Automatically translated.View original post

A group of hackers using n8n Webhooks sent malware via mail.

The hacker group uses n8n Webhooks to send malware via Phishing email for a long time since 2025.

Sending emails to deceive victims by phishing means is called a classic method of spreading malware to victims. Many people may understand that it uses a common deceptive email delivery tool to do this. In fact, today, a tool that many people do not believe can be used for this purpose has been used.

According to a report by The Hacker News website, the hackers behind the Phishing email fraud campaign have been used to create workflow tools to automate AI or Artificial Intelligence. N8n is also involved in these campaigns. It is used to create Webhook, a mechanism to send data from source to destination with requests (requests) automatically that will result in applications that work with Webhook to automate the event. Define it on the script, which is, of course, a collaborative application in this case is malware itself.

The task of this campaign starts with hackers sending an email with a Webhook embedded in n8n as an attachment that claims to be an archives. When the victim opens, the link will take the victim to a Captcha authentication screen. If the victim is done, it will lead to downloading and installing a malware extension (Dropper) that comes in the NSIS file format (Nullsoft Scriptable Install System). The malware will create persistence on the system by registering malware DLL files and malware-related Service (Service) to guarantee that the malware will resume. Every time the machine is rebooted, the last step leads to running a PowerShell script to download tools such as Datto and ITarian Endpoint Management in the MSI Installer file format. These two tools are tools for Remote Monitoring and Management, which will act as backdoor malware, connecting to a C2 or Command and Control server. Hackers can log in at any time.

A research team from Cisco Talos, a network management specialist, explained that the hackers behind it use the subdomain of n8n called .app.n8n [.] cloud to use the Request receiver from Webhook embedded in Phishing email, which, after receiving the data, leads to the workflow set up by the hackers on the n8n system, leading to the embedding of malware as mentioned above, but the ability of n8n's Webhook has other capabilities: the "fingerprint" feature. (Fingerprint) By simply embedding an invisible image file or a Tracking Code with a n8n-generated Webhook URL. When the victim opens the email, Webhook sends the HTTP GET protocol Request back to the source with identity information such as the victim's email address (Email Address) that will automatically identify who opened the email.

# Trending # Lemon 8 Howtoo # lemon 8 diary # n8n # freedomhack

2 days agoEdited to

... Read moreจากประสบการณ์ส่วนตัวที่ได้ติดตามปัญหาด้านความปลอดภัยไซเบอร์ ผมพบว่าแฮกเกอร์ในยุคปัจจุบันมีความชำนาญในการใช้เครื่องมือ Automation เช่น n8n เพื่อเปลี่ยนการโจมตีแบบ Phishing ให้มีประสิทธิภาพสูงขึ้นอย่างมาก n8n เป็นแพลตฟอร์ม Workflow Automation ที่เดิมทีใช้สำหรับสร้างขั้นตอนการทำงานอัตโนมัติระหว่างแอปพลิเคชันต่างๆ แต่เมื่อนำมาใช้ในเชิงร้าย กลุ่มแฮกเกอร์ก็สามารถสร้าง Webhook ที่รวมถึงการดำเนินการติดตั้งมัลแวร์ และการเชื่อมต่อกับเซิร์ฟเวอร์ควบคุมในรูปแบบอัตโนมัติ ด้วยวิธีนี้ แคมเปญ Phishing จะมีความซับซ้อนขึ้น และยากที่จะตรวจจับจากระบบป้องกันทั่วไป ที่น่าสนใจคือการใช้ฟีเจอร์ Fingerprint ของ Webhook ที่ฝังโค้ดหรือไฟล์รูปภาพที่มองไม่เห็นลงในอีเมล ทำให้ทราบได้ทันทีว่าใครเปิดอีเมลนั้นๆ ซึ่งช่วยให้แฮกเกอร์ควบคุมเป้าหมายได้อย่างแยบยล และสามารถปรับเปลี่ยนแคมเปญให้ตรงกับเหยื่อเฉพาะกลุ่มได้ ดังนั้น สำหรับผู้ใช้ทั่วไป ผมขอแนะนำให้ระมัดระวังและไม่คลิกลิงก์หรือเปิดไฟล์แนบจากอีเมลที่ไม่รู้จัก รวมถึงเปิดใช้งานระบบยืนยันตัวตนหลายชั้น (MFA) และอัพเดตซอฟต์แวร์ระบบความปลอดภัยอย่างสม่ำเสมอ นอกจากนี้องค์กรควรเสริมระบบตรวจจับแบบ Behavior-based Detection ที่สามารถวิเคราะห์กิจกรรมที่ผิดปกติบนเครือข่ายร่วมกับ Machine Learning เพื่อรับมือกับเทคนิคที่หลากหลายของแฮกเกอร์ในยุคนี้ โดยรวมแล้ว การโจมตีผ่าน n8n Webhooks นี้เป็นตัวอย่างที่ดีของการใช้เครื่องมือแท้ที่ถูกปรับใช้ในทางที่ผิด มันสะท้อนให้เห็นถึงความสำคัญในการเข้าใจเทคโนโลยีและการพัฒนากลยุทธ์ป้องกันที่ทันสมัย เพื่อปกป้องข้อมูลและระบบของเราให้ปลอดภัยจากภัยคุกคามไซเบอร์ที่ซับซ้อนขึ้นทุกวัน

Related posts

Do you like hackers?
#hacker #hackers #tricked #fyp
Lil Conscious

Lil Conscious

38 likes

A young woman with long dark hair, wearing a pink satin shirt, smiles at the camera while sitting at a table. Overlay text reads: 'Tools and sites I use as a cybersecurity student to progress my skills and keep me interested in studying'.
A screenshot of 'The Hacker News' website, displaying various cybersecurity news articles from January 2025, including topics like vulnerabilities, malware, cyber espionage, and AI jailbreak methods. An ad for Zscaler and a banner for CIS Hardened Images are also visible.
A screenshot of the O'Reilly learning platform, showing various books and expert playlists related to AI, engineering, and data. Overlay text highlights the subscription cost ($50/month or $499/year) and its value for accessing books and live events.
Tools and sites I use as a cybersecurity student 🌸
#cybersecuritystudent #cybersecurity #techgirlie
LexiStudies

LexiStudies

104 likes

BIG Holiday Costco Shop & Haul | Anchorage, Alaska
vanditsv

vanditsv

2 likes

PSA PSA PSA ‼️ #fyp #hackers #facebook #scammers #viral
Kay’s House ✨

Kay’s House ✨

2 likes

SIEGEX is all CHEATERS & HACKERS😭
Why is this game full of cheaters and hackers and bugs🤷‍♀️ #siege #rainbowsixsiege #gaming #streamer #foryou
Phasma

Phasma

32 likes

Have Gamer Kids Who Love Ramen? 👀 Take Them Here!
Have gamer children who love to eat ramen noodles like mine? 👀 Gone and take them to The Forks USA in Suwanee and let them have a ball ! 📍The Forks USA Self Ramen & PC Cafe 💰: $8.99 for ramen plus add on items (chicken, rice cakes, crab, etc.) & $6.99 per hour for each person who plans
Call Me Pooh ✨

Call Me Pooh ✨

83 likes

I wanted a real project I could actually show, not just talk about. So I used Atoms ⚛️ Check it out here: https://tinyurl.com/3xzc8xbe It feels like having a whole AI team helping me: 🔍 they do the deep research first 🏁 then Race Mode builds different versions so I can compare 👥 I just pick
emilie.studygram

emilie.studygram

19 likes

scammers and hackers beware
Hudson
cercofhell

cercofhell

28 likes

Look world I just made this new Facebook account a minute ago Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers and Elon Musk and Donald Trump and Mark Zuckerberg just locked and suspended it cause I'm sharing my legal paperwork and federal complaints I'm filling
glentrump359

glentrump359

0 likes

Just An FYI This Is How So Many People are Getting Hacked!!! Plz Don’t Fall For Message Like These!!! it’s A Fake Account!!! #fakeaccount #hackers
MaryBell

MaryBell

2 likes

me rocking the shades yesterday at my day group ☺️
Øg Hackers Dèmøn

Øg Hackers Dèmøn

1 like

Hackers
How call of duty has me #call of duty #hacker #warzone
Stevie_Wonders

Stevie_Wonders

1 like

Taco Tuesday 🤯 Admin Abuse ⁉️ #stealabrainrot #robloxstealabrainrot #roblox #neoskittles
NeoSkittles

NeoSkittles

4 likes

4 In demand Certificates You Need in 2025
Hey Career Girl, I know you want to start off the New Year on the right foot and a certificate is just the thing. Certificates can open the doors to new pathways in the career world that wouldn't have been opened before! Love this type of content? Follow and share! Need Interview P
Lauren|Career Girl

Lauren|Career Girl

164 likes

Ban Hackers
Vinicius Jr 🇧🇷 #fcmobile #eafcmobile #fifamobile #fcmobile25 #eafc
manuelofficial_13

manuelofficial_13

1 like

A laptop with a cloudy sky wallpaper and a white cup with a red logo. Text overlay reads: 'Free Websites That Saved My GPA AND MY SANITY Sharing So You Don't Struggle Too'.
A laptop screen displays Yahoo search results for 'Quizlet'. An overlay describes Quizlet as a free flashcard tool for memorizing terms, definitions, and formulas, making studying feel like a game.
A laptop screen displays Yahoo search results for 'Unriddle.ai'. An overlay describes Unriddle.ai as a free tool that breaks down notes, articles, or assignments to aid understanding of long readings.
Websites You NEED to Pass Your College Courses
Y’all college is hard enough without trying to figure everything out on your own 😩 So here’s my list of websites that actually helped me pass my classes like, these were in my survival kit. I’m not gatekeeping 🫶🏽 Quizlet When I needed to memorize terms FAST. I used it for flashcards, and the matc
Beauty

Beauty

278 likes

A screenshot showing a Facebook pop-up notification stating 'Account Disabled' for the email t*****0@gmail.com, advising the user to visit the Help Center.
A screenshot of a login screen for t*****0@gmail.com, displaying 'Continue' and 'Try another way' buttons, with a blurred document visible in the background.
A screenshot showing a Facebook notification that an account named 'Beans Bombs' has been permanently disabled for not following Community Standards, with no option for review after 180 days.
Look world deactivate it now I just made this Facebook account finna to go make some more and go on my others I'm finna to file some more federal complaints and send it to them to Look world just suspended this new Facebook account right now for no reason and won't let my information go thr
glentrump359

glentrump359

0 likes

Bigfoot Super Hackers.
#manthoughts #hackers #laughoutloud #bigfootvlog #lifetips
Alien Hayes

Alien Hayes

11 likes

Kalebdavis19

Kalebdavis19

1 like

Your Site Isn’t Broken… It’s Quietly Dying
Nobody tells website owners this, but… A broken website doesn’t always look broken. There’s no warning. No alert. No obvious sign. But behind the scenes: * Your pages could be disappearing from search * Visitors could be leaving before it loads * Forms could be failing silently * H
Global Vibes Hub

Global Vibes Hub

0 likes

A message to Minecraft hackers…
You should join the server #minecraft #gaming #fyp
BendersMC

BendersMC

13 likes

⚠️ The Hidden Dangers of Public Wi-Fi Free Wi-Fi feels convenient, but it can be a trap. Hackers can create what’s called an “evil twin” network—a fake hotspot that looks legitimate. The moment you connect, they can access your data, passwords, banking info, and private messages. Listen
Dannah Eve

Dannah Eve

82 likes

Look world deactivated all my Instagram accounts cause I was at a 1000 friends to go go live and removing all my legal paperwork and complaints tampering with federal evidence Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and ha
glentrump359

glentrump359

0 likes

A woman wearing a black outfit and a large pearl necklace smiles while sitting in a room with rows of green chairs. Other individuals are visible in the background. The image features Lemon8 branding with the username @angelawrivers.
Hackers hijacked antivirus features to install mal
Hackers hijacked antivirus features to install malware - here's what we know https://www.yahoo.com/tech/cybersecurity/articles/hackers-hijacked-antivirus-features-install-140500891.html #hackers #malware #cybersecurity #antivirus
angela1957

angela1957

1 like

Look world Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers just locked and removed my lives for no reason cause I'm speaking my freedom of speech constitutional rights and laws FBI and state police DEA and governme
glentrump359

glentrump359

0 likes

The image shows a keyboard with a fingerprint icon, overlaid with "OUTSMART HACKERS" and "Secrets they don't want you to know," serving as the title for a guide on cybersecurity.
This image explains hackers use software to guess passwords and advises creating long passwords with a random mix of letters, numbers, and symbols to defend against such attacks.
The image warns that hackers try common passwords and advises users to defend themselves by avoiding easy words/phrases and not reusing passwords across different sites.
SECRETS Hackers DON’T Want You to Know!
After hackers got into my Facebook account and completely erased it, I dusted myself off and started a deep dive to understand why and how hackers work. The best way to protect yourself is to outsmart them. Here are 5 secrets Hackers DON'T want you to know! Share this with everyone! #lemon8pa
techgirljen

techgirljen

425 likes

Amen thanks Father God Jesus Christ God morning word and prayer devil's I rebuke you your childrens Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers and Elon Musk and Donald Trump and Mark Zuckerberg and Randy Tappin and Christopher Thirdkill and IT and their countr
glentrump359

glentrump359

0 likes

Look world on my new Snapchat right now want let anyone see my stories rejecting all of them Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers everyday all day and night and morning harassing me on all my social media ap
glentrump359

glentrump359

0 likes

#yungblud
watch4hackers

watch4hackers

6 likes

Most small businesses believe they’re too small to be hacked… but that’s not how cyber risk works. In today’s connected world, your business doesn’t stand alone. You rely on vendors, payroll systems, cloud platforms, CRMs, IT providers, to run your operations. But here’s the truth many people ov
Abby❤️💎

Abby❤️💎

0 likes

🚨 16 Billion passwords leaked - the largest breach ever 🚨 Here is how it happened and what you can do to be safe. #news #databreach #cybersecuritytips #onlinesafety
Cybersecurity Girl

Cybersecurity Girl

122 likes

Ai in Cybersecurity
Artificial Intelligence isn’t replacing cybersecurity professionals, it’s amplifying them. AI doesn’t sleep. It learns, detects, and defends faster than ever before. This is what modern cybersecurity looks like “intelligence with intuition.” #Cybersecurity #AIinCybersecurity #dataprivacy
Abby❤️💎

Abby❤️💎

0 likes

Hackers are using tricks & steal financial info.🌸🍋
SECURITY TIPS: Be careful from hackers they use multiple different types of software and tricks to steal data from computers, cell phones or other devices to steal your data, financial information and personal details. When they hack via computer systems Showing they are from Microsoft Security Ale
Mujahid Bakht

Mujahid Bakht

6 likes

A hand holds a pink iPhone with text 'Tech 101 For Beginners' and 'Tips to help Non-Tech Savvy Users,' accompanied by laptop and phone app icons, against a brick background.
A pink iPhone in its box, illustrating the tip to 'Keep Your Devices Updated' with text explaining why updates help and advising to enable automatic updates.
An iPhone screen displaying app icons and display settings, accompanying the tip to 'Use Strong, Unique Passwords' with reasons why and advice on using combinations and password managers.
Tech Hacks For Beginners 📲💻😬
I have some great tips for non-tech savvy tech users. I know these tips will help you learn your tech more quickly and effectively. 1. Keep Your Devices Updated Why It Helps: Updates often contain security patches and improvements that help your device run smoothly. Tip: Enable automatic updat
Joy 📚

Joy 📚

282 likes

A rumor has been going around that Iranian hackers threatened to hack the U.S. credit system and boost everyone’s credit score. #fyp
iddy2707

iddy2707

2 likes

TOP 5 HARDEST JOBS AT NORTHROP GRUMMAN
Zona

Zona

3 likes

Ban Hackers
😃 #fcmobile #eafcmobile #fifamobile #fcmobile25 #eafc
manuelofficial_13

manuelofficial_13

4 likes

King Trump
GrouchyGrandpaChannel

GrouchyGrandpaChannel

4 likes

BREAKING: FBI Director Kash Patel’s Personal Email Reportedly Breached by Iran
BREAKING: FBI Director Kash Patel’s Personal Email Reportedly Breached by Iran-Linked Hackers ⸻ A shocking cybersecurity breach has reportedly exposed the personal email of FBI Director Kash Patel. Iran-linked hackers claim they accessed his Gmail account and leaked private content online. W
King media Roof Llc

King media Roof Llc

42 likes

A smartphone displays a message asking God to unblock it due to hackers. A patterned pad and colorful items are in the hazy background. The image includes Lemon8 branding and a username.
God, please unblock this android, hackers have in
Olga Ledbetter

Olga Ledbetter

37 likes

If you have the Samsung, you need to watch this and update your phone immediately 
Cybersecurity Girl

Cybersecurity Girl

48 likes

Look world as soon I start going live on bingo app Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and hackers lock my bingo live cause I'm listening to the word of God Jesus Christ God
glentrump359

glentrump359

0 likes

Vibe coding is more accessible but it’s not as simple as speaking plain English😡
NO! Vibe coding is NOT as simple as people say! And if done poorly, you can get hacked 😒 45% of the apps built with AI could be vulnerable from day one. We’re talking about: 1. Hardcoded API keys 2. Missing authentication 3. Vulnerable dependencies These are common issues in AI generated c
Learn AI with Rosie Rachel

Learn AI with Rosie Rachel

0 likes

HACKERS IN THE BETA
Blackops 7 has hackers already…. #hacker #blackops7 #bo7
Goofstha

Goofstha

1 like

Look world deactivated all my Instagram accounts cause I was at a 1000 friends to go go live and removing all my legal paperwork and complaints tampering with federal evidence Elon Musk and Donald Trump and Mark Zuckerberg and Morehouse parish sheriff department officers and Mike Stone Tubbs and ha
glentrump359

glentrump359

0 likes

Look world the 2 day on my Facebook accounts right now rejecting all my posts and won't let me share my posts Look world on my bingo app right now locking all my lives for no reason cause I'm listening to the word of God Jesus Christ these meth heads going crazy frfr on God Jesus Christ y&#
glentrump359

glentrump359

0 likes

Poor Belle ! #beauty & the beast salt shackers
Like why did they have to paint her face like that 😂😂🤣🤣 #new #beauty #beautyandthebeast #disney #salt #pepper #homegoods #finds #fyp #fypシ #trending #shop #shopping #shopwithme #fypage #explore #explorepage #reels #eleydencreations #content #contentcreator #creator
EleydenCreation

EleydenCreation

651 likes

75 hard day 8
Day 8 of MY 75 hard! My rules: 1. Follow my set diet. 2. Drink minimum 80oz of water a day. 3. Workout daily. 4. Read 10 pages of NF OR Fiction a day. 5. Practice something daily. 6. Progress photos + log weight weekly. #75hard #healthylifestyle #healthyfood #postpa
Madison

Madison

11 likes

Look world removed my posts again on Lemon8 app right now I just posted a minute ago these meth heads going crazy frfr they need some serious help on God Jesus Christ Look world on Lemon8 app right now removing my freedom of speech constitutional rights and laws Elon Musk and Donald Trump and Mark
glentrump359

glentrump359

0 likes

WARZONE HACKERS
Warzone is full hackers and call of duty does not care #warzone #hacker #memesdaily #memes🤣 #gaming
DUSTINMYRQ ™

DUSTINMYRQ ™

3 likes

See more