Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Casting a Wider Net: Scaling Threat

0
Medium
Published: Wed Mar 18 2026 (03/18/2026, 10:53:13 UTC)
Source: AlienVault OTX General

Description

LeakNet, a ransomware operator, has expanded its initial access methods by utilizing ClickFix lures on compromised websites and implementing a new Deno-based, in-memory loader. The group has shifted from relying on initial access brokers to running its own campaigns. LeakNet's post-exploitation playbook remains consistent, involving jli.dll side-loading, PsExec-based lateral movement, and S3 bucket payload staging. The Deno loader executes base64-encoded payloads in memory, making detection challenging for traditional security tools. Defenders are advised to focus on behavioral signals and implement measures such as blocking newly registered domains, restricting Win-R access, and limiting PsExec usage to authorized administrators.

AI-Powered Analysis

AILast updated: 03/18/2026, 11:27:48 UTC

Technical Analysis

LeakNet, a ransomware group, has evolved its intrusion tactics by expanding initial access vectors and enhancing payload delivery mechanisms. Previously dependent on initial access brokers, LeakNet now runs its own campaigns, increasing operational control and scale. The group uses ClickFix lures hosted on compromised websites to socially engineer victims into initiating infection. A key technical advancement is the deployment of a Deno-based in-memory loader that executes base64-encoded payloads directly in memory, bypassing disk-based detection and complicating traditional signature-based defenses. Post-compromise, LeakNet employs jli.dll side-loading, a technique where a legitimate Windows utility is tricked into loading a malicious DLL, facilitating stealthy code execution. For lateral movement, the group leverages PsExec, a legitimate Windows tool, to propagate within networks. Payloads are staged on Amazon S3 buckets, enabling flexible and resilient command and control infrastructure. The campaign’s indicators include a set of suspicious IP addresses and domains associated with the infrastructure. The combination of social engineering, in-memory execution, side-loading, and legitimate tool abuse reflects a sophisticated and evasive ransomware operation. Defenders are challenged by the stealthy nature of the Deno loader and the use of legitimate administrative tools, necessitating a focus on behavioral detection and strict access controls.

Potential Impact

Organizations worldwide face increased risk of ransomware infection that can lead to data encryption, operational disruption, and potential data exfiltration. The use of in-memory execution and side-loading techniques reduces the likelihood of detection by traditional antivirus and endpoint detection systems, increasing dwell time and potential damage. Lateral movement via PsExec allows attackers to spread rapidly across networks, potentially compromising multiple systems and critical infrastructure. Staging payloads on cloud storage like S3 buckets enhances the attackers’ resilience and complicates takedown efforts. The shift from initial access brokers to self-run campaigns indicates LeakNet’s growing capabilities and potential for more frequent and widespread attacks. Industries with high-value data or critical operations, such as healthcare, finance, and manufacturing, are particularly vulnerable. The campaign’s reliance on social engineering and compromised websites means organizations with less mature security awareness programs and web defenses are at greater risk. Overall, the threat can cause significant financial loss, reputational damage, and operational downtime.

Mitigation Recommendations

1. Implement advanced behavioral monitoring to detect anomalous in-memory execution and side-loading activities, focusing on processes like jli.dll and Deno runtime usage. 2. Block or closely monitor access to newly registered domains and suspicious IP addresses linked to the campaign. 3. Restrict and audit the use of PsExec and other administrative tools, limiting execution to authorized administrators only. 4. Disable or tightly control Windows Remote Management (Win-R) access to reduce lateral movement opportunities. 5. Employ network segmentation to contain potential lateral movement within internal networks. 6. Harden web infrastructure to prevent compromise and monitor for unauthorized changes or malicious lures like ClickFix. 7. Use endpoint detection and response (EDR) solutions capable of detecting in-memory payload execution and DLL side-loading techniques. 8. Conduct regular user awareness training emphasizing the risks of social engineering and suspicious links. 9. Monitor cloud storage access patterns, especially for S3 buckets, to detect unusual payload staging or data exfiltration activities. 10. Maintain up-to-date backups and test recovery procedures to mitigate ransomware impact.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://reliaquest.com/blog/threat-spotlight-casting-a-wider-net-clickfix-deno-and-leaknets-scaling-threat"]
Adversary
LeakNet
Pulse Id
69ba8419321e1d3c9be7c4cc
Threat Score
null

Indicators of Compromise

Ip

ValueDescriptionCopy
ip144.31.2.161
ip144.31.224.98
ip144.31.54.243
ip194.31.223.42
ip87.121.79.25

Domain

ValueDescriptionCopy
domainapiclofront.com
domaincnoocim.com
domaincrahdhduf.com
domaindelhedghogeggs.com
domainmshealthmetrics.com
domainneremedysoft.com
domainokobojirent.com
domainsendtokenscf.com
domainserialmenot.com
domainverify-safeguard.top
domainwindowallclean.com
domaintools.usersway.net

Threat ID: 69ba88a2771bdb17497e4f69

Added to database: 3/18/2026, 11:12:34 AM

Last enriched: 3/18/2026, 11:27:48 AM

Last updated: 3/19/2026, 3:39:34 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses