Bioterrorists to trick COVID-19 Vaccine Developers with Malware

1866

Security researchers at the Ben Gurion University of the Negev has discovered that Bio-terrorists can trick COVID-19 Vaccine Developers with malware and can alter the vaccines with toxic chemicals and deadly viruses in labs.

This is possible by altering the sub-string DNA in the code with a new sequence and then leaving no trace of alteration.

After receiving an alert from the team of researchers, the US Department of Health and Human Services(HHS) has issued fresh protocols for screening DNA orders for synthetic gene providers that scrutinize for potentially harmful DNA.

In a recent analysis conducted by HHS, it was found that 16 out of 50 obfuscated DNA samples were not scanned for any alterations made in fraudulent ways and this has rang the alarm bells across the world.

Screening of DNA orders is done to curb any malpractices been carried out in synthetic gene engineering to avoid development of dangerous substances.

HHA argues that hackers hired to conduct bio-war can induce malware into the networks of R&D of vaccine development to exploit DNA molecules only to be replaced with malicious ones.

Therefore, the only way to curb such cyber-biological threats is to improve the scanning patterns in algorithms that consider the Vivo Gene editing. So, vaccine developers and other scientists working on several experiments should be extra cautious when such cyber alerts are issued and should re-analyze their defense skills against cyber intrusions of terror.

Ad
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display