• HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
Sunday, October 5, 2025
BIOENGINEER.ORG
No Result
View All Result
  • Login
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
  • HOME
  • NEWS
  • EXPLORE
    • CAREER
      • Companies
      • Jobs
        • Lecturer
        • PhD Studentship
        • Postdoc
        • Research Assistant
    • EVENTS
    • iGEM
      • News
      • Team
    • PHOTOS
    • VIDEO
    • WIKI
  • BLOG
  • COMMUNITY
    • FACEBOOK
    • INSTAGRAM
    • TWITTER
No Result
View All Result
Bioengineer.org
No Result
View All Result
Home NEWS Science News Biology

Personalized medicine software vulnerability uncovered by Sandia researchers

Bioengineer by Bioengineer
July 2, 2019
in Biology
Reading Time: 4 mins read
0
IMAGE
Share on FacebookShare on TwitterShare on LinkedinShare on RedditShare on Telegram

Discovery led researchers to software fix

IMAGE

Credit: Brent Haglund

LIVERMORE, Calif. — A weakness in one common open source software for genomic analysis left DNA-based medical diagnostics vulnerable to cyberattacks.

Researchers at Sandia National Laboratories identified the weakness and notified the software developers, who issued a patch to fix the problem. The issue has also been fixed in the latest release of the software. While no attack from this vulnerability is known, the National Institutes of Standards and Technology recently described it in a note to software developers, genomics researchers and network administrators.

The discovery reveals that protecting genomic information involves more than safe storage of an individual’s genetic information. The cybersecurity of computer systems analyzing genetic data is also crucial, said Corey Hudson, a bioinformatics researcher at Sandia who helped uncover the issue.

Personalized medicine — the process of using a patient’s genetic information to guide medical treatment — involves two steps: sequencing the entire genetic content from a patient’s cells and comparing that sequence to a standardized human genome. Through that comparison, doctors identify specific genetic changes in a patient that are linked to disease.

Genome sequencing starts with cutting and replicating a person’s genetic information into millions of small pieces. Then a machine reads each piece numerous times and transforms images of the pieces into sequences of building blocks, commonly represented by the letters A, T, C and G. Finally, software collects those sequences and matches each snippet to its place on a standardized human genome sequence. One matching program used widely by personalized genomics researchers is called Burrows-Wheeler Aligner (BWA).

Sandia researchers studying the cybersecurity of this program found a weak spot when the program imports the standardized genome from government servers. The standardized genome sequence traveled over insecure channels, which created the opportunity for a common cyberattack called a “man-in-the-middle.”

In this attack, an adversary or a hacker could intercept the standard genome sequence and then transmit it to a BWA user along with a malicious program that alters genetic information obtained from sequencing. The malware could then change a patient’s raw genetic data during genome mapping, making the final analysis incorrect without anyone knowing it. Practically, this means doctors may prescribe a drug based on the genetic analysis that, had they had the correct information, they would have known would be ineffective or toxic to a patient.

Forensic labs and genome sequencing companies that also use this mapping software were also temporarily vulnerable to having results maliciously altered in the same way. Information from direct-to-consumer genetic tests was not affected by this vulnerability because these tests use a different sequencing method than whole genome sequencing, Hudson said.

Security cybersleuths

To find this vulnerability, Hudson and his cybersecurity colleagues at the University of Illinois at Urbana-Champaign used a platform developed by Sandia called Emulytics to simulate the process of genome mapping. First, they imported genetic information simulated to resemble that from a sequencer. Then they had two servers send information to Emulytics. One provided a standard genome sequence and the other acted as the “man-in-the-middle” interceptor. The researchers mapped the sequencing results and compared results with and without an attack to see how the attack changed the final sequence.

“Once we discovered that this attack could change a patient’s genetic information, we followed responsible disclosure,” Hudson said. The researchers contacted the open source developers, who then issued a patch to fix the problem. They also contacted public agencies, including cybersecurity experts at the U.S. Computer Emergency Readiness Team, so they could more widely distribute information about this issue.

The research, funded by Sandia’s Laboratory Directed Research and Development program, continues testing other genome mapping software for security weaknesses. Differences between each program mean the researchers might find a similar, but not identical, issue in other programs, Hudson said.

Along with installing the latest version of BWA, Hudson and his colleagues recommend other “cyberhygiene” strategies to secure genomic information, including transmitting data over encrypted channels and using software that protects sequencing data from being changed. They also encourage security researchers who routinely analyze open source software for weaknesses to look at genomics programs. This practice is common in industrial control systems in the energy grid and software used in critical infrastructure, Hudson said, but would be a new area for genomics security.

“Our goal is to make systems safer for people who use them by helping to develop best practices,” he said.

###

Sandia National Laboratories is a multimission laboratory operated by National Technology and Engineering Solutions of Sandia LLC, a wholly owned subsidiary of Honeywell International Inc., for the U.S. Department of Energy’s National Nuclear Security Administration. Sandia Labs has major research and development responsibilities in nuclear deterrence, global security, defense, energy technologies and economic competitiveness, with main facilities in Albuquerque, New Mexico, and Livermore, California.

Sandia news media contact: Melissae Fellet, [email protected], 505-845-7478

Media Contact
Melissae Fellet
[email protected]

Original Source

https://share-ng.sandia.gov/news/resources/news_releases/genomic_cybersecurity/

Tags: BiotechnologyGeneticsSystem Security/HackersTechnology/Engineering/Computer Science
Share12Tweet8Share2ShareShareShare2

Related Posts

blank

Exploring Splicing Patterns in Medicinal Rheum Palmatum

October 5, 2025
NR2E1 Gene Methylation Influences Beef Cattle Adipocytes

NR2E1 Gene Methylation Influences Beef Cattle Adipocytes

October 5, 2025

“Rice Cultivar Transcriptome Reveals Heat Stress Response Genes”

October 4, 2025

Revolutionary Graph Network Enhances Protein Interaction Prediction

October 4, 2025
Please login to join discussion

POPULAR NEWS

  • New Study Reveals the Science Behind Exercise and Weight Loss

    New Study Reveals the Science Behind Exercise and Weight Loss

    94 shares
    Share 38 Tweet 24
  • New Study Indicates Children’s Risk of Long COVID Could Double Following a Second Infection – The Lancet Infectious Diseases

    92 shares
    Share 37 Tweet 23
  • Physicists Develop Visible Time Crystal for the First Time

    75 shares
    Share 30 Tweet 19
  • New Insights Suggest ALS May Be an Autoimmune Disease

    70 shares
    Share 28 Tweet 18

About

We bring you the latest biotechnology news from best research centers and universities around the world. Check our website.

Follow us

Recent News

ICU Nurses’ Perspectives on End-of-Life Care

Exploring Splicing Patterns in Medicinal Rheum Palmatum

Exchange Transfusion Impact on Severe Infant Pertussis

Subscribe to Blog via Email

Success! An email was just sent to confirm your subscription. Please find the email now and click 'Confirm' to start subscribing.

Join 62 other subscribers
  • Contact Us

Bioengineer.org © Copyright 2023 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Homepages
    • Home Page 1
    • Home Page 2
  • News
  • National
  • Business
  • Health
  • Lifestyle
  • Science

Bioengineer.org © Copyright 2023 All Rights Reserved.