Friday, September 26, 2025

Covert MCP Server Detected Stealthily Harvesting Emails

Title: Security Risks of Model Context Protocol: Exposing Vulnerabilities in AI Tools

In recent developments, Koi Security’s Idan Dardikman revealed critical security flaws in the Model Context Protocol (MCP) server, particularly in version 1.0.16 of the Postmark MCP Server. This version’s malicious code sent sensitive information—emails, passwords, internal memos—to a personal server without developers’ knowledge. Despite being a legitimate tool used by many developers, it highlighted severe risks associated with trusting AI-driven technology.

The incident showcased how easily one line of code could compromise thousands of emails, with estimations suggesting up to 15,000 emails were accessed daily across organizations. Dardikman emphasized that developers inadvertently enabled this attack by granting extensive permissions to MCP servers, raising alarms about systemic vulnerabilities. Furthermore, a previous analysis revealed significant security flaws in MCP implementations. This emphasizes the urgent need for rigorous security measures and caution in integrating AI tools within development environments.

Source link

Share

Read more

Local News