- This Lil Jon-Kool-Aid Man Christmas jam is as extra as you’d expect 1 Year Ago
- YouTube stars say unfair copyright claims are making their lives hell 1 Year Ago
- UPS deletes tweet about shredding letters to North Pole after huge backlash Today 11:21 AM
- Viral petition leads to revised Holland Tunnel Christmas decor Today 11:10 AM
- Paul Ryan’s self-serving farewell tour is the bane of the internet right now Today 10:59 AM
- ‘Chilling Adventures of Sabrina’ renewed for seasons 3 and 4 Today 10:59 AM
- Former NASA engineer dupes package thieves into opening this epic glitter bomb Today 10:54 AM
- Trump officials withheld abortion from raped migrant teen Today 10:21 AM
- Your favorite Twitter memes could be hiding malware Today 9:47 AM
- This ‘Sailor Moon’ game brings us back to the ’90s in the best way Today 9:36 AM
- Teacher who said holidays are ‘difficult’ gets heartwarming surprise from students Today 9:14 AM
- Fox News blames ‘weaponized’ social media for Tucker Carlson backlash Today 9:09 AM
- Report: Black women receive way more abusive tweets than white women Today 8:34 AM
- Roger Stone to publicly apologize for spreading lies on InfoWars Today 8:13 AM
- Netflix true crime series ‘The Innocent Man’ is a missed opportunity Today 7:31 AM
Photo via vchal/Shutterstock (Licensed)
It’s said to be the first DNA exploit used on a computer.
Remember a few month ago when we were all laughing at Harvard scientists for putting a GIF inside a strand of DNA? Now that bridge between technology and the substance that makes up every living organism has taken a much darker turn.
Researchers at the University of Washington took control of a machine using a malicious strand of DNA in what is being considered the first “DNA-based exploit of a computer system.” Malicious software was encoded into short strands of DNA that scientists purchased online. When analyzed, the infected DNA corrupted gene-sequencing software, allowing researchers to take “full control” of the underlying system.
Researchers believe the remarkable feat could one day become practical for illegal hacking as DNA sequencing becomes more popular and powerful. They warn that criminals could use blood or saliva samples to gain access to places they know will sequence them, like university computers, police forensics labs, or genetics laboratories. This could potentially give hackers access to sensitive information and enough control to tamper with DNA evidence.
“There are a lot of interesting—or threatening may be a better word—applications of this coming in the future,” Peter Ney, a researcher on the project, told Wired.
The malware was encoded into DNA using a buffer overflow, a cybersecurity anomaly that occurs when a command overwhelms an allocated block of memory and overflows onto adjacent memory, causing the execution of malicious code. All the data the researchers used for their virus needed to fit in just 176 DNA code units—the bases A, T, G, and C—so the strands would stay intact.
The synthetic strand went after the buffer overflow scientists intentionally put inside FASTQ, a program used to sequence DNA. The result of their work is a hack that can break out of the FASTQ program and into other blocks of memory contained within a computer running the DNA sequencing.
“We know that if an adversary has control over the data a computer is processing, it can potentially take over that computer,” Tadayoshi Kohno, University of Washington computer science professor, told Wired. “That means when you’re looking at the security of computational biology systems, you’re not only thinking about the network connectivity and the USB drive and the user at the keyboard but also the information stored in the DNA they’re sequencing. It’s about considering a different class of threat.”
As terrifying as this may sound, there is very little risk of your computer being hacked by DNA anytime soon. The researchers admit they rigged the experiment in their favor, disabling critical computer security systems and inserting their own flaw to allow the buffer overflow.
“This is interesting research about potential long-term risks. We agree with the premise of the study that this does not pose an imminent threat and is not a typical cyber security capability,” Jason Callahan, the chief information security officer at gene-sequencing equipment manufacturer Illumina, told Wired.
The DNA hack will be shown at the Usenix Security Symposium in Vancouver later this month. You can find the full research paper on the University of Washington website.
Phillip Tracy is a former technology staff writer at the Daily Dot. He's an expert on smartphones, social media trends, and gadgets. He previously reported on IoT and telecom for RCR Wireless News and contributed to NewBay Media magazine. He now writes for Laptop magazine.