On-Prem

Public Sector

Uncle Sam to inject $50M into auto-patcher for hospital IT

Boffins, why not simply invent an algorithm that autonomously fixes flaws, thereby ending ransomware forever


The US government's Advanced Research Projects Agency for Health (ARPA-H) has pledged more than $50 million to fund the development of technology that aims to automate the process of securing hospital IT environments.

ARPA-H has called this program Universal PatchinG and Remediation for Autonomous DEfense, or UPGRADE for short. The agency basically wants techies to get together and build a suite of software tools that can scan for vulnerabilities and weaknesses in hospital computer systems, and then automatically deploy patches for identified threats, developing and testing fixes and mitigations as needed.

As such, the agency this week invited teams to apply for funding totaling tens of millions of dollars to create UPGRADE and see it through to completion.

Modern medical facilities typically use a lot of internet or network-connected devices, and taking these offline to patch or protect them can disrupt patient services. Not patching them, however, leaves clinics vulnerable to compromise. To accommodate these hospital-specific concerns, the UPGRADE platform will test software fixes in a model environment before deploying them "with minimum interruption" to the devices that need them, if the plans come to fruition. 

The project thus seeks participants focused on four specific areas: Creating a vulnerability mitigation software platform; developing digital twins of hospital equipment; auto-detecting flaws; and auto-developing custom defenses.  

ARPA-H is a US government funding agency that President Joe Biden created two years ago. It's tasked with making "pivotal investments in breakthrough technologies" that advantage medicine and healthcare — specifically technologies that "cannot readily be accomplished through traditional research or commercial activity." And its director reports to the US Dept of Health and Human Services (HHS) Secretary.

"We continue to see how interconnected our nation's health care ecosystem is and how critical it is for our patients and clinical operations to be protected from cyberattacks," HHS Deputy Secretary Andrea Palm said in a statement. "ARPA-H's UPGRADE will help build on HHS' Healthcare Sector Cybersecurity Strategy to ensure that all hospital systems, large and small, are able to operate more securely and adapt to the evolving landscape."

HHS, incidentally, sets hospitals voluntary healthcare-specific cybersecurity performance goals that look likely to become mandatory.

UPGRADE, and what it hopes to accomplish, is a big task. It's also potentially a life-saving one, as ransomware and other criminal gangs increasingly target medical facilities with the intent of locking IT and medical staff out of critical systems needed to deploy ambulances, provide medications and services, and access patients' vital information.

"Healthcare is both acutely being targeted, and it has been more and more targeted over the last few years," ARPA-H program manager Andrew Carney told The Register in an earlier interview. "It's also uniquely sensitive to disruptions compared to many other critical infrastructure sectors."

Carney, at the time, was discussing another recent ARPA-H partnership, this one with the Defense Advanced Research Projects Agency (DARPA) for the Artificial Intelligence Cyber Challenge (AIxCC).

AIxCC is the two-year competition that DARPA announced last summer at the annual Black Hat conference in Las Vegas. It focuses on building AI-based tools that automatically secure code used in critical infrastructure. Participants in this challenge are now competing in trials to see which teams will advance to the semifinals at DEF CON in August. 

During the semi-finals, seven teams will each be awarded $2 million before advancing to the final competition at the DEF CON conference in 2025. ®

Send us news
33 Comments

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

BlackBerry offloads Cylance's endpoint security products to Arctic Wolf

Fresh attempt to mix the perfect cocktail of IoT and Infosec

US reportedly mulls TP-Link router ban over national security risk

It could end up like Huawei -Trump's gonna get ya, get ya, get ya

Microsoft won't let customers opt out of passkey push

Enrollment invitations will continue until security improves

Blocking Chinese spies from intercepting calls? There ought to be a law

Sen. Wyden blasts FCC's 'failure' amid Salt Typhoon hacks

Australia moves to drop some cryptography by 2030 – before quantum carves it up

The likes of SHA-256, RSA, ECDSA and ECDH won't be welcome in just five years

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

Boffins trick AI model into giving up its secrets

All it took to make an Google Edge TPU give up model hyperparameters was specific hardware, a novel attack technique … and several days

Open source maintainers are drowning in junk bug reports written by AI

Python security developer-in-residence decries use of bots that 'cannot understand code'