LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader
嗯,用户让我帮忙总结一篇文章的内容,控制在一百个字以内,而且不需要特定的开头。首先,我需要仔细阅读文章,理解其主要内容和关键点。 这篇文章讲的是一个名为LeakNet的勒索软件组织,他们采用了ClickFix的社会工程策略,通过被入侵的网站作为初始入侵手段。ClickFix是一种让用户手动运行恶意命令来解决并不存在的错误的方法,这与传统的通过被盗凭证获取初始访问权限的方法不同。此外,LeakNet还使用了基于Deno JavaScript运行时的分阶段命令控制加载器,在内存中直接执行恶意负载,以减少磁盘上的证据并逃避检测。 文章还提到LeakNet首次出现于2024年11月,并声称自己是“数字 watchdog”,专注于互联网自由和透明度。他们利用合法但被入侵的网站来提供虚假的CAPTCHA验证检查,诱使用户运行恶意命令。这种方法的优势在于减少了对第三方供应商的依赖,降低了每名受害者的获取成本,并消除了等待有价值账户进入市场的操作瓶颈。 此外,LeakNet在入侵后的行为遵循一致的方法论:使用DLL侧加载启动恶意DLL、横向移动、数据外泄和加密。他们还利用Windows命令来显示活动的身份验证凭据,以便更快地移动而不必请求新凭据。在阶段和外泄方面,他们使用S3桶来掩盖其检测足迹。 最后,文章指出随着越来越多的威胁行为者采用ClickFix策略,LeakNet的这一做法标志着其初始访问能力的首次扩展和战略转变。他们通过合法但被入侵的网站进行攻击,减少了网络层上的明显信号。 总结一下,文章主要讲述了LeakNet如何利用ClickFix策略和分阶段C2加载器进行勒索软件攻击,并分析了他们的战术变化及其对防御者的影响。 </think> 这篇文章描述了勒索软件组织LeakNet采用ClickFix社会工程策略通过被入侵网站进行初始攻击,并利用基于Deno的分阶段C2加载器在内存中执行恶意负载以规避检测。该方法减少了对第三方依赖并降低了成本。 2026-3-17 14:34:0 Author: thehackernews.com(查看原文) 阅读量:8 收藏

LeakNet Ransomware

The ransomware operation known as LeakNet has adopted the ClickFix social engineering tactic delivered through compromised websites as an initial access method.

The use of ClickFix, where users are tricked into manually running malicious commands to address non-existent errors, is a departure from relying on traditional methods for obtaining initial access, such as through stolen credentials acquired from initial access brokers (IABs), ReliaQuest said in a technical report published today.

The second important aspect of these attacks is the use of a staged command-and-control (C2) loader built on the Deno JavaScript runtime to execute malicious payloads directly in memory.

"The key takeaway here is that both entry paths lead to the same repeatable post-exploitation sequence every time," the cybersecurity company said. "That gives defenders something concrete to work with: known behaviors you can detect and disrupt at each stage, well before ransomware deployment, regardless of how LeakNet got in."

LeakNet first emerged in November 2024, describing itself as a "digital watchdog" and framing its activities as focused on internet freedom and transparency. According to data captured by Dragos, the group has also targeted industrial entities.

The use of ClickFix to breach victims offers several advantages, the most significant being that it reduces dependence on third-party suppliers, lowers per-victim acquisition cost, and removes the operational bottleneck of waiting for valuable accounts to hit the market.

In these attacks, the legitimate-but-compromised sites are used to serve fake CAPTCHA verification checks that instruct users to copy and paste a "msiexec.exe" command to the Windows Run dialog. The attacks are not confined to a specific industry vertical, instead casting a wide net to infect as many victims as possible. 

The development comes as more threat actors are adopting the ClickFix playbook, as it abuses trusted, everyday workflows to entice users into running rogue commands via legitimate Windows tooling in a manner that feels routine and safe.

"LeakNet's adoption of ClickFix marks both the first documented expansion of the group’s initial access capability and a meaningful strategic shift," ReliaQuest said.

"By moving away from IABs, LeakNet removes a dependency that naturally constrained how quickly and broadly it could operate. And because ClickFix is delivered through legitimate—but compromised—websites, it doesn’t present the same obvious signals at the network layer as attacker-owned infrastructure."

Besides the use of ClickFix to initiate the attack chain, LeakNet is assessed to be using a Deno-based loader to execute Base64-encoded JavaScript directly in memory so as to minimize on-disk evidence and evade detection. The payload is designed to fingerprint the compromised system, contact an external server to fetch next-stage malware, and enter into a polling loop that repeatedly fetches and executes additional code through Deno.

Separately, ReliaQuest said it also observed an intrusion attempt in which threat actors used Microsoft Teams-based phishing to socially engineer a user into launching a payload chain that ended in a similar Deno-based loader. While the activity remains unattributed, the use of the bring your own runtime (BYOR) approach either signals a broadening of LeakNet's initial access vectors, or that other threat actors have adopted the technique.

LeakNet's post-compromise activity follows a consistent methodology: it starts with the use of DLL side-loading to launch a malicious DLL delivered via the loader, followed by lateral movement using PsExec, data exfiltration, and encryption.

"LeakNet runs cmd.exe /c klist, a built-in Windows command that displays active authentication credentials on the compromised system. This tells the attacker which accounts and services are already reachable without the need for requesting new credentials, so they can move faster and more deliberately," ReliaQuest said.

"For staging and exfiltration, LeakNet uses S3 buckets, exploiting the appearance of normal cloud traffic to reduce its detection footprint."

The development comes as Google revealed that Qilin (aka Agenda), Akira (aka RedBike), Cl0p, Play, SafePay, INC Ransom, Lynx, RansomHub, DragonForce (aka FireFlame and FuryStorm), and Sinobi emerged as the top 10 ransomware brands with the most victims claimed on their data leak sites.

"In a third of incidents, the initial access vector was confirmed or suspected exploitation of vulnerabilities, most often in common VPNs and firewalls," Google Threat Intelligence Group (GTIG) said, adding 77% of analyzed ransomware intrusions included suspected data theft, an increase from 57% in 2024.

"Despite ongoing turmoil caused by actor conflicts and disruption, ransomware actors remain highly motivated and the extortion ecosystem demonstrates continued resilience. Several indicators suggest the overall profitability of these operations is, however, declining, and at least some threat actors are shifting their targeting calculus away from large companies to instead focus on higher volume attacks against smaller organizations."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/leaknet-ransomware-uses-clickfix-via.html
如有侵权请联系:admin#unsafe.sh