Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Discover Spotify working on ‘SongDNA’ feature to introduce you to the people behind your favorite music

Apple adds 650 megawatts of renewable energy in Europe, also deploys renewable energy in China

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » The first malicious MCP server found stealing emails with the Rogue Postarm-MCP package
Identity

The first malicious MCP server found stealing emails with the Rogue Postarm-MCP package

userBy userSeptember 29, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 29, 2025Ravi LakshmananMCP Server / Vulnerability

Cybersecurity researchers have discovered what is described as the first instance of a model context protocol (MCP) server discovered in the wild, increasing the risk of the software supply chain.

According to KOI Security, legally-looking developers were able to slip in malformed code within an NPM package called “Postmark-MCP”, which copied the official Postmark Labs library of the same name. The malicious feature was introduced in version 1.0.16, released on September 17, 2025.

The actual “Mark-MCP” library available on GitHub allows users to expose MCP servers to send emails, access and use email templates, and track campaigns using Artificial Intelligence (AI) Assistant.

DFIR Retainer Service

The NPM package in question was removed from NPM by developer “Phanpak” and uploaded to the repository on September 15th, 2025, maintaining 31 other packages. The JavaScript library has collected a total of 1,643 downloads.

“Since version 1.0.16, we’ve quietly copied all emails to developers’ personal servers,” said Idan Dardikman, Chief Technology Officer of KOI Security. “This is the world’s first sighting of a real-world malicious MCP server. The attack surface of endpoint supply chain attacks is gradually becoming the biggest attack surface for the enterprise.”

The malicious package is a replica of the original library and saves one line change added to version 1.0.16.[.]bcc’ing it by club “Discover potentially sensitive communications.

“The postmark MCP backdoor is not refined. It’s embarrassingly simple,” Dardikman said. “But it perfectly shows just how completely broken this whole setup is. One developer. One line of code. With thousands of stolen emails.”

Developers who have installed the NPM package are recommended to remove it from the workflow immediately, rotate any credentials that may have been published in email, and check the email logs of BCC traffic to the reported domain.

CIS Build Kit

“MCP servers typically run with high trust and wide range of privileges within the agent toolchain. That’s why they are sensitive to the data they process (password resets, invoices, customer communications, internal memos, etc.), Snyk said. “In this case, the backdoor of this MCP server was built with the intention of harvesting and removing emails from agent workflows that rely on this MCP server.”

The findings show how threat actors continue to exploit user trust associated with the open source ecosystem and the early MCP ecosystem, especially when deployed in a critical business environment without proper guardrails.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleHow advanced filtration increases the potential for a circular economy
Next Article SVG files created by LLM outmart email security
user
  • Website

Related Posts

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

October 15, 2025

F5 breach exposes BIG-IP source code — state hackers behind massive intrusion

October 15, 2025

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

October 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Discover Spotify working on ‘SongDNA’ feature to introduce you to the people behind your favorite music

Apple adds 650 megawatts of renewable energy in Europe, also deploys renewable energy in China

Chinese threat group Jewelbug secretly infiltrated Russian IT networks for months

Eightfold Co-Founder Raises $35M for Viven, AI Digital Twin Startup Contacts Missed Colleagues

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Beyond the Algorithm: How FySelf’s TwinH and Reinforcement Learning are Reshaping Future Education

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.