Artificial intelligence is evolving every day, so you might think it would be easy to keep it safe. I mean, it should be easy to fight off cybercriminals if you can break through complex codes in an instant, right? But, well, not everything is black and white.
It is often overlooked that AI assistant tools such as ChatGPT and Gemini are vulnerable to malware threats, but this may be one reason why malware worms can penetrate them more easily. This can be a welcome mat for malware to sneak in and catch you. You let your guard down.
So, if you use ChatGPT or Gemini, here’s what you need to know about this new malware worm. Not a real threat at this point, but new research This report tells us a lot about the potential security issues and headaches that AI will face in the future.
The researchers disclosed this paper to OpenAI and Google, along with the fact that “this worm exploits a poor architectural design in the GenAI ecosystem and is not a vulnerability in the GenAI service.”
A smartphone equipped with ChatGPT. (Kurt “Cyber Guy” Knutson)
What is the Morris II computer worm?
The computer worm in question is a type of malware called Morris II, named after the Morris worm discovered in 1988 after it crashed about 10% of all computers connected to the Internet at the time.
However, as a side note, it’s important to understand that computer worms are a type of standalone malware that can replicate itself, spread to other computers, and contaminate everything in its path. .
What is artificial intelligence (AI)?
In this context, the worm we are talking about was designed by researchers to understand some of the vulnerabilities in AI assistant tools such as AI booking calendars and email services. Although not a direct threat at this time, it could come to AI tools sooner than you think.

A man is typing on a laptop keyboard. (Kurt “Cyber Guy” Knutson)
Read more: How scammers use AI tools to file perfect tax returns in your name
How does this computer worm work?
Morris II is a “zero-click” worm that infects Generative AI (GenAI) systems without requiring user interaction. The GenAI platform relies on prompts, which are essentially instructions given in text format.
However, Morris II can manipulate these prompts. Injects malicious prompts that trick the GenAI system into performing harmful actions without the knowledge of the user or her GenAI itself. For example, the worm used a compromised GenAI email assistant to Phishing emails and spampotentially stealing or compromising data.
CLICK HERE TO GET FOX BUSINESS ON THE GO
More information: Creepy materialized AI avatars give faces and voices for chat interactions
Morris II Steps to protect yourself from cyber threats
To protect yourself from potential cybersecurity threats such as the Morris II computer worm, you can take the following steps:
Be careful with email: Avoid opening email attachments or clicking links from unknown or untrusted sources.
Use antivirus software. Invest in reliable antivirus software that can detect and remove computer worms and other malware. The best way to protect yourself from clicking on malicious links that install malware that can access your personal information is to install antivirus protection on all your devices. This can also alert you to phishing emails and ransomware scams. Get my picks for the best antivirus protection products of 2024 for Windows, Mac, Android, and iOS devices.
Keep your system up to date. regularly Update your operating system and applications Patch security vulnerabilities.
Please use a strong password. Create complex passwords that are difficult to guess, and use different passwords for each account. Please consider using . password manager Generate and save complex passwords.
Back up your data. regularly Back up Save important data to external drives or cloud storage to prevent loss in case of infection.
Limit file sharing: Be careful when downloading files from peer-to-peer networks or file-sharing platforms, as they can be a source of malware.
Enable security features. Turn on security features such as: two-factor authentication Adds a layer of protection.
While AI tools are very useful, it’s important to remember that they are not immune to cyber threats. Being proactive about digital security is essential to protecting your personal information and devices.
Read more: How AI can manipulate voters, undermine elections, and threaten democracy
Cart important points
There is no need to abandon these AI tools just yet, but these researchers are working to understand what types of threats they will pose in the near future. This information allows you to prepare for and mitigate potential future malware threats.
CLICK HERE TO GET THE FOX NEWS APP
Given the potential vulnerabilities of AI tools, what precautions do you think users and developers should take? Please let us know by email. Cyberguy.com/Contact
For more of my tech tips and security alerts, subscribe to my free CyberGuy Report newsletter using the link below. Cyberguy.com/Newsletter
Ask your cart a question or let us know your story you’d like us to feature.
Answers to CyberGuy frequently asked questions:
Copyright 2024 CyberGuy.com. All rights reserved.



