Categories: Cyber Security News

Malicious MCP Server Discovered Stealing Sensitive Email Data Through AI Agents

A malicious Model Context Protocol (MCP) server has been discovered exfiltrating thousands of emails daily through AI assistant integrations, marking the first documented case of a supply chain attack targeting the emerging MCP ecosystem.

The compromised package, postmark-mcp, has been downloaded approximately 1,500 times weekly and has been quietly stealing sensitive email communications since version 1.0.16.

Security researchers at Koi discovered the backdoor after their risk engine flagged suspicious behavioral changes in the popular email integration tool.

A simple line that steals thousands of emails (source – koi)

The malicious code, consisting of a single line buried at line 231, automatically adds a blind carbon copy (BCC) to “giftshop.club” for every email processed through the MCP server.

Sophisticated Supply Chain Deception

The attack demonstrates a concerning evolution in supply chain compromises. For 15 versions, postmark-mcp functioned legitimately, building trust within developer communities.

Koidex report for postmark-mcp (source – koi)

The malicious developer, identified as a software engineer from Paris with an established GitHub presence, impersonated the official Postmark integration by copying legitimate code from ActiveCampaign’s repository and publishing it under the same name on npm.

The backdoor’s implementation is deceptively simple yet devastatingly effective. The malicious line automatically appends the external email address to all outgoing communications, allowing the attacker to intercept password resets, invoices, internal memos, and confidential documents without detection.

AI assistants, operating autonomously with these MCP servers, cannot identify the unauthorized BCC field and continue executing email operations normally.

Conservative estimates suggest that the compromise affects approximately 300 organizations actively using the tool, potentially exposing 3,000 to 15,000 emails per day to unauthorized access.

The exfiltrated data likely includes API keys, financial information, customer communications, and other sensitive business intelligence.

Critical Infrastructure Vulnerability

The incident highlights fundamental security gaps in the MCP ecosystem, where AI assistants operate with god-mode permissions across email systems, databases, and API endpoints.

Unlike traditional npm packages, MCP servers are designed for autonomous AI execution, creating blind trust relationships that bypass conventional security controls.

The compromised package operated outside standard enterprise security perimeters, avoiding asset inventories, vendor risk assessments, and data loss prevention systems.

Organizations using AI assistants with MCP integrations may be unknowingly exposing critical infrastructure to similar threats.

After being contacted by researchers, the developer deleted the package from npm without explanation, although already-installed instances remain active and continue to exfiltrate data. The attack server, giftshop.club appears to be another project controlled by the same developer.

Postmark-mcp npm page (source – koi)

Organizations using Postmark-MCP version 1.0.16 or later should immediately remove the package and rotate potentially exposed credentials. Security teams are advised to audit all MCP server implementations and establish verification processes for AI assistant integrations before deployment.

IOCs

Package: postmark-mcp (npm)
Malicious Version: 1.0.16 and later
Backdoor Email: phan@giftshop[.]club
Domain: giftshop[.]club

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

The post Malicious MCP Server Discovered Stealing Sensitive Email Data Through AI Agents appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Save 50% Off the Wolfbox 2-in-1 Cordless Car Jump Starter and 24,000mAh Power Bank

A jump starter is an essential part of car's emergency kit and you don't need…

27 minutes ago

New Alert: Hackers Hijack Corporate M365 Accounts with OAuth Device Codes

ANY.RUN, a leading provider of interactive malware analysis and threat intelligence solutions, has recently observed a surge…

1 hour ago

Windows 11 25H2/24H2 Update Fixes Bluetooth Visibility Problems

Microsoft has released an out-of-band hotpatch, KB5084897, addressing a critical Bluetooth device visibility issue impacting…

1 hour ago

Microsoft Introduces AI-Powered Troubleshooting for Purview Data Lifecycle Management

Microsoft has announced the release of an AI-powered troubleshooting capability for Microsoft Purview Data Lifecycle…

1 hour ago

Illinois residents could soon use ‘plug in’ solar panels without extra fees or approval

Illinois Senate Bill 3104 aims to make it easier for residents, including renters and condominium…

1 hour ago

Dune: Part 3 Trailer Showcases the Epic Conclusion of Denis Villeneuve’s Trilogy and a First-Look at Robert Pattinson’s Villain

The first trailer for Dune: Part 3 has arrived, and it gives us our best…

1 hour ago

This website uses cookies.