Tuesday, April 28, 2026

AI Under Attack: The Rise of Malevolent ‘Worm’ Threatening the Future of Artificial Intelligence

Date:

In the fast-paced world of technology, advancements are made daily that push the boundaries of innovation. However, with these advancements come new challenges and threats. Today, we are witnessing the emergence of the first virus developed specifically for artificial intelligence. ChatGPT and the poisoning of Google Gemini are just the beginning of what could be a new era of cyber threats targeting AI systems.

What is ChatGPT and how does it work?
ChatGPT is an AI-powered chatbot developed by OpenAI that has gained widespread popularity for its ability to engage in human-like conversations. This advanced AI model is based on the GPT-3 architecture and is designed to understand and generate text based on the context of a conversation. However, what sets ChatGPT apart is its vulnerability to malicious attacks due to its reliance on input from users to learn and improve its responses.

Researchers Create Malicious AI ‘Worm’ Aimed at Generative AI Systems

A team of researchers has made a shocking discovery by creating a harmful artificial intelligence (AI) ‘worm’ that is meant to attack generative AI systems. This new and worrisome invention brings up important issues about how safe and reliable AI technologies are, especially since they are being used more and more in areas like healthcare, finance, and the creative arts.

The first virus for artificial intelligence

A new cybersecurity threat has emerged with the “Morris II” worm, a sophisticated malware that uses popular AI services to spread, infiltrate systems, and steal sensitive data. Named after the disruptive Morris worm of 1988, this development highlights the urgent need to strengthen AI models against such vulnerabilities

Morris II, the inaugural virus designed for artificial intelligences, led to the leakage of personal information and the dissemination of spam emails by AI email assistants in a controlled testing environment.

Researchers have identified a novel “zero-click” AI worm capable of exploiting ChatGPT, Gemini, and the open-source AI model LLaVA through a malicious self-replicating prompt utilizing text and image inputs. 

This worm can propagate its attack across various models by taking advantage of interconnectivity within the AI ecosystem, facilitating phishing attacks, spam email distribution, and the spread of propaganda.

This research seeks to demonstrate that all software, including large language models within GenAI tools, are vulnerable to computer virus threats.

Morris 2, created by Cornell University researchers, Intuit, and Technion, is named after the Morris Worm, one of the earliest self-replicating computer worms, developed by Robert Morris in 1988. 

The Morris Worm was responsible for crashing approximately 10% of the computers connected to the internet at that time.

A new worm uses a tricky self-copying method

This makes it harder to stop and control

Researchers from Cornell Tech, the Israel Institute of Technology, and Intuit developed a novel technique known as an “adversarial self-replicating prompt” to engineer a computer worm. This technique involves inputting a specific prompt into a large language model (LLM), which they evaluated using platforms such as OpenAI’s ChatGPT, Google’s Gemini, and the open-source LLaVA model, a collaborative effort by the University of Wisconsin-Madison, Microsoft Research, and Columbia University. 

The adversarial self-replicating prompt is designed to manipulate the LLM into generating additional prompts autonomously. This manipulation occurs when the initial prompt is processed, leading the model to produce its own set of malicious prompts that it subsequently executes, thereby creating a self-propagating cycle of harmful instructions. 

The mechanism by which this worm operates is akin to well-known cybersecurity vulnerabilities, such as SQL injection and buffer overflow attacks. These methods exploit weaknesses in software systems, allowing the adversarial prompt to infiltrate the model’s operational framework and execute potentially harmful commands without direct human intervention.

The worm possesses two primary functions: 

1. Data theft: This malicious software is capable of siphoning off sensitive personal information from the email accounts of infected systems, such as names, phone numbers, credit card information, and social security numbers. 

2. Spam distribution: The worm can create and dispatch spam and other harmful emails using compromised AI-driven email assistants, facilitating its spread to additional systems.

Compromised artificial intelligence databases

The researchers illustrated the text prompt methodology by composing an email that contained an adversarial text prompt, effectively “poisoning” the AI email assistant’s database through the use of retrieval-augmented generation (RAG). This technique allows the large language model (LLM) to access and utilize external data sources. Upon receiving the email, the RAG forwarded it to the LLM provider, which subsequently generated a response that compromised the AI service, extracted sensitive information from the emails, and propagated the infection to new hosts when the LLM was employed to respond to another client’s email. 

In a separate experiment involving images, the researchers embedded a self-replicating prompt within an image file, which prompted the email assistant to disseminate the message to additional email addresses. This image functioned as both the content—potentially containing spam, scams, propaganda, disinformation, or abusive material—and as the activation mechanism that facilitated the spread of the malicious worm. 

The researchers have indicated that this development signifies a novel category of cybersecurity threat, particularly as AI systems continue to evolve and become more interconnected. The laboratory-engineered malware exemplifies the ongoing vulnerabilities inherent in LLM-based chatbot services, highlighting their susceptibility to exploitation for harmful cyberattacks. OpenAI has recognized this vulnerability and is actively engaged in efforts to enhance the resilience of its systems against such attacks.

Final Note: Finding harmful AI ‘worms’ that attack generative AI shows we need to think about ethics as we develop new tech. As scientists explore AI more, it’s crucial for everyone to stay alert about cybersecurity risks. By controlling the spread of digital and AI tools, we can create a safer future for everyone.

This image has an empty alt attribute; its file name is Cyber-attck-Health-Care-896x1024.png
https://securityintelligence.com/posts/cybersecurity-in-healthcare-onging-crisis/
https://securityintelligence.com/news/rising-threat-cyberattacks-restaurant-industry/

Additional Information:

What Is an AI Worm?

An AI worm is a type of malware that leverages artificial intelligence to enhance its propagation and effectiveness. Capable of self-replicating, it can quickly spread across networks and devices, utilizing AI techniques to evade detection and adapt to security measures.

AI Worms Explained

AI worms are a new type of malware that uses artificial intelligence to spread and steal information. Unlike traditional malware, an AI worm doesn’t rely on code vulnerabilities. Instead, it manipulates AI models to generate seemingly harmless text or images containing malicious code.

The recently developed “Morris II” AI worm works by using adversarial self-replicating prompts. These prompts trick AI systems into generating responses containing the malicious code. When users interact with the infected response, such as replying to an email, their machines become infected.

Key capabilities of AI worms like Morris II include:

  • Data Exfiltration: AI worms can extract sensitive data from infected systems, including names, phone numbers, credit card details, and social security numbers.
  • Spam Propagation: An AI worm can generate and send spam or malicious emails through compromised AI-powered email assistants, helping spread the infection.

While Morris II currently exists only as a research project in controlled environments, it demonstrates potential security risks as AI systems become more interconnected. Researchers warn that developers and companies need to address these vulnerabilities, especially as AI assistants gain more autonomy in performing tasks on users’ behalf.

Characteristics of AI Worms

AI worms are, well, intelligent. They possess abilities to learn from interactions and dynamically adjust strategies to dodge security measures.

Adaptability

AI worms adapt to different environments and security measures. They analyze the security protocols of the systems they encounter and modify their behavior to avoid detection. For instance, if an AI worm encounters a firewall, it may change its communication patterns to mimic legitimate traffic, thus slipping past the firewall undetected.

Learning

AI worms utilize machine learning algorithms to improve their effectiveness. They collect data from their environment and learn which strategies work best for spreading and avoiding detection. For example, an AI worm might analyze failed attempts to penetrate a network and adjust its methods based on what it learns, increasing its success rate over time.

Propagation

AI worms use sophisticated algorithms to identify the most efficient ways to spread. They analyze network structures and pinpoint vulnerabilities to exploit. This might involve using social engineering tactics to trick users into downloading malicious attachments or exploiting known software vulnerabilities to gain access to new systems.

Advanced Evasion

AI worms continuously change their signatures and behaviors to evade detection. Traditional security systems rely on recognizing known malware signatures, but AI worms can generate new signatures on the fly, making them difficult to detect. They might also mimic the behavior of legitimate software processes to blend in with normal network traffic.

Targeted Attacks

AI worms can be programmed to target specific systems or organizations. They gather intelligence on their targets, such as identifying critical infrastructure or high-value data. A targeted approach allows them to cause maximum damage or exfiltrate sensitive information with higher precision.

Automated Exploitation

AI worms automate the process of finding and exploiting vulnerabilities. They scan networks for weak points and deploy exploits faster than human hackers can. This automation allows them to scale their attacks and compromise a large number of systems in a short period.

By leveraging these intrinsic characteristics, AI worms pose a significant threat to cybersecurity. Understanding these traits enables us to develop more effective defenses and mitigate the risks associated with such advanced malware.

Traditional Worms Vs. AI Worms

Traditional worms have been around a long while. As security teams know, they follow predefined rules and patterns, which make them less flexible and easier to detect once their signature is known. An AI worm, however, stands out from traditional worms primarily because they use machine learning algorithms to learn from their environment and adapt their behavior in real time. 

When AI worms encounter new security measures, they adjust their strategies to overcome the obstacles. They also excel in evasion techniques. They continuously change their signatures and behaviors to evade detection. By mimicking legitimate network traffic or software processes, they blend in seamlessly and avoid triggering security alerts. Traditional worms, in contrast, usually have static signatures and behaviors, making them more susceptible to detection by signature-based antivirus programs.

In terms of propagation, AI worms use sophisticated algorithms to identify and exploit the most efficient paths. They employ advanced techniques such as social engineering and network vulnerability scanning to spread quickly and effectively. Traditional worms often rely on simpler methods, such as exploiting well-known vulnerabilities or using predictable spreading mechanisms.

AI worms also exhibit a high degree of targeting precision. They gather intelligence on their targets, enabling them to launch precise attacks on specific systems or organizations. This targeted approach maximizes their impact and effectiveness. Traditional worms generally spread indiscriminately, affecting any vulnerable system they encounter, which can make them easier to detect and contain.

In addition, AI worms automate the process of finding and exploiting vulnerabilities, allowing them to scale their attacks quickly and efficiently. They can multitask and perform complex operations simultaneously. Traditional worms tend to follow a linear, step-by-step approach to propagation and exploitation, limiting their ability to scale and adapt quickly.

Potential Threats

With a capacity to disrupt critical infrastructure, AI worms pose an array of threats with far-reaching implications for cybersecurity and beyond. They can target essential services such as power grids, water treatment facilities, and healthcare systems, for instance. A successful attack on a core infrastructure could endanger lives and cause significant economic damage.

By infiltrating banking networks, AI worms can execute fraudulent transactions, steal sensitive financial data, and even manipulate stock markets. The financial losses from breaches of this nature can destabilize economies.

In terms of corporate espionage, AI worms can infiltrate corporate networks to steal intellectual property, trade secrets, and confidential business strategies. Successful data breaches can give competitors unfair advantages and result in financial losses for the affected organizations.

Similarly, nation-states could deploy AI worms to conduct espionage, steal classified information, or disable defense systems. Such attacks could compromise a country’s defense capabilities and give adversaries critical intelligence, potentially altering the balance of power on a global scale.

The threat extends to personal privacy, as well. AI worms can harvest vast amounts of personal data, including emails, photos, and sensitive documents stored on individual devices. The misuse of this data can lead to identity theft, blackmail, and other malicious activities, causing significant distress and harm to individuals.

In the context of supply chains, AI worms can infiltrate a single supplier’s network and propagate through interconnected systems, leading to production delays, compromised products, and significant financial losses for multiple organizations. The interconnected nature of modern supply chains means that a breach in one part can cascade across the network.

AI worms of course can be weaponized for political purposes. Hacktivist groups or politically motivated attackers might deploy them to disrupt elections, manipulate public opinion, or sabotage government operations. 

Lastly, we can’t dismiss the psychological impact of AI worms. Nearly 2 in 5 cloud security professionals (38%) consider AI-powered attacks a top concern, according to The State of Cloud-Native Security Report 2024. But when asking this same group about AI-powered attacks compromising sensitive data, that number shoots up to 89%, more than doubling. The uncertainty surrounding the capabilities of AI-powered attacks gives many pause. 

Source: Revelation Today

Also Read:

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Related articles

Registration deptt sets ambitious revenue collection target of Rs 10,000 cr in 2026-27

Deptt achieved more than 101% revenue collection in 2025-26 Senior citizens aged 80 yrs or above will now be...

Arvind Kejriwal’s arrogance, will not appear in Justice Swarn Kanta’s court

During his tenure as Chief Minister of Delhi, Arvind Kejriwal accepted the resignations of several ministers who were...

Trump is in deep trouble after waging war with Iran!

Uncertainty remains about what the US aims to achieve in a war with Iran. Donald Trump unilaterally extended...

China has developed an iron-water battery,80% cheaper than lithium batteries

China has developed a battery technology that is 80 times cheaper and has a longer lifespan than existing...
news-1701

sabung ayam online

yakinjp

yakinjp

rtp yakinjp

slot thailand

yakinjp

yakinjp

yakin jp

yakinjp id

maujp

maujp

maujp

maujp

sabung ayam online

sabung ayam online

judi bola online

sabung ayam online

judi bola online

slot mahjong ways

slot mahjong

sabung ayam online

judi bola

live casino

sabung ayam online

judi bola

live casino

SGP Pools

slot mahjong

sabung ayam online

slot mahjong

SLOT THAILAND

berita 128000726

berita 128000727

berita 128000728

berita 128000729

berita 128000730

berita 128000731

berita 128000732

berita 128000733

berita 128000734

berita 128000735

berita 128000736

berita 128000737

berita 128000738

berita 128000739

berita 128000740

berita 128000741

berita 128000742

berita 128000743

berita 128000744

berita 128000745

berita 128000746

berita 128000747

berita 128000748

berita 128000749

berita 128000750

berita 128000751

berita 128000752

berita 128000753

berita 128000754

berita 128000755

artikel 128000821

artikel 128000822

artikel 128000823

artikel 128000824

artikel 128000825

artikel 128000826

artikel 128000827

artikel 128000828

artikel 128000829

artikel 128000830

artikel 128000831

artikel 128000832

artikel 128000833

artikel 128000834

artikel 128000835

artikel 128000836

artikel 128000837

artikel 128000838

artikel 128000839

artikel 128000840

artikel 128000841

artikel 128000842

artikel 128000843

artikel 128000844

artikel 128000845

artikel 128000846

artikel 128000847

artikel 128000848

artikel 128000849

artikel 128000850

article 138000756

article 138000757

article 138000758

article 138000759

article 138000760

article 138000761

article 138000762

article 138000763

article 138000764

article 138000765

article 138000766

article 138000767

article 138000768

article 138000769

article 138000770

article 138000771

article 138000772

article 138000773

article 138000774

article 138000775

article 138000776

article 138000777

article 138000778

article 138000779

article 138000780

article 138000781

article 138000782

article 138000783

article 138000784

article 138000785

article 138000816

article 138000817

article 138000818

article 138000819

article 138000820

article 138000821

article 138000822

article 138000823

article 138000824

article 138000825

article 138000826

article 138000827

article 138000828

article 138000829

article 138000830

article 138000831

article 138000832

article 138000833

article 138000834

article 138000835

article 138000836

article 138000837

article 138000838

article 138000839

article 138000840

article 138000841

article 138000842

article 138000843

article 138000844

article 138000845

article 138000786

article 138000787

article 138000788

article 138000789

article 138000790

article 138000791

article 138000792

article 138000793

article 138000794

article 138000795

article 138000796

article 138000797

article 138000798

article 138000799

article 138000800

article 138000801

article 138000802

article 138000803

article 138000804

article 138000805

article 138000806

article 138000807

article 138000808

article 138000809

article 138000810

article 138000811

article 138000812

article 138000813

article 138000814

article 138000815

story 138000816

story 138000817

story 138000818

story 138000819

story 138000820

story 138000821

story 138000822

story 138000823

story 138000824

story 138000825

story 138000826

story 138000827

story 138000828

story 138000829

story 138000830

story 138000831

story 138000832

story 138000833

story 138000834

story 138000835

story 138000836

story 138000837

story 138000838

story 138000839

story 138000840

story 138000841

story 138000842

story 138000843

story 138000844

story 138000845

article 138000726

article 138000727

article 138000728

article 138000729

article 138000730

article 138000731

article 138000732

article 138000733

article 138000734

article 138000735

article 138000736

article 138000737

article 138000738

article 138000739

article 138000740

article 138000741

article 138000742

article 138000743

article 138000744

article 138000745

article 208000456

article 208000457

article 208000458

article 208000459

article 208000460

article 208000461

article 208000462

article 208000463

article 208000464

article 208000465

article 208000466

article 208000467

article 208000468

article 208000469

article 208000470

journal-228000376

journal-228000377

journal-228000378

journal-228000379

journal-228000380

journal-228000381

journal-228000382

journal-228000383

journal-228000384

journal-228000385

journal-228000386

journal-228000387

journal-228000388

journal-228000389

journal-228000390

journal-228000391

journal-228000392

journal-228000393

journal-228000394

journal-228000395

journal-228000396

journal-228000397

journal-228000398

journal-228000399

journal-228000400

journal-228000401

journal-228000402

journal-228000403

journal-228000404

journal-228000405

article 228000376

article 228000377

article 228000378

article 228000379

article 228000380

article 228000381

article 228000382

article 228000383

article 228000384

article 228000385

article 228000386

article 228000387

article 228000388

article 228000389

article 228000390

article 228000391

article 228000392

article 228000393

article 228000394

article 228000395

article 228000396

article 228000397

article 228000398

article 228000399

article 228000400

article 228000401

article 228000402

article 228000403

article 228000404

article 228000405

article 228000406

article 228000407

article 228000408

article 228000409

article 228000410

article 228000411

article 228000412

article 228000413

article 228000414

article 228000415

article 228000416

article 228000417

article 228000418

article 228000419

article 228000420

article 228000421

article 228000422

article 228000423

article 228000424

article 228000425

article 228000426

article 228000427

article 228000428

article 228000429

article 228000430

article 228000431

article 228000432

article 228000433

article 228000434

article 228000435

article 238000461

article 238000462

article 238000463

article 238000464

article 238000465

article 238000466

article 238000467

article 238000468

article 238000469

article 238000470

article 238000471

article 238000472

article 238000473

article 238000474

article 238000475

article 238000476

article 238000477

article 238000478

article 238000479

article 238000480

article 238000481

article 238000482

article 238000483

article 238000484

article 238000485

article 238000486

article 238000487

article 238000488

article 238000489

article 238000490

article 238000491

article 238000492

article 238000493

article 238000494

article 238000495

article 238000496

article 238000497

article 238000498

article 238000499

article 238000500

article 238000501

article 238000502

article 238000503

article 238000504

article 238000505

article 238000506

article 238000507

article 238000508

article 238000509

article 238000510

article 238000511

article 238000512

article 238000513

article 238000514

article 238000515

article 238000516

article 238000517

article 238000518

article 238000519

article 238000520

update 238000492

update 238000493

update 238000494

update 238000495

update 238000496

update 238000497

update 238000498

update 238000499

update 238000500

update 238000501

update 238000502

update 238000503

update 238000504

update 238000505

update 238000506

update 238000507

update 238000508

update 238000509

update 238000510

update 238000511

update 238000512

update 238000513

update 238000514

update 238000515

update 238000516

update 238000517

update 238000518

update 238000519

update 238000520

update 238000521

sumbar-238000396

sumbar-238000397

sumbar-238000398

sumbar-238000399

sumbar-238000400

sumbar-238000401

sumbar-238000402

sumbar-238000403

sumbar-238000404

sumbar-238000405

sumbar-238000406

sumbar-238000407

sumbar-238000408

sumbar-238000409

sumbar-238000410

news-1701