🇮🇹

N8n Webhooks Weaponized in Phishing Campaigns to Distribute Malware

Cisco Talos uncovers phishing campaigns since October 2025 leveraging n8n webhooks to bypass security filters. A trusted domain becomes the perfect shield for malware.

No login, no IP stored.

Cisco Talos researchers have documented phishing campaigns active since at least October 2025 that abuse n8n’s cloud automation webhooks to deliver malware and harvest victim data. By March 2026, the volume of phishing emails using these URLs had grown roughly eight times compared to January 2025.

n8n is the workflow automation platform we’ve mentioned several times recently for critical vulnerabilities in self-hosted instances. This is a different problem, and in some ways more insidious: there’s no bug to patch, no security update to deploy.

How the Attack Works

Anyone can open a free n8n cloud account and create workflows with webhook nodes, generating publicly accessible URLs in the format name.app.n8n.cloud/webhook/xxx. Each HTTP request to that URL triggers the workflow and returns a response. Attackers leverage this to build attack infrastructure operating under a domain that email filters and antimalware systems already trust.

Talos describes two primary variants. In the first, the phishing email contains a link to an n8n webhook displaying a fake CAPTCHA page. Once completed, a malicious executable downloads. Because the entire process occurs through n8n’s domain, the browser shows no warning flags. The final payload, according to Talos, is a modified version of legitimate remote management tools, used to establish persistent contact with a command-and-control server.

The Invisible Pixel

The second variant is less visible but equally effective. The email embeds an invisible image whose URL is an n8n webhook. When the email opens, the mail client automatically sends a GET request to that URL with parameters like the victim’s email address. The attacker gets a list of who opened the email, when, and with which client.

The Structural Problem

What makes this technique difficult to stop is exactly why it works: n8n is a legitimate service, used by developers and technical teams worldwide. The domain app.n8n.cloud isn’t suspicious by definition, and blocklisting it would interfere with entirely lawful workflows.

This isn’t the first time automation services have been weaponized this way. Similar campaigns have previously abused links on Dropbox, Google Docs, and other widely-trusted cloud tools. The logic remains constant: the more established and trustworthy a service is, the more useful it becomes as cover.

Support Yoota · affiliate link

Spread the word

Sniff out what’s new (follow me 🐾)

YOOTA
YOOTA
@en@yoota.it

Sniffing out tech news

488 posts
8 followers

Continua a fiutare

Loading top paws…

Cookies! We don't use tracking cookies or collect personal data, but since this site is federated via ActivityPub ⁂, your visit may connect to Mastodon or other federated servers.Affiliations: Some articles include affiliate links. When you buy through them, we may earn a small commission.