Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. LeakNet Ransomware Weaponizes ClickFix and Deno Runtime for Stealthy Corporate Attacks
LeakNet Ransomware Weaponizes ClickFix and Deno Runtime for Stealthy Corporate Attacks
NEWS

LeakNet Ransomware Weaponizes ClickFix and Deno Runtime for Stealthy Corporate Attacks

The LeakNet ransomware gang is using ClickFix social engineering for initial access and a Deno-based malware loader to execute fileless payloads from...

Dylan H.

News Desk

March 17, 2026
6 min read

LeakNet Ransomware Gang Adopts ClickFix and Deno to Bypass Enterprise Defenses

The LeakNet ransomware group has significantly upgraded its attack methodology, now combining the ClickFix social engineering technique for initial access with a novel Deno JavaScript runtime-based malware loader that executes payloads entirely in memory — bypassing traditional antivirus and EDR solutions. The campaign was documented by security researchers and reported by BleepingComputer on March 17, 2026.

LeakNet, active since November 2024, operates as a double-extortion ransomware group — exfiltrating data before encrypting and threatening to publish stolen files on their Tor-based leak site. The group has claimed approximately 3 victims per month across healthcare, finance, manufacturing, and education sectors, with documented victims across the United States, Canada, Taiwan, Pakistan, and Switzerland.


Incident Details

AttributeValue
Threat ActorLeakNet
Active SinceNovember 2024
Initial AccessClickFix social engineering
Loader TechnologyDeno JavaScript/TypeScript runtime
Evasion TechniqueFileless execution; steganographic JPEG payloads
Post-ExploitationDLL sideloading, PsExec lateral movement, Kerberos ticket enumeration
C2 InfrastructureTor-based; unexpected S3 bucket exfiltration also observed
Operation ModelDouble extortion (encrypt + exfiltrate + leak)
Targeted SectorsHealthcare, Insurance, Manufacturing, Education, Finance, Energy, Logistics

How the Attack Works

Phase 1: ClickFix Initial Access

ClickFix is a social engineering technique in which victims are directed to attacker-controlled websites displaying fake browser error messages, CAPTCHA challenges, or technical problem prompts. The page instructs the user to copy-paste a command into the Windows Run dialog or PowerShell terminal to "fix" the displayed issue.

In LeakNet's variant, the ClickFix lure triggers execution of a command that downloads and installs the legitimate Deno runtime onto the victim machine. Because the user voluntarily executes the command themselves, browser-based security filters are bypassed.

Observable detection signal: Browser processes spawning msiexec — monitor for any instance where a browser (chrome.exe, msedge.exe, firefox.exe) invokes msiexec directly.

Phase 2: Deno-Based Fileless Loader

Rather than deploying a custom binary (which would be flagged by AV/EDR), LeakNet installs the legitimate, digitally-signed Deno runtime and uses it as a living-off-the-land binary (LOLBin) to execute malicious JavaScript payloads.

Loader behavior:

  1. Deno decodes and executes a malicious JavaScript payload directly into system memory — creating no on-disk artifacts
  2. The encrypted malware payload is concealed inside a JPEG image file using steganography
  3. The payload is decoded from the image and reflectively loaded into memory, bypassing file-scanning security tools
  4. Deno scripts follow a naming convention: PowerShell files named Romeo*.ps1, VBScript files named Juliet*.vbs

Phase 3: Post-Exploitation Chain

Once the Deno loader delivers the second-stage payload, LeakNet executes the following post-exploitation sequence:

TechniqueDetail
Host FingerprintingComputer name, GUID, public IP collected; unique victim ID generated
C2 BeaconingEncrypted C2 communication over Tor; persistent polling loop established
DLL Sideloadingjli.dll loaded via a Java process staged in C:\ProgramData\USOShared
Credential Discoveryklist executed to enumerate Kerberos tickets for lateral movement
Lateral MovementPsExec used to spread across the corporate network
Data ExfiltrationData uploaded to actor-controlled Tor infrastructure; unexpected S3 outbound traffic also observed

Impact Assessment

Impact AreaDescription
Data TheftExfiltration of corporate data before encryption — published in batches (1% first as proof)
EncryptionFile encryption follows exfiltration; double-extortion pressure applied
Detection EvasionFileless + steganographic loader significantly reduces AV/EDR detection rate
Lateral SpreadPsExec + Kerberos enumeration enables rapid domain-wide propagation
Sector RiskHealthcare and financial sector victims face regulatory exposure from data leaks

Indicators of Compromise

Tor Infrastructure:

PurposeOnion Address
Primary data leak sitenleakk6sejx45jxtk7x6iyt65hwvfrkifc5v7ertdlwm3gttbpvlvxqd.onion
File server 1ahic5qo3qbjgsyv7x2h5w7uh6nuh45km5srblj7i2amxt57xp4wud2qd.onion
File server 2bnlluetsuf6pv7mchgue46h43v66uxtccpg3n5vcdzbeqften5cedlid.onion

Behavioral IOCs:

  • deno.exe executing outside known development environments
  • Browser processes spawning msiexec
  • jli.dll sideloaded via Java from C:\ProgramData\USOShared
  • klist execution in unusual process context
  • PsExec usage without matching change management records
  • Unexpected outbound connections to S3 buckets
  • PowerShell scripts matching Romeo*.ps1 / VBScript matching Juliet*.vbs

Detection and Response Recommendations

For Security Operations Teams

  1. Alert on Deno outside dev environments — deno.exe has no legitimate business use on corporate endpoints; any execution should trigger immediate investigation
  2. Monitor browser-to-msiexec process chains — this is a reliable ClickFix detection signal
  3. Hunt for jli.dll sideloading — specifically in C:\ProgramData\USOShared and other non-standard directories
  4. Alert on klist execution — Kerberos ticket enumeration outside normal IT admin workflows is a lateral movement precursor
  5. Baseline and alert on PsExec usage — any PsExec invocation without a correlated change record warrants immediate review
  6. Monitor S3 outbound traffic — unexpected data transfers to S3 endpoints are an exfiltration signal

For IT Administrators

  1. User awareness training — ClickFix relies entirely on users executing commands they paste from websites; train users to never run copy-pasted commands from browser prompts
  2. Application whitelisting — block Deno from executing on endpoints where it is not an approved application
  3. Script block logging — enable PowerShell ScriptBlock logging to capture Romeo*.ps1 execution
  4. Privileged access workstations — limit PsExec availability to dedicated admin workstations
  5. Network segmentation — limit east-west movement capabilities to contain post-compromise lateral spread

Key Takeaways

  1. LeakNet is a double-extortion ransomware group active since November 2024, now significantly increasing its technical sophistication with ClickFix + Deno-based fileless attacks
  2. ClickFix remains one of the most effective initial access techniques because it weaponizes user trust and bypasses browser-based security by having the victim execute the command themselves
  3. The use of the legitimate Deno runtime as a LOLBin combined with steganographic JPEG payloads represents a deliberate effort to evade both signature-based and behavioral detection
  4. deno.exe executing on a corporate endpoint should be treated as a high-confidence indicator of compromise unless explicitly authorized
  5. The group's Tor-based infrastructure and dual-exfiltration model (Tor + S3) makes C2 blocking difficult without comprehensive egress filtering
  6. Organizations in healthcare, finance, and insurance face the highest risk given LeakNet's documented victim selection pattern and the regulatory implications of data exfiltration in these sectors

Sources

  • LeakNet ransomware uses ClickFix, Deno runtime in stealthy attacks — BleepingComputer
  • CastleRAT: First attack to abuse Deno JavaScript runtime — ThreatDown/Malwarebytes
  • LeakNet Ransomware Tracker — WatchGuard
  • LeakNet group profile — RansomLook
#Ransomware#Malware#ClickFix#Threat Intelligence#Cybercrime

Related Articles

Termite Ransomware Operator Velvet Tempest Chains ClickFix

Microsoft-tracked threat actor Velvet Tempest is deploying Termite ransomware via a ClickFix social-engineering chain that loads DonutLoader and installs...

6 min read

The Rise of Ransomware-as-a-Service: 14 Active Platforms

Security researchers identify 14 active RaaS platforms operating sophisticated affiliate programs, with entry costs as low as $40 per month lowering the...

4 min read

Ransomware Attacks Surge in Early 2026 with 26 Claims in

Threat intelligence reports show 8 active ransomware groups claimed 26 victims on February 2nd alone, with major corporations including BASF and Honeywell...

4 min read
Back to all News