Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
n8n Webhooks Exploited for Malware Delivery via Phishing

n8n Webhooks Exploited for Malware Delivery via Phishing

Posted on April 15, 2026 By CWS

Since October 2025, cybercriminals have been leveraging n8n, a well-known AI-driven workflow automation platform, to conduct advanced phishing campaigns. This exploitation involves sending automated emails that deliver malicious software or gather device fingerprints, experts from Cisco Talos reported recently.

n8n enables users to link various web applications, APIs, and AI models to automate tasks. Users can sign up for a developer account to access a managed cloud-hosted service without any additional setup, obtaining a unique domain under the format .app.n8n.cloud. This feature, while convenient, has been manipulated by threat actors to bypass traditional security defenses.

How n8n Webhooks Are Being Abused

The platform’s ability to create webhooks—URLs that trigger workflows upon receiving specific data—has been exploited. According to Cisco Talos, these webhook URLs have been used in phishing attacks since October 2025. A webhook, often a ‘reverse API,’ allows one application to inform another in real-time, making these URLs a target for malicious use.

When activated, the URL triggers workflow steps that return results to the requesting application, often masquerading as a legitimate webpage when accessed through email. This tactic allows attackers to maintain a guise of credibility by using trusted domain names, a critical factor in their strategy.

Significant Rise in Malicious Email Campaigns

March 2026 saw a dramatic increase in phishing emails using these n8n webhook URLs, with a 686% rise compared to January 2025. In one observed campaign, a phishing email with a linked n8n webhook URL appeared to share a document. Upon clicking the link, users were directed to a CAPTCHA-protected page, which eventually downloaded a malicious payload.

The ultimate aim is to deploy executable files or MSI installers that enable remote access through modified versions of legitimate management tools, like Datto and ITarian Endpoint Management, connecting back to a command-and-control server.

Additional Exploits for Fingerprinting

In addition to malware delivery, n8n is being exploited for fingerprinting. This involves embedding invisible images or tracking pixels within emails, hosted on an n8n webhook URL. Opening such an email triggers an HTTP GET request to the n8n URL, providing attackers with the recipient’s email and other identifiers.

Cisco Talos emphasized that the same workflows designed for developer efficiency are now being repurposed for nefarious activities due to their integration ease and automation capabilities. Security teams must ensure these platforms remain beneficial rather than becoming security risks.

The ongoing abuse of n8n webhooks highlights the urgent need for heightened cybersecurity measures to protect against similar threats. As low-code automation continues to expand, security professionals must remain vigilant to prevent these tools from becoming liabilities.

The Hacker News Tags:AI automation, Cisco Talos, cloud security, Cybersecurity, Malware, n8n, Phishing, remote access, threat intelligence, Webhooks

Post navigation

Previous Post: Critical PHP Composer Flaw Allows Command Execution
Next Post: Malicious Chrome Extensions Compromise User Data

Related Posts

Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws Zoom and GitLab Release Security Updates Fixing RCE, DoS, and 2FA Bypass Flaws The Hacker News
ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services The Hacker News
Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets The Hacker News
Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto The Hacker News
The State of Trusted Open Source The State of Trusted Open Source The Hacker News
CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog CISA Adds Two N-able N-central Flaws to Known Exploited Vulnerabilities Catalog The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • WordPress Plugins Compromised by Hidden Malware Backdoor
  • Hackers Exploit Google Cloud to Deliver Remcos RAT
  • Trump Advocates for Extending Surveillance Program Amid Privacy Concerns
  • MuddyWater-Style Cyber Attack Targets Middle Eastern Sectors
  • Ivanti Neurons for ITSM Vulnerabilities Resolved

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • WordPress Plugins Compromised by Hidden Malware Backdoor
  • Hackers Exploit Google Cloud to Deliver Remcos RAT
  • Trump Advocates for Extending Surveillance Program Amid Privacy Concerns
  • MuddyWater-Style Cyber Attack Targets Middle Eastern Sectors
  • Ivanti Neurons for ITSM Vulnerabilities Resolved

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark