Close Menu
    What's Hot

    Goodwin University Data Breach Exposes Student Records

    May 15, 2026

    QR Code Phishing Attacks : How Quishing Scams Are Targeting Mobile Users

    May 15, 2026

    Gujarat Fake Trading App Cyber Fraud Case: ₹49 Lakh Investment Scam Exposes Rising Digital Fraud Threats

    May 14, 2026

    Australian Financial Firm Cybersecurity Failure 2026: FIIG Securities Fined $2.5 Million After Major Data Breach

    May 13, 2026

    Foxconn Ransomware Attack: 8TB Data Theft Claims Raise Major Supply Chain Security Concerns

    May 13, 2026
    Facebook X (Twitter) Instagram
    Friday, May 15
    CyberNexora News
    X (Twitter) Instagram LinkedIn
    • Home
    • Cyber Incidents
    • laws & government
    • Penalties
    • Learn & Protect
    • Resources
    • Contact Us
    Get Cyber Alerts
    CyberNexora News
    Home»Cyber Incidents»n8n Supply Chain Attack Uses Fake Community Nodes to Steal OAuth Credentials

    n8n Supply Chain Attack Uses Fake Community Nodes to Steal OAuth Credentials

    Malicious npm Packages Target n8n Automation Platform in Supply Chain Attack
    Zeel_CyberexpertBy Zeel_CyberexpertJanuary 13, 2026Updated:March 4, 20262 Mins Read
    Facebook Twitter LinkedIn Email Telegram

    Security researchers have identified a new supply chain attack targeting the n8n workflow automation platform, where attackers uploaded multiple malicious packages to the npm registry disguised as legitimate community nodes.

    These packages were crafted to resemble official integrations, including connectors for Google Ads and performance monitoring services. Once installed, they presented standard configuration interfaces, encouraging users to authorize external accounts. The provided OAuth credentials were then covertly extracted and transmitted to attacker-controlled infrastructure.

    One of the malicious packages imitated a Google Ads connector and prompted users to link their advertising account through what appeared to be a genuine authorization form. Behind the scenes, the credentials were intercepted and forwarded to remote servers without the user’s knowledge.

    According to security researchers, this campaign represents a notable shift in supply chain attacks. Instead of focusing on developer workstations, the attackers targeted automation platforms that store and manage sensitive credentials for multiple services in one place.

    At least eight npm packages were confirmed to contain malicious functionality before being removed from the registry. Some of these packages had already accumulated thousands of downloads. Additional related packages published by the same authors remain available, and their behavior is still under investigation.

    Analysis revealed that after installation, the malicious node stored credentials normally within n8n’s credential system. During workflow execution, the node accessed and decrypted the stored tokens using the platform’s internal mechanisms and then exfiltrated the data to external endpoints controlled by the attackers.

    This is the first publicly documented case of a supply chain attack explicitly focused on the n8n ecosystem. The incident demonstrates how trust in community-contributed automation components can be exploited to gain unauthorized access to business integrations and cloud services.

    Researchers also noted that n8n community nodes operate with the same privileges as the core platform. This allows a malicious node to access environment variables, read and write files, perform outbound network communication, and interact with decrypted credentials during execution, making detection difficult.

    The campaign is believed to be ongoing, as new versions of some packages were published shortly before the discovery was made public.

    Share. Facebook Twitter LinkedIn Email Telegram

    latest news

    Goodwin University Data Breach Exposes Student Records

    May 15, 2026

    QR Code Phishing Attacks : How Quishing Scams Are Targeting Mobile Users

    May 15, 2026

    Gujarat Fake Trading App Cyber Fraud Case: ₹49 Lakh Investment Scam Exposes Rising Digital Fraud Threats

    May 14, 2026

    Australian Financial Firm Cybersecurity Failure 2026: FIIG Securities Fined $2.5 Million After Major Data Breach

    May 13, 2026

    Foxconn Ransomware Attack: 8TB Data Theft Claims Raise Major Supply Chain Security Concerns

    May 13, 2026

    Google AI-Generated Zero-Day Exploit 2026: Cybersecurity Enters a New Era of AI-Powered Attacks

    May 12, 2026

    South Staffordshire Water Data Breach Fine 2026: ICO Issues Nearly £1 Million Penalty After Cybersecurity Failures

    May 11, 2026

    OWASP Mobile Top 10-2024: Critical Mobile App Security Risks Every Security Professional Should Know

    May 10, 2026

    LockBit 5.0 Ransomware Attack on VP Brands International: Cybersecurity Threat Analysis and Business Impact

    May 10, 2026

    Vidar Malware Campaign: Fake Software Downloads Used to Steal Corporate Credentials

    May 9, 2026
    Recent Posts
    • Goodwin University Data Breach Exposes Student Records
    • QR Code Phishing Attacks : How Quishing Scams Are Targeting Mobile Users
    • Gujarat Fake Trading App Cyber Fraud Case: ₹49 Lakh Investment Scam Exposes Rising Digital Fraud Threats
    Top Posts

    Goodwin University Data Breach Exposes Student Records

    May 15, 2026

    Unauthorized Access Incident at Coupang Exposes Customer Data

    December 29, 2025

    Significant Data Breach at Korean Air Subcontractor Exposes Employee Records

    December 29, 2025
    About

    CyberNexora Blog provides trusted cybersecurity news, attack analysis, and security awareness updates. Our goal is to educate and inform readers about emerging cyber threats and best protection practices.

    Facebook X (Twitter) Instagram Pinterest LinkedIn
    Pages
    • Home
    • Cyber Incidents
    • laws & government
    • Penalties
    • Learn & Protect
    • Resources
    • Contact Us

    Get Cyber Security Alerts

    Thanks! Please check your email to confirm subscription.

    • About CyberNexora News
    • Privacy Policy
    © 2026 CyberNexora News. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.