Malicious MCP Server Discovered Stealing Sensitive Email Data Through AI Agents

A malicious Model Context Protocol (MCP) server has been discovered exfiltrating thousands of emails daily through AI assistant integrations, marking the first documented case of a supply chain attack targeting the emerging MCP ecosystem.

The compromised package, postmark-mcp, has been downloaded approximately 1,500 times weekly and has been quietly stealing sensitive email communications since version 1.0.16.

Security researchers at Koi discovered the backdoor after their risk engine flagged suspicious behavioral changes in the popular email integration tool.

A simple line that steals thousands of emails
A simple line that steals thousands of emails (Source – KOI)

The malicious code, consisting of a single line buried at line 231, automatically adds a blind carbon copy (BCC) to “giftshop.club” for every email processed through the MCP server.

Sophisticated Supply Chain Deception

The attack demonstrates a concerning evolution in supply chain compromises. For 15 versions, postmark-mcp functioned legitimately, building trust within developer communities.

Koidex report for postmark-mcp
Koidex report for postmark-mcp (Source – KOI)

The malicious developer, identified as a software engineer from Paris with an established GitHub presence, impersonated the official Postmark integration by copying legitimate code from ActiveCampaign’s repository and publishing it under the same name on npm.

The backdoor’s implementation is deceptively simple yet devastatingly effective. The malicious line automatically appends the external email address to all outgoing communications, allowing the attacker to intercept password resets, invoices, internal memos, and confidential documents without detection.

AI assistants, operating autonomously with these MCP servers, cannot identify the unauthorized BCC field and continue executing email operations normally.

Conservative estimates suggest that the compromise affects approximately 300 organizations actively using the tool, potentially exposing 3,000 to 15,000 emails per day to unauthorized access.

The exfiltrated data likely includes API keys, financial information, customer communications, and other sensitive business intelligence.

Critical Infrastructure Vulnerability

The incident highlights fundamental security gaps in the MCP ecosystem, where AI assistants operate with god-mode permissions across email systems, databases, and API endpoints.

Unlike traditional npm packages, MCP servers are designed for autonomous AI execution, creating blind trust relationships that bypass conventional security controls.

The compromised package operated outside standard enterprise security perimeters, avoiding asset inventories, vendor risk assessments, and data loss prevention systems.

Organizations using AI assistants with MCP integrations may be unknowingly exposing critical infrastructure to similar threats.

After being contacted by researchers, the developer deleted the package from npm without explanation, although already-installed instances remain active and continue to exfiltrate data. The attack server, giftshop.club appears to be another project controlled by the same developer.

postmark-mcp NPM page (Source – KOI)

Organizations using Postmark-MCP version 1.0.16 or later should immediately remove the package and rotate potentially exposed credentials. Security teams are advised to audit all MCP server implementations and establish verification processes for AI assistant integrations before deployment.

IOCs

Package: postmark-mcp (npm)
Malicious Version: 1.0.16 and later
Backdoor Email: phan@giftshop[.]club
Domain: giftshop[.]club

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

Priya
Priya
Priya is a Security Reporter who tracks malware campaigns, exploit kits, and ransomware operations. Her reporting highlights technical indicators and attack patterns that matter to defenders

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here