Close Menu
  • Threat Intelligence
    • Cyber Attacks & Exploits
    • Data Breaches
    • Malware Analysis
  • Security Tools
    • Cybersecurity Tool Reviews
    • Cybersecurity Tools
    • Top 10 Security Tools
  • News & Updates
    • Cybersecurity Weekly Report
    • Industry Updates
  • Endpoint & System Security
  • Mobile Security
  • Cyber Insurance
  • Cyber law & Compliance
X (Twitter) LinkedIn WhatsApp
Trending
  • Cybersecurity Weekly Report: March 23 – 29, 2026
  • Data Breach Detection Time 2026: The Full Guide
  • Kali Linux 2026.1: 8 New Hacking Tools & BackTrack Mode
  • Cybersecurity Weekly Report: 16 – 22 March, 2026
  • CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE
  • WhiteHat Hub VBA Macros Workshop 2026 – Learn Macro Malware Analysis
  • Betterleaks Secrets Scanner: Fixing API Key Leak Detection Gaps
  • Cybersecurity Weekly Report: March 9 -15, 2026
Friday, April 10
Cyber infos
X (Twitter) LinkedIn WhatsApp
  • Threat Intelligence
    • Cyber Attacks & Exploits
    • Data Breaches
    • Malware Analysis
  • Security Tools
    • Cybersecurity Tool Reviews
    • Cybersecurity Tools
    • Top 10 Security Tools
  • News & Updates
    • Cybersecurity Weekly Report
    • Industry Updates
  • Endpoint & System Security
  • Mobile Security
  • Cyber Insurance
  • Cyber law & Compliance
Cyber infos
Cyber Attacks & Exploits

n8n Supply Chain Attack Exposes Risks in Community Automation Integrations

V DiwaharBy V DiwaharJanuary 13, 2026Updated:March 24, 2026No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn WhatsApp Copy Link
Share
Facebook Twitter Pinterest Threads Copy Link

A newly disclosed n8n supply chain attack has revealed how threat actors abused community-maintained npm packages to steal sensitive OAuth credentials from developers and organizations, according to a report published this week by Endor Labs.

The attackers uploaded malicious packages to the npm registry that posed as legitimate n8n community nodes, including a fake Google Ads integration. Once installed, these packages captured OAuth tokens during normal workflow execution and transmitted them to attacker-controlled servers, researchers confirmed.

The incident highlights growing security risks associated with third-party integrations in workflow automation platforms increasingly used for business-critical operations.

Table of Contents hide
1 How the Attack Was Discovered
2 Why n8n Became a High-Value Target
3 Malicious Packages Identified
4 What Data Was Compromised
5 Current Status of the Incident
6 What n8n Users Should Do Immediately
7 Industry Perspective on the n8n Supply Chain Attack
8 Official Statements
9 Frequently Asked Questions
10 Final Thoughts

How the Attack Was Discovered

According to Endor Labs, the malicious activity was identified during a supply chain investigation earlier this month. Researchers observed unusual outbound network traffic originating from n8n workflows that appeared otherwise legitimate.

“This campaign exploited workflow automation platforms that function as centralized credential vaults,” Endor Labs stated in its advisory. Unlike traditional npm malware that targets developer machines, the attackers focused on environments storing OAuth tokens and API keys for multiple SaaS services in one place.

The findings were publicly disclosed last week, and npm has since removed several of the identified packages.

Why n8n Became a High-Value Target

Security researchers say the n8n supply chain attack succeeded because of how the platform handles community nodes.

According to n8n’s official documentation, community nodes run with the same privileges as the core platform. This means they can:

  • Read environment variables
  • Access the file system
  • Decrypt stored credentials
  • Make outbound network requests

“Community nodes are not sandboxed or isolated,” Endor Labs researchers Kiran Raj and Henrik Plate explained. “A single malicious package can gain deep visibility into workflows and exfiltrate credentials without immediate detection.”

Because n8n often serves as a centralized automation hub, compromising one node can expose access to advertising platforms, payment processors, and customer data systems.

Malicious Packages Identified

Endor Labs confirmed at least eight npm packages were involved in the campaign. One of the most widely downloaded packages, n8n-nodes-hfgjf-irtuinvcm-lasdqewriit, masqueraded as a Google Ads node and recorded thousands of downloads before removal.

According to npm registry data reviewed by researchers, the malicious packages collectively reached tens of thousands of downloads, significantly increasing the potential impact.

The issue has been tracked under the security advisory GHSA-77g5-qpc3-x24r.

n8n Supply Chain Attack Exposes Risks in Community Automation Integrations

What Data Was Compromised

The attackers targeted OAuth credentials entered by users during node configuration. According to Endor Labs, the malicious code waited until workflows were executed, then decrypted stored tokens using n8n’s master key.

The stolen data included:

  • Google Ads OAuth tokens
  • API keys for connected services
  • Credentials stored in n8n’s encrypted vault

Researchers warned that these credentials could allow attackers to manipulate advertising accounts, access financial services, or pivot into connected enterprise systems.

Current Status of the Incident

npm has removed the confirmed malicious packages from its registry. However, researchers say the threat may not be fully contained.

Endor Labs noted that some related packages remain available and that one suspicious update was published only hours before its report was released. “This suggests the campaign may still be active,” the company stated.

n8n has not reported a breach of its core infrastructure but has reiterated warnings about the risks of installing unverified community nodes.

What n8n Users Should Do Immediately

Security experts recommend the following actions for organizations using n8n:

  • Audit all installed community nodes
  • Remove unknown or unnecessary integrations
  • Rotate OAuth tokens and API keys
  • Monitor outbound traffic from n8n instances
  • Use service accounts with minimal permissions

For self-hosted deployments, n8n advises disabling community packages entirely by setting:

N8N_COMMUNITY_PACKAGES_ENABLED=false

Industry Perspective on the n8n Supply Chain Attack

According to Endor Labs, this incident reflects a broader trend in supply chain attacks.

“Threat actors are moving up the stack,” the company stated. “Automation platforms, CI/CD tools, and orchestration systems now represent high-value targets because they aggregate credentials and control business processes.”

The campaign closely mirrors previous attacks targeting GitHub Actions workflows, indicating that attackers are systematically exploiting trusted automation ecosystems.

Official Statements

n8n has warned users that community nodes can execute arbitrary code on the host system and emphasized that they should be treated as untrusted software.

“Community packages inherit the same trust level as n8n itself,” the company stated in its security guidance. “Users are responsible for assessing the risk before installation.”

Endor Labs urged organizations to prioritize official integrations and implement stronger supply chain monitoring.

Frequently Asked Questions

Was n8n itself compromised?
No. According to researchers, the attack did not exploit a vulnerability in n8n’s core platform.

Who is most at risk?
Self-hosted users who enabled community nodes without strict review.

Is the threat ongoing?
Security researchers say follow-up activity is possible, and continued monitoring is advised.

Final Thoughts

The n8n supply chain attack demonstrates how trusted automation platforms have become prime targets for credential theft. As organizations rely more heavily on workflow automation, security teams must apply the same scrutiny to community integrations as they do to CI/CD pipelines and cloud infrastructure.

Cyber Infos will continue monitoring this developing situation and provide updates as new information becomes available.

Related posts:

  1. How Big Data is Driving New Cybersecurity Measures
  2. AI Operator Agents: How Hackers Use AI to Write Malicious Code
  3. North Korea VS Code Malware Attack Targets Developers in 2026
  4. SmarterMail Vulnerabilities Actively Exploited in Ransomware Attacks
Share. Facebook Twitter Pinterest Threads Telegram Email LinkedIn WhatsApp Copy Link
Previous ArticleCybersecurity weekly report: January 4–10, 2026 – Breaches, Ransomware & Patches
Next Article Microsoft Patch Tuesday January 2026: 112 Vulnerabilities Fixed, 3 Zero-Days
V Diwahar
  • Website
  • LinkedIn

I'm Aspiring SOC Analyst and independent Cybersecurity researcher, founder of CyberInfos.in. I analyzes cyber threats, vulnerabilities, and attacks, providing practical security insights for organizations and cybersecurity professionals worldwide.

Related Posts

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026
Read More

Iran Cyber Attacks 2026: Hacktivist Surge Hits 110 Targets

March 5, 2026
Read More

Perplexity Comet Browser Vulnerability Exploited via Calendar Invite

March 4, 2026
Read More
Add A Comment
Leave A Reply Cancel Reply

Cyber Attacks & Exploits

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026

Iran Cyber Attacks 2026: Hacktivist Surge Hits 110 Targets

March 5, 2026

Perplexity Comet Browser Vulnerability Exploited via Calendar Invite

March 4, 2026

AI-Powered Cyber Attacks Surge 89% in 2025 Crisis Breakouts

February 25, 2026

Google Antigravity Suspension Hits OpenClaw Users

February 24, 2026
Top 10 Security Tools

Top 10 Best Autonomous Endpoint Management Tools in 2026

November 14, 2025

Top 10 Best API Security Testing Tools in 2026

October 29, 2025

10 Best Free Malware Analysis Tools–2026

July 1, 2025

Top 10 Best Dynamic Malware Analysis Tools in 2026

March 6, 2025

Mobile Security

Android Security Update Fixes 129 Flaws, Zero-Day

March 3, 2026

PromptSpy Android Malware Marks First Use of Generative AI in Mobile Attacks

February 20, 2026

Securing Mobile Payments and Digital Wallets: Tips for Safe Transactions

December 19, 2025

How to Prevent SIM Swap Attacks and Protect Your Mobile Number in 2026

December 16, 2025

How to Use a VPN to Protect Your Privacy in 2026 (Step-by-Step Guide)

December 13, 2025
Cyber Insurance

A Step-by-Step Checklist to Prepare Your Business for Cyber Insurance (2026 Guide)

December 14, 2025

Is Your Business Really Protected? A Deep Dive Into Cyber Liability Coverage

December 6, 2025

What Cyber Insurance Doesn’t Cover & How to Fix the Gaps

December 1, 2025

Top Cyber Risks Today and How Cyber Insurance Protects You in 2026

November 28, 2025

What Every Business Owner Must Know Before Buying Cyber Insurance in 2026

November 26, 2025
Recents

Cybersecurity Weekly Report: March 23 – 29, 2026

March 30, 2026

Data Breach Detection Time 2026: The Full Guide

March 28, 2026

Kali Linux 2026.1: 8 New Hacking Tools & BackTrack Mode

March 26, 2026

Cybersecurity Weekly Report: 16 – 22 March, 2026

March 22, 2026

CVE-2026-32746: 32-Year-Old Telnetd Bug Enables RCE

March 20, 2026
Pages
  • About us
  • Contact us
  • Disclaimer
  • Privacy policy
  • Sitemaps
  • Terms and conditions
About us

CyberInfos delivers trusted cybersecurity news, expert threat analysis, and digital safety guidance for individuals and businesses worldwide.

LinkedIn
Partners
White Hat Hub Partner
X (Twitter) LinkedIn WhatsApp
  • Contact us
  • Sitemap
Copyright © 2026 cyberinfos.in - All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.