Breaking DNA: Cooking Malware in the Lab
This talk demonstrates the feasibility of using synthetic DNA as a storage medium for malicious code, effectively bypassing traditional network-based security controls. By encoding shellcode into DNA sequences, an attacker can deliver payloads through physical supply chains that are subsequently processed by vulnerable bioinformatics analysis software. The research highlights how legacy, memory-unsafe C/C++ code in bioinformatics tools can be exploited via buffer overflow to achieve remote code execution. The presentation emphasizes the critical need for secure coding practices and input validation in scientific research software.
Exploiting Bioinformatics Pipelines via Synthetic DNA Injection
TLDR: Researchers have demonstrated that synthetic DNA can act as a covert delivery mechanism for malicious payloads, bypassing traditional network-based security controls. By encoding shellcode into DNA sequences, attackers can exploit memory-unsafe C/C++ code within bioinformatics analysis software via buffer overflow. This research highlights a critical, often overlooked, physical-to-digital attack vector that requires immediate attention from security teams managing scientific research infrastructure.
Security professionals typically focus on the network perimeter, endpoint protection, and cloud configurations. We assume that data entering our systems is either benign or can be sanitized by standard inspection tools. This assumption fails when the data itself is biological. The recent research presented at BSides London 2025 on "Breaking DNA" proves that we are ignoring a massive, emerging attack surface: the bioinformatics pipeline.
The Mechanics of Biological Injection
Bioinformatics software is designed to process massive datasets, often written in legacy C or C++ to maximize performance. These tools frequently rely on memory-unsafe functions like strcpy or gets to handle input, creating a classic environment for memory corruption. The attack vector here is not a malicious packet or a phishing link; it is a physical sample of synthetic DNA.
An attacker synthesizes a DNA strand containing a specific sequence that, when processed by analysis software, triggers a buffer overflow. Because the software treats this DNA as legitimate research data, it bypasses firewalls, intrusion detection systems, and sandboxes that are looking for traditional binary signatures or suspicious network traffic. The payload is "born" inside the lab environment the moment the sequencer reads the DNA and the analysis software attempts to process the resulting file.
Technical Execution and Memory Corruption
The core of this attack relies on the OWASP A03:2021-Injection category, specifically targeting the way bioinformatics tools handle input validation. When a sequencer reads the synthetic DNA, it generates a file in a format like FASTQ or FASTA. These are essentially plain-text files containing the sequence of bases (A, T, G, C) detected.
If the analysis software is vulnerable, the attacker can craft a DNA sequence that, when converted into this text format, exceeds the allocated buffer size. The following conceptual payload structure demonstrates how an attacker might overwrite the return address on the stack:
// Conceptual buffer overflow payload
// [Padding] + [Shellcode] + [Return Address]
char buffer[512];
strcpy(buffer, malicious_dna_sequence);
By carefully calculating the offset, the attacker overwrites the return address to point to their shellcode. Once the function returns, the CPU executes the malicious instructions. This grants the attacker remote code execution within the context of the analysis software, which often runs with high privileges to access sensitive research data.
Real-World Applicability for Pentesters
For a pentester or a bug bounty hunter, this research changes the definition of "input." If you are assessing a client in the biotech, pharmaceutical, or academic research sectors, you must look beyond web applications and APIs. Ask how they handle external data. Do they accept physical samples? How is the sequencing data processed?
During an engagement, focus on the software stack used for genomic analysis. Look for tools that have not been updated in years or that rely on custom, unhardened C/C++ libraries. If you can identify the specific bioinformatics suite in use, check for known vulnerabilities in its dependencies. The impact of a successful exploit is total system compromise, data corruption, or the theft of proprietary genomic research, which is often worth millions of dollars.
Defending the Lab Environment
Defending against this vector requires a shift in focus from network security to supply chain and application security. Organizations must prioritize refactoring legacy bioinformatics code to use memory-safe languages like Rust. If rewriting is not feasible, implementing strict input validation and memory protection techniques—such as Address Space Layout Randomization (ASLR) and Data Execution Prevention (DEP)—is mandatory.
Furthermore, security teams should treat genomic data as untrusted input. Just as you would sanitize a web form, you must sanitize the output of your sequencers before it reaches your core analysis engines. Establish rigorous Standard Operating Procedures (SOPs) for handling physical samples and ensure that your software environment is isolated from the rest of your production network.
The intersection of biology and computing is expanding rapidly, and with it, the potential for novel, high-impact exploits. We are no longer just protecting servers and workstations; we are protecting the integrity of the data that defines life itself. If you are working in an environment that processes genomic data, start by auditing your analysis pipelines today. The next big vulnerability might not be a zero-day in a web server, but a carefully crafted sequence of A, T, G, and C.
Vulnerability Classes
Target Technologies
OWASP Categories
Up Next From This Conference
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Kill List: Hacking an Assassination Site on the Dark Web




