Malicious MCP Server Discovered Stealing Sensitive Email Data Through AI Agents
The compromised package, postmark-mcp, has been downloaded approximately 1,500 times weekly and has been quietly stealing sensitive email communications since version 1.0.16.
Security researchers at Koi discovered the backdoor after their risk engine flagged suspicious behavioral changes in the popular email integration tool.
The malicious code, consisting of a single line buried at line 231, automatically adds a blind carbon copy (BCC) to “giftshop.club” for every email processed through the MCP server.
The attack demonstrates a concerning evolution in supply chain compromises. For 15 versions, postmark-mcp functioned legitimately, building trust within developer communities.
The malicious developer, identified as a software engineer from Paris with an established GitHub presence, impersonated the official Postmark integration by copying legitimate code from ActiveCampaign’s repository and publishing it under the same name on npm.
The backdoor’s implementation is deceptively simple yet devastatingly effective. The malicious line automatically appends the external email address to all outgoing communications, allowing the attacker to intercept password resets, invoices, internal memos, and confidential documents without detection.
AI assistants, operating autonomously with these MCP servers, cannot identify the unauthorized BCC field and continue executing email operations normally.
Conservative estimates suggest that the compromise affects approximately 300 organizations actively using the tool, potentially exposing 3,000 to 15,000 emails per day to unauthorized access.
The exfiltrated data likely includes API keys, financial information, customer communications, and other sensitive business intelligence.
The incident highlights fundamental security gaps in the MCP ecosystem, where AI assistants operate with god-mode permissions across email systems, databases, and API endpoints.
Unlike traditional npm packages, MCP servers are designed for autonomous AI execution, creating blind trust relationships that bypass conventional security controls.
The compromised package operated outside standard enterprise security perimeters, avoiding asset inventories, vendor risk assessments, and data loss prevention systems.
Organizations using AI assistants with MCP integrations may be unknowingly exposing critical infrastructure to similar threats.
After being contacted by researchers, the developer deleted the package from npm without explanation, although already-installed instances remain active and continue to exfiltrate data. The attack server, giftshop.club appears to be another project controlled by the same developer.
Organizations using Postmark-MCP version 1.0.16 or later should immediately remove the package and rotate potentially exposed credentials. Security teams are advised to audit all MCP server implementations and establish verification processes for AI assistant integrations before deployment.
Package: postmark-mcp (npm)
Malicious Version: 1.0.16 and later
Backdoor Email: phan@giftshop[.]club
Domain: giftshop[.]club
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post Malicious MCP Server Discovered Stealing Sensitive Email Data Through AI Agents appeared first on Cyber Security News.
A jump starter is an essential part of car's emergency kit and you don't need…
ANY.RUN, a leading provider of interactive malware analysis and threat intelligence solutions, has recently observed a surge…
Microsoft has released an out-of-band hotpatch, KB5084897, addressing a critical Bluetooth device visibility issue impacting…
Microsoft has announced the release of an AI-powered troubleshooting capability for Microsoft Purview Data Lifecycle…
Illinois Senate Bill 3104 aims to make it easier for residents, including renters and condominium…
The first trailer for Dune: Part 3 has arrived, and it gives us our best…
This website uses cookies.