Automation tools that promise to save time and connect apps in seconds are being reused by attackers to put phishing and malware into mail boxes. According to a recent report from Cisco Talos researchers, malicious groups have started using the N8n automation platform as a shipping channel for campaigns that seek both to distribute harmful loads and to identify who opens a mail using remote fingerprints. The problem arises when legitimate services unintentionally become a reliable facade for malicious activities. You can check the Talos analysis on the official page of your blog to see the technical details that describe this abuse: analysis of Cisco Talos.
To understand what is going on you have to remember what is n8n: it is a flow automation platform that allows you to link APIs, web applications and IA models to run repetitive tasks without the need to mount your own servers. Developers can create a managed account and, without additional cost, get a cloud service that assigns each user a custom domain with a type format< nombre-de-account > .app.n8n.cloud. From there you can create webhooks, which are URLs that expect to receive data and, in so doing, shoot a sequence of automated actions. The information on how these websites work is available on the N8n documentation.

Webhooks act as a kind of "reverse API": instead of one app looking at information, another app pushes data into the URL and causes a flow to run. This behavior allows you to return HTML content that the browser of the recipient renders as if it were a normal page. The attackers have taken advantage of this ability for browsers to download malicious files from external hosts, but presented as if they came from the reliable n8n domain., which helps to draw certain safety filters that trust the reputation of the domain.
In the campaigns observed, the same webhook URLs have been placed in emails that simulate, for example, links to shared documents. When pressing, the victim reaches a page showing a CAPTCHA; when completed, a embedded script starts downloading an executable or an MSI installer hosted on another server. This malicious piece is usually a modified installer of legitimate remote management tools - variants that mimic known market solutions such as Datto or ITarian - and its ultimate purpose is to create persistence and communication with command and control servers.
In addition to malware delivery, attackers use n8n to get information about who opens the emails. By inserting an invisible image or a tracking pixel whose origin is a web-hook URL hosted in the n8n domain, the simple act of opening the message generates an HTTP request that reveals traceable parameters - such as the address of the recipient or customer data. In this way, the automation that had to save work to developers becomes a tool for automating recognition, tracking and threat delivery.
Talos' data are strong about the trend: the presence of these links in the mail identified by their systems has grown significantly in the periods analyzed, indicating that the attackers have found an efficient platform for their campaigns in n8n. This pattern is not unique to n8n: in general, any cloud service that offers public URLs and ability to run code or return HTML can be tempting for malicious actors who seek to camouflage their actions under the appearance of legitimate infrastructure.
In the face of such threats, the defensive position must combine technical measures and organization: security teams need to critically review the filtering and sandboxing rules, analyse the HTML content returned by trusted domains and increase protection around remote management tools, as they are a recurring goal for persistence. On the user side, maintaining reasonable mistrust in the face of unexpected links, avoiding enabling downloads from unverified pages and not entering credentials on forms whose origin is unclear remain essential practices. For specific recommendations on how to protect against phishing and other social engineering campaigns, national cybersecurity agency guides provide practical and up-to-date guidelines, such as those of CISA: CISA - tips on phishing.

There are also lessons for low-code platform providers and product managers: limit the default public exposure of webhooks, require additional verifications for endpoints returning HTML, apply behavior analysis and rate limiting mechanisms, and offer options to validate the reputation of the domains to which automations point can reduce the abuse vector. Safety should not be a layer added after, but part of the design of the services that facilitate automation.
For organizations that use remote management tools or integrate automations into their workflow, it is recommended to audit service accounts, rotate credentials, monitor atypical outgoing connections and establish controls to detect unauthorized software facilities. Suppliers such as Datto and others linked to the RMM ecosystem maintain documentation and safe practice notices; it is recommended to review their official resources to understand how these solutions are used when they are manipulated by malicious actors (e.g., public information on the web of suppliers such as Datto or ITarian).
In the end, history is a delicate balance: automation platforms offer real advantages, but their flexibility can become a risk if proper controls are not adopted. Users, security teams and suppliers must work together so that the tools that promise to speed up the work do not end up making the way for the attackers. Monitoring remains the best defence: reviewing technical reports, following the recommendations of specialized firms such as Cisco Talos and adopting good practices recommended by the security forces will help to keep these platforms as an asset and not as a back door.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...