webinar

The MCP Backdoor:
How Malware Slips In
Through Developer Tools

Wednesday
|
November 12
|
2 PM ET
Register Now

Host

speakers

James Berthoty
James Berthoty
Founder and Analyst
Latio
Kyle Ness
Kyle Ness
Security Researcher
Koi
Rohit Bansal
Rohit Bansal
Security Engineering Lead
Grammarly

Save your seat

Can’t join live? Register anyway and we’ll send you the recording

Abstract

Koi researchers uncovered the first malicious Model Context Protocol (MCP) server in the wild. It hid inside a routine developer workflow and silently BCC’d outbound emails to an attacker. It looked like a normal integration and stayed invisible to standard endpoint and supply chain controls. This is a new backdoor already living inside developer tooling.

MCP servers act as super-connectors across code, data, and infrastructure. They self-install, self-update, and often operate outside approved software intake. The result is permissions sprawl, opaque data movement, and attack paths most teams are not monitoring.

Register Now
In this session, we'll cover:
What MCP is and why it matters:

How this emerging protocol spreads through developer tools and quietly lands inside enterprise endpoints.

Reverse engineering the first malicious MCP:

A live breakdown of the attack path, what it touched, and why traditional controls missed it.

Where MCP hides today:

Findings from enterprise assessments and the telemetry that actually surfaces MCP risk.

How to mitigate now:

A 30-day path to restore visibility, score MCP risk across endpoints, and enforce guardrails without slowing developers.