{"id":80401,"date":"2025-09-24T15:09:53","date_gmt":"2025-09-24T12:09:53","guid":{"rendered":"https:\/\/gulftech-news.com\/en\/?p=80401"},"modified":"2025-09-24T15:09:55","modified_gmt":"2025-09-24T12:09:55","slug":"kaspersky-warns-open-source-ai-connector-could-be-abused-by-cyberattackers","status":"publish","type":"post","link":"https:\/\/gulftech-news.com\/en\/2025\/09\/24\/kaspersky-warns-open-source-ai-connector-could-be-abused-by-cyberattackers\/","title":{"rendered":"Kaspersky warns open-source AI connector could be abused by cyberattackers"},"content":{"rendered":"\n<p><strong>Kaspersky has found that Model Context Protocol (MCP) could be weaponized by cybercriminals as a supply chain attack vector, potentially leading to harmful impacts, including, but not limited to the leakage of password, credit card, cryptowallet and other types of data. In their new research, Kaspersky experts show the concept of an attack and share mitigation measures for businesses who integrate AI tools into their workflows.<\/strong><\/p>\n\n\n\n<p>Open-sourced by Anthropic in 2024, the <a href=\"https:\/\/www.anthropic.com\/news\/model-context-protocol\"><u>Model Context Protocol <\/u><\/a>(MCP) is a standard that gives AI systems, especially LLM-based apps, a consistent way to connect to external tools and services. For instance, organizations may use it to let LLMs search and update documents, manage code repositories and APIs, or access CRM, financial, and cloud data.<\/p>\n\n\n\n<p>Like any open-source tool, MCP can be abused by cybercriminals. In their new research, Kaspersky Emergency Response Team experts built a proof-of-concept that simulates how attackers might abuse an MCP server. <\/p>\n\n\n\n<p>This was to demonstrate how the supply chain attacks can unfold through the protocol and to showcase the potential harm that might come from running such tools without proper auditing. Performing a controlled security lab test, they simulated a developer workstation with a rogue MCP server installed, ultimately harvesting such sensitive data types as:\u00a0 \u00a0<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>browser passwords<\/li>\n\n\n\n<li>credit card data<\/li>\n\n\n\n<li>cryptocurrency wallet files<\/li>\n\n\n\n<li>API tokens and certificates<\/li>\n\n\n\n<li>cloud configurations and more<\/li>\n<\/ul>\n\n\n\n<p>During the simulated attack a \u201cvictim\u201d only sees the legitimate output. Kaspersky has not yet observed this vector in real life and warns that the vector may be used by cybercriminals not only to extract sensitive data, but also to cause other harmful impacts such as executing malicious code, installing backdoors and deploying ransomware, etc.<\/p>\n\n\n\n<p>In their research, Kaspersky used Cursor as the AI example client to connect with the weaponized MCP server, though the same attack concept may be applied to other LLMs as well. Cursor and Anthropic have been notified of the research outcomes.<\/p>\n\n\n\n<p>\u201cSupply chain attacks remain one of the most pressing threats in the cybersecurity space, and the potential weaponization of MCP we demonstrated follows this trend. With the current hype around AI and the race to integrate these tools into workflows, businesses may lower their guard and, by adopting a seemingly legitimate but unproven custom MCP, perhaps posted on Reddit or similar platforms, end up suffering a data leak. <\/p>\n\n\n\n<p>This underscores the importance of a strong security posture. In our new white paper, we share the technical details of this potential attack vector along with measures to help avoid falling victim,\u201d says Mohamed Ghobashy, Incident Response Specialist in the Kaspersky Global Emergency Response Team.<\/p>\n\n\n\n<p>The detailed research is presented on <a href=\"https:\/\/securelist.com\/model-context-protocol-for-ai-integration-abused-in-supply-chain-attacks\/117473\/\">Securelist<\/a>. To manage the risks associated with MCP abuse attacks, Kaspersky experts suggest that users:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Check the MCP before installation. Submit every new server to a process where it\u2019s scanned, reviewed, and approved before production use. Maintain a whitelist of approved servers so anything new stands out immediately.<\/li>\n\n\n\n<li>Lock it down. Run servers in containers or virtual machines with access limited to only the folders they require, and isolate networks so development environments can\u2019t reach production or other sensitive systems.<\/li>\n\n\n\n<li>Monitor for odd behavior and anomalies. Log every prompt and response so that hidden instructions or unusual tool calls can be spotted in the transcript. Keep an eye out for suspicious prompts, unexpected SQL commands, or unusual data flows, like outbound traffic triggered by agents outside standard workflows.<\/li>\n\n\n\n<li>Adopt managed security services by Kaspersky such as<a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/compromise-assessment\"> <\/a><a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/managed-detection-and-response\">Managed Detection and Response<\/a> (MDR) and \/ or<a href=\"https:\/\/www.kaspersky.com\/enterprise-security\/incident-response\"> Incident Response<\/a>, covering the entire incident management cycle \u2013 from threat identification to continuous protection and remediation.\u00a0 They help to protect against evasive cyberattacks, investigate incidents and get additional expertise even if a company lacks cybersecurity workers.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky has found that Model Context Protocol (MCP) could be weaponized by cybercriminals as a supply chain attack vector, potentially leading to harmful impacts, including, but not limited to the leakage of password, credit card, cryptowallet and other types of data. In their new research, Kaspersky experts show the concept of an attack and share &hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[644],"tags":[3765,1088],"class_list":["post-80401","post","type-post","status-publish","format-standard","hentry","category-communications-technology","tag-cyberattackers","tag-kaspersky-4"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Kaspersky warns open-source AI connector could be abused by cyberattackers - Gulf Tech News<\/title>\n<meta name=\"description\" content=\"Kaspersky warns open-source AI connector could be abused by cyberattackers\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gulftech-news.com\/en\/2025\/09\/24\/kaspersky-warns-open-source-ai-connector-could-be-abused-by-cyberattackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kaspersky warns open-source AI connector could be abused by cyberattackers - Gulf Tech News\" \/>\n<meta property=\"og:description\" content=\"Kaspersky warns open-source AI connector could be abused by cyberattackers\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gulftech-news.com\/en\/2025\/09\/24\/kaspersky-warns-open-source-ai-connector-could-be-abused-by-cyberattackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Gulf Tech News\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-24T12:09:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-24T12:09:55+00:00\" \/>\n<meta name=\"author\" content=\"bessan helmi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"bessan helmi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/09\/24\/kaspersky-warns-open-source-ai-connector-could-be-abused-by-cyberattackers\/\",\"url\":\"https:\/\/gulftech-news.com\/en\/2025\/09\/24\/kaspersky-warns-open-source-ai-connector-could-be-abused-by-cyberattackers\/\",\"name\":\"Kaspersky warns open-source AI connector could be abused by cyberattackers - Gulf Tech News\",\"isPartOf\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/#website\"},\"datePublished\":\"2025-09-24T12:09:53+00:00\",\"dateModified\":\"2025-09-24T12:09:55+00:00\",\"author\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c\"},\"description\":\"Kaspersky warns open-source AI connector could be abused by cyberattackers\",\"breadcrumb\":{\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/09\/24\/kaspersky-warns-open-source-ai-connector-could-be-abused-by-cyberattackers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gulftech-news.com\/en\/2025\/09\/24\/kaspersky-warns-open-source-ai-connector-could-be-abused-by-cyberattackers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gulftech-news.com\/en\/2025\/09\/24\/kaspersky-warns-open-source-ai-connector-could-be-abused-by-cyberattackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gulftech-news.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kaspersky warns open-source AI connector could be abused by cyberattackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#website\",\"url\":\"https:\/\/gulftech-news.com\/en\/\",\"name\":\"Gulf Tech News\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gulftech-news.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c\",\"name\":\"bessan helmi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g\",\"caption\":\"bessan helmi\"},\"url\":\"https:\/\/gulftech-news.com\/en\/author\/bessan-helmi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kaspersky warns open-source AI connector could be abused by cyberattackers - Gulf Tech News","description":"Kaspersky warns open-source AI connector could be abused by cyberattackers","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gulftech-news.com\/en\/2025\/09\/24\/kaspersky-warns-open-source-ai-connector-could-be-abused-by-cyberattackers\/","og_locale":"en_US","og_type":"article","og_title":"Kaspersky warns open-source AI connector could be abused by cyberattackers - Gulf Tech News","og_description":"Kaspersky warns open-source AI connector could be abused by cyberattackers","og_url":"https:\/\/gulftech-news.com\/en\/2025\/09\/24\/kaspersky-warns-open-source-ai-connector-could-be-abused-by-cyberattackers\/","og_site_name":"Gulf Tech News","article_published_time":"2025-09-24T12:09:53+00:00","article_modified_time":"2025-09-24T12:09:55+00:00","author":"bessan helmi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"bessan helmi","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/gulftech-news.com\/en\/2025\/09\/24\/kaspersky-warns-open-source-ai-connector-could-be-abused-by-cyberattackers\/","url":"https:\/\/gulftech-news.com\/en\/2025\/09\/24\/kaspersky-warns-open-source-ai-connector-could-be-abused-by-cyberattackers\/","name":"Kaspersky warns open-source AI connector could be abused by cyberattackers - Gulf Tech News","isPartOf":{"@id":"https:\/\/gulftech-news.com\/en\/#website"},"datePublished":"2025-09-24T12:09:53+00:00","dateModified":"2025-09-24T12:09:55+00:00","author":{"@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c"},"description":"Kaspersky warns open-source AI connector could be abused by cyberattackers","breadcrumb":{"@id":"https:\/\/gulftech-news.com\/en\/2025\/09\/24\/kaspersky-warns-open-source-ai-connector-could-be-abused-by-cyberattackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gulftech-news.com\/en\/2025\/09\/24\/kaspersky-warns-open-source-ai-connector-could-be-abused-by-cyberattackers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/gulftech-news.com\/en\/2025\/09\/24\/kaspersky-warns-open-source-ai-connector-could-be-abused-by-cyberattackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gulftech-news.com\/en\/"},{"@type":"ListItem","position":2,"name":"Kaspersky warns open-source AI connector could be abused by cyberattackers"}]},{"@type":"WebSite","@id":"https:\/\/gulftech-news.com\/en\/#website","url":"https:\/\/gulftech-news.com\/en\/","name":"Gulf Tech News","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gulftech-news.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/c033626e357b2f7e127eac0570ddc05c","name":"bessan helmi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gulftech-news.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bb1e09a6f094e0fa605073926f8ad9eb228a8b0aacd381fda782c562612428cf?s=96&d=mm&r=g","caption":"bessan helmi"},"url":"https:\/\/gulftech-news.com\/en\/author\/bessan-helmi\/"}]}},"_links":{"self":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/80401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/comments?post=80401"}],"version-history":[{"count":1,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/80401\/revisions"}],"predecessor-version":[{"id":80402,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/posts\/80401\/revisions\/80402"}],"wp:attachment":[{"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/media?parent=80401"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/categories?post=80401"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gulftech-news.com\/en\/wp-json\/wp\/v2\/tags?post=80401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}