Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

World launches tool to verify the humans behind AI shopping agents

LeakNet ransomware uses ClickFix and deploys Deno In-Memory Loader via hacked sites

Today’s Live Science: Starlink hits 10,000 satellites in orbit as Super El Nino approaches

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » LeakNet ransomware uses ClickFix and deploys Deno In-Memory Loader via hacked sites
Identity

LeakNet ransomware uses ClickFix and deploys Deno In-Memory Loader via hacked sites

By March 17, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

LeakNet Ransomware

The ransomware campaign known as LeakNet employed ClickFix social engineering tactics delivered through compromised websites as its initial access method.

The use of ClickFix, which allows users to be tricked into manually running malicious commands to address non-existent errors, is a departure from relying on traditional methods of gaining initial access, such as stealing credentials obtained from an initial access broker (IAB), ReliaQuest said in a technical report published today.

The second key aspect of these attacks is the use of a staged command-and-control (C2) loader built on top of the Deno JavaScript runtime to execute the malicious payload directly in memory.

“The key here is that both entry vectors lead to the same repeatable post-exploitation sequence every time,” the cybersecurity firm said. “This gives defenders the ability to be specific: Regardless of how LeakNet enters, it is a known behavior that can be detected and stopped at each stage of the ransomware, well before it is deployed.”

LeakNet first emerged in November 2024, calling itself a “digital watchdog” and positioning its activities as focused on internet freedom and transparency. According to data collected by Dragos, the group also targets industrial associations.

Using ClickFix to compromise victims provides several benefits. Most importantly, it reduces dependence on third-party suppliers, reduces acquisition cost per victim, and eliminates the operational bottleneck of waiting for valuable accounts to come to market.

These attacks use legitimate but compromised sites to force users to copy the “msiexec.exe” command and install Windows.[ファイル名を指定して実行]It provides a fake CAPTCHA validation check that you are asked to paste into a dialog. Attacks are not limited to any particular industry, but cast a wide net to infect as many victims as possible.

This development comes as more threat actors adopt the ClickFix playbook. This playbook exploits trusted, everyday workflows to lure users into executing malicious commands through legitimate Windows tools in a seemingly routine and safe manner.

“LeakNet’s adoption of ClickFix represents the first documented expansion of the group’s early access capabilities as well as a meaningful strategic shift,” ReliaQuest said.

“By moving away from the IAB, LeakNet removes dependencies that naturally limit its rapid and widespread operation. Also, because ClickFix is ​​delivered through a legitimate (but compromised) website, it does not present the same obvious signals at the network layer as attacker-owned infrastructure.”

In addition to using ClickFix to initiate the attack chain, LeakNet is credited with using a Deno-based loader to execute Base64-encoded JavaScript directly in memory to minimize on-disk evidence and avoid detection. This payload is designed to fingerprint a compromised system, connect to an external server to retrieve the next stage of malware, and enter into a polling loop that repeatedly retrieves and executes additional code via Deno.

Separately, ReliaQuest announced that it also observed intrusion attempts in which threat actors used Microsoft Teams-based phishing to socially engineer users into launching payload chains, ultimately spawning similar Deno-based loaders. Although the cause of this activity remains unknown, the use of a BYOR (Bring Your Own Runtime) approach indicates an expansion of LeakNet’s initial access vector or that other threat actors have adopted this technique.

LeakNet’s post-breach activities follow a consistent methodology. That is, it begins by using DLL sideloading to launch a malicious DLL delivered via the loader, followed by lateral movement, data exfiltration, and encryption using PsExec.

“LeakNet runs cmd.exe /c klist, a built-in Windows command that displays active authentication credentials on a compromised system. This allows attackers to act faster and more cautiously by knowing which accounts and services are already accessible without requiring new credentials,” ReliaQuest said.

“For staging and exfiltration, LeakNet uses S3 buckets and leverages the appearance of regular cloud traffic to reduce the discovery footprint.”

The development comes after Google revealed that Qilin (aka Agenda), Akira (aka RedBike), Cl0p, Play, SafePay, INC Ransom, Lynx, RansomHub, DragonForce (aka FireFlame and FuryStorm), and Sinobi emerged as the top 10 ransomware brands with the most reported victims on data breach sites.

“In one-third of incidents, the first access path was a known or suspected exploit of a vulnerability, mostly in a common VPN or firewall,” Google Threat Intelligence Group (GTIG) said, adding that 77% of ransomware intrusions analyzed involved suspected data theft, up from 57% in 2024.

“Despite the continued disruption caused by adversary conflict and disruption, ransomware attackers remain highly motivated and the extortion ecosystem shows continued resilience. However, several indicators suggest that the overall profitability of these activities is declining, and that at least some threat actors are shifting their targeting calculations away from large enterprises and instead focusing on high-volume attacks against small organizations.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleToday’s Live Science: Starlink hits 10,000 satellites in orbit as Super El Nino approaches
Next Article World launches tool to verify the humans behind AI shopping agents

Related Posts

AI is everywhere, but CISOs are still protecting it with yesterday’s skills and tools, study finds

March 17, 2026

Konni introduced EndRAT through spear phishing and used KakaoTalk to spread malware

March 17, 2026

CISA reports that Wing FTP vulnerability that leaks server paths is being actively exploited

March 17, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

World launches tool to verify the humans behind AI shopping agents

LeakNet ransomware uses ClickFix and deploys Deno In-Memory Loader via hacked sites

Today’s Live Science: Starlink hits 10,000 satellites in orbit as Super El Nino approaches

CERN detects new particle at Large Hadron Collider

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.