{"id":611,"date":"2026-04-15T18:07:43","date_gmt":"2026-04-15T18:07:43","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=611"},"modified":"2026-04-15T18:07:43","modified_gmt":"2026-04-15T18:07:43","slug":"n8n-webhooks-abused-since-october-2025-to-deliver-malware-via-phishing-emails","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=611","title":{"rendered":"n8n Webhooks Abused Since October 2025 to Deliver Malware via Phishing Emails"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Apr 15, 2026<\/span><\/span><span class=\"p-tags\">Threat Intelligence \/ Cloud Security<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiSXMJaHSQp1aJ8l7rKKtfILQtDMLWTUVOPwWqizQ-nRzb5JbG1BJOFKTs0NYGVQ0fBFTzLkjaY0bntn7UDnlyy502mDQJzvqFhTJwmYlctN551StWLJf8hnET4i8ZrwWvtzhswLW_2GoSI1zlMVRnI89aVrFU1lbes9p7fpYFjT9V7OxAmbmMW3UR-hv9_\/s1700-e365\/webhook.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>Threat actors\u00a0have been\u00a0observed weaponizing n8n, a popular artificial intelligence (AI) workflow automation platform, to facilitate sophisticated phishing campaigns and deliver malicious payloads or fingerprint devices by sending automated\u00a0emails.<\/p>\n<p>\u00abBy leveraging trusted infrastructure, these attackers bypass traditional security filters, turning productivity tools into delivery vehicles for persistent remote\u00a0access,\u00bb Cisco Talos researchers Sean Gallagher and Omid\u00a0Mirzaei <a href=\"https:\/\/blog.talosintelligence.com\/the-n8n-n8mare\/\">said<\/a> in an analysis published\u00a0today.<\/p>\n<p>N8n is a workflow automation platform that allows users to connect various web applications, APIs, and AI model services to sync data, build agentic systems, and run repetitive rule-based\u00a0tasks.<\/p>\n<p>Users can register for a developer account at no extra cost\u00a0to avail a managed cloud-hosted service and run automation workflows\u00a0without having to set up their own infrastructure.Doing so, however, creates\u00a0a unique custom\u00a0domain that goes\u00a0by the\u00a0format\u00a0\u2013 <account name=\"\">.app.n8n.cloud \u2013 from where a user can access their applications.<\/account><\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/vpn-risk-report-inside-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWajeG0cdaapf1GKTZRUZUB7BzuYGegyw5k0eAorJXlmkFdYCCeLXXhXYJuXU9lWD33rV6rRnIyly3czoNfYifpxk1eGA5slItPmim3HkubXoQMgC4J7hdQPywxGbWq7Eqeff_o6s2Fq-WmSFd5guwdLn7IqpveMqULqtVnd-ndnljWYGj45EkMFB7m0qm\/s728-e100\/z-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The platform also\u00a0supports the ability\u00a0to <a href=\"https:\/\/docs.n8n.io\/integrations\/builtin\/core-nodes\/n8n-nodes-base.webhook\/\">create\u00a0webhooks<\/a> to receive data from apps and services\u00a0when certain events are triggered.Thismakes it possible to\u00a0initiate a\u00a0workflow after\u00a0receiving certain\u00a0data.The data,\u00a0in this case, is sent via a unique webhook\u00a0URL.<\/p>\n<p><a name=\"more\"\/><\/p>\n<p>According to Cisco\u00a0Talos, it&#8217;s these URL-exposed webhooks \u2013 which make use of the same *.app.n8n[.]cloud subdomain \u2013 that has been abused in phishing attacks as far back as October\u00a02025.<\/p>\n<p>\u00abA webhook, often referred to as\u00a0a\u00a0&#8216;reverse\u00a0API,&#8217; allows one application to provide real-time information to another. These\u00a0URLs register an application as\u00a0a\u00a0&#8216;listener&#8217; to receive data, which can include programmatically pulled HTML\u00a0content,\u00bb Talos explained.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyZMXs7e5kEEfgpciVNOrKQ9OG9_RuwzyCKi1qp1CU51-ATu1SCWTC-cbtMm5SeIYbboBZ9wbO8W-ESUQE2MPjOZ-TjJ08g8bAfAIOBGKmppcfuwpKcsEcly8F11LLHkj3gH_m8iTmOexsEGPxwuhXHPBOsPtLLyI-psvpKd8VbzjQ1NUZu4PWf8Io5KWO\/s1700-e365\/talos.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgyZMXs7e5kEEfgpciVNOrKQ9OG9_RuwzyCKi1qp1CU51-ATu1SCWTC-cbtMm5SeIYbboBZ9wbO8W-ESUQE2MPjOZ-TjJ08g8bAfAIOBGKmppcfuwpKcsEcly8F11LLHkj3gH_m8iTmOexsEGPxwuhXHPBOsPtLLyI-psvpKd8VbzjQ1NUZu4PWf8Io5KWO\/s1700-e365\/talos.jpg\" alt=\"\" border=\"0\" data-original-height=\"475\" data-original-width=\"1000\"\/><\/a><\/div>\n<p>\u00abWhen the URL receives a request, the subsequent workflow steps are triggered, returning results as an HTTP data stream to the requesting application. If\u00a0the URL is accessed via email, the recipient&#8217;s browser acts as the receiving application, processing the output as a web\u00a0page.\u00bb<\/p>\n<p>What\u00a0makes this significant is that it opens a new door for threat actors to propagate malware while maintaining a veneer of legitimacy by giving the impression that they are originating from a trusted\u00a0domain.<\/p>\n<p>Threat\u00a0actors have wasted no time taking advantage of the behavior to set up n8n webhook URLs for malware delivery and device fingerprinting. The\u00a0volume of email messages containing these URLs in March 2026 is said to have been about 686% higher than in January\u00a02025.<\/p>\n<p>In\u00a0one campaign observed by Talos, threat actors have been found to embed an n8n-hosted webhook link in emails that claimed to be a shared document. Clicking the link takes the user to a web page that displays a CAPTCHA, which, upon completion, activates the download of a malicious payload from an external\u00a0host.<\/p>\n<p>\u00abBecause the entire process is encapsulated within the JavaScript of the HTML document, the download appears to the browser to have come from the n8n domain,\u00bb the researchers\u00a0noted.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The\u00a0end goal of the attack is to deliver an executable or an MSI installer that serves as a conduit for modified versions of legitimate Remote Monitoring and Management (RMM) tools like Datto and ITarian Endpoint Management, and use them to establish persistence by establishing a connection to a command-and-control (C2)\u00a0server.<\/p>\n<p>A\u00a0second prevalent case concerns the abuse of n8n for fingerprinting. Specifically, this entails embedding in emails an invisible image or tracking pixel that&#8217;s hosted on an n8n webhook URL. As\u00a0soon as the digital missive is opened via an email client, it automatically sends an HTTP GET request to the n8n URL along with tracking parameters, like the victim&#8217;s email address, thereby enabling the attackers to identify\u00a0them.<\/p>\n<p>\u00abThe same workflows designed to save developers hours of manual labor are now being repurposed to automate the delivery of malware and fingerprinting devices due to their flexibility, ease of integration, and seamless automation,\u00bb Talos said. \u00abAs we continue to leverage the power of low-code automation, it\u2019s the responsibility of security teams to ensure these platforms and tools remain assets rather than liabilities.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Apr 15, 2026Threat Intelligence \/ Cloud Security Threat actors\u00a0have been\u00a0observed weaponizing n8n, a popular artificial intelligence (AI) workflow automation platform, to facilitate sophisticated phishing campaigns and deliver malicious payloads&hellip;<\/p>\n","protected":false},"author":1,"featured_media":612,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1233,529,625,42,602,1234,390,1232],"class_list":["post-611","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-abused","tag-deliver","tag-emails","tag-malware","tag-n8n","tag-october","tag-phishing","tag-webhooks"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=611"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/611\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/612"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}