{"id":55488,"date":"2024-03-04T14:57:44","date_gmt":"2024-03-04T14:57:44","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35607\/Researchers-Create-AI-Worms-That-Can-Spread-From-One-System-To-Another.html"},"modified":"2024-03-04T14:57:44","modified_gmt":"2024-03-04T14:57:44","slug":"researchers-create-ai-worms-that-can-spread-from-one-system-to-another","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\/","title":{"rendered":"Researchers Create AI Worms That Can Spread From One System To Another"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/03\/ai-malware-800x450.jpg\" alt=\"Researchers create AI worms that can spread from one system to another\"><figcaption class=\"caption\">\n<div class=\"caption-credit\">Jacqui VanLiew; Getty Images<\/div>\n<\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/ai\/2024\/03\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">106<\/span> <\/a> <\/aside>\n<p> <!-- cache hit 73:single\/related:640dd1f7a3071756cbcc271ca2b118a7 --><!-- empty --><\/p>\n<p>As generative AI systems like <a href=\"https:\/\/www.wired.com\/story\/17-tips-better-chatgpt-prompts\/\">OpenAI&#8217;s ChatGPT<\/a> and <a href=\"https:\/\/www.wired.com\/story\/how-to-use-google-gemini-advanced-ai-chatbot\/\">Google&#8217;s Gemini<\/a> become more advanced, they are increasingly being put to work. Startups and tech companies are building AI agents and ecosystems on top of the systems that can <a href=\"https:\/\/www.wired.com\/story\/ai-chatbots-chatgpt-boring-chores\/\">complete boring chores for you<\/a>: think automatically making calendar bookings and potentially <a href=\"https:\/\/www.wired.com\/story\/fast-forward-tested-next-gen-ai-assistant\/\">buying products<\/a>. But as the tools are given more freedom, it also increases the potential ways they can be attacked.<\/p>\n<p>Now, in a demonstration of the risks of connected, autonomous AI ecosystems, a group of researchers has created one of what they claim are the first generative AI worms\u2014which can spread from one system to another, potentially stealing data or deploying malware in the process. \u201cIt basically means that now you have the ability to conduct or to perform a new kind of cyberattack that hasn&#8217;t been seen before,\u201d says Ben Nassi, a Cornell Tech researcher behind the research.<\/p>\n<p>Nassi, along with fellow researchers Stav Cohen and Ron Bitton, created the worm, dubbed Morris II, as a nod to the original <a href=\"https:\/\/www.wired.com\/2011\/07\/0726first-computer-fraud-indictment\/\">Morris computer worm<\/a> that caused chaos across the Internet in 1988. In a <a href=\"https:\/\/sites.google.com\/view\/compromptmized\">research paper and website <\/a>shared exclusively with WIRED, the researchers show how the AI worm can attack a generative AI email assistant to steal data from emails and send spam messages\u2014breaking some security protections in ChatGPT and Gemini in the process.<\/p>\n<p>The research, which was undertaken in test environments and not against a publicly available email assistant, comes as <a href=\"https:\/\/www.wired.com\/story\/how-chatgpt-works-large-language-model\/\">large language models (LLMs)<\/a> are increasingly becoming multimodal, being able to generate images and <a href=\"https:\/\/www.wired.com\/story\/openai-sora-generative-ai-video\/\">video as well as text<\/a>. While generative AI worms haven\u2019t been spotted in the wild yet, multiple researchers say they are a security risk that startups, developers, and tech companies should be concerned about.<\/p>\n<figure class=\"image shortcode-img right full\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2019\/02\/wired-logo.png\" width=\"218\" height=\"58\"><\/figure>\n<p>Most generative AI systems work by being fed prompts\u2014text instructions that tell the tools to answer a question or create an image. However, these prompts can also be weaponized against the system. <a href=\"https:\/\/www.wired.com\/story\/chatgpt-jailbreak-generative-ai-hacking\/\">Jailbreaks<\/a> can make a system disregard its safety rules and spew out toxic or hateful content, while <a href=\"https:\/\/www.wired.co.uk\/article\/chatgpt-prompt-injection-attack-security\">prompt injection attacks<\/a> can give a chatbot secret instructions. For example, an attacker may hide text on a webpage <a href=\"https:\/\/greshake.github.io\/\">telling an LLM to act as a scammer and ask for your bank details<\/a>. <\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>To create the generative AI worm, the researchers turned to a so-called \u201cadversarial self-replicating prompt.\u201d This is a prompt that triggers the generative AI model to output, in its response, another prompt, the researchers say. In short, the AI system is told to produce a set of further instructions in its replies. This is broadly similar to traditional <a href=\"https:\/\/www.wired.com\/2016\/05\/hacker-lexicon-sql-injections-everyday-hackers-favorite-attack\/\">SQL injection and buffer overflow attacks<\/a>, the researchers say.<\/p>\n<p>To show how the worm can work, the researchers created an email system that could send and receive messages using generative AI, plugging into ChatGPT, Gemini, and open source LLM, <a href=\"https:\/\/llava-vl.github.io\/\">LLaVA<\/a>. They then found two ways to exploit the system\u2014by using a text-based self-replicating prompt and by embedding a self-replicating prompt within an image file.<\/p>\n<figure class=\"video\">\n<div class=\"wrapper\"><iframe loading=\"lazy\" type=\"text\/html\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/FL3qHH02Yd4?start=0&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen>[embedded content]<\/iframe><\/div>\n<\/figure>\n<p>In one instance, the researchers, acting as attackers, wrote an email including the adversarial text prompt, which \u201cpoisons\u201d the database of an email assistant using <a href=\"https:\/\/blogs.nvidia.com\/blog\/what-is-retrieval-augmented-generation\/\">retrieval-augmented generation (RAG)<\/a>, a way for LLMs to pull in extra data from outside its system. When the email is retrieved by the RAG, in response to a user query, and is sent to GPT-4 or Gemini Pro to create an answer, it \u201cjailbreaks the GenAI service\u201d and ultimately steals data from the emails, Nassi says. \u201cThe generated response containing the sensitive user data later infects new hosts when it is used to reply to an email sent to a new client and then stored in the database of the new client,\u201d Nassi says.<\/p>\n<p>In the second method, the researchers say, an image with a malicious prompt embedded makes the email assistant forward the message on to others. \u201cBy encoding the self-replicating prompt into the image, any kind of image containing spam, abuse material, or even propaganda can be forwarded further to new clients after the initial email has been sent,\u201d Nassi says.<\/p>\n<p>In a video demonstrating the research, the email system can be seen forwarding a message multiple times. The researchers also say they could extract data from emails. \u201cIt can be names, it can be telephone numbers, credit card numbers, SSN, anything that is considered confidential,\u201d Nassi says.<\/p>\n<p>Although the research breaks some of the safety measures of ChatGPT and Gemini, the researchers say the work is a warning about \u201cbad architecture design\u201d within the wider AI ecosystem. Nevertheless, they reported their findings to Google and OpenAI. \u201cThey appear to have found a way to exploit prompt-injection type vulnerabilities by relying on user input that hasn&#8217;t been checked or filtered,\u201d a spokesperson for OpenAI says, adding that the company is working to make its systems \u201cmore resilient\u201d and saying developers should \u201cuse methods that ensure they are not working with harmful input.\u201d Google declined to comment on the research. Messages Nassi shared with WIRED show the company\u2019s researchers requested a meeting to talk about the subject.<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>While the demonstration of the worm takes place in a largely controlled environment, multiple security experts who reviewed the research say that the future risk of generative AI worms is one that developers should take seriously. This particularly applies when AI applications are given permission to take actions on someone\u2019s behalf\u2014such as sending emails or booking appointments\u2014and when they may be linked up to other AI agents to complete these tasks. In other recent research, security researchers from Singapore and China have shown how they could <a href=\"https:\/\/arxiv.org\/pdf\/2402.08567.pdf\">jailbreak 1 million LLM agents in under five minutes<\/a>.<\/p>\n<p>Sahar Abdelnabi, a researcher at the CISPA Helmholtz Center for Information Security in Germany, who worked on some of the first <a href=\"https:\/\/arxiv.org\/pdf\/2302.12173.pdf\">demonstrations of prompt injections against LLMs in May 2023 and highlighted that worms<\/a> may be possible, says that when AI models take in data from external sources or the AI agents can work autonomously, there is the chance of worms spreading. \u201cI think the idea of spreading injections is very plausible,\u201d Abdelnabi says. \u201cIt all depends on what kind of applications these models are used in.\u201d Abdelnabi says that while this kind of attack is simulated at the moment, it may not be theoretical for long.<\/p>\n<p>In a paper covering their findings, Nassi and the other researchers say they anticipate seeing generative AI worms in the wild in the next two to three years. \u201cGenAI ecosystems are under massive development by many companies in the industry that integrate GenAI capabilities into their cars, smartphones, and operating systems,\u201d the research paper says.<\/p>\n<p>Despite this, there are ways people creating generative AI systems can defend against potential worms, including using <a href=\"https:\/\/www.wired.co.uk\/article\/generative-ai-prompt-injection-hacking\">traditional security approaches<\/a>. \u201cWith a lot of these issues, this is something that proper secure application design and monitoring could address parts of,\u201d says Adam Swanda, a threat researcher at AI enterprise security firm Robust Intelligence. \u201cYou typically don&#8217;t want to be trusting LLM output anywhere in your application.\u201d<\/p>\n<p>Swanda also says that keeping humans in the loop\u2014ensuring AI agents aren\u2019t allowed to take actions without approval\u2014is a crucial mitigation that can be put in place. \u201cYou don&#8217;t want an LLM that is reading your email to be able to turn around and send an email. There should be a boundary there.\u201d For Google and OpenAI, Swanda says that if a prompt is being repeated within its systems thousands of times, that will create a lot of \u201cnoise\u201d and may be easy to detect.<\/p>\n<p>Nassi and the research reiterate many of the <a href=\"https:\/\/sites.google.com\/view\/compromptmized\">same approaches to mitigations<\/a>. Ultimately, Nassi says, people creating AI assistants need to be aware of the risks. \u201cThis is something that you need to understand and see whether the development of the ecosystem, of the applications, that you have in your company basically follows one of these approaches,\u201d he says. \u201cBecause if they do, this needs to be taken into account.\u201d<\/p>\n<p><em>This story originally appeared on wired.com.<\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35607\/Researchers-Create-AI-Worms-That-Can-Spread-From-One-System-To-Another.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":55489,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8869],"class_list":["post-55488","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinehackerbotnet"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Researchers Create AI Worms That Can Spread From One System To Another 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Researchers Create AI Worms That Can Spread From One System To Another 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-04T14:57:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/03\/ai-malware-800x450.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Researchers Create AI Worms That Can Spread From One System To Another\",\"datePublished\":\"2024-03-04T14:57:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\\\/\"},\"wordCount\":1362,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another.jpg\",\"keywords\":[\"headline,hacker,botnet\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\\\/\",\"name\":\"Researchers Create AI Worms That Can Spread From One System To Another 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another.jpg\",\"datePublished\":\"2024-03-04T14:57:44+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another.jpg\",\"width\":800,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,botnet\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerbotnet\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Researchers Create AI Worms That Can Spread From One System To Another\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Researchers Create AI Worms That Can Spread From One System To Another 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\/","og_locale":"en_US","og_type":"article","og_title":"Researchers Create AI Worms That Can Spread From One System To Another 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-03-04T14:57:44+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2024\/03\/ai-malware-800x450.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Researchers Create AI Worms That Can Spread From One System To Another","datePublished":"2024-03-04T14:57:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\/"},"wordCount":1362,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another.jpg","keywords":["headline,hacker,botnet"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\/","url":"https:\/\/www.threatshub.org\/blog\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\/","name":"Researchers Create AI Worms That Can Spread From One System To Another 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another.jpg","datePublished":"2024-03-04T14:57:44+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/03\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another.jpg","width":800,"height":450},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/researchers-create-ai-worms-that-can-spread-from-one-system-to-another\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,botnet","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerbotnet\/"},{"@type":"ListItem","position":3,"name":"Researchers Create AI Worms That Can Spread From One System To Another"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55488"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55488\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/55489"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}