Hackers Exploit n8n AI Workflow to Deliver Malware via Trusted Webhooks
Cybercriminals are abusing the n8n AI workflow automation platform to deliver malware through trusted webhook infrastructure, bypassing traditional email security filters. By creating legitimate developer accounts, attackers generate subdomains under n8n’s official domain, allowing malicious emails and payloads to appear trustworthy and evade detection systems.


Researchers found that attackers exploit n8n’s webhook feature to send phishing emails, embed tracking pixels, and deliver malware disguised as legitimate files. Victims are often redirected through fake pages, including CAPTCHA verification screens, before unknowingly downloading malicious executables that install remote access tools (RMM) for persistent system control and data exfiltration.


This campaign highlights the growing risk of attackers weaponizing trusted platforms for large-scale cyberattacks. Security experts recommend adopting behavioral detection, monitoring unusual traffic to automation domains, and implementing advanced email security solutions to detect threats that bypass traditional reputation-based defenses.
NPAV offers a robust solution to combat cyber fraud. Protect yourself with our top-tier security product, FraudProtector.net
- Other (43)
- Ransomware (179)
- Events and News (28)
- Features (45)
- Security (504)
- Tips (83)
- Google (44)
- Achievements (13)
- Products (37)
- Activation (7)
- Dealers (1)
- Bank Phishing (59)
- Malware Alerts (294)
- Cyber Attack (381)
- Data Backup (15)
- Data Breach (226)
- Phishing (191)
- Securty Tips (9)
- Browser Hijack (30)
- Adware (15)
- Email And Password (90)
- Android Security (96)
- Knoweldgebase (37)
- Botnet (20)
- Updates (10)
- Alert (72)
- Hacking (87)
- Social Media (11)
- vulnerability (128)
- Hacker (102)
- Spyware (18)
- Windows (24)
- Microsoft (43)
- Uber (1)
- YouTube (4)
- Trojan (7)
- Website hacks (17)
- Paytm (1)
- Credit card scam (4)
- Telegram (8)
- RAT (12)
- Bug (4)
- Twitter (3)
- Facebook (13)
- Banking Trojan (16)
- Mozilla (2)
- COVID-19 (5)
- Instagram (5)
- NPAV Announcement (18)
- IoT Security (4)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (3)
- Amazon (5)
- DMart (1)
- Payment Risk (5)
- Occasion (3)
- firewall (4)
- Cloud malware (4)
- Cloud storage (2)
- Financial fraud (112)
- Impersonation phishing (2)
- DDoS (12)
- Smishing (2)
- Whale (0)
- Whale phishing (5)
- WINRAR (3)
- ZIP (2)
- Fraud Protector (99)
-
Mobile Frauds
(78)
- WhatsApp (20)
- AI (37)