Dark
Light

Researchers unleash GenAI malware Morris II, self-replicating havoc

1 min read
104 views

TLDR:

Researchers have developed a self-replicating malware, Morris II, that exploits GenAI email assistants, demonstrating the reality of theoretical AI attacks. This malware can exfiltrate personal data, take over email accounts for spamming, and compromise systems with a “zero-click” technique. The attack uses prompts to trick AI assistants into fetching malicious data, ultimately requiring more testing and development to address security holes. Regulation and collaboration are essential to ensure responsible and secure use of GenAI technologies.

In a recent study, researchers from the Israel Institute of Technology, Cornell Tech, and Intuit have successfully developed self-replicating malware named Morris II, which exploits the vulnerability of GenAI email assistants such as Gemini Pro, ChatGPT 4.0, and LLaVA. This malware is capable of exfiltrating personal data, taking over email accounts, and compromising systems with a zero-click technique, all initiated by receiving a malicious email.

The self-replicating malware uses prompts to trick AI assistants into fetching malicious data, corrupting their internal databases, and ultimately passing on the same sequence of instructions to other hosts using similar AI assistants. This attack highlights the need for more testing, development, regulation, and collaboration to ensure responsible and secure use of GenAI technologies in the future.

Previous Story

Catch the latest Cyber Briefing: 20240308 with all the updates

Next Story

UK Space Leaders discuss defending against Cyber Threats

Latest from News