AI worms: What is it, how it works, and how to stay safe.

How does the AI worm work

In today’s rapidly evolving digital landscape, generative AI technologies like ChatGPT, Gemini, and Copilot are leading the charge. These AI-powered platforms are revolutionizing the way we solve problems, from crafting personalized diet plans to drafting complex code. However, this burgeoning reliance on AI also brings new risks. Including the threat of AI worms that can compromise our data and breach the security of AI systems.

A groundbreaking report from Wired highlights a concerning development in the realm of AI threats. Researchers from prestigious institutions like Cornell University, Technion-Israel Institute of Technology, and Intuit have unveiled “Morris II”. It dubbed the first generative AI worm. Named after the infamous internet worm of 1988 Morris II is designed to exploit vulnerabilities in popular AI models. Ben Nassi a researcher at Cornell Tech emphasizes the unprecedented nature of this cyberattack. Signalling a novel threat in the cyber landscape.

How does the AI worms work?

Although the research surrounding Morris II was conducted in a controlled setting. No real-world instances reported yet, the implications are alarming. The researchers caution that attackers could harness such malware to steal data or send spam emails en masse via AI assistants.This looming threat underscores the urgent need for developers and tech companies to fortify their defences against such innovative attacks.

But how exactly does Morris II operate? Picture a cunning computer worm, its primary objective to disrupt AI-powered email assistants. Initially, Morris II engages in “adversarial self-replication” bombarding the email system with messages that lead to a loop of forwarding. Confusing the underlying AI models and potentially leading to data breaches or the dissemination of malware.

Morris II employs two insidious strategies to infiltrate systems: text-based and image-based attacks. The former involves embedding malicious prompts in emails, while the latter uses images laced with hidden prompts to further the worm’s spread. This dual approach makes Morris II a formidable adversary, capable of manipulating AI systems to compromise user privacy and security.

Once the worm breaches AI assistants, the consequences are severe. It can exploit generative AI’s capabilities to extract sensitive information from emails, posing a significant risk to user privacy. The potential for Morris II to siphon off personal information data. PI like names, phone numbers, credit card details and social security numbers is a stark reminder of the vulnerabilities inherent in AI systems.

What happens after AI is tricked?

Despite Morris II’s theoretical nature, we cannot underestimate its potential for real-world harm. As AI systems grow more interconnected and autonomous, the risk posed by AI worms becomes more pronounced. It’s crucial for developers and companies to recognize and address these threats proactively.

Here is what you can do to stay safe from AI worms.

To safeguard against AI worms like Morris II, several defensive measures are recommended. Designing AI systems with security as a priority is essential, incorporating traditional security practices and maintaining a healthy skepticism towards AI outputs. Involving humans in the decision-making process and requiring their approval for AI actions can provide an additional layer of security. Vigilant monitoring of AI systems for anomalies, such as repetitive prompts, can aid in the early detection of potential threats.

About Smart Group

Smart Group Cyber Security Consultancy Services offer cutting-edge solutions to protect your digital assets in an increasingly interconnected world. Our team of expert consultants specializes in identifying vulnerabilities, implementing robust security protocols, and providing comprehensive risk management strategies. We empower businesses with tailored cybersecurity measures. And ensuring they stay ahead of evolving threats. And maintain the integrity of their data and systems.


In conclusion, we at Smart Group hope this article has provided you with valuable insights and actionable strategies. Smart Group India Incubation provides a nurturing environment for startups, offering comprehensive support and resources to foster growth and innovation. With access to expert mentorship, state-of-the-art infrastructure, and networking opportunities, startups can thrive in their journey from ideation to market launch. Explore our services in DevOps consultancy, IoT solutions, and cybersecurity to leverage cutting-edge technology for your business success. Join us to embark on a transformative journey towards entrepreneurial excellence. For further information and a deeper dive into this topic, we encourage you to explore the following resources. These links offer a wealth of knowledge and expert opinions that can enhance your understanding and assist you in applying these concepts effectively.

Startup Policies Govt. Of India


Startup News Sites


Research Papers