The ransomware group LeakNet is expanding operations by developing its own infection and execution infrastructure, reducing reliance on initial access brokers. key innovation in its recent campaigns is the use of ClickFix social engineering lures hosted on compromised legitimate websites. These lures trick unsuspecting users into executing malicious commands often via Windows Run (Win+R) under guise of fake verification prompts such as CAPTCHA or browser security checks. Once executed, these commands typically invoke msiexec to download and launch a payload from attacker-controlled infrastructure. This approach allows LeakNet to broaden its victim pool significantly, any user browsing compromised websites can become an entry point without targeted phishing or prior compromise. A second major advancement is deployment of a stealthy loader built on Deno, which operates using a bring-your-own-runtime (BYOR) technique. Instead of dropping traditional malware files on disk, the loader executes base64-encoded JavaScript or TypeScript directly in memory via data URLs, leaving minimal forensic artifacts. Initial scripts often disguised as benign files like PowerShell or VBS scripts initiate the infection chain. Once active, Deno process collects system information such as hostname, username, OS version, and memory, generating a unique identifier for each victim. It then communicates with command-and-control (C2) servers, dynamically selects endpoints, and continuously fetches additional payloads. Because Deno is a legitimate, signed runtime commonly used by developers, it can bypass application allowlists, making detection dependent on behavioral anomalies rather than file signatures. Despite evolving entry techniques, LeakNet maintains a consistent post-exploitation workflow that offers defenders opportunities for detection. The group uses DLL sideloading placing a malicious jli.dll alongside legitimate Java binaries to establish persistence and evade suspicion. It then conducts reconnaissance using commands like “klist” to enumerate Kerberos tickets and leverages tools such as PsExec for lateral movement across networks. Data staging and exfiltration are carried out via cloud storage services like Amazon S3, blending malicious traffic with legitimate enterprise activity. Given this reliance on trusted tools and services, organizations must prioritize behavioral detection strategies, including monitoring unusual msiexec executions, suspicious use of Deno outside development environments, abnormal PsExec activity, and unexpected outbound connections to cloud storage. Strengthening endpoint controls and restricting risky user actions can significantly reduce exposure to such advanced ransomware campaigns.
Authorities recently dismantled a massive IoT-based botnet responsible for launching record-breaking distributed denial-of-service (DDoS) attacks reaching up to 30 Tbps. The operat...
Cisco firewall appliances are actively being targeted through critical zero-day vulnerabilities that enable unauthenticated attackers to gain full control over affected systems. Th...
Security researchers have identified a malicious campaign targeting developers through a compromised extension distributed via the Open VSX Registry. Disguised as a GitHub download...