The n8n n8mare: How threat actors are misusing AI workflow automation
Investigation reveals widespread abuse of n8n, an AI workflow automation platform, in sophisticated phishing campaigns from October 2025 through March 2026. Attackers exploit the platform's webhook functionality to deliver malware and fingerprint devices while bypassing security filters through trusted infrastructure. Email volume containing n8n webhook URLs increased by 686% between January 2025 and March 2026. Observed campaigns utilize CAPTCHA-protected pages to deliver remote access tools including modified Datto RMM and ITarian Endpoint Management software. The webhooks mask malicious payload sources behind legitimate n8n domains. Additional abuse cases involve tracking pixels embedded in emails for device fingerprinting. These attacks demonstrate how legitimate productivity and automation platforms can be weaponized, requiring behavioral detection approaches rather than simple domain blocking to protect organizational workflows.
Pulse ID: 69dfa9e58a74337f7fb97333
Pulse Link: https://otx.alienvault.com/pulse/69dfa9e58a74337f7fb97333
Pulse Author: AlienVault
Created: 2026-04-15 15:08:21
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#CAPTCHA #CyberSecurity #Email #Endpoint #InfoSec #Malware #OTX #OpenThreatExchange #Phishing #RAT #RCE #Rust #bot #AlienVault








