Experts warn that DNA sequencers are vulnerable to bootkit attacks


  • Eclypsium researchers find vulnerability in the way iSeq 100 starts
  • The bug allows threat actors to establish persistence, lock the device, or alter results.
  • Since then, a patch is available, so update now.

A popular DNA sequencer has been discovered to have a vulnerability that allows threat actors to establish persistence on the device, destroy the hardware or even alter the results, experts said.

Eclypsium researchers analyzed the BIOS firmware on the iSeq 100, a DNA sequencer built by US biotechnology company Illumina, a benchtop sequencing system designed for small-scale genomics and targeted sequencing applications. It is used to read and analyze DNA, help researchers understand genetic information, study diseases, develop treatments, or explore how organisms are related.

Leave a Comment

Your email address will not be published. Required fields are marked *