect them can disrupt patient services. Not patching them, however, leaves clinics vulnerable to compromise. To accommodate these hospital-specific concerns, the UPGRADE platform will test software fixes in a model environment before deploying them "with minimum interruption" to the devices that need them, if the plans come to fruition. 

The project thus seeks participants focused on four specific areas: Creating a vulnerability mitigation software platform; developing digital twins of hospital equipment; auto-detecting flaws; and auto-developing custom defenses.  

ARPA-H is a US government funding agency that President Joe Biden created two years ago. It's tasked with making "pivotal investments in breakthrough technologies" that advantage medicine and healthcare — specifically technologies that "cannot readily be accomplished through traditional research or commercial activity." And its director reports to the US Dept of Health and Human Services (HHS) Secretary.

"We continue to see how interconnected our nation's health care ecosystem is and how critical it is for our patients and clinical operations to be protected from cyberattacks," HHS Deputy Secretary Andrea Palm said in a statement. "ARPA-H's UPGRADE will help build on HHS' Healthcare Sector Cybersecurity Strategy to ensure that all hospital systems, large and small, are able to operate more securely and adapt to the evolving landscape."

HHS, incidentally, sets hospitals voluntary healthcare-specific cybersecurity performance goals that look likely to become mandatory.

UPGRADE, and what it hopes to accomplish, is a big task. It's also potentially a life-saving one, as ransomware and other criminal gangs increasingly target medical facilities with the intent of locking IT and medical staff out of critical systems needed to deploy ambulances, provide medications and services, and access patients' vital information.

"Healthcare is both acutely being targeted, and it has been more and more targeted over the last few years," ARPA-H program manager Andrew Carney told The Register in an earlier interview. "It's also uniquely sensitive to disruptions compared to many other critical infrastructure sectors."

Carney, at the time, was discussing another recent ARPA-H partnership, this one with the Defense Advanced Research Projects Agency (DARPA) for the Artificial Intelligence Cyber Challenge (AIxCC).

AIxCC is the two-year competition that DARPA announced last summer at the annual Black Hat conference in Las Vegas. It focuses on building AI-based tools that automatically secure code used in critical infrastructure. Participants in this challenge are now competing in trials to see which teams will advance to the semifinals at DEF CON in August. 

During the semi-finals, seven teams will each be awarded $2 million before advancing to the final competition at the DEF CON conference in 2025. ®

Send us news
33 Comments

Microsoft hosts a security summit but no press, public allowed

CrowdStrike, other vendors, friendly govt reps…but not anyone who would tell you what happened

Security biz Verkada to pay $3M penalty under deal that also enforces infosec upgrade

Allowed access to 150K cameras, some in sensitive spots, but has been done for spamming

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

White House thinks it's time to fix the insecure glue of the internet: Yup, BGP

Better late than never

CrowdStrike's meltdown didn't dent its market dominance … yet

Total revenue for Q2 grew 32 percent

Volt Typhoon suspected of exploiting Versa SD-WAN bug since June

The same Beijing-backed cyber spy crew the feds say burrowed into US critical infrastructure

Microsoft security tools questioned for treating employees as threats

Cracked Labs examines how workplace surveillance turns workers into suspects

Watchdog warns FBI is sloppy on secure data storage and destruction

National security data up for grabs, Office of the Inspector General finds

Planned Parenthood confirms cyber-attack as RansomHub threatens to leak data

93GB of info feared pilfered in Montana by heartless crooks

Iran's Pioneer Kitten hits US networks via buggy Check Point, Palo Alto gear

The government-backed crew also enjoys ransomware as a side hustle

Cicada ransomware may be a BlackCat/ALPHV rebrand and upgrade

Researchers find many similarities, and nasty new customizations such as embedded compromised user credentials

Transport for London confirms cyberattack, assures us all is well

Government body claims there is no evidence of customer data being compromised