3 Followers
35 Following
57 Posts
#CISSP, #secops
BlogRedlantern.tech

My Ars colleague and friend @benjedwards just published a forward-looking piece anticipating a class of attack that's the AI equivalent to the traditional malware worm. The catalyst for this new possible threat is the advent of platforms like OpenClaw and Moltbook, which give rise to "networks of AI agents carrying out instructions from prompts and sharing them with other AI agents, which could spread the instructions further."

He writes:

You might call it a “prompt worm” or a “prompt virus.” They’re self-replicating instructions that could spread through networks of communicating AI agents similar to how traditional worms spread through computer networks. But instead of exploiting operating system vulnerabilities, prompt worms exploit the agents’ core function: following instructions.

...

With OpenClaw, the attack vectors multiply with every added skill extension. Here’s how a prompt worm might play out today: An agent installs a skill from the unmoderated ClawdHub registry. That skill instructs the agent to post content on Moltbook. Other agents read that content, which contains specific instructions. Those agents follow those instructions, which include posting similar content for more agents to read. Soon it has “gone viral” among the agents, pun intended.

These types of threats rarely play out precisely the way early forecasts predict. But I think Benj is on to something here. And if he's right, security pros will have a new class of high-severity exploits to grapple with tht will be every bit as challenging as the worm.

https://arstechnica.com/ai/2026/02/the-rise-of-moltbook-suggests-viral-ai-prompts-may-be-the-next-big-security-threat/?comments-page=1#comments

The rise of Moltbook suggests viral AI prompts may be the next big security threat

We don't need self-replicating AI models to have problems, just self-replicating prompts.

Ars Technica

RE: https://mastodon.social/@arstechnica/116006591768354993

This was recently mentioned on a podcast (Linux Unplugged), talking about what it can do and it's potential. It did get me interested. Now here is the opposite side of the coin which I think has merit and needs to be examined.

RE: https://mastodon.social/@nixCraft/115974065551866233

I had jumped to Linux because they moved the start menu. Since that time my move has been more justified.

You ever forget the command you know you need?

  • And you know it is in your bash history on the hard drive you just removed and put away?
  • And the external enclosure for it arrived but it will require traversing the cold and snow?
  • All that bash history for the taking...

Seems like a problem for tomorrow.

(and this is why my next long-term project is small utilities bins and an as-built script.)

How to Get Scammed (by DPRK Hackers)

https://infosec.pub/post/40778510

How to Get Scammed (by DPRK Hackers) - Infosec.Pub

Lemmy

My security practice year wrap by the numbers:

  • Total Assessments (does not include monthly recurring work or billable consulting): 69
  • New Clients: 15
  • Total Devices Scanned: 36,169
  • Total Subnets: 1481
  • Total High/Critical Vulnerabilities Found: 6639
  • Total Passwords Cracked: 3241
  • Most Used Password (Cracked): npc12345

#yearwrapped

And here are my thoughts on GrrCon this year. Always ends too soon and takes too long to come back around again. Hope to see everyone again.

https://redlantern.tech/AAR/

GrrCon 2025 After Action Report

Opening Remarks Once again, GrrCon has come and gone. GrrCon is the largest convention I have attended, and it still has a community feel. My first year I went alone. The second year I attended with the #MISec community. This year I spent most of my time walking the halls and talking with people I know from #MISec meetups, past GrrCons, and from Discord, LinkedIn, and Infosec.Exchange. I don’t think I’ve spoken to as many people at any previous convention as I did this year. Below I cover how things went.

X is where you find the people who think they run the Internet.

Bluesky is where you find the people who think they ought to run the Internet.

Mastodon is where you find the people who actually do run the Internet, and kind of wish they didn't.

(WIth apologies to Yes, Minister)