Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fake Postmark MCP Server Silently Stole Thousands of Emails With a Single Line of Malicious Code

Fake Postmark MCP Server Silently Stole Thousands of Emails With a Single Line of Malicious Code

Posted on September 30, 2025September 30, 2025 By CWS

A malicious npm package deal masquerading because the official Postmark MCP Server has been exfiltrating consumer emails to an exterior server. 

This faux “postmark-mcp” module, out there on npm from variations 1.0.0 by means of 1.0.15, constructed belief over 15 incremental releases earlier than dropping a backdoor in model 1.0.16. 

The stealthy payload consisted of a single line of code that silently BCC’d each outbound e mail to the attacker’s area.

Postmark-mcp BCC Electronic mail Exfiltration Assault

Based on Postmark the attacker printed the “postmark-mcp” package deal below the guise of ActiveCampaign’s Postmark MCP Server library. 

By aligning naming, versioning, and package deal description with reputable Postmark conventions, the malicious actor evaded cursory scrutiny. 

Builders integrating MCP companies by way of npm set up postmark-mcp unknowingly pulled in a trojanized dependency. In model 1.0.16, a lone line inserted into the primary transport script added unauthorized BCC performance:

This code snippet hooks into the prevailing Postmark consumer workflow, leveraging the addHeader technique to duplicate outbound emails. 

As a result of the malicious line is syntactically innocuous and embedded alongside reputable header setup logic, it escaped discover in code evaluations and automatic safety scans.

Hundreds of e mail messages exchanged between builders and their customers had been silently forwarded to the attacker’s server. 

Though the reputable Postmark API and official SDKs stay uncompromised, organizations counting on unverified third-party packages might have suffered unauthorized information leakage.

Postmark urges all customers to right away:

Uninstall “postmark-mcp” out of your initiatives:

Study SMTP logs and Postmark observe occasions for suspicious BCC operations or sudden API calls.

Change any credentials or tokens transmitted throughout the compromise window to stop additional unauthorized entry.

Postmark reaffirms that it has by no means printed a “postmark-mcp” library on npm. The official packages and SDKs are listed within the Postmark documentation and GitHub repository. 

Customers can confirm package deal authenticity by checking the postmark and postmark.js libraries maintained at github.com/ActiveCampaign/postmark and consulting the API docs at Postmark’s developer portal.

This incident highlights the essential significance of vetting third-party dependencies. Integrating solely formally documented libraries ensures that your e mail infrastructure stays safe.

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Code, Emails, Fake, Line, Malicious, MCP, Postmark, Server, Silently, Single, Stole, Thousands

Post navigation

Previous Post: Organizations Warned of Exploited Sudo Vulnerability
Next Post: New Android Trojan “Datzbro” Tricking Elderly with AI-Generated Facebook Travel Events

Related Posts

Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access Kimsuky and Lazarus Hacker Groups Unveil New Tools That Enable Backdoor and Remote Access Cyber Security News
Claude AI Flaws Risk Data Theft and Unsafe Redirects Claude AI Flaws Risk Data Theft and Unsafe Redirects Cyber Security News
Aembit Expands Workload IAM to Microsoft Ecosystem, Enhancing Hybrid Security for Non-Human Identities Aembit Expands Workload IAM to Microsoft Ecosystem, Enhancing Hybrid Security for Non-Human Identities Cyber Security News
Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage Ransomware Attack on Phone Repair and Insurance Company Cause Millions in Damage Cyber Security News
FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests FortiSandbox SSRF Vulnerability Allow Attacker to proxy Internal Traffic via Crafted HTTP Requests Cyber Security News
Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data Threat Actors Exploit LANSCOPE Endpoint Manager Zero-Day Vulnerability to Steal Confidential Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark