AI platform n8n abused for stealthy phishing and malware delivery
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户给的原文是关于n8n平台被滥用的情况。 首先,我得通读文章,抓住主要信息。文章提到攻击者利用n8n这个AI自动化平台进行钓鱼攻击、传播恶意软件,并通过可信的基础设施来绕过安全措施。此外,还提到了Cisco Talos的研究发现,攻击者使用n8n的webhooks来运行钓鱼活动,伪装成可信来源,比如OneDrive链接,诱导用户下载恶意文件。 接下来,我需要把这些关键点浓缩成一句话。重点包括:n8n被滥用、钓鱼攻击、恶意软件传播、利用可信基础设施绕过安全、以及具体的攻击手法如伪装链接和CAPTCHA页面。 现在考虑字数限制,要简洁明了。可能的结构是:攻击者利用n8n平台进行钓鱼和恶意软件传播,通过可信基础设施绕过安全措施,并伪装成合法来源诱导下载。 最后检查一下是否在100字以内,并且没有使用“文章内容总结”之类的开头。确保信息准确且完整。 </think> 攻击者利用AI自动化平台n8n运行钓鱼活动、传播恶意软件并绕过安全措施。通过伪装可信来源和使用webhooks技术,诱导用户下载恶意文件或设备指纹识别。 2026-4-16 13:57:4 Author: securityaffairs.com(查看原文) 阅读量:20 收藏

AI platform n8n abused for stealthy phishing and malware delivery

Attackers abuse AI automation platform n8n to run phishing campaigns, deliver malware, and evade security by using trusted infrastructure.

Threat actors are exploiting the popular AI workflow automation platform n8n to launch advanced phishing campaigns, deliver malware, and collect device data through automated emails. By using trusted infrastructure, they can bypass traditional security controls and maintain persistent access. The abuse of legitimate tools like n8n highlights how attackers are turning productivity platforms into powerful cyberattack enablers.

Cisco Talos found that attackers are abusing n8n webhooks, URLs that trigger automated workflows, to run phishing campaigns and deliver malware.

When users click these links in emails, their browser processes malicious content as if it came from a trusted source. The use of webhooks has surged sharply, driven by their ability to mask origins and tailor payloads. In observed campaigns, victims received emails mimicking OneDrive links, leading to CAPTCHA-protected pages that downloaded malicious files.

“Talos observed a phishing campaign (shown in Figure 3) that used an n8n-hosted webhook link in emails that purported to be a shared Microsoft OneDrive folder. When clicked, the link opened a webpage in the targeted user’s browser containing a CAPTCHA.” reads the report published by Talos. “Once the CAPTCHA is completed, a download button appears, triggering a progress bar as the payload is downloaded from an external host. Because the entire process is encapsulated within the JavaScript of the HTML document, the download appears to the browser to have come from the n8n domain.”

These included executables or MSI installers that deployed remote management tools as backdoors, enabling persistence, command execution, and data exfiltration while appearing legitimate.

The malicious executable employed in this campaign uses PowerShell commands to deploy the Datto RMM tool, configure it as a scheduled task, and establish persistence by connecting to a remote relay before deleting traces of the payload. Talos also observed a similar attack using n8n webhooks to deliver a different payload via a phishing page protected by a CAPTCHA. Once solved, victims download a malicious MSI installer disguised as a OneDrive document, which installs a modified ITarian RMM tool acting as a backdoor and enabling data exfiltration, while a fake installer interface hides the activity.

Additionally, attackers abuse n8n for device fingerprinting by embedding invisible tracking images in emails. When opened, these trigger requests to webhook URLs containing unique identifiers, allowing attackers to confirm email access and collect information about the victim’s device.

“The same workflows designed to save developers hours of manual labor are now being repurposed to automate the delivery of malware and fingerprinting devices due to their flexibility, ease of integration, and seamless automation.” concludes the report. “As we continue to leverage the power of low-code automation, it’s the responsibility of security teams to ensure these platforms and tools remain assets rather than liabilities.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, malware)




文章来源: https://securityaffairs.com/190887/hacking/ai-platform-n8n-abused-for-stealthy-phishing-and-malware-delivery.html
如有侵权请联系:admin#unsafe.sh