Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Infiltrated n8n’s Community Node Ecosystem With a Weaponized npm Package

Hackers Infiltrated n8n’s Community Node Ecosystem With a Weaponized npm Package

Posted on January 12, 2026January 12, 2026 By CWS

Attackers have efficiently infiltrated n8n’s neighborhood node ecosystem utilizing a malicious npm bundle disguised as a reliable Google Advertisements integration software.

The assault reveals a essential vulnerability in how workflow automation platforms deal with third-party integrations and person credentials.

The malicious bundle, named n8n-nodes-hfgjf-irtuinvcm-lasdqewriit, tricked builders into getting into their Google Advertisements OAuth credentials by way of a seemingly genuine credential kind.

assault overview

Why n8n Is a Goal

As soon as submitted, the malicious code silently stole these credentials and despatched them to an attacker-controlled server throughout workflow execution.

This provide chain assault represents a brand new escalation in cybersecurity threats, exploiting the belief that builders place in community-maintained integrations inside automation platforms.

n8n serves as a centralized credential vault, storing OAuth tokens and API keys for dozens of built-in companies, similar to Google Advertisements, Stripe, and Salesforce, in a single location.

Malicious Google Advertisements node proven within the n8n node palette after putting in the compromised bundle.

This makes compromising even a single neighborhood node extremely beneficial to attackers, because it provides them entry to a complete group’s related digital ecosystem.

The n8n platform’s structure makes it notably susceptible. Neighborhood nodes run with full working system entry, can learn atmosphere variables, and entry file techniques.

putting in n8n neighborhood bundle by way of GUI.

Make outbound community requests basically inheriting the identical belief degree because the core platform itself.

The Scope of the Downside

Endorlabs researchers recognized not less than eight malicious npm packages concentrating on the n8n ecosystem. The first malicious bundle alone achieved over 3,400 weekly downloads earlier than elimination.

malicious npm bundle as listed within the npm registry

A number of packages have been faraway from the npm registry, tracked by way of safety advisories together with GHSA-77g5-qpc3-x24r.

EndorLabs urges organizations to prioritize official n8n nodes over neighborhood alternate options and to rigorously audit packages earlier than set up.

Examine bundle particulars for warning indicators like poor descriptions, unusual names, and really low obtain counts.

Monitoring outbound community site visitors from n8n cases and utilizing remoted service accounts with minimal privileges may considerably scale back publicity danger.

This assault mirrors earlier provide chain compromises concentrating on GitHub Actions workflows, demonstrating that menace actors repeatedly adapt their ways to take advantage of rising automation platforms.

As workflow automation turns into more and more central to enterprise operations, organizations should steadiness comfort in opposition to the safety implications of community-provided integrations.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Community, Ecosystem, Hackers, Infiltrated, n8ns, Node, NPM, Package, Weaponized

Post navigation

Previous Post: Telegram Exposes Real Users IP Addresses, Bypassing Proxies on Android and iOS in 1-click
Next Post: Malicious Chrome Extension Steals Wallet Login Credentials and Enables Automated Trading

Related Posts

Threat Actors Attack PayPal Users in New Account Profile Set up Scam Threat Actors Attack PayPal Users in New Account Profile Set up Scam Cyber Security News
Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique Cyber Security News
U.S. DOJ Charged 54 in Connection With ATM Hacking Attack by Deploying Ploutus Malware U.S. DOJ Charged 54 in Connection With ATM Hacking Attack by Deploying Ploutus Malware Cyber Security News
Apache StreamPark Vulnerability Let Attackers Access Sensitive Data Apache StreamPark Vulnerability Let Attackers Access Sensitive Data Cyber Security News
Qilin Led Ransomware Attack Claimed to Compromised 104 Organizations in August Qilin Led Ransomware Attack Claimed to Compromised 104 Organizations in August Cyber Security News
Italian Adviser Becomes Latest Target in Expanding Paragon Graphite Spyware Surveillance Case Italian Adviser Becomes Latest Target in Expanding Paragon Graphite Spyware Surveillance Case Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark