Email Heist: Fake npm Package Exposes Thousands in Sneaky Cyber Swindle
Beware of fake npm packages! A malicious package impersonating Postmark’s MCP server secretly siphoned off thousands of emails daily, exposing sensitive information. This incident highlights the security risks within the MCP ecosystem and the ease of poisoning npm packages, stressing the need for tighter security measures.

Hot Take:
Oh, the sweet irony of trusting a package named “postmark-mcp” that secretly BCC’d your emails to an online gift shop. Who knew that your digital correspondence could be the hottest commodity on the black market? But hey, at least it wasn’t a zero-day exploit—just a classic case of ‘here, take my data, it’s yours!’
Key Points:
– The fake npm package “postmark-mcp” impersonated Postmark’s MCP server and stole thousands of emails.
– The malicious package was downloaded 1,500 times in a week and integrated into hundreds of workflows.
– The backdoor BCC’d sensitive emails, including password resets and financial details, to an attacker-controlled address.
– This incident highlights vulnerabilities in the MCP ecosystem and risks in npm’s open-source repositories.
– GitHub, the owner of npm, is tightening security measures in response to ongoing threats.