Experts warn that DNA sequencers are vulnerable to bootkit attacks


  • Eclypsium researchers find vulnerability in the way the iSeq 100 boots up
  • The flaw allows threat actors to establish persistence, brick the device, or manipulate the results
  • A patch has since been made available, so update now

A popular DNA sequencer has been found with a vulnerability that allows threat actors to establish persistence on the device, destroy the hardware or even tamper with the results, experts have claimed.

Researchers from Eclypsium analyzed the BIOS firmware in the iSeq 100, a DNA sequencer built by US biotechnology company Illumina, a benchtop sequencing system designed for small genomic and targeted sequencing applications. It is used to read and analyze DNA, help scientists understand genetic information, study diseases, develop treatments or explore how organisms are related.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top