By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens
Computing

n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens

News Room
Last updated: 2026/01/12 at 1:45 PM
News Room Published 12 January 2026
Share
n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens
SHARE

Jan 12, 2026Ravie LakshmananVulnerability / Workflow Automation

Threat actors have been observed uploading a set of eight packages on the npm registry that masqueraded as integrations targeting the n8n workflow automation platform to steal developers’ OAuth credentials.

One such package, named “n8n-nodes-hfgjf-irtuinvcm-lasdqewriit,” mimics a Google Ads integration, and prompts users to link their advertising account in a seemingly legitimate form and then siphon it to servers under the attackers’ control.

“The attack represents a new escalation in supply chain threats,” Endor Labs said in a report published last week. “Unlike traditional npm malware, which often targets developer credentials, this campaign exploited workflow automation platforms that act as centralized credential vaults – holding OAuth tokens, API keys, and sensitive credentials for dozens of integrated services like Google Ads, Stripe, and Salesforce in a single location.”

Cybersecurity

The complete list of identified packages, which have since been removed, is as follows –

  • n8n-nodes-hfgjf-irtuinvcm-lasdqewriit (4,241 downloads, author: kakashi-hatake)
  • n8n-nodes-ggdv-hdfvcnnje-uyrokvbkl (1,657 downloads, author: kakashi-hatake)
  • n8n-nodes-vbmkajdsa-uehfitvv-ueqjhhhksdlkkmz (1,493 downloads, author: kakashi-hatake)
  • n8n-nodes-performance-metrics (752 downloads, author: hezi109)
  • n8n-nodes-gasdhgfuy-rejerw-ytjsadx (8,385 downloads, author: zabuza-momochi)
  • n8n-nodes-danev (5,525 downloads, author: dan_even_segler)
  • n8n-nodes-rooyai-model (1,731 downloads, author: haggags)
  • n8n-nodes-zalo-vietts (4,241 downloads, authors: vietts_code and diendh)

The users “zabuza-momochi,” “dan_even_segler,” and “diendh” have also been linked to other libraries that are still available for download as of writing –

It’s not clear if they harbor similar malicious functionality. However, an assessment of the first three packages on ReversingLabs Spectra Assure has uncovered no security issues. In the case of “n8n-nodes-zl-vietts,” the analysis has flagged the library as containing a component with malware history.

Interestingly, an updated version of the package “n8n-nodes-gg-udhasudsh-hgjkhg-official” was published to npm just three hours ago, suggesting that the campaign is possibly ongoing.

The malicious package, once installed as a community node, behaves like any other n8n integration, displaying configuration screens and saving the Google Ads account OAuth tokens in encrypted format to the n8n credential store. When the workflow is executed, it runs code to decrypt the stored tokens using n8n’s master key and exfiltrates them to a remote server.

The development marks the first time a supply chain threat has explicitly targeted the n8n ecosystem, with bad actors weaponizing the trust in community integrations to achieve their goals.

Cybersecurity

The findings highlight the security issues that come with integrating untrusted workflows, which can expand the attack surface. Developers are recommended to audit packages before installing them, scrutinize package metadata for any anomalies, and use official n8n integrations.

N8n has also warned about the security risk arising from the use of community nodes from npm, which it said can execute malicious actions on the machine that the service runs on. On self-hosted n8n instances, it’s advised to disable community nodes by setting N8N_COMMUNITY_PACKAGES_ENABLED to false.

“Community nodes run with the same level of access as n8n itself. They can read environment variables, access the file system, make outbound network requests, and, most critically, receive decrypted API keys and OAuth tokens during workflow execution,” researchers Kiran Raj and Henrik Plate said. “There is no sandboxing or isolation between node code and the n8n runtime.”

“Because of this, a single malicious npm package is enough to gain deep visibility into workflows, steal credentials, and communicate externally without raising immediate suspicion. For attackers, the npm supply chain offers a quiet and highly effective entry point into n8n environments.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Ultrafast UV light set to transform communications and imaging
Next Article Connect to 40% Off the TP-Link Deco X50 Outdoor Mesh Wi-Fi With This Deal Connect to 40% Off the TP-Link Deco X50 Outdoor Mesh Wi-Fi With This Deal
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

AI-Powered Credit Scoring for the Thin File and Informal Economy | HackerNoon
AI-Powered Credit Scoring for the Thin File and Informal Economy | HackerNoon
Computing
PSA: Google Chrome 151 to drop support for macOS 12 Monterey – 9to5Mac
PSA: Google Chrome 151 to drop support for macOS 12 Monterey – 9to5Mac
News
Blade Runner Considered Several Hollywood Legends Before Casting Harrison Ford – BGR
Blade Runner Considered Several Hollywood Legends Before Casting Harrison Ford – BGR
News
Ready to Install Handgun Components for Shooters
Ready to Install Handgun Components for Shooters
Gadget

You Might also Like

AI-Powered Credit Scoring for the Thin File and Informal Economy | HackerNoon
Computing

AI-Powered Credit Scoring for the Thin File and Informal Economy | HackerNoon

10 Min Read
Top Crypto Opportunity This Month? BTC Whales Rotate Into This Cheap Crypto as Protocol Launch Nears | HackerNoon
Computing

Top Crypto Opportunity This Month? BTC Whales Rotate Into This Cheap Crypto as Protocol Launch Nears | HackerNoon

6 Min Read
The Ultimate Developer’s Guide to Jira Success | HackerNoon
Computing

The Ultimate Developer’s Guide to Jira Success | HackerNoon

1 Min Read
AlphaTON Capital Closes M AI Infrastructure Expansion to Address Demands for Confidential Compute | HackerNoon
Computing

AlphaTON Capital Closes $46M AI Infrastructure Expansion to Address Demands for Confidential Compute | HackerNoon

10 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?