Kaspersky Warns Open-Source AI Connector Could Be Abused By Cyberattackers
(MENAFN- Mid-East Info) Kaspersky has found that Model Context Protocol MCP could be weaponized by cybercriminals as a supply chain attack vector, potentially leading to harmful impacts, including, but not limited to the leakage of password, credit card, cryptowallet and other types of data. In their new research, Kaspersky experts show the concept of an attack and share mitigation measures for businesses who integrate AI tools into their workflows.
Open-sourced by Anthropic in 2024, the Model Context Protocol (MCP) is a standard that gives AI systems, especially LLM-based apps, a consistent way to connect to external tools and services. For instance, organizations may use it to let LLMs search and update documents, manage code repositories and APIs, or access CRM, financial, and cloud data. Like any open-source tool, MCP can be abused by cybercriminals. In their new research, Kaspersky Emergency Response Team experts built a proof-of-concept that simulates how attackers might abuse an MCP server. This was to demonstrate how the supply chain attacks can unfold through the protocol and to showcase the potential harm that might come from running such tools without proper auditing. Performing a controlled security lab test, they simulated a developer workstation with a rogue MCP server installed, ultimately harvesting such sensitive data types as:
Open-sourced by Anthropic in 2024, the Model Context Protocol (MCP) is a standard that gives AI systems, especially LLM-based apps, a consistent way to connect to external tools and services. For instance, organizations may use it to let LLMs search and update documents, manage code repositories and APIs, or access CRM, financial, and cloud data. Like any open-source tool, MCP can be abused by cybercriminals. In their new research, Kaspersky Emergency Response Team experts built a proof-of-concept that simulates how attackers might abuse an MCP server. This was to demonstrate how the supply chain attacks can unfold through the protocol and to showcase the potential harm that might come from running such tools without proper auditing. Performing a controlled security lab test, they simulated a developer workstation with a rogue MCP server installed, ultimately harvesting such sensitive data types as:
-
browser passwords
credit card data
cryptocurrency wallet files
API tokens and certificates
cloud configurations and more
-
Check the MCP before installation. Submit every new server to a process where it's scanned, reviewed, and approved before production use. Maintain a whitelist of approved servers so anything new stands out immediately.
Lock it down. Run servers in containers or virtual machines with access limited to only the folders they require, and isolate networks so development environments can't reach production or other sensitive systems.
Monitor for odd behavior and anomalies. Log every prompt and response so that hidden instructions or unusual tool calls can be spotted in the transcript. Keep an eye out for suspicious prompts, unexpected SQL commands, or unusual data flows, like outbound traffic triggered by agents outside standard workflows.
Adopt managed security services by Kaspersky such as Managed Detection and Response (MDR) and / or Incident Response, covering the entire incident management cycle – from threat identification to continuous protection and remediation. They help to protect against evasive cyberattacks, investigate incidents and get additional expertise even if a company lacks cybersecurity workers.

Legal Disclaimer:
MENAFN provides the
information “as is” without warranty of any kind. We do not accept
any responsibility or liability for the accuracy, content, images,
videos, licenses, completeness, legality, or reliability of the information
contained in this article. If you have any complaints or copyright
issues related to this article, kindly contact the provider above.
Most popular stories
Market Research

- New Cryptocurrency Mutuum Finance (MUTM) Raises $15.8M As Phase 6 Reaches 40%
- Bydfi Joins Korea Blockchain Week 2025 (KBW2025): Deepening Web3 Engagement
- Yield Basis Nears Mainnet Launch As Curve DAO Votes On Crvusd Proposal
- 0G Labs Launches Aristotle Mainnet With Largest Day-One Ecosystem For Decentralized AI
- Ethereum-Based Defi Crypto Mutuum Finance (MUTM) Raises Over $16 Million With More Than 720M Tokens Sold
- Fintech's Gender Gap In Focus: Drofa Comms' Women Leading The Way Joins Evolvh3r's She Connects At TOKEN2049
Comments
No comment