- This topic has 0 replies, 1 voice, and was last updated 2 weeks, 3 days ago by
Rameses Quiambao.
- AuthorPosts
- April 16, 2026 at 9:25 am #1952
Rameses Quiambao
ParticipantSummary
Threat actors are abusing n8n, a popular workflow automation platform, to launch phishing campaigns that deliver malware and perform device fingerprinting.
The abuse has been observed since October 2025, with a significant spike in activity in 2026.
Key points:
• Attackers use trusted n8n cloud domains to bypass email security filters
• Webhooks are weaponized to deliver malicious payloads
• Campaigns involve phishing emails disguised as shared documentsResearch Source
According to Cisco Talos researchers, attackers are leveraging n8n’s automation capabilities and trusted infrastructure to deliver malware while appearing legitimate.
The use of *.app.n8n.cloud domains helps evade detection, as these are considered trusted by many security tools.
Technical Details
The attack abuses n8n webhook functionality, which allows automated workflows to trigger when a URL is accessed.
How it works:
• Victim receives phishing email with embedded n8n webhook link
• Link redirects to a fake page (e.g., document or CAPTCHA)
• Completing CAPTCHA triggers malware download
• Payload is fetched from attacker-controlled infrastructure

Malware delivery:
• Executable (.exe) or MSI installer
• Installs modified RMM tools (e.g., Datto, ITarian)
• Establishes persistence and remote access via C2Fingerprinting technique:
• Embedded tracking pixel (invisible image)
• Sends HTTP request when email is opened
• Collects victim data (email, IP, device info)Notable increase:
• 686% rise in malicious emails using n8n webhooksObserved Attack Activity
Initial Access
• Phishing emails with webhook links
• Fake shared documents or business communicationsExecution
• CAPTCHA-based lure triggers payload delivery
• JavaScript-based execution in browserPersistence
• Deployment of RMM tools for remote access
• Connection to attacker-controlled C2 serversCollection
• Device fingerprinting via tracking pixels
• Collection of user and system metadataDefense Evasion
• Use of trusted n8n domains
• Blends malicious traffic with legitimate automation workflowsThreat Actor
Attribution:
• Unknown threat actors (no confirmed APT group yet)However:
• Techniques align with cybercriminal groups leveraging legitimate SaaS platforms
• Focus on stealth, automation, and scalabilityImpact
This technique introduces a new risk in cloud and SaaS environments:
• Bypasses traditional email security controls
• Enables stealthy malware delivery
• Allows persistent remote access via legitimate tools
• Increases phishing success rates due to trusted domainsOrganizations may face:
• Endpoint compromise
• Data exfiltration
• Lateral movement داخل networks
• Long-term unauthorized accessMitigation
Recommended actions:
Block or monitor n8n webhook domains where not required
Inspect email links pointing to automation platforms
Disable automatic image loading in email clients (prevents tracking)
Restrict unauthorized RMM tool usage via AppLocker or WDAC
Enable:
• Safe Links
• Safe Attachments
• Advanced email filtering
Monitor outbound traffic for suspicious connectionsReferences
• https://thehackernews.com/2026/04/n8n-webhooks-abused-since-october-2025.html- This topic was modified 2 weeks, 3 days ago by
Rameses Quiambao.
- This topic was modified 2 weeks, 3 days ago by
- AuthorPosts
- You must be logged in to reply to this topic.

