APromptRiskDBThreat intelligence atlas
AI Case Study

Morris II Worm: RAG-Based Attack - AI Case Study

Researchers developed Morris II, a zero-click worm designed to attack generative AI (GenAI) ecosystems and propagate between connected GenAI systems. The worm uses an adversarial self-replicating prompt which uses prompt injection to replicate the prompt as output and perform malicious activity. The researchers demonstrate how this worm can propagate through an email system with a RAG-based assistant. They use a t...

ExerciseRAG-based e-mail assistantStav Cohen, Ron Bitton, Ben NassiExecutionAI Model AccessPersistence

Overview

Case steps7Steps described in the case record.
Techniques7Attack methods mentioned in the case steps.
Linked CVEs0Known vulnerabilities mentioned in the record.

Risk patterns

Patterns found in the case record and its linked vulnerabilities.

  • 1Dominant ATLAS tactic. Execution appears in 3 case steps.
  • 2Multiple attack methods. The case connects to 7 unique AI attack methods.

Procedure timeline

Search the case steps or filter them by attacker goal.

Execution3AI Model Access1Persistence1Exfiltration1Impact1
  1. Step 2

    Direct

    Execution

    The researchers test prompts on public model APIs to identify working prompt injections.

  2. Execution

    The researchers send an email containing an adversarial self-replicating prompt, or "AI worm," to an address used in the target email system. The GenAI email assistant automatically ingests the email as part of its normal operations to generate a suggested reply. The email is stored in the database used for retrieval augmented generation, compromising the RAG system.

  3. Step 4

    Triggered

    Execution

    When the email containing the worm is retrieved by the email assistant in another reply generation task, the prompt injection changes the behavior of the GenAI email assistant.

  4. Exfiltration

    The malicious instructions in the prompt cause the generated output to leak sensitive data such as emails, addresses, and phone numbers.

  5. Step 7

    User Harm

    Impact

    Users of the GenAI email assistant may have PII leaked to attackers.

Mitigations

Defenses connected to the attack methods in this case.

Sources

Original public records and references for this case.