sábado, 10 abril 2021
Visitas totales a la web: 86447777

El portal de los profesionales de seguridad y emergencias

Nº 1 del mundo en español en seguridad global

Soluciones de seguridad global

Bioterrorists can trick scientists into making dangerous toxins or viruses by infecting lab computers with malware that alters synthetic DNA they produce for experiments

STACY LIBERATORE FOR DAILYMAIL.COM

  • A new cyberattack tricks scientists into making toxic chemicals or viruses.
  • Hackers can infect computers with malware to change DNA sequences.
  • They can bypass protocols set to scan DNA for malicious sequences.
  • Hackers can also camouflage their threats on the scientist’s computers.

Cyber security researchers uncovered an online attack that tricks scientists into creating toxic chemicals or deadly viruses in their own labs.

A team from Ben-Gurion University of the Negev found bioterrorists can infect an ‘unwitting’ biologist’s computer with malware and easily replace a short sub-string of the DNA in the code with a new sequence. 

The US Department of Health and Human Services (HHS) has protocols for screening DNA orders from synthetic gene providers that scan for potentially harmful DNA.

However, the team was able to bypass the guidelines through obfuscation and found 16 out of 50 obfuscated DNA samples were not detected when screened according to the ‘best-match’ HHS guidelines.Researchers found bioterrorists can infect an 'unwitting' biologist's computer with malware that replaces a short sub-string of the DNA in the code with a new sequence+3

Researchers found bioterrorists can infect an ‘unwitting’ biologist’s computer with malware that replaces a short sub-string of the DNA in the code with a new sequence

Rami Puzis, head of the Ben-Gurion University (BGU) Complex Networks Analysis Lab, said: ‘To regulate both intentional and unintentional generation of dangerous substances, most synthetic gene providers screen DNA orders, which is currently the most effective line of defense against such attacks.’

The researchers also found that accessibility and automation of the synthetic gene engineering workflow, combined with insufficient cybersecurity controls, allow malware to interfere with biological processes within the victim’s lab, closing the loop with the possibility of an exploit written into a DNA molecule.

The team described the attack in their study published in Nature using a scenario of Alice, Bob and Eva.

Alice is a scientists working at an academic institution and orders synthetic DNA from Bob, in which Eve, the attacker, replaces part of the ordered sequences with with a malicious sequence.

The team described the attack in their study published in Nature using a scenario of Alice, Bob and Eva. Alice is a scientists working at an academic institution and orders synthetic DNA from Bob, in which Eve, the attacker, replaces part of the ordered sequences with with obfuscated select agents and sequences for its future deobfuscation+3

The team described the attack in their study published in Nature using a scenario of Alice, Bob and Eva. Alice is a scientists working at an academic institution and orders synthetic DNA from Bob, in which Eve, the attacker, replaces part of the ordered sequences with with obfuscated select agents and sequences for its future deobfuscation

Eve also attacks Alice’s computer with malware that replaces part of Alice’s sequence and camouflages fragments of the pathogenic DNA in the hijacked order.

Alice unintentionally uses the malicious DNA along with other sequences, including Cas9. 

During the cell transformation, Cas9 proteins are combined with gRNA from the malicious sequence to form CRISPR complexes that create multiple double-strand breaks – resulting in a noxious agent.

‘This threat is real. We conducted a proof of concept: an obfuscated DNA encoding a toxic peptide was not detected by software implementing the screening guidelines,’ reads the published study.

‘The DNA injection attack demonstrates a significant new threat of malicious code altering biological processes.’ 

Alice unintentionally uses the malicious DNA along with other sequences, including Cas9. During the cell transformation, Cas9 proteins are combined with gRNA from the malicious sequence to form CRISPR complexes that create multiple double-strand breaks - resulting in a noxious agent+3

Alice unintentionally uses the malicious DNA along with other sequences, including Cas9. During the cell transformation, Cas9 proteins are combined with gRNA from the malicious sequence to form CRISPR complexes that create multiple double-strand breaks – resulting in a noxious agent

The researchers also found that accessibility and automation of the synthetic gene engineering workflow, combined with insufficient cybersecurity controls, allow malware to interfere with biological processes within the victim’s lab, closing the loop with the possibility of an exploit written into a DNA molecule.

‘This attack scenario underscores the need to harden the synthetic DNA supply chain with protections against cyber-biological threats,’ Puzis says.

‘To address these threats, we propose an improved screening algorithm that takes into account in vivo gene editing.

‘We hope this paper sets the stage for robust, adversary resilient DNA sequence screening and cybersecurity-hardened synthetic gene production services when biosecurity screening will be enforced by local regulations worldwide.’

Fecha de publicaciónnoviembre 30, 2020

BELT.ES no se hace responsable de las opiniones de los artículos reproducidos en nuestra Revista de Prensa, ni hace necesariamente suyas las opiniones y criterios expresados. La difusión de la información reproducida se realiza sin fines comerciales. 

Listado de Expertos

Recomendado

Profesión militar: Obediencia debida frente a la obligación de disentir

Con ocasión de la realización de estudios en el Instituto Universitario Gutiérrez Mellado tuve la ocasión de leer y analizar una serie de documentos de opinión que trataban en profundidad las diferentes facetas presentes en el campo de las relaciones cívico-militares; temas que , habitualmente, no han estado presentes en los diferentes cursos y actividades formativas en la enseñanza militar, ni, por supuesto, en la civil.

El paracaidista español que humilló a los «temibles» espías soviéticos

Joaquín Madolell, natural de Melilla y militar del Ejército del Aire, desarticuló la mayor red del espionaje...

El amor de Macarena Olona por la Guardia Civil empieza por su pareja, un joven oficial condecorado

El padre de su hijo llegó a la Benemérita como militar de carrera y, los que le...

Últimas noticias

Alaska, un erial que Rusia no dudó en vender

Españoles y británicos intentaron arrogarse este territorio, sobreexplotado por los rusos, que finalmente se deshicieron de él.

Un retén 24 horas atenderá las emergencias en las zonas verdes de Madrid

La Junta de Gobierno aprueba el nuevo contrato, que entrará en vigor en agosto, obligará a mantener una plantilla mínima de más...

Telefónica despide al jefe del negocio de ciberseguridad por un presunto fraude

Su salida y la de otros tres directivos se produjo antes de la remodelación completa de la cúpula de Telefónica Tech

Muere Dick Hoyt, el padre que convirtió a su hijo con parálisis cerebral en un Ironman

Juntos participaron en más de 1.000 carreras y triatlones, incluyendo 32 ediciones del Maratón de Boston Dick Hoyt participó en...

¿Qué puedo hacer para que no okupen mi casa?

La Policía Nacional elabora una guía de consejos y actuaciones para los propietarios ante la okupación ilegal de viviendas