Home https://server7.kproxy.com/servlet/redirect.srv/sruj/smyrwpoii/p2/ Science https://server7.kproxy.com/servlet/redirect.srv/sruj/smyrwpoii/p2/ Bioterrorists trick scientists into creating deadly viruses by infecting lab computers with malware

Bioterrorists trick scientists into creating deadly viruses by infecting lab computers with malware



Bioterrorists can trick scientists into producing dangerous toxins or viruses by infecting lab computers with malware that alters the synthetic DNA they produce for experiments

  • A new cyberattack is misleading scientists into producing toxic chemicals or viruses
  • Hackers can infect computers with malware to alter DNA sequences
  • They can bypass protocols set up to scan DNA for malicious sequences
  • Hackers can also disguise their threats on scientists’ computers

Cybersecurity researchers have uncovered an online attack that tricks scientists into creating toxic chemicals or deadly viruses in their own labs.

A team from Ben-Gurion University in the Negev has found that bioterrorists can infect the computer of an “involuntary” biologist with malware and easily replace a short string of DNA in the code with a new sequence.

The US Department of Health and Human Services (HHS) has protocols for screening DNA orders from synthetic gene suppliers that scan for potentially harmful DNA.

However, the team was able to circumvent the guidelines by blurring and found that 16 of the 50 blurred DNA samples were not detected during screening according to the “most appropriate” HHS guidelines.

Researchers have found that bioterrorists can infect the computer of an

Researchers have found that bioterrorists can infect the computer of an “involuntary” biologist with malware that replaces a short string of DNA in the code with a new sequence

Rami Puzis, head of the Ben Gurion University’s (BGU) complex network analysis laboratory, said: “To regulate both intentional and unintentional generation of hazardous substances, most synthetic gene suppliers are checking DNA orders, which is currently the most effective line of defense against such attacks.

The researchers also found that the availability and automation of the synthetic genetic engineering workflow, combined with insufficient cybersecurity control, allowed malware to interfere with biological processes in the victim’s laboratory, closing the cycle with the possibility of an exploit recorded in a molecule. DNA.

The team described the attack in their study, published in Nature, using a script by Alice, Bob and Eva.

Alice is a scientist working in an academic institution and orders synthetic DNA from Bob, in which the attacker Eva replaces part of the ordered sequences with a malicious sequence.

The team described the attack in their study, published in Nature, using a script by Alice, Bob and Eva.  Alice is a scientist working in an academic institution, and orders synthetic DNA from Bob, in which the attacker Eva replaces part of the ordered sequences with obscure selected agents and sequences for her future debofusion

The team described the attack in their study, published in Nature, using a script by Alice, Bob and Eva. Alice is a scientist working in an academic institution, and orders synthetic DNA from Bob, in which the attacker Eva replaces part of the ordered sequences with obscure selected agents and sequences for her future debofusion.

Eve also attacks Alice’s computer with malware that replaces part of Alice’s sequence and masks fragments of pathogenic DNA in the abducted order.

Alice inadvertently uses the malicious DNA along with other sequences, including Cas9.

During cell transformation, Cas9 proteins combine with gRNA from the malicious sequence to form CRISPR complexes that create multiple double-strand breaks – leading to a harmful agent.

“This threat is real. We conducted proof of the concept: blurred DNA encoding a toxic peptide was not detected by software implementing screening guidelines, “the study said.

“The DNA injection attack shows a significant new threat from malicious code that alters biological processes.”

Alice inadvertently uses the malicious DNA along with other sequences, including Cas9.  During cellular transformation, Cas9 proteins combine with gRNA from the malicious sequence to form CRISPR complexes that create multiple double-strand breaks - leading to a harmful agent.

Alice inadvertently uses the malicious DNA along with other sequences, including Cas9. During cellular transformation, Cas9 proteins combine with gRNA from the malicious sequence to form CRISPR complexes that create multiple double-strand breaks – leading to a harmful agent.

The researchers also found that the availability and automation of the synthetic genetic engineering workflow, combined with insufficient cybersecurity control, allowed malware to interfere with biological processes in the victim’s laboratory, closing the cycle with the possibility of an exploit recorded in a molecule. DNA.

“This attack scenario underscores the need to solidify the synthetic DNA supply chain with protections against cyber-biological threats,” Puzis said.

“To address these threats, we are proposing an improved screening algorithm that takes into account in vivo gene editing.

“We hope this document marks the beginning of a solid, adversarial DNA sequencing screening and cybersecurity-cured synthetic gene production services when biosecurity screening is imposed by local regulations around the world.”

Advertising


Source link