Self-replicating Morris II worm targets AI email assistants


The proliferation of generative artificial intelligence (GenAI) email assistants such as OpenAI’s GPT-3 and Google’s Smart Compose has revolutionized communication workflows. Unfortunately, it has also introduced novel attack vectors for cyber criminals.


Leveraging recent advancements in AI and natural language processing, malicious actors can exploit vulnerabilities in GenAI systems to orchestrate sophisticated cyberattacks with far-reaching consequences. Recent studies have uncovered the insidious capabilities of self-replicating malware, exemplified by the “Morris II” strain created by researchers.


How the Morris II malware strain works


Building upon the legacy of the infamous Morris worm, this modern variant employs advanced techniques to compromise GenAI email assistants without requiring user interaction. For instance, researchers have demonstrated how crafted email content can deceive AI assistants into executing malicious commands, leading to data exfiltration, email account hijacking and automated malware propagation across interconnected systems.


The exploitation of GenAI email assistants typically involves manipulating the natural language processing capabilities to bypass security measures and execute unauthorized actions. In a recent incident, researchers showcased how a carefully crafted email containing innocuous-sounding prompts could trigger an AI assistant to execute malicious commands, resulting in unauthorized access to sensitive data and dissemination of malware-laden emails to unsuspecting recipients.


Read the Threat Intelligence Index report

Technical analysis of Morris II malware


Morris II is designed to exploit GenAI components through the use of adversarial self-replicating prompts. Here’s an overview of its techniques and attack vectors:


Adversar ..

Support the originator by clicking the read the rest link below.