Overview
Risk patterns
Patterns found in the case record and its linked vulnerabilities.
- 1Dominant ATLAS tactic. Defense Evasion appears in 2 case steps.
- 2Multiple attack methods. The case connects to 9 unique AI attack methods.
Procedure timeline
Search the case steps or filter them by attacker goal.
-
Defense Evasion
Step 1
Impersonation
The bad actor impersonated Postmark by publishing a legitimate version of their
postmark-mcppackage to npm. Postmark had not registered thepostmark-mcpname on npm themselves, allowing the bad actor to namesquat. Legitimate users were tricked into using the npm package even though it wasn’t managed by the official developers ofpostmark-mcp -
Resource Development
Step 2
Develop Capabilities
The bad actor modified the legitimate Postmark MCP server to include their email address on the BCC line on all emails sent by the tool.
-
Resource Development The bad actor published their malicious version of
postmark-mcpto npm. -
Defense Evasion
Step 4
AI Supply Chain Rug Pull
By waiting for users to adopt a legitimate version of
postmark-mcpfirst, the bad actor was able to evade the additional scrutiny and scanning performed on new tools. -
Initial Access
Step 5
AI Agent Tool
When organizations upgraded
postmark-mcpto version1.0.16, they received the malicious version of the tool via the compromised supply chain. -
Persistence
Step 6
AI Agent Tool Poisoning
Once configured with the organization’s AI agents, the poisoned Postmark MCP server’s effects persist.
-
Execution
Step 7
Poisoned AI Agent Tool
When users at the victim organization instructed their AI agent to use tools provided by the poisoned Postmark MCP Server, the malicious code was executed.
-
Exfiltration When organizations sent emails via the
postmark-mcptool, the entire contents of their emails are exfiltrated to the bad actor via the address added on the BCC line. -
Impact
Step 9
External Harms
The exfiltrated emails may include transactional emails (revealing private information about the organization’s clients) and promotional emails (revealing the organization’s client list).
Mitigations
Defenses connected to the attack methods in this case.
Sources
Original public records and references for this case.
Original source
Original source links
Open the MITRE ATLAS data and public references used for this case study.