The researchers showed that computers used to analyze DNA can have normal software security problems. When a DNA sample is sequenced, the machine turns the DNA into digital data that software reads. The researchers found that some DNA analysis programs do not properly check the data they receive. Because of this, they were able to hide a small malicious program inside a strand of DNA. When the sequencing machine read the DNA and converted it into digital code, the program caused a buffer overflow, which is when a program receives more data than it can safely handle. This allowed the malicious code to run on the computer that was analyzing the DNA.
To reduce the risk of this type of attack, the researchers recommend using isolation methods when running DNA analysis software. One method is using virtual machines, which are like separate computers running inside the main computer. If something malicious happens, it stays inside the VM and does not damage the real system. Another option is using containers, which also separate the software from the rest of the computer. Both methods help limit the damage if harmful code is triggered.
Treating biological data as untrusted input means scientists should not automatically assume DNA samples are safe. As DNA data becomes more digital and shared between labs, there is a small chance that someone could hide malicious code in it. Organizations should continue advancing science but also follow strong cybersecurity practices, like checking data carefully and using secure systems, to prevent these new types of risks.