“. if the url is accessed via email, the recipient ’ s browser acts as the receiving application, processing the output as a webpage. talos has observed a significant rise in emails containing n8n webhook urls over the past year. for example, the volume of these emails in march 20…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1055.001Dynamic-link Library Injection
83%
“##eting themselves and the rest of the payload. talos observed a similar campaign that also utilized an n8n webhook to deliver a different payload. like the previous instance, it featured a self - contained phishing page delivered as a data stream from the webhook, protected with…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.007Artificial Intelligence
64%
“the n8n n8mare : how threat actors are misusing ai workflow automation - cisco talos research has uncovered agentic ai workflow automation platform abuse in emails. recently, we identified an increase in the number of emails that abuse n8n, one of these platforms, from as early a…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.001PowerShell
63%
“link in emails that purported to be a shared microsoft onedrive folder. when clicked, the link opened a webpage in the targeted user ’ s browser containing a captcha. once the captcha is completed, a download button appears, triggering a progress bar as the payload is downloaded …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
60%
“##eting themselves and the rest of the payload. talos observed a similar campaign that also utilized an n8n webhook to deliver a different payload. like the previous instance, it featured a self - contained phishing page delivered as a data stream from the webhook, protected with…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
53%
“link in emails that purported to be a shared microsoft onedrive folder. when clicked, the link opened a webpage in the targeted user ’ s browser containing a captcha. once the captcha is completed, a download button appears, triggering a progress bar as the payload is downloaded …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1566.002Spearphishing Link
49%
“##n [. ] cloud ” from which the user ’ s applications can be accessed. this is similar to many web - based ai - aided development tools, and one that malicious actors have harnessed elsewhere in the past ; earlier this year, talos observed another ai - oriented web application se…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
43%
“link in emails that purported to be a shared microsoft onedrive folder. when clicked, the link opened a webpage in the targeted user ’ s browser containing a captcha. once the captcha is completed, a download button appears, triggering a progress bar as the payload is downloaded …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.004Malicious Copy and Paste
35%
“link in emails that purported to be a shared microsoft onedrive folder. when clicked, the link opened a webpage in the targeted user ’ s browser containing a captcha. once the captcha is completed, a download button appears, triggering a progress bar as the payload is downloaded …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Cisco Talos research has uncovered agentic AI workflow automation platform abuse in emails. Recently, we identified an increase in the number of emails that abuse n8n, one of these platforms, from as early as October 2025 through March 2026.