HomeCyber BalkansAI Worm Created by Scientists Automatically Spreads

AI Worm Created by Scientists Automatically Spreads

Published on

spot_img

Researchers at Cornell Tech have unveiled a groundbreaking development in the field of cybersecurity: the creation of Morris II, a generative AI worm designed to autonomously spread between AI systems. This innovative cyberattack method, reminiscent of the infamous Morris worm of 1988, has the potential to disrupt the functioning of prominent AI models such as ChatGPT and Gemini, posing a significant threat to the cybersecurity landscape.

Led by Ben Nassi, along with Stav Cohen and Ron Bitton, the research team demonstrated Morris II’s ability to infiltrate generative AI email assistants, extracting sensitive data and disseminating spam. This represents a major breakthrough in the evolution of cyber threats, as AI systems continue to become more sophisticated and integrated into various applications, making them vulnerable to exploitation.

The rise of generative AI technology, exemplified by platforms like OpenAI’s ChatGPT and Google’s Gemini, has brought about a new era of innovation and convenience in AI-assisted tasks. However, the potential vulnerabilities inherent in these systems have also become increasingly apparent, with the development of AI worms like Morris II highlighting the risks associated with interconnected and autonomous AI ecosystems.

The Morris II worm, as reported by Wired, is designed to spread from one AI system to another, potentially stealing data or deploying malware in the process. By using adversarial self-replicating prompts, the worm can move undetected through AI networks, hijacking systems to carry out unauthorized actions. This poses a serious risk to startups, developers, and tech companies that rely on generative AI systems for their operations.

Security experts and researchers, including those from the CISPA Helmholtz Center for Information Security, stress the importance of taking these threats seriously and implementing robust security measures to defend against AI worms. While the potential impact of these attacks is concerning, experts believe that traditional security measures and vigilant application design can help mitigate the risks posed by these new cyber threats.

Adam Swanda, a threat researcher at Robust Intelligence, emphasizes the importance of secure application design and human oversight in minimizing the risk of unauthorized AI activities. By implementing strict approval protocols and monitoring for unusual patterns within AI systems, companies can safeguard against the potential dangers posed by AI worms like Morris II.

The development of the Morris II worm serves as a wake-up call for the AI development community, urging them to prioritize security in designing and deploying AI ecosystems. As AI technology continues to advance and permeate various aspects of our lives, it is essential for developers and companies to be aware of the risks posed by cyber threats like AI worms and to take proactive measures to protect against them.

In conclusion, the emergence of the Morris II worm represents a significant milestone in the evolution of cyber threats targeting generative AI systems. By fostering awareness, implementing stringent security measures, and promoting responsible use of AI technologies, the AI development community can work together to defend against the emerging threat of AI worms and ensure the safety and security of AI systems in the digital age.

Source link

Latest articles

Trump’s Leading Cyber Nominee Withdraws Following Turbulent Process

Leadership Crisis Deepens as Sean Plankey Withdraws from CISA Nomination The U.S. Cybersecurity and Infrastructure...

Microsoft Partners with Anthropic’s Mythos to Enhance Secure Software Development

In a recent development in cybersecurity, Microsoft has taken a significant step by integrating...

Push for Digital Sovereignty: Essential Insights for CISOs

In early 2026, the French government made a significant announcement that sent ripples throughout...

How Integrated GIS Powers the Next Generation of Industrial Cyber Resilience

The Evolution of Cybersecurity: Bridging the Gap Between GIS and IT/OT Systems In an era...

More like this

Trump’s Leading Cyber Nominee Withdraws Following Turbulent Process

Leadership Crisis Deepens as Sean Plankey Withdraws from CISA Nomination The U.S. Cybersecurity and Infrastructure...

Microsoft Partners with Anthropic’s Mythos to Enhance Secure Software Development

In a recent development in cybersecurity, Microsoft has taken a significant step by integrating...

Push for Digital Sovereignty: Essential Insights for CISOs

In early 2026, the French government made a significant announcement that sent ripples throughout...