Skip to main content
Security 2 min read 491 views

SmartLoader Trojanizes Oura Ring MCP Server to Steal Developer Credentials

Attackers cloned a legitimate Oura Health MCP server on GitHub, built a fake contributor network to manufacture credibility, and used the trojanized package to deploy the StealC infostealer against developers.

TD

TechDrop Editorial

Share:

Cybersecurity researchers have disclosed details of a new SmartLoader campaign that distributes a trojanized version of a Model Context Protocol (MCP) server tied to Oura Health to deliver the StealC infostealer. The attack marks a strategic shift by the SmartLoader group away from targeting pirated-software seekers toward developers, whose machines routinely hold API keys, cloud credentials, and production system access.

How the Attack Was Built

Threat actors cloned the legitimate Oura Ring MCP Server — a tool designed to connect AI assistants to Oura Ring health data — and constructed a deceptive infrastructure of fake GitHub forks and fabricated contributors to manufacture credibility. Researchers identified at least five fraudulent accounts (YuzeHao2023, punkpeye, dvlan26, halamji, and yzhao112) that were used to inflate the repository's apparent legitimacy with a network of seemingly real forks.

Once a victim downloads and launches the package, typically delivered as a ZIP archive, an obfuscated Lua script executes, dropping the SmartLoader component. SmartLoader then proceeds to deploy StealC, which harvests browser-saved passwords, cryptocurrency wallet data, and other stored credentials from the infected machine.

Why Developers Are the Target

The campaign reflects a calculated escalation in targeting. Developer workstations are disproportionately valuable to attackers: they often contain authenticated sessions to cloud infrastructure, CI/CD pipelines, package registries, and code repositories. A single compromised developer machine can provide lateral movement pathways into production environments that would be difficult to access through traditional endpoints.

The use of MCP servers as a delivery vector is particularly noteworthy. As AI-assisted development tools proliferate, the MCP ecosystem — which connects large language models to external data sources — is expanding rapidly, and the security review processes surrounding MCP server installation remain immature in most organizations.

Recommended Mitigations

Security teams are advised to inventory all installed MCP servers and establish a formal security review before installation of any new ones. Organizations should verify the origin and authenticity of MCP servers, confirm repository contributor histories, and monitor for suspicious outbound network traffic or persistence mechanisms on developer machines. Treating MCP server installation with the same scrutiny applied to third-party library dependencies is now essential practice.

Related Articles