Security
Uncovering the Tactics of LeakNet Ransomware: ClickFix and Deno Runtime Exploits Revealed
The Rise of LeakNet Ransomware: ClickFix Technique and Deno Runtime
In the realm of cyber threats, the LeakNet ransomware gang has adopted a stealthy approach using the ClickFix technique for infiltrating corporate networks. This sophisticated group now leverages a malware loader built on the open-source Deno runtime, designed for JavaScript and TypeScript.
By utilizing the ClickFix method, attackers trick unsuspecting users into unwittingly executing malicious commands on their systems through deceptive prompts. This technique, commonly employed by various ransomware groups like Termite and Interlock, has now found its way into LeakNet’s arsenal.
LeakNet’s implementation of ClickFix leads to the deployment of a Deno-based loader, enabling the execution of a JavaScript payload directly in system memory. This strategic move minimizes forensic evidence stored on disk, thereby reducing the likelihood of detection.
The Evolution of LeakNet
LeakNet emerged as a ransomware threat actor in late 2024, targeting an average of three victims per month. With the adoption of these new tactics, their operation may expand, posing a greater threat to organizations.
The “Bring Your Own Runtime” Attack
Described as a “bring your own runtime” (BYOR) attack by cybersecurity experts at ReliaQuest, LeakNet’s use of Deno represents a unique strategy. Deno, a legitimate JavaScript/TypeScript runtime, allows for code execution outside the browser on a system. This approach bypasses blocklists and filters designed to prevent unknown binary execution, making it a challenging threat to detect.
Instead of deploying a custom malware loader that could raise red flags, LeakNet leverages the legitimate Deno executable to run malicious code. The attackers initiate this process through Visual Basic Script (VBS) and PowerShell scripts, cleverly named Romeo*.ps1 and Juliet*.vbs.
The use of Deno for direct in-memory execution is crucial, as it leaves minimal forensic artifacts behind, resembling a routine developer task rather than a malicious activity.
Post-Exploitation Tactics
Following the execution of the code, LeakNet engages in various post-exploitation techniques, including DLL sideloading, C2 beaconing, credential discovery, lateral movement via PsExec, and payload staging. These tactics involve sophisticated methods like data exfiltration through abusing Amazon S3 buckets.
The researchers emphasize that the consistent and repeatable nature of LeakNet’s attack chain provides valuable detection opportunities for defenders. Signs of potential LeakNet activity include Deno running outside development environments, suspicious browser executions, abnormal PsExec usage, unexpected outbound traffic to S3, and DLL sideloading in atypical directories.
Stay Informed: The Red Report 2026
Maintaining cybersecurity vigilance is crucial in the face of evolving threats. The Red Report 2026 sheds light on new malware techniques that utilize mathematical algorithms to evade detection and operate covertly.
Unlock insights from the analysis of 1.1 million malicious samples, uncover the top 10 techniques, and assess the effectiveness of your security measures.
-
Facebook5 months agoEU Takes Action Against Instagram and Facebook for Violating Illegal Content Rules
-
Facebook5 months agoWarning: Facebook Creators Face Monetization Loss for Stealing and Reposting Videos
-
Facebook5 months agoFacebook Compliance: ICE-tracking Page Removed After US Government Intervention
-
Facebook3 months agoFacebook’s New Look: A Blend of Instagram’s Style
-
Facebook5 months agoInstaDub: Meta’s AI Translation Tool for Instagram Videos
-
Facebook3 months agoFacebook and Instagram to Reduce Personalized Ads for European Users
-
Facebook3 months agoReclaim Your Account: Facebook and Instagram Launch New Hub for Account Recovery
-
Apple5 months agoMeta discontinues Messenger apps for Windows and macOS

