Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package

First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package

Posted on September 29, 2025September 29, 2025 By CWS

Sep 29, 2025Ravie LakshmananMCP Server / Vulnerability
Cybersecurity researchers have found what has been described because the first-ever occasion of a Mannequin Context Protocol (MCP) server noticed within the wild, elevating software program provide chain dangers.
In response to Koi Safety, a legitimate-looking developer managed to slide in rogue code inside an npm package deal referred to as “postmark-mcp” that copied an official Postmark Labs library of the identical identify. The malicious performance was launched in model 1.0.16, which was launched on September 17, 2025.
The precise “postmark-mcp” library, accessible on GitHub, exposes an MCP server to permit customers to ship emails, entry and use e-mail templates, and monitor campaigns utilizing synthetic intelligence (AI) assistants.

The npm package deal in query has since been deleted from npm by the developer “phanpak,” who uploaded it to the repository on September 15, 2025, and maintains 31 different packages. The JavaScript library attracted a complete of 1,643 downloads.
“Since model 1.0.16, it has been quietly copying each e-mail to the developer’s private server,” Koi Safety Chief Expertise Officer Idan Dardikman mentioned. “That is the world’s first sighting of a real-world malicious MCP server. The assault floor for endpoint provide chain assaults is slowly turning into the enterprise’s largest assault floor.”

The malicious package deal is a duplicate of the unique library, save for a one-line change added in model 1.0.16 that basically forwards each e-mail despatched utilizing the MCP server to the e-mail tackle “phan@giftshop[.]membership” by BCC’ing it, doubtlessly exposing delicate communications.
“The postmark-mcp backdoor is not subtle – it is embarrassingly easy,” Dardikman mentioned. “Nevertheless it completely demonstrates how utterly damaged this entire setup is. One developer. One line of code. Hundreds upon 1000’s of stolen emails.”
Builders who’ve put in the npm package deal are beneficial to right away take away it from their workflows, rotate any credentials which will have been uncovered by e-mail, and evaluate e-mail logs for BCC visitors to the reported area.

“MCP servers usually run with excessive belief and broad permissions inside agent toolchains. As such, any knowledge they deal with could be delicate (password resets, invoices, buyer communications, inside memos, and many others.),” Snyk mentioned. “On this case, the backdoor on this MCP Server was constructed with the intention to reap and exfiltrate emails for agentic workflows that relied on this MCP Server.”
The findings illustrate how risk actors proceed to abuse the person belief related to the open-source ecosystem and the nascent MCP ecosystem to their benefit, particularly when they’re rolled out in enterprise vital environments with out ample guardrails.

The Hacker News Tags:Emails, Malicious, MCP, Package, PostmarkMCP, Rogue, Server, Stealing

Post navigation

Previous Post: Formbricks Signature Verification Vulnerability Let Attackers Reset User Passwords Without Authorization
Next Post: LLM-Crafted SVG Files Outsmart Email Security

Related Posts

FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware FIN6 Uses AWS-Hosted Fake Resumes on LinkedIn to Deliver More_eggs Malware The Hacker News
BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. The Hacker News
APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More The Hacker News
MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors The Hacker News
WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories WhatsApp Hijacks, MCP Leaks, AI Recon, React2Shell Exploit and 15 More Stories The Hacker News
Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide Salt Typhoon Exploits Cisco, Ivanti, Palo Alto Flaws to Breach 600 Organizations Worldwide The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News