Experts warn DNA sequencers are vulnerable to bootkit attacks

0
1


  • Researchers from Eclypsium find vulnerability in the way iSeq 100 boots up
  • The bug allows threat actors to establish persistence, brick the device, or tamper with the results
  • A patch has since been made available, so update now

A popular DNA sequencer has been found carrying a vulnerability allowing threat actors to establish persistence on the device, destroy the hardware, or even tamper with the results, experts have claimed.

Researchers from Eclypsium analyzed the BIOS firmware in iSeq 100, a DNA sequencer built by a US biotechnology company Illumina, a benchtop sequencing system designed for small-scale genomic and targeted sequencing applications. It is used to read and analyze DNA, help researchers understand genetic information, study diseases, develop treatments, or explore how organisms are related.

LEAVE A REPLY

Please enter your comment!
Please enter your name here