Back to Intelligence

Securing Interstate Telehealth: Defending Expanded Attack Surfaces and PHI Data

SA
Security Arsenal Team
April 4, 2026
5 min read

Introduction

The recent announcement by Johns Hopkins Medicine and the American Telemedicine Association (ATA) regarding an interstate telehealth initiative marks a significant shift in healthcare delivery. While this expansion improves patient access to remote care and Remote Patient Monitoring (RPM), it fundamentally alters the security landscape for defenders.

For security teams, the "virtual clinic" introduces a myriad of new endpoints, IoT devices, and cross-state data flows that sit outside the traditional perimeter. As healthcare organizations rush to scale these capabilities, the attack surface expands proportionally, increasing the risk of Protected Health Information (PHI) exposure, ransomware attacks on medical devices, and compliance violations across state lines. Defenders must proactively secure these new channels before adversaries exploit them.

Technical Analysis

From a defensive perspective, the interstate telehealth initiative relies heavily on three critical technical components that represent high-risk targets:

  1. Remote Patient Monitoring (RPM) IoT Devices: These devices often run on embedded operatingystems with limited security patching capabilities. They collect sensitive physiological data and transmit it to cloud repositories.
  2. Telehealth Conferencing Platforms: Integration of web-based video conferencing into Electronic Health Records (EHR) systems creates potential API abuse vectors and web-shell injection points.
  3. Cross-Border Data Routing: Data flowing between states often traverses multiple networks and jurisdictions. This increases the risk of Man-in-the-Middle (MitM) attacks, especially if legacy protocols or unencrypted streams are used for compatibility with older medical equipment.

Severity: High. The convergence of IT (EHR) and OT (Medical Devices) creates a "soft target" for lateral movement. A compromised IoT device serving as a telehealth gateway can provide an attacker with a beachhead into the core clinical network.

Defensive Monitoring

To protect the integrity of interstate telehealth deployments, security operations must hunt for anomalies in device behavior and data traffic patterns. The following detection rules and queries are designed to identify potential exploitation of telehealth infrastructure.

SIGMA Rules

YAML
---
title: Suspicious Child Process from Telehealth Application
id: a1b2c3d4-e5f6-4a7b-8c9d-0e1f2a3b4c5d
status: experimental
description: Detects suspicious shell execution spawned from known telehealth client applications, potentially indicating exploitation or code injection.
references:
  - https://attack.mitre.org/techniques/T1059/
author: Security Arsenal
date: 2024/05/21
tags:
  - attack.execution
  - attack.t1059.003
logsource:
  category: process_creation
  product: windows
detection:
  selection:
    ParentImage|contains:
      - '\Zoom.exe'
      - '\Teams.exe'
      - '\Teams_windows_x64.exe'
      - '\chrome.exe'
      - '\msedge.exe'
    Image|endswith:
      - '\cmd.exe'
      - '\powershell.exe'
      - '\wscript.exe'
  filter:
    CommandLine|contains: 'update'
condition: selection and not filter
falsepositives:
  - Legitimate administrative troubleshooting via telehealth tools
level: medium
---
title: Potential Exfiltration of Medical Imaging Data
id: b2c3d4e5-f6a7-4b8c-9d0e-1f2a3b4c5d6e
status: experimental
description: Detects high volume egress of data typical of medical imaging formats (DICOM) to non-standard external endpoints or unusual ports.
references:
  - https://attack.mitre.org/techniques/T1041/
author: Security Arsenal
date: 2024/05/21
tags:
  - attack.exfiltration
  - attack.t1041
logsource:
  category: network_connection
  product: windows
detection:
  selection:
    DestinationPort|notin:
      - 443
      - 80
      - 8080
    Initiated: 'true'
    Image|endswith:
      - '\java.exe'
      - '\python.exe'
  condition: selection
falsepositives:
  - Legitimate DICOM exchange between medical systems on non-standard ports
level: high

KQL (Microsoft Sentinel/Defender)

Detect unusual sign-in patterns that may indicate compromise of telehealth accounts across state lines.

KQL — Microsoft Sentinel / Defender
SigninLogs
| where ResultType == 0
| extend DeviceDetail = parse_(DeviceDetail)
| where DeviceDetail.deviceId is not null
| where RiskLevelDuringSignIn in ("medium", "high")
| project TimeGenerated, UserPrincipalName, AppDisplayName, IPAddress, Location, DeviceDetail, RiskDetails
| order by TimeGenerated desc

Identify large data transfers originating from IP addresses associated with VPNs or anonymizers common in telehealth support.

KQL — Microsoft Sentinel / Defender
DeviceNetworkEvents
| where ActionType == "ConnectionAccepted"
| where RemotePort in (11112, 104, 27360) // Common telehealth/RPM ports
| where SentBytes > 1000000 // 1MB threshold
| summarize TotalBytes=sum(SentBytes) by DeviceName, RemoteIP, RemotePort
| where TotalBytes > 5000000 // 5MB threshold

Velociraptor VQL

Hunt for persistent scheduled tasks that may be used to maintain persistence on RPM workstations or telehealth kiosks.

VQL — Velociraptor
-- Hunt for suspicious scheduled tasks on telehealth endpoints
SELECT Name, Action, Trigger, Command, Author
FROM foreach(
  row=glob(globs='C:\Windows\System32\Tasks\**'),
  query={
    SELECT Name, read_file(filename=OSPath) AS RawXML
    FROM scope()
  }
)
WHERE RawXML =~ 'powershell' 
   OR RawXML =~ 'cmd.exe' 
   OR RawXML =~ 'http://'

Identify processes listening on non-standard ports that could indicate unauthorized remote access tools.

VQL — Velociraptor
-- Hunt for processes listening on suspicious ports
SELECT Pid, Process.Name, Listen.Address, Listen.Port, Family, Process.Username
FROM listen_sockets()
WHERE Listen.Port > 1024 
  AND Listen.Port < 65535
  AND Process.Name NOT IN ['svchost.exe', 'lsass.exe', 'System', 'TeamViewer_Service.exe', 'Zoom.exe']
  AND Process.Username != 'NT AUTHORITY\SYSTEM'

PowerShell Remediation Script

Audit and disable unnecessary services on Windows-based telehealth endpoints to reduce attack surface.

PowerShell
# Audit Remote Registry and Remote Desktop Services on Telehealth Endpoints
$ServicesToCheck = @("RemoteRegistry", "TermService")

foreach ($ServiceName in $ServicesToCheck) {
    $Service = Get-Service -Name $ServiceName -ErrorAction SilentlyContinue
    if ($Service) {
        if ($Service.StartType -ne "Disabled") {
            Write-Host "[!] Vulnerable Service Found: $($ServiceName) is currently $($Service.StartType)"
            # Uncomment to remediate:
            # Set-Service -Name $ServiceName -StartupType Disabled
            # Stop-Service -Name $ServiceName -Force
        } else {
            Write-Host "[+] Secure: $($ServiceName) is Disabled."
        }
    }
}


# Remediation

To secure the organization against the risks introduced by expanded interstate telehealth initiatives, IT and Security teams must implement the following controls:

1.  **Network Segmentation:** Deploy RPM and telehealth devices on isolated VLANs, separate from the clinical core network. Enforce strict Zero Trust access controls between these zones.

2.  **IoT Hardening:** Ensure all remote monitoring devices have unique credentials. Disable unused ports and services (e.g., Telnet, FTP) on medical gateways. Ensure all firmware is patched to the latest secure versions.

3.  **Data Loss Prevention (DLP):** Implement DLP policies to inspect and encrypt all egress traffic containing PHI. Monitor specifically for large file transfers to unknown external IPs.

4.  **Multi-Factor Authentication (MFA):** Enforce MFA for all users accessing telehealth portals, EHR integrations, and VPNs used for remote support.

5.  **Encryption Audit:** Verify that all telehealth video streams and RPM data transmissions are encrypted using TLS 1.2 or higher. Discontinue support for legacy SSL/TLS versions.

Related Resources

Security Arsenal Healthcare Cybersecurity AlertMonitor Platform Book a SOC Assessment healthcare Intel Hub

healthcarehipaaransomwaretelehealthiot-securityphi-protectionrpm

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.