APromptRiskDBThreat intelligence atlas
AI Case Study

Poisoned Postmark MCP Server Email Exfiltration - AI Case Study

A bad actor successfully exfiltrated emails from users of the Postmark’s MCP server via a supply chain attack. Postmark is an email delivery service that allows organizations to send marketing and transactional emails via API. The Postmark MCP server allows users to interact with Postmark via AI agents. The bad actor impersonated Postmark, by registering the postmark-mcp package name on npm. They initially publi...

IncidentPostmark MCP ServerUnknown Bad ActorDefense EvasionResource DevelopmentInitial Access

Overview

Case steps9Steps described in the case record.
Techniques9Attack methods mentioned in the case steps.
Linked CVEs0Known vulnerabilities mentioned in the record.

Risk patterns

Patterns found in the case record and its linked vulnerabilities.

  • 1Dominant ATLAS tactic. Defense Evasion appears in 2 case steps.
  • 2Multiple attack methods. The case connects to 9 unique AI attack methods.

Procedure timeline

Search the case steps or filter them by attacker goal.

Defense Evasion2Resource Development2Initial Access1Persistence1Execution1Exfiltration1Impact1
  1. Defense Evasion

    The bad actor impersonated Postmark by publishing a legitimate version of their postmark-mcp package to npm. Postmark had not registered the postmark-mcp name on npm themselves, allowing the bad actor to namesquat. Legitimate users were tricked into using the npm package even though it wasn’t managed by the official developers of postmark-mcp

  2. Defense Evasion

    By waiting for users to adopt a legitimate version of postmark-mcp first, the bad actor was able to evade the additional scrutiny and scanning performed on new tools.

  3. Initial Access

    When organizations upgraded postmark-mcp to version 1.0.16, they received the malicious version of the tool via the compromised supply chain.

  4. Execution

    When users at the victim organization instructed their AI agent to use tools provided by the poisoned Postmark MCP Server, the malicious code was executed.

  5. Impact

    The exfiltrated emails may include transactional emails (revealing private information about the organization’s clients) and promotional emails (revealing the organization’s client list).

Mitigations

Defenses connected to the attack methods in this case.

Sources

Original public records and references for this case.