CyberSecurity SEE

LeakNet Ransomware Employs ClickFix Through Compromised Sites and Implements Deno In-Memory Loader

LeakNet Ransomware Employs ClickFix Through Compromised Sites and Implements Deno In-Memory Loader

Certainly! Below is a rewritten version of the provided article in the third person, and it’s expanded to over 500 words while maintaining the original context.


The cybercrime landscape continues to evolve, as evidenced by the emergence of the ransomware operation known as LeakNet. This group has recently incorporated the ClickFix social engineering tactic, utilizing compromised websites as a primary access method to infiltrate victim systems. Traditional initial access methods typically involve acquiring stolen credentials through Initial Access Brokers (IABs), but LeakNet’s latest strategy marks a significant departure from these conventional approaches. This information was detailed in a technical report released by ReliaQuest, a renowned cybersecurity company.

In this new tactic, the ClickFix method deceives users into executing harmful commands by masquerading as solutions to non-existent system errors. The cybersecurity company highlighted that this strategy not only reduces reliance on third-party suppliers but also minimizes the acquisition costs associated with each victim. This evolution in approach also alleviates the operational bottleneck caused by waiting for valuable stolen accounts to become available in the cybercrime market.

Further complicating matters, LeakNet has deployed a command-and-control (C2) loader that leverages the Deno JavaScript runtime. This loader allows for the execution of malicious payloads directly in the system’s memory, bypassing traditional detection methods that scan for files written to the disk. By implementing this, LeakNet establishes a systematic post-exploitation sequence that remains consistent, regardless of how the attacker gains initial access. As ReliaQuest pointed out, defenders now have concrete behaviors to monitor and disrupt before the ransomware is deployed, creating a strategic advantage in the ongoing battle against cyber threats.

LeakNet first made its presence felt in November 2024, branding itself as a “digital watchdog” focused on promoting internet freedom and transparency. However, it has since been linked to attacks on various industrial entities, marking a substantial shift in its operational methodology. The group has cast a wide net, targeting a diverse array of victims across multiple industries, which amplifies the potential damage and impact of its attacks.

The ClickFix approach leverages legitimate websites that have been compromised to deliver false CAPTCHA verifications. Victims of these cyberattacks are often instructed to copy and paste a "msiexec.exe" command directly into their Windows Run dialog. By utilizing this method, LeakNet can execute its malicious payloads in a manner that appears routine and safe to unsuspecting users, thus increasing the likelihood of successful infiltration.

Particularly alarming is that as more threat actors adopt this ClickFix playbook, it emphasizes a broader trend in cybersecurity where everyday workflows are exploited to trick users into executing harmful commands. The implications are severe, as it suggests that even technologically savvy individuals can fall victim to these disguised attacks.

This strategic shift by LeakNet also represents a notable expansion of its initial access capabilities. By eliminating the dependency on IABs, the group has increased its operational speed and breadth. The use of compromised legitimate websites allows LeakNet to obfuscate its activities, presenting fewer signals at the network layer compared to attacks conducted via infrastructure owned by the criminals themselves.

Additionally, there are indications that LeakNet employs a Deno-based loader for executing Base64-encoded JavaScript directly in memory. This advanced method minimizes on-disk evidence, making it more challenging for cybersecurity professionals to detect and neutralize the threat. The payload not only fingerprints the compromised system but also contacts external servers to retrieve subsequent malware, ensuring the attacker’s foothold within the system is well-established.

Separate from LeakNet’s tactics, ReliaQuest recently identified an intrusion attempt using Microsoft Teams to phish a user into initiating a payload chain, which concluded with a similar Deno-based loader. While these activities remain unattributed, the expanding use of bring-your-own-runtime (BYOR) strategies suggests either a widening of LeakNet’s initial access channels or a general trend among various cybercriminal groups adopting such techniques.

Post-compromise, LeakNet adheres to a consistent methodology: executing DLL side-loading to launch malicious code, conducting lateral movement via PsExec, and engaging in data exfiltration and encryption. The group notably runs a command to display active authentication credentials on compromised systems, thereby expanding its reach without needing to request new credentials, enabling faster and more calculated movements across networks.

Moreover, it has been reported that LeakNet utilizes Amazon S3 buckets for staging and exfiltration, which cleverly disguises its activities within normal cloud traffic patterns, further diminishing detection chances.

In the broader ransomware landscape, threats have continued to proliferate, with numerous groups including Qilin, Akira, Cl0p, and others emerging as key players. Recent data from Google suggests that one-third of ransomware incidents involved exploitation of vulnerabilities, predominantly found in commonly used VPNs and firewall systems. The trend also indicates an increase in suspected data theft, implying that ransomware actors are not only increasing in number but also becoming more sophisticated in their methods and targets.

Despite ongoing turmoil in the cybercriminal world, the resilience of ransomware operations underscores an unsettling reality: these actors remain motivated and capable, adapting their strategies to maintain profitability in an ever-changing environment.


This rewritten piece expands upon the original content, providing additional context and detail while maintaining the integrity of the information presented.

Source link

Exit mobile version