The hidden face of open source trust cloned MCP and deployed StealC to steal high-value secrets

Published 5 min de lectura 122 reading

A few days ago, cyber security researchers uncovered a sophisticated campaign that combines social engineering, supplanting open source projects and malware to achieve high value goals. At the center of the maneuver is a manipulated version of an MCP server (Model Context Protocol) linked to the Oura smart ring, which was cloned and enriched with malicious code to install an information thief known as StealC.

According to the analysis published by Straiker's AI Research (STAR) Labs, the attackers did not opt for the "quick and massive attack": they invested weeks, even months, in building an appearance of legitimacy on public platforms before deploying their payload. This work included the creation of multiple false accounts in GitHub and a network of forks and fictitious collaborators to make the infected repository look verified by the community. The original project repository is available at GitHub while Straiker's report details the technique used to clone and thwart confidence: report by Straiker.

The hidden face of open source trust cloned MCP and deployed StealC to steal high-value secrets
Image generated with IA.

The input vector was double. On the one hand, the operators uploaded the crunched version of the MCP server to public list components - including a public directory of MCP - so that someone seeking to integrate the service into their assistant or workflow could run into the malicious package among legitimate alternatives. On the other hand, the package was distributed in a ZIP that, when it was run, released a Lua obuscado script that dropped SmartLoader, a loader known to download and run additional tools. In this case, SmartLoader served to deploy StealC, designed to exfilter browser passwords, credentials and even information from cryptomoneda coins.

The campaign exemplifies a worrying development: the attackers move from targeting users looking for pirated software to deliberately targeting developers and teams that integrate components in development or production environments. Development systems often hold high-value secrets- as API keys, cloud access tokens and access to production environments - which multiply the impact of an intrusion.

The use of public repositories and records as confidence vectors is key to this attack. By taking advantage of GitHub's implicit reputation and specific catalogues, the aggressors exploit reliable heuristics that developers often follow: if a package is in a public register and has an apparent history of contributions, it tends to be assumed that it is safe. Straiker warns that the campaign made that story and used it as bait deliberately.

This type of supply chain abuse is not new, but it has been gaining sophistication with techniques that include generation of IA content to create credible descriptions and documentation, and manufacturing of activity on public platforms. To understand the magnitude of the risk, it is useful to remember that software supply chains are a priority vector by security agencies: initiatives such as the GitHub on supply chain security and the resources of agencies such as CISA They insist on specific controls to mitigate such attacks.

What can teams and organizations do? First, it is essential to treat third-party components with the same caution as the executable software: to verify the origin, to review the actual history of commitments and collaborators and, where possible, to prefer signed or verified maintenance packages. It is also recommended to establish controls in the development environment that monitor unusual outgoing connections and persistence mechanisms. It is not enough to rely on the appearance; it is necessary to validate the provenance and behaviour of the code.

In practice, this involves auditioning which MCP servers are installed in the environments, subjecting any new integration to a formal security review and monitoring network telemetry in search of traffic to unknown infrastructure. In addition, organizations should manage and rotate secrets, minimize privileges in development environments and use automated unit scanning to detect unexpected changes in third-party projects.

The hidden face of open source trust cloned MCP and deployed StealC to steal high-value secrets
Image generated with IA.

The case also raises questions about how confidence in the open development ecosystem in the IA era evolves. Making community credentials - repositories with false forks and collaborators, automatically generated documentation, listed in public directories - adds a new layer of deception that challenges traditional heuristics. Straiker sums up the lesson: attackers are investing time and resources to build confidence because they know that this is the most effective shortcut to access high-value victims.

For those who use Oura-related devices or services, it is appropriate to be attentive to official communications and manufacturer updates in Oura. And for software equipment, the recommendation is clear: integrate security controls into the development life cycle and not download or install components without prior verification. Good practices and continuous surveillance remain the best defenses against campaigns that combine social engineering, abuse of public platforms and malware.

The campaign that SmartLoader and StealC used recalls that the threat does not always come through obvious windows; sometimes it enters through the door that the development ecosystem itself left open. The confidence in the digital supply chain must be continuously gained and monitored, not assumed by default.

Coverage

Related

More news on the same subject.