{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreiciuq6pwo6c6z3owb76bhsayo5kx3ltrvayfkpayogrxayusmiehy",
    "uri": "at://did:plc:ghkvexthfanuyq7fb5veq6tw/app.bsky.feed.post/3mf3gjg5s3sm2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreidgaowny7uzso4vgx4mz6xrotejfivkiebvnqsjhmf7emtno57a2i"
    },
    "mimeType": "image/jpeg",
    "size": 206681
  },
  "path": "/2026/02/smartloader-attack-uses-trojanized-oura.html",
  "publishedAt": "2026-02-17T12:42:00.000Z",
  "site": "https://thehackernews.com",
  "textContent": "Cybersecurity researchers have disclosed details of a new SmartLoader campaign that involves distributing a trojanized version of a Model Context Protocol (MCP) server associated with Oura Health to deliver an information stealer known as StealC.\n\"The threat actors cloned a legitimate Oura MCP Server – a tool that connects AI assistants to Oura Ring health data – and built a deceptive",
  "title": "SmartLoader Attack Uses Trojanized Oura MCP Server to Deploy StealC Infostealer"
}