Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package

Posted on September 29, 2025September 29, 2025 By CWS

Sep 29, 2025Ravie LakshmananMCP Server / Vulnerability
Cybersecurity researchers have found what has been described because the first-ever occasion of a Mannequin Context Protocol (MCP) server noticed within the wild, elevating software program provide chain dangers.
In response to Koi Safety, a legitimate-looking developer managed to slide in rogue code inside an npm package deal referred to as “postmark-mcp” that copied an official Postmark Labs library of the identical identify. The malicious performance was launched in model 1.0.16, which was launched on September 17, 2025.
The precise “postmark-mcp” library, accessible on GitHub, exposes an MCP server to permit customers to ship emails, entry and use e-mail templates, and monitor campaigns utilizing synthetic intelligence (AI) assistants.

The npm package deal in query has since been deleted from npm by the developer “phanpak,” who uploaded it to the repository on September 15, 2025, and maintains 31 different packages. The JavaScript library attracted a complete of 1,643 downloads.
“Since model 1.0.16, it has been quietly copying each e-mail to the developer’s private server,” Koi Safety Chief Expertise Officer Idan Dardikman mentioned. “That is the world’s first sighting of a real-world malicious MCP server. The assault floor for endpoint provide chain assaults is slowly turning into the enterprise’s largest assault floor.”

The malicious package deal is a duplicate of the unique library, save for a one-line change added in model 1.0.16 that basically forwards each e-mail despatched utilizing the MCP server to the e-mail tackle “phan@giftshop[.]membership” by BCC’ing it, doubtlessly exposing delicate communications.
“The postmark-mcp backdoor is not subtle – it is embarrassingly easy,” Dardikman mentioned. “Nevertheless it completely demonstrates how utterly damaged this entire setup is. One developer. One line of code. Hundreds upon 1000’s of stolen emails.”
Builders who’ve put in the npm package deal are beneficial to right away take away it from their workflows, rotate any credentials which will have been uncovered by e-mail, and evaluate e-mail logs for BCC visitors to the reported area.

“MCP servers usually run with excessive belief and broad permissions inside agent toolchains. As such, any knowledge they deal with could be delicate (password resets, invoices, buyer communications, inside memos, and many others.),” Snyk mentioned. “On this case, the backdoor on this MCP Server was constructed with the intention to reap and exfiltrate emails for agentic workflows that relied on this MCP Server.”
The findings illustrate how risk actors proceed to abuse the person belief related to the open-source ecosystem and the nascent MCP ecosystem to their benefit, particularly when they’re rolled out in enterprise vital environments with out ample guardrails.

The Hacker News Tags:Emails, Malicious, MCP, Package, PostmarkMCP, Rogue, Server, Stealing

Post navigation

Previous Post: Formbricks Signature Verification Vulnerability Let Attackers Reset User Passwords Without Authorization
Next Post: LLM-Crafted SVG Files Outsmart Email Security

Related Posts

Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions The Hacker News
Public Exploit for Chained SAP Flaws Exposes Unpatched Systems to Remote Code Execution The Hacker News
Microsoft Expands Sentinel Into Agentic Security Platform With Unified Data Lake The Hacker News
Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors The Hacker News
Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices The Hacker News
Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News