LeakNet ransomware uses ClickFix and Deno runtime for stealthy attacks
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户的要求是直接写文章描述,不需要开头语。首先,我得仔细阅读文章内容,抓住主要信息。 文章讲的是LeakNet勒索软件团伙使用ClickFix技术进行初始访问,并利用基于Deno运行时的恶意软件加载器。Deno是一个开源的JavaScript和TypeScript运行时,合法且签名,因此能绕过安全检测。攻击者通过VBS和PowerShell脚本启动Deno,执行内存中的恶意代码,减少 forensic证据。此外,LeakNet还使用DLL侧载、C2信标、凭证发现、横向移动和数据外泄等技术。 接下来,我需要将这些信息浓缩到100字以内。重点包括:LeakNet使用ClickFix和社会工程学攻击;利用合法的Deno运行时执行恶意代码;绕过安全检测;以及后续的攻击技术如DLL侧载等。 现在组织语言:LeakNet利用ClickFix和社会工程学攻击企业环境,使用合法的Deno运行时执行恶意代码,绕过检测,并采用DLL侧载等技术进行后续攻击。 检查字数是否在限制内,并确保信息准确无误。 </think> LeakNet 勒索软件团伙利用 ClickFix 技术和社会工程学攻击企业环境,并通过合法的 Deno 运行时执行恶意代码以绕过检测。该团伙采用 DLL 侧载、C2 信标和数据外泄等技术进一步攻击目标。 2026-3-17 12:15:16 Author: www.bleepingcomputer.com(查看原文) 阅读量:11 收藏

LeakNet ransomware uses ClickFix, Deno runtime in stealthy attacks

The LeakNet ransomware gang is now using the ClickFix technique for initial access into corporate environments and deploys a malware loader based on the open-source Deno runtime for JavaScript and TypeScript.

The attacker is using the legitimate Deno to decode and execute a malicious payload directly into system memory, minimizing forensic evidence on the disk and lowering the chance of detection.

LeakNet is a relatively recent ransomware threat actor that has been active since the end of 2024. The actor averages around three victims every month, but the operation may expand with the adoption of the new tactics.

ClickFix is a widely used social engineering attack that tricks users into running malicious commands on their systems through fake prompts. The technique has been adopted by multiple ransomware groups, like Termite and Interlock.

In LeakNet’s case, the ClickFix lure leads to deploying a Deno-based loader that executes a JavaScript payload in system memory.

ClickFix lure used by LeakNet
ClickFix lure used by LeakNet
Source: ReliaQuest

ReliaQuest calls this tactic a “bring your own runtime” (BYOR) attack, as Deno is a legitimate JavaScript/TypeScript runtime that allows JS/TS code execution outside the browser on a system.

Deno is signed and legitimate, so it bypasses blocklists and filters for unknown binary execution.

“Rather than deploying a custom malware loader that’s more likely to get flagged, the attackers install the legitimate Deno executable and use it to run malicious code,” explains ReliaQuest.

“In observed activity, that process was initiated through Visual Basic Script (VBS) and PowerShell scripts, cleverly named Romeo*.ps1 and Juliet*.vbs.”

The use of Deno for direct in-memory execution is key, as the activity leaves minimal forensic artifacts behind and appears as a normal developer task.

Once executed, the code fingerprints the host, generates a unique victim ID, and connects to the command-and-control (C2) to pull the second-stage payload. At the same time, it runs a persistent polling loop to receive new commands from the C2.

In the post-exploitation phase, LeakNet uses DLL sideloading (jli.dll loaded via Java in C:\ProgramData\USOShared), C2 beaconing, credential discovery via ‘klist’ enumeration, lateral movement via PsExec, and payload staging and data exfiltration that involves abusing Amazon S3 buckets.

LeakNet attack paths
LeakNet attack paths
Source: ReliaQuest

The researchers underline that the consistency and repeatability of the attack chain provide detection opportunities for defenders.

Strong signs of potential LeakNet activity include Deno running outside development environments, suspicious ‘misexec’ execution from browsers, abnormal PsExec usage, unexpected outbound traffic to S3, and DLL sideloading in unusual directories.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/leaknet-ransomware-uses-clickfix-and-deno-runtime-for-stealthy-attacks/
如有侵权请联系:admin#unsafe.sh