New Attack Techniques Using MCP & How It Will be Used to Build Security Tools

The security industry’s rapid response to MCP demonstrates the ongoing evolution of cybersecurity defenses, with researchers already incorporating elements of MCP’s evasion techniques into next-generation security tools that promise better protection against similar threats in the future. Through detailed analysis, researchers determined that MCP’s command structure mimics legitimate administrative tools, allowing it to operate under the radar of many security monitoring solutions. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Once executed, these scripts establish an encrypted communication channel with attacker-controlled servers using a technique called “protocol tunneling” that disguises malicious traffic as legitimate API calls. Security researchers have observed MCP attacks targeting primarily financial institutions and critical infrastructure, with the malware’s ability to bypass conventional security measures making it particularly dangerous. Tenable researchers identified the malware during routine threat hunting operations when they noticed unusual API calls being made to cloud services from several client environments. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. The very protocol mechanisms that make MCP effective are being repurposed to create more robust detection systems that can identify similar attack patterns in the future. A sophisticated new attack technique known as Malicious Command Protocol (MCP) has emerged in recent weeks, raising significant concerns among cybersecurity professionals worldwide. This novel threat leverages previously unexploited vulnerabilities in command and control infrastructures, allowing attackers to establish persistent connections while evading traditional detection methods. “What makes MCP particularly concerning is its ability to adapt its communication patterns based on the environment it infects,” noted the lead Tenable analyst in their initial report. Tushar is a Cyber security content editor with a passion for creating captivating and informative content. The impact of MCP has already been substantial, with at least three major financial institutions reporting data exfiltration incidents linked to the malware. Interestingly, the security community is already developing countermeasures based on MCP’s own techniques.

This Cyber News was published on cybersecuritynews.com. Publication date: Fri, 02 May 2025 08:00:06 +0000


Cyber News related to New Attack Techniques Using MCP & How It Will be Used to Build Security Tools

25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
3 months ago Cybersecuritynews.com
New Attack Techniques Using MCP & How It Will be Used to Build Security Tools - The security industry’s rapid response to MCP demonstrates the ongoing evolution of cybersecurity defenses, with researchers already incorporating elements of MCP’s evasion techniques into next-generation security tools that promise ...
5 months ago Cybersecuritynews.com
CVE-2023-53649 - In the Linux kernel, the following vulnerability has been resolved: ...
1 day ago
How To Implementing MITRE ATT&CK In SOC Workflows - A Step-by-Step Guide - By understanding the framework, mapping your current capabilities, developing targeted detection and response strategies, and integrating ATT&CK into your tools and processes, you can build a proactive, threat-informed defense that evolves ...
5 months ago Cybersecuritynews.com
CVE-2021-36845 - Multiple Authenticated Stored Cross-Site Scripting (XSS) vulnerabilities in YITH Maintenance Mode (WordPress plugin) versions < 1.3.8, there are 46 vulnerable parameters that were missed by the vendor while patching the 1.3.7 version to 1.3.8. ...
4 years ago
Critical mcp-remote Vulnerability Exposes LLM Clients to Remote Code Execution Attacks - According to the JFrog security research team report, CVE-2025-6514 exploits the OAuth authorization flow in mcp-remote, a proxy tool that enables LLM hosts like Claude Desktop to communicate with remote MCP servers. The vulnerability affects ...
2 months ago Cybersecuritynews.com CVE-2025-6514
Threat Actors Can Weaponize MCP Servers - Threat actors have discovered new ways to exploit MCP (Master Control Program) servers, turning them into potent weapons for cyberattacks. MCP servers, critical in managing and controlling network operations, are increasingly targeted due to their ...
3 weeks ago Cybersecuritynews.com
Top 30 Best Penetration Testing Tools - 2025 - The tool supports various protocols and offers advanced filtering and analysis capabilities, making it ideal for diagnosing network issues, investigating security incidents, and understanding complex network interactions during penetration testing. ...
6 months ago Cybersecuritynews.com
CVE-2024-26626 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
GitGuardian Launches MCP Server to Bring Secrets Security into Developer Workflows - GitGuardian, the leader in automated secrets detection and remediation, today announced the launch of its Model Context Protocol (MCP) Server, a powerful new infrastructure designed to bring AI-assisted secrets security directly into developer ...
2 months ago Cybersecuritynews.com
8 Tips on Leveraging AI Tools Without Compromising Security - Forecasts like the Nielsen Norman Group estimating that AI tools may improve an employee's productivity by 66% have companies everywhere wanting to leverage these tools immediately. How can companies employ these powerful AI/ML tools without ...
1 year ago Darkreading.com
ChatGPT and MCP Tools Pose Risks to Private Data: What You Need to Know - The rise of AI-powered tools like ChatGPT and MCP (Machine Code Processing) has brought significant advancements in automation and data processing. However, these technologies also introduce new risks to private data security. This article explores ...
3 weeks ago Cybersecuritynews.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
1 year ago Esecurityplanet.com
What is App Security? SAST, DAST, IAST, and RASP. - Effective application security relies on well-defined processes and a diverse array of specialized tools to provide protection against unauthorized access and attacks. Security testing is a critical part of an application security strategy and should ...
1 year ago Feeds.dzone.com
Key Breakthroughs from RSA Conference 2025 - Day 1 - Sumo Logic unveiled intelligent security operations with capabilities like detection-as-code (bringing DevSecOps to threat detection), UEBA historical baselining (improving accuracy by learning behavior over time), multiple threat intelligence feeds, ...
5 months ago Cybersecuritynews.com Inception
Navigating the Security Risks of Multicloud Management - The lack of visibility and control over multiple clouds exacerbates these risks, making it imperative for organizations to adopt robust cloud security practices. These tools enhance visibility across multiple cloud environments by providing a unified ...
1 year ago Darkreading.com
Malicious MCP Server Exfiltrates Secrets, BCC - A newly discovered malicious MCP (Managed Control Protocol) server has been found exfiltrating sensitive secrets and data, posing a significant threat to organizations relying on this protocol for secure communications. This attack vector exploits ...
1 week ago Darkreading.com
The Dangers of Remote Management & Monitoring Tools for Cybersecurity - Remote monitoring and management (RMM) tools are used by business organizations to manage and monitor their enterprise IT infrastructure from a central location. However, the increasing sophistication of hackers and cybercriminals has caused both ...
2 years ago Csoonline.com
4 types of cloud security tools organizations need in 2024 - By now, organizations know which on-premises security tools they need, but when it comes to securing the cloud, they don't always understand which cloud security tools to implement. While many traditional on-premises tools and controls work in the ...
1 year ago Techtarget.com
20 Best Endpoint Management Tools - 2025 - What is Good?What Could Be Better?Comprehensive endpoint security against many threats.The user interface may overwhelm some users.Machine learning for real-time threat detection.Integration with existing systems may be complex.A central management ...
6 months ago Cybersecuritynews.com
10 Best Anti-Phishing Tools in 2025 - What is Good?What Could Be Better?Real-time email threat detection and response using AI and machine learning.Limited customer support optionsAutomates incident response to stop phishing attacks quickly.The training module is not entirely ...
2 months ago Cybersecuritynews.com
What Is Security Service Edge: All You Need to Know - Security service edge is a security technology that secures access to assets outside of the corporate network. Security service edge introduces a control that connects to remote users and assets before they connect to each other. All SSE tools borrow ...
1 year ago Esecurityplanet.com
The Complete Guide to PAM Tools, Features, And Techniques - Before we can dig into specific PAM tools and techniques – it’s first helpful to discuss what effective privileged access management looks like. Privileged access management can’t exist in a silo, because hackers often rely on network/software ...
1 year ago Heimdalsecurity.com

Cyber Trends (last 7 days)