<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Workflow-Automation — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/workflow-automation/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 15 Apr 2026 10:03:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/workflow-automation/feed.xml" rel="self" type="application/rss+xml"/><item><title>n8n AI Workflow Automation Platform Abused for Malware Delivery and Device Fingerprinting</title><link>https://feed.craftedsignal.io/briefs/2026-04-n8n-abuse/</link><pubDate>Wed, 15 Apr 2026 10:03:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-n8n-abuse/</guid><description>Threat actors are abusing the n8n AI workflow automation platform to deliver malware and fingerprint devices via phishing campaigns, bypassing traditional security filters by leveraging trusted infrastructure.</description><content:encoded><![CDATA[<p>Cisco Talos has observed a surge in the abuse of agentic AI workflow automation platforms, specifically n8n, in phishing campaigns between October 2025 and March 2026. Attackers are leveraging the trusted infrastructure of n8n to bypass traditional security filters and deliver malware or fingerprint devices. This involves embedding n8n webhook URLs in phishing emails, which redirect victims to malicious content served through the n8n platform. This technique effectively turns a productivity tool into a delivery mechanism for persistent remote access, highlighting the evolving tactics of threat actors exploiting legitimate services. Talos observed a 686% increase in emails containing n8n webhook URLs between January 2025 and March 2026, indicating the growing prevalence of this attack vector.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a phishing email containing a malicious link.</li>
<li>The link is an n8n webhook URL pointing to a workflow controlled by the attacker on a subdomain of <code>tti.app.n8n[.]cloud</code>.</li>
<li>The victim receives the email and clicks the embedded n8n webhook URL, believing it to be a legitimate service.</li>
<li>Clicking the link redirects the victim&rsquo;s browser to the n8n platform, which triggers the pre-configured workflow.</li>
<li>The n8n workflow serves an HTML page containing a CAPTCHA to the victim&rsquo;s browser.</li>
<li>After the victim completes the CAPTCHA, the webpage presents a download button, concealing the true source of the payload.</li>
<li>Clicking the download button initiates the download of a malicious executable (e.g., &ldquo;DownloadedOneDriveDocument.exe&rdquo;) from an external host.</li>
<li>The executable installs a modified version of Datto RMM, establishes a connection to a relay on <code>centrastage[.]net</code>, granting the attacker remote access and control over the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The abuse of n8n for malware delivery and device fingerprinting can lead to significant compromise of targeted systems. Successful exploitation allows attackers to gain remote access via tools like the modified Datto RMM, enabling them to steal sensitive data, deploy ransomware, or conduct further malicious activities within the compromised network. The rise in n8n webhook URL usage in phishing emails, with a 686% increase in volume from January 2025 to March 2026, indicates a potentially widespread impact across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor email traffic for URLs containing <code>tti.app.n8n[.]cloud</code> and flag them as suspicious (IOC table).</li>
<li>Implement a detection rule to identify network connections to <code>centrastage[.]net</code> initiated by unusual processes (Sigma rule below).</li>
<li>Inspect process creation events for the execution of &ldquo;DownloadedOneDriveDocument.exe&rdquo; or similar filenames downloaded from n8n domains (Sigma rule below).</li>
<li>Block the domains <code>tti.app.n8n[.]cloud</code> and <code>centrastage[.]net</code> at the DNS resolver (IOC table).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>n8n</category><category>phishing</category><category>malware</category><category>workflow-automation</category></item></channel></rss>