- Who survived the ‘Game of Thrones’ series finale? Sunday 10:21 PM
- Justin Bieber fans are damaging one of Iceland’s top tourist spots Sunday 1:28 PM
- James Charles drops 41-minute response video to Tati Westbrook’s accusations Sunday 1:15 PM
- Watch what happens when this Twitch streamer quits his job on camera Sunday 12:25 PM
- Men are finally sharing their abortion stories Sunday 10:58 AM
- Netflix’s ‘Maria’ is a trigger-happy B-movie Sunday 9:07 AM
- How to stream Money in the Bank 2019 for free Sunday 9:00 AM
- How to watch ‘Game of Thrones’ season 8, episode 6 for free Sunday 8:00 AM
- These ‘Game of Thrones’ houses are gone forever Sunday 7:54 AM
- The 10 best anime movies on Hulu Sunday 7:00 AM
- Vibe TV puts a premium price tag on piracy Sunday 6:00 AM
- Twitter unites in collective confusion over ‘Democrats for Trump’ trending Saturday 2:28 PM
- YouTube star tweets and deletes video of his Black cousin ‘Peanut’ acting as a stool Saturday 1:04 PM
- The ‘Do you wash your legs in the shower’ debate has now escalated to feet Saturday 12:20 PM
- Trump posts a world-class golf score, and the internet laughs at him Saturday 10:46 AM
Photo via vchal/Shutterstock (Licensed)
It’s said to be the first DNA exploit used on a computer.
Remember a few month ago when we were all laughing at Harvard scientists for putting a GIF inside a strand of DNA? Now that bridge between technology and the substance that makes up every living organism has taken a much darker turn.
Researchers at the University of Washington took control of a machine using a malicious strand of DNA in what is being considered the first “DNA-based exploit of a computer system.” Malicious software was encoded into short strands of DNA that scientists purchased online. When analyzed, the infected DNA corrupted gene-sequencing software, allowing researchers to take “full control” of the underlying system.
Researchers believe the remarkable feat could one day become practical for illegal hacking as DNA sequencing becomes more popular and powerful. They warn that criminals could use blood or saliva samples to gain access to places they know will sequence them, like university computers, police forensics labs, or genetics laboratories. This could potentially give hackers access to sensitive information and enough control to tamper with DNA evidence.
“There are a lot of interesting—or threatening may be a better word—applications of this coming in the future,” Peter Ney, a researcher on the project, told Wired.
The malware was encoded into DNA using a buffer overflow, a cybersecurity anomaly that occurs when a command overwhelms an allocated block of memory and overflows onto adjacent memory, causing the execution of malicious code. All the data the researchers used for their virus needed to fit in just 176 DNA code units—the bases A, T, G, and C—so the strands would stay intact.
The synthetic strand went after the buffer overflow scientists intentionally put inside FASTQ, a program used to sequence DNA. The result of their work is a hack that can break out of the FASTQ program and into other blocks of memory contained within a computer running the DNA sequencing.
“We know that if an adversary has control over the data a computer is processing, it can potentially take over that computer,” Tadayoshi Kohno, University of Washington computer science professor, told Wired. “That means when you’re looking at the security of computational biology systems, you’re not only thinking about the network connectivity and the USB drive and the user at the keyboard but also the information stored in the DNA they’re sequencing. It’s about considering a different class of threat.”
As terrifying as this may sound, there is very little risk of your computer being hacked by DNA anytime soon. The researchers admit they rigged the experiment in their favor, disabling critical computer security systems and inserting their own flaw to allow the buffer overflow.
“This is interesting research about potential long-term risks. We agree with the premise of the study that this does not pose an imminent threat and is not a typical cyber security capability,” Jason Callahan, the chief information security officer at gene-sequencing equipment manufacturer Illumina, told Wired.
The DNA hack will be shown at the Usenix Security Symposium in Vancouver later this month. You can find the full research paper on the University of Washington website.
Phillip Tracy is a former technology staff writer at the Daily Dot. He's an expert on smartphones, social media trends, and gadgets. He previously reported on IoT and telecom for RCR Wireless News and contributed to NewBay Media magazine. He now writes for Laptop magazine.