Warning about open source AI that poses potential cybersecurity risks

NGUYỄN ĐĂNG |

Cybercriminals could take advantage of the Model Context Protocol (MCP), a protocol for connecting open-source AI to conduct supply chain attacks.

MCP, which Anthropic announced as open source code in 2024, is a protocol that allows AI (artificial intelligence) systems, especially large language model-based applications (LLM) to connect directly with external tools and services.

Like any other open source tool, MCP can be taken advantage of by bad guys. In a recent study, experts from Kaspersky Emergency Response Team (Kaspersky Emergency Response Team - GERT) conducted a pilot scenario, simulating how attackers took advantage of MCP servers.

The experiment aims to illustrate how attackers attack the supply chain through this protocol, and at the same time show the level of damage that can occur when organizations and businesses use tools such as MCP without thorough inspection and review.

In a cybersecurity lab, experts simulate a Programmer's computer with a malicious MCP server installed, which can collect a variety of sensitive data, including:

- Password saved in the browser

- Credit card information

- cryptocurrency wallet file

- API token and certificate information

- Cloud settings and many other types of data

In a simulation attack, users are easily deceived by not recognizing any unusual signs. Although Kaspersky has never recorded this attack method in practice, users should still be wary that cybercriminals can take advantage of this method not only to steal sensitive data but also to carry out other dangerous acts such as running malware, installing backdoors or distributing malware for blackmail.

Faced with these risks, cybersecurity experts also make recommendations to help businesses reduce risks from MCP- take advantage attacks.

Check MCP carefully before installing: All new servers need to be scan, evaluated and approved before being put into actual use. Businesses should maintain a white list of approved servers to easily detect and control any new factors that appear.

Limit access: Operate servers in containers or virtual machines, only grant access to truly necessary folders, while separating networks, ensuring that the development environment cannot connect to the production system or other sensitive systems.

Monitor unusual behavior: It is necessary to record all prompt and feedback questions to promptly detect hidden instructions or unusual operations. Pay special attention to suspicious signs such as unexpected SQL commands or unusual data flows, such as data sent outside of programs not in the normal operating process.

Deploy security management services such as Managed detection and response (MDR) and/or Incident response: These services cover the entire incident handling process, from threat detection, continuous protection to troubleshooting. This solution still helps businesses defend against sophisticated attacks, investigate incidents and provide the necessary expertise, even when businesses lack specialized cybersecurity personnel.

NGUYỄN ĐĂNG
RELATED NEWS

Microsoft says it has a breakthrough in AI chip cooling

|

Microsoft recently announced that it has made a breakthrough with new AI chip cooling technology, capable of bringing efficiency three times higher than the current method.

Mobile application for emotional encryption still struggles to find a foothold

|

Although many AI-powered emotion- encrypting startups have become a lion with billions of USD in valuations, these mobile applications have not found a foothold.

Vietnamese enterprises give advice on building sovereign AI

|

The initiative to contribute to building and perfecting copyrighted AI for Vietnam was discussed by domestic and international experts at the NVIDIA AI Day event.

boycotting the $118 million cryptocurrency super scam that shocked 23 countries

|

European authorities have just dismantled a large-scale cryptocurrency investment scam ring in 23 countries, causing victims to lose $118 million.

Close-up of the bears being "revived" in Bach Ma

|

HUE - Many bears that were once held captive for honey are being cared for and restored at the Vietnam Bears Rescue Center II (Bach Ma National Park).

Responding to storm No. 9, Ninh Binh temporarily suspends ferry terminal operations from 6:00 p.m. on September 24

|

Ninh Binh - In order to proactively prevent and combat storm No. 9, ferry routes in Ninh Binh will temporarily suspend operations from 6:00 p.m. on September 24 until the storm is gone.

Forecast of the provinces with the heaviest rain and winds as storm No. 9 Ragasa is about to make landfall

|

According to the latest forecast from the National Center for Hydro-Meteorological Forecasting, the following areas will have the possibility of heavy rain and strongest winds when storm No. 9 Ragasa makes landfall.

Prime Minister approves personnel of Quang Ninh province

|

The Prime Minister approved the election results for the position of Chairman of the People's Committee of Quang Ninh province for Mr. Bui Van Khang - Deputy Secretary of the Quang Ninh Provincial Party Committee.

Microsoft says it has a breakthrough in AI chip cooling

QUANG MINH |

Microsoft recently announced that it has made a breakthrough with new AI chip cooling technology, capable of bringing efficiency three times higher than the current method.

Mobile application for emotional encryption still struggles to find a foothold

HẠO THIÊN (THEO techcrunch) |

Although many AI-powered emotion- encrypting startups have become a lion with billions of USD in valuations, these mobile applications have not found a foothold.

Vietnamese enterprises give advice on building sovereign AI

NGUYỄN ĐĂNG |

The initiative to contribute to building and perfecting copyrighted AI for Vietnam was discussed by domestic and international experts at the NVIDIA AI Day event.