{"id":7496,"date":"2026-04-20T10:31:27","date_gmt":"2026-04-20T08:31:27","guid":{"rendered":"https:\/\/yoota.it\/en\/n8n-webhooks-weaponized-in-phishing-campaigns-to-distribute-malware\/"},"modified":"2026-04-20T10:31:30","modified_gmt":"2026-04-20T08:31:30","slug":"n8n-webhooks-weaponized-in-phishing-campaigns-to-distribute-malware","status":"publish","type":"post","link":"https:\/\/yoota.it\/en\/n8n-webhooks-weaponized-in-phishing-campaigns-to-distribute-malware\/","title":{"rendered":"N8n Webhooks Weaponized in Phishing Campaigns to Distribute Malware"},"content":{"rendered":"\n<p>Cisco Talos researchers have documented phishing campaigns active since at least October 2025 that abuse n8n&#8217;s cloud automation webhooks to deliver malware and harvest victim data. By March 2026, the volume of phishing emails using these URLs had grown roughly eight times compared to January 2025.<\/p>\n\n\n\n<p>n8n is the workflow automation platform we&#8217;ve mentioned several times recently for <a href=\"https:\/\/yoota.it\/quattro-vulnerabilita-critiche-in-n8n-se-hai-unistanza-propria-aggiorna-subito\/\">critical vulnerabilities in self-hosted instances<\/a>. This is a different problem, and in some ways more insidious: there&#8217;s no bug to patch, no security update to deploy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How the Attack Works<\/h2>\n\n\n\n<p>Anyone can open a free n8n cloud account and create workflows with webhook nodes, generating publicly accessible URLs in the format <code>name.app.n8n.cloud\/webhook\/xxx<\/code>. Each HTTP request to that URL triggers the workflow and returns a response. Attackers leverage this to build attack infrastructure operating under a domain that email filters and antimalware systems already trust.<\/p>\n\n\n\n<p>Talos describes two primary variants. In the first, the phishing email contains a link to an n8n webhook displaying a fake CAPTCHA page. Once completed, a malicious executable downloads. Because the entire process occurs through n8n&#8217;s domain, the browser shows no warning flags. The final payload, according to Talos, is a modified version of legitimate remote management tools, used to establish persistent contact with a command-and-control server.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Invisible Pixel<\/h2>\n\n\n\n<p>The second variant is less visible but equally effective. The email embeds an invisible image whose URL is an n8n webhook. When the email opens, the mail client automatically sends a GET request to that URL with parameters like the victim&#8217;s email address. The attacker gets a list of who opened the email, when, and with which client.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Structural Problem<\/h2>\n\n\n\n<p>What makes this technique difficult to stop is exactly why it works: n8n is a legitimate service, used by developers and technical teams worldwide. The domain <code>app.n8n.cloud<\/code> isn&#8217;t suspicious by definition, and blocklisting it would interfere with entirely lawful workflows.<\/p>\n\n\n\n<p>This isn&#8217;t the first time automation services have been weaponized this way. Similar campaigns have previously abused links on Dropbox, Google Docs, and other widely-trusted cloud tools. The logic remains constant: the more established and trustworthy a service is, the more useful it becomes as cover.<\/p>\n\n\n\n    \n    <div class=\"yoota-fonte\">\n        <a href=\"https:\/\/thehackernews.com\/2026\/04\/n8n-webhooks-abused-since-october-2025.html\" target=\"_blank\" rel=\"nofollow noopener\" class=\"yoota-fonte-hit\">\n            \n            <span class=\"yoota-fonte-icon\" aria-hidden=\"true\">\n                <i class=\"ri-external-link-line\"><\/i>\n            <\/span>\n\n            <span class=\"yoota-fonte-content\">\n                <span class=\"yoota-fonte-label\">SOURCE:\/\/<\/span>\n\n                                    <span class=\"yoota-fonte-link\">\n                        thehackernews.com                    <\/span>\n                            <\/span>\n\n        <\/a>\n    <\/div>\n    \n    \n\n\n\n    \n    <div class=\"yoota-fonte\">\n        <a href=\"https:\/\/blog.talosintelligence.com\/the-n8n-n8mare\/\" target=\"_blank\" rel=\"nofollow noopener\" class=\"yoota-fonte-hit\">\n            \n            <span class=\"yoota-fonte-icon\" aria-hidden=\"true\">\n                <i class=\"ri-external-link-line\"><\/i>\n            <\/span>\n\n            <span class=\"yoota-fonte-content\">\n                <span class=\"yoota-fonte-label\">SOURCE:\/\/<\/span>\n\n                                    <span class=\"yoota-fonte-link\">\n                        blog.talosintelligence.com                    <\/span>\n                            <\/span>\n\n        <\/a>\n    <\/div>\n    \n    \n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cisco Talos uncovers phishing campaigns since October 2025 leveraging n8n webhooks to bypass security filters. A trusted domain becomes the perfect shield for malware.<\/p>\n","protected":false},"author":2,"featured_media":7495,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"italian_url":"https:\/\/yoota.it\/i-webhook-di-n8n-sfruttati-in-campagne-di-phishing-per-distribuire-malware\/","yoota_meta_description":"","activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":4,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"federated","footnotes":""},"categories":[51],"tags":[633,302,602,634],"class_list":["post-7496","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dev","tag-cisco-talos","tag-cybersecurity","tag-n8n","tag-phishing"],"_links":{"self":[{"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/posts\/7496","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/comments?post=7496"}],"version-history":[{"count":1,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/posts\/7496\/revisions"}],"predecessor-version":[{"id":7498,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/posts\/7496\/revisions\/7498"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/media\/7495"}],"wp:attachment":[{"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/media?parent=7496"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/categories?post=7496"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yoota.it\/en\/wp-json\/wp\/v2\/tags?post=7496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}