Incident: DNA Used to Hack Computer System - Cybersecurity Vulnerability Exposed

Published Date: 2017-08-11

Postmortem Analysis
Timeline 1. The software failure incident of hacking into a computer using custom strands of DNA happened in July 2017 as per the article published on August 11, 2017 [62031].
System The software failure incident described in the article involved a hack that exploited weaknesses in DNA sequencing software. The specific system that failed in this incident was: 1. DNA sequencing software with cybersecurity weaknesses and a failure to follow security best practices [62031].
Responsible Organization 1. Researchers from the University of Washington [62031]
Impacted Organization 1. Computer system at the University of Washington [62031]
Software Causes 1. The software cause of the failure incident was a weakness in the DNA sequencing software that allowed the researchers to exploit and gain full control over a computer connected to the DNA sequencer [62031].
Non-software Causes 1. Weakness in the DNA sequencing software [62031]
Impacts 1. The impact of the software failure incident reported in Article 62031 was the successful hacking into a computer using custom strands of DNA for the first time. The researchers were able to transmit a computer virus from the biological realm to the digital realm by encoding malicious computer code in DNA strands, exploiting vulnerabilities in DNA sequencing software [62031].
Preventions 1. Implementing stronger security measures in DNA sequencing software to prevent vulnerabilities that could be exploited by malicious DNA strands [62031].
Fixes 1. Improving security measures within DNA sequencing systems to prevent vulnerabilities that could be exploited by malicious DNA strands [62031].
References 1. Researchers from the University of Washington - [62031]

Software Taxonomy of Faults

Category Option Rationale
Recurring unknown (a) The software failure incident related to hacking into a computer using custom strands of DNA at the University of Washington is a unique case and has not been reported to have happened again within the same organization or with its products and services [62031]. (b) There is no information in the provided article about a similar incident happening at other organizations or with their products and services.
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the article. The researchers from the University of Washington successfully hacked into a computer using custom strands of DNA. They designed and created a synthetic DNA strand containing malicious computer code encoded in the bases of the DNA strand. This design flaw allowed them to exploit vulnerabilities in the DNA sequencing software, converting the molecular code into computer code capable of taking over the computer connected to the DNA sequencer [62031]. (b) The software failure incident related to the operation phase is also present in the article. The hack was only possible due to weaknesses in the DNA sequencing software and the specific operation of processing the DNA strand. The researchers were able to gain full control over a computer by exploiting these vulnerabilities in the operation of the DNA sequencing system. This highlights the importance of addressing security risks in the operation and maintenance of DNA sequencing systems [62031].
Boundary (Internal/External) within_system (a) within_system: The software failure incident described in the article is within the system. The researchers successfully hacked into a computer by encoding malicious computer code in a synthetic DNA strand. This exploit took advantage of weaknesses in the DNA sequencing software, allowing them to gain remote control over the computer processing the DNA. The vulnerability was specific to the DNA sequencing software and was not a result of an external attack [62031].
Nature (Human/Non-human) non-human_actions (a) The software failure incident in the article was due to non-human actions. Specifically, the failure occurred as a result of weaknesses in the DNA sequencing software, which allowed for the malicious computer code encoded in the DNA strand to exploit vulnerabilities in the sequencing compute program [62031].
Dimension (Hardware/Software) software (a) The software failure incident reported in the article is not directly related to hardware issues. Instead, it is about a unique case where a computer was hacked using custom strands of DNA, highlighting vulnerabilities in DNA sequencing software [62031]. (b) The software failure incident in the article is primarily due to weaknesses in the DNA sequencing software, which allowed the researchers to exploit the system and gain control over a computer by encoding malware in DNA strands. The researchers emphasized the need for better security within DNA sequencing systems to prevent such attacks in the future [62031].
Objective (Malicious/Non-malicious) malicious (a) The objective of the software failure incident was malicious. Researchers from the University of Washington successfully hacked into a computer using custom strands of DNA with the intent to harm the system. They designed and created a synthetic DNA strand containing malicious computer code encoded in the bases of the DNA strand. This code, when processed by the vulnerable program, gave remote control of the computer to the hackers, allowing them to exploit and gain full control over the computer using adversarial synthetic DNA [62031].
Intent (Poor/Accidental Decisions) unknown (a) The intent of the software failure incident was not due to poor decisions but rather highlighted the vulnerability in DNA sequencing software. The researchers from the University of Washington successfully hacked into a computer using custom strands of DNA to illustrate the need for better security within DNA sequencing systems [62031]. The hack was made possible due to weaknesses in the DNA sequencing software, emphasizing the importance of addressing computer security risks in DNA sequencing systems.
Capability (Incompetence/Accidental) accidental (a) The software failure incident in the article was not due to development incompetence. Instead, it was a result of a hack where researchers successfully hacked into a computer using custom strands of DNA, exploiting weaknesses in the DNA sequencing software [62031]. (b) The software failure incident in the article was accidental. The hack using DNA to take over a computer was a demonstration of a potential vulnerability in DNA sequencing systems, highlighting the need for better security measures in place to prevent such accidental breaches [62031].
Duration temporary The software failure incident described in the article [62031] can be categorized as a temporary failure. The incident occurred due to a specific weakness in the DNA sequencing software that allowed the researchers to exploit and gain control over a computer by encoding malware in a synthetic DNA strand. The vulnerability in the sequencing software was a contributing factor to the temporary failure, as it enabled the attack to take place. The researchers emphasized that there is no present cause for alarm about current threats and highlighted the need for better security within DNA sequencing systems to address such vulnerabilities in the future.
Behaviour crash, value, other (a) crash: The software failure incident in the article can be categorized as a crash. The researchers were able to hack into a computer by exploiting a weakness in the DNA sequencing software, causing the system to lose control and allowing remote control of the computer [62031]. (b) omission: There is no indication in the article that the software failure incident was due to the system omitting to perform its intended functions at an instance(s). (c) timing: The software failure incident was not related to the system performing its intended functions too late or too early. (d) value: The software failure incident can be attributed to the system performing its intended functions incorrectly, as the malicious computer code encoded in the DNA strand led to the computer being taken over by the researchers [62031]. (e) byzantine: The software failure incident does not align with the definition of a byzantine failure, which involves erroneous behavior with inconsistent responses and interactions. (f) other: The behavior of the software failure incident can be categorized as a unique form of attack where the system was compromised through the transfer of malware via DNA, showcasing a novel vulnerability in the DNA sequencing software [62031].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence non-human, unknown (a) unknown (b) unknown (c) unknown (d) unknown (e) unknown (f) [62031] The software failure incident involving the hacking of a computer using custom strands of DNA did not result in any real observed consequences on non-human entities. (g) unknown (h) unknown (i) unknown
Domain information (a) The failed system in the reported incident was related to the industry of information. The researchers hacked into a computer system using custom strands of DNA, illustrating vulnerabilities in DNA sequencing software used for processing and analyzing DNA data [62031]. This incident highlights the importance of enhancing security measures within DNA sequencing systems to prevent potential cyber threats in the information industry.

Sources

Back to List