LeakNet Changes Tactics, But Consistency Gives Defenders an Advantage
嗯,用户让我用中文总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述。首先,我需要仔细阅读这篇文章,理解其主要内容。 文章主要讲的是勒索软件团伙LeakNet在扩大规模并改变策略。他们引入了新的初始访问路径和加载技术,比如ClickFix诱饵和Deno基的内存加载器。这些技术让传统的安全工具难以检测。LeakNet的攻击步骤包括执行、横向移动和载荷部署,这些步骤具有高度一致性,使得防御者可以针对这些行为进行检测和干扰。 接下来,我需要将这些关键点浓缩到100字以内。要确保涵盖LeakNet的新策略、技术以及防御建议。同时,语言要简洁明了,避免复杂的句子结构。 可能的结构是:先点明LeakNet的变化,然后说明他们使用的新技术和攻击步骤,最后提到防御措施。这样逻辑清晰,内容全面。 现在开始组织语言:“勒索软件团伙LeakNet扩大规模并改变策略,采用ClickFix诱饵和Deno基内存加载器等新技术。攻击步骤包括执行、横向移动和载荷部署,具有一致性。防御者可据此检测并干扰攻击。” 这样大约90字左右,符合要求。 检查一下是否遗漏了关键点:新技术、攻击步骤的一致性、防御建议。看起来都涵盖了。好的,这样应该能满足用户的需求。 </think> 勒索软件团伙LeakNet扩大规模并改变策略,采用ClickFix诱饵和Deno基内存加载器等新技术。攻击步骤包括执行、横向移动和载荷部署,具有一致性。防御者可据此检测并干扰攻击。 2026-4-1 06:0:8 Author: securityboulevard.com(查看原文) 阅读量:5 收藏

Ransomware operator LeakNet is going large. Well, they’re scaling up, and at the same time, they’re changing tactics.  

Among the techniques introduced are a new initial access path and a new loader technique, according to an analysis by ReliaQuest. 

“‘ClickFix’ lures hosted on compromised websites and a Deno-based, in-memory loader that most security tools won’t catch. No matter how it gets in, LeakNet then follows the same post-exploitation steps: Execution, lateral movement, and payload staging,” ReliaQuest’s analysis found.  

The researchers pointed to two key developments—the first being their high confidence that LeakNet is using the ClickFix social engineering technique, with fake error prompts to convince users to manually run malicious commands through legitimate but compromised websites. That’s a departure from the operator’s previous use of initial access brokers (IABs) to grab stolen credentials. Instead, the group is shifting toward running its own campaigns directly, the researchers said.  

They also found that the group is using a staged, stealthy Deno-based command-and-control (C2) loader built on a JavaScript/TypeScript runtime, which is similar to Node.js. The Deno loader executes payloads primarily in memory, the researchers noted. 

“The key takeaway here is that both entry paths lead to the same repeatable post-exploitation sequence every time,” the analysis showed. 

That’s good news for defenders, the researchers say, because it gives them “something concrete to work with: known behaviors you can detect and disrupt at each stage, well before ransomware deployment, regardless of how LeakNet got in.” 

This operational consistency “makes the group’s behavior predictable—and if you recognize the sequence, you can disrupt it even when the entry point changes,” the report said. “Because the same tools and techniques show up across every incident, a handful of well-placed behavioral detections can cover the entire known attack surface.” 

The evolution of LeakNet “underscores a broader, concerning shift toward sophisticated evasion techniques that co-opt legitimate infrastructure,” says Jason Soroko, senior fellow at Sectigo.  

Organizations, Soroko says, “must recognize that LeakNet is bypassing traditional security perimeters by adopting a ‘bring your own runtime’ (BYOR) strategy.” 

What is being seen “with LeakNet is an evolution of trends that have been building for several years, now combined into a more efficient and scalable model,” says Shane Barney, CISO at Keeper Security.  

“The shift away from relying on initial access brokers toward generating access through techniques like ClickFix expands the potential victim pool and removes a traditional constraint on ransomware operations,” says Barney. “At the same time, the use of legitimate runtimes and in-memory execution reflects a continued move toward blending into normal system activity rather than introducing clearly malicious tools.” 

The deployment of “a legitimate Deno executable to run a base-64 encoded payload which works in-memory, and coupling this with deceptive ‘ClickFix’ lures hosted on compromised but otherwise trusted websites” neutralizes standard file-based detection mechanisms, Soroko says.  

“The insight from this analysis is not the novelty of the initial access vector, but how much the adversary stuck to their subsequent playbook—regardless of how the perimeter is breached, the attack funnels into the same post-exploitation sequence every time,” says Soroko. 

Since LeakNet “is shortening the path from initial access to lateral movement by relying less on IABs and running its own ClickFix lures,” ReliaQuest recommends organizations take actions that focus on preventing initial access and lateral movement, such as: 

Blocking Newly Registered Domains: C2 domains spun up associated with this campaign are usually only a few weeks old. Newly registered domains are rarely needed for business operations and have a big effect on making it harder for threat actors to spin up new infrastructure.  

Blocking users from using Win-R: Regular non-technical users should not have access to run Win-R on their Windows Workstation.  

Preventing PsExec from unauthorized users: Regular non-technical users should not have access to run PsExec. Create a Group Policy Object (GPO) to block its use and only allow authorized admins.  

While none of the elements “are new on their own,” says Barney, “what stands out is the consistency. Regardless of how access is gained, the same post-compromise pattern appears, which gives defenders something concrete to detect and disrupt.” 

He says that the findings reinforce the need for security teams “to operate from an assumption of breach and build controls that limit what an attacker can do once access is established.” 

Prevention, in this context, he explains, “is about reducing freedom of movement. That means restricting access to administrative tools, enforcing least-privilege by default and ensuring elevated access is time-bound and tightly controlled. If an attacker can’t execute freely, move laterally or reach additional systems, the attack breaks down before it reaches impact.” 

Barney recommends defenders prioritize “making sure access is appropriate, limited and consistently enforced,” noting that “when access is over-permissioned or broadly available, attackers inherit that same reach” but “when it’s constrained and controlled, their ability to progress is significantly reduced.” 

Recent Articles By Author


文章来源: https://securityboulevard.com/2026/04/leaknet-changes-tactics-but-consistency-gives-defenders-an-advantage/
如有侵权请联系:admin#unsafe.sh