A malicious MCP server is silently stealing user emails
Koi Security says it's discovered the first malicious MCP server in the wild, exposing a risk to the entire ecosystem
Security researchers have issued a warning after discovering the first malicious Model Context Protocol (MCP) server in the wild.
MCP servers are widely used to allow AI agents to handle emails and run database queries, which means giving them access to all email traffic, according to Koi Security.
Postmark MCP Server is downloaded 1,500 times per week, and has been integrated into hundreds of developer workflows.
30% off Keeper Security's Business Starter and Business plans
Keeper Security is trusted and valued by thousands of businesses and millions of employees. Why not join them and protect your most important assets while taking advantage of this special offer?
However, since version 1.0.16 was released, Koi said it's been copying every single email - including invoices, internal memos, and confidential documents - to the developer's personal server.
"These MCP servers run with the same privileges as the AI assistants themselves - full email access, database connections, API permissions - yet they don't appear in any asset inventory, skip vendor risk assessments, and bypass every security control from DLP to email gateways," said Koi co-founder Idan Dardikman.
"By the time someone realizes their AI assistant has been quietly BCCing emails to an external server for months, the damage is already catastrophic."
There is a completely legitimate GitHub repo with the same name, officially maintained by Postmark, researchers noted. However, the attacker took the legitimate code from the repo, added his malicious BCC line, and published it to npm under the same name.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"This is the world’s first sighting of a real world malicious MCP server. The attack surface for endpoint supply chain attacks is slowly becoming the enterprise’s biggest attack surface," warned Dardikman.
"We're talking about 3,000 to 15,000 emails every day flowing straight to giftshop.club. And the truly messed up part? The developer didn't hack anything. Didn't exploit a zero-day. Didn't use some sophisticated attack vector,” he added/
“We literally handed him the keys, said 'here, run this code with full permissions', and let our AI assistants use it hundreds of times a day."
Malicious MCP server scrapped, but users still at risk
When Koi contacted the developer, Dardikman said he immediately deleted the package from npm. However, any organizations already using it will continue to be affected.
Users of version 1.0.16 should remove it immediately and rotate any credentials that may have been exposed, the company warned. They should also audit every MCP server they're using, making sure it's an official repository, reviewing the source code, and checking for changes in every update.
Koi said it reported the issue to npm, adding that the discovery raises broader concerns over MCP security.
"The postmark-mcp backdoor isn't just about one malicious developer or 1,500 weekly compromised installations. It's a warning shot about the MCP ecosystem itself," he said.
"We're handing god-mode permissions to tools built by people we don't know, can't verify, and have no reason to trust. These aren't just npm packages - they're direct pipelines into our most sensitive operations, automated by AI assistants that will use them thousands of times without question."
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
MORE FROM ITPRO
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
The six biggest security challenges coming in 2026In-depth What will be the main challenges businesses face in 2026 and what can they do to prepare?
-
Channel focus: All you need to know about Microsoft's partner programChannel Focus The veteran OS developer and vendor continues to advance its strategy, particularly in Azure cloud solutions and AI
-
NHS supplier DXS International confirms cyber attack – here’s what we know so farNews The NHS supplier says front-line clinical services are unaffected
-
LastPass hit with ICO fine after 2022 data breach exposed 1.6 million users – here’s how the incident unfoldedNews The impact of the LastPass breach was felt by customers as late as December 2024
-
Researchers claim Salt Typhoon masterminds learned their trade at Cisco Network AcademyNews The Salt Typhoon hacker group has targeted telecoms operators and US National Guard networks in recent years
-
Trend Micro issues warning over rise of 'vibe crime' as cyber criminals turn to agentic AI to automate attacksNews Trend Micro is warning of a boom in 'vibe crime' - the use of agentic AI to support fully-automated cyber criminal operations and accelerate attacks.
-
Cyber budget cuts are slowing down, but that doesn't mean there's light on the horizon for security teamsNews A new ISC2 survey indicates that both layoffs and budget cuts are on the decline
-
NCSC issues urgent warning over growing AI prompt injection risks – here’s what you need to knowNews Many organizations see prompt injection as just another version of SQL injection - but this is a mistake
-
Chinese hackers are using ‘stealthy and resilient’ Brickstorm malware to target VMware servers and hide in networks for months at a timeNews Organizations, particularly in the critical infrastructure, government services, and facilities and IT sectors, need to be wary of Brickstorm
-
AWS CISO Amy Herzog thinks AI agents will be a ‘boon’ for cyber professionals — and teams at Amazon are already seeing huge gainsNews AWS CISO Amy Herzog thinks AI agents will be a ‘boon’ for cyber professionals, and the company has already unlocked significant benefits from the technology internally.

