Casting a Wider Net: Scaling Threat
LeakNet, a ransomware operator, has expanded its initial access methods by utilizing ClickFix lures on compromised websites and implementing a new Deno-based, in-memory loader. The group has shifted from relying on initial access brokers to running its own campaigns. LeakNet's post-exploitation playbook remains consistent, involving jli.dll side-loading, PsExec-based lateral movement, and S3 bucket payload staging. The Deno loader executes base64-encoded payloads in memory, making detection challenging for traditional security tools. Defenders are advised to focus on behavioral signals and implement measures such as blocking newly registered domains, restricting Win-R access, and limiting PsExec usage to authorized administrators.
AI Analysis
Technical Summary
LeakNet, a ransomware group, has evolved its intrusion tactics by expanding initial access vectors and enhancing payload delivery mechanisms. Previously dependent on initial access brokers, LeakNet now runs its own campaigns, increasing operational control and scale. The group uses ClickFix lures hosted on compromised websites to socially engineer victims into initiating infection. A key technical advancement is the deployment of a Deno-based in-memory loader that executes base64-encoded payloads directly in memory, bypassing disk-based detection and complicating traditional signature-based defenses. Post-compromise, LeakNet employs jli.dll side-loading, a technique where a legitimate Windows utility is tricked into loading a malicious DLL, facilitating stealthy code execution. For lateral movement, the group leverages PsExec, a legitimate Windows tool, to propagate within networks. Payloads are staged on Amazon S3 buckets, enabling flexible and resilient command and control infrastructure. The campaign’s indicators include a set of suspicious IP addresses and domains associated with the infrastructure. The combination of social engineering, in-memory execution, side-loading, and legitimate tool abuse reflects a sophisticated and evasive ransomware operation. Defenders are challenged by the stealthy nature of the Deno loader and the use of legitimate administrative tools, necessitating a focus on behavioral detection and strict access controls.
Potential Impact
Organizations worldwide face increased risk of ransomware infection that can lead to data encryption, operational disruption, and potential data exfiltration. The use of in-memory execution and side-loading techniques reduces the likelihood of detection by traditional antivirus and endpoint detection systems, increasing dwell time and potential damage. Lateral movement via PsExec allows attackers to spread rapidly across networks, potentially compromising multiple systems and critical infrastructure. Staging payloads on cloud storage like S3 buckets enhances the attackers’ resilience and complicates takedown efforts. The shift from initial access brokers to self-run campaigns indicates LeakNet’s growing capabilities and potential for more frequent and widespread attacks. Industries with high-value data or critical operations, such as healthcare, finance, and manufacturing, are particularly vulnerable. The campaign’s reliance on social engineering and compromised websites means organizations with less mature security awareness programs and web defenses are at greater risk. Overall, the threat can cause significant financial loss, reputational damage, and operational downtime.
Mitigation Recommendations
1. Implement advanced behavioral monitoring to detect anomalous in-memory execution and side-loading activities, focusing on processes like jli.dll and Deno runtime usage. 2. Block or closely monitor access to newly registered domains and suspicious IP addresses linked to the campaign. 3. Restrict and audit the use of PsExec and other administrative tools, limiting execution to authorized administrators only. 4. Disable or tightly control Windows Remote Management (Win-R) access to reduce lateral movement opportunities. 5. Employ network segmentation to contain potential lateral movement within internal networks. 6. Harden web infrastructure to prevent compromise and monitor for unauthorized changes or malicious lures like ClickFix. 7. Use endpoint detection and response (EDR) solutions capable of detecting in-memory payload execution and DLL side-loading techniques. 8. Conduct regular user awareness training emphasizing the risks of social engineering and suspicious links. 9. Monitor cloud storage access patterns, especially for S3 buckets, to detect unusual payload staging or data exfiltration activities. 10. Maintain up-to-date backups and test recovery procedures to mitigate ransomware impact.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Japan, South Korea, Netherlands, Singapore
Indicators of Compromise
- ip: 144.31.2.161
- ip: 144.31.224.98
- ip: 144.31.54.243
- ip: 194.31.223.42
- ip: 87.121.79.25
- domain: apiclofront.com
- domain: cnoocim.com
- domain: crahdhduf.com
- domain: delhedghogeggs.com
- domain: mshealthmetrics.com
- domain: neremedysoft.com
- domain: okobojirent.com
- domain: sendtokenscf.com
- domain: serialmenot.com
- domain: verify-safeguard.top
- domain: windowallclean.com
- domain: tools.usersway.net
Casting a Wider Net: Scaling Threat
Description
LeakNet, a ransomware operator, has expanded its initial access methods by utilizing ClickFix lures on compromised websites and implementing a new Deno-based, in-memory loader. The group has shifted from relying on initial access brokers to running its own campaigns. LeakNet's post-exploitation playbook remains consistent, involving jli.dll side-loading, PsExec-based lateral movement, and S3 bucket payload staging. The Deno loader executes base64-encoded payloads in memory, making detection challenging for traditional security tools. Defenders are advised to focus on behavioral signals and implement measures such as blocking newly registered domains, restricting Win-R access, and limiting PsExec usage to authorized administrators.
AI-Powered Analysis
Technical Analysis
LeakNet, a ransomware group, has evolved its intrusion tactics by expanding initial access vectors and enhancing payload delivery mechanisms. Previously dependent on initial access brokers, LeakNet now runs its own campaigns, increasing operational control and scale. The group uses ClickFix lures hosted on compromised websites to socially engineer victims into initiating infection. A key technical advancement is the deployment of a Deno-based in-memory loader that executes base64-encoded payloads directly in memory, bypassing disk-based detection and complicating traditional signature-based defenses. Post-compromise, LeakNet employs jli.dll side-loading, a technique where a legitimate Windows utility is tricked into loading a malicious DLL, facilitating stealthy code execution. For lateral movement, the group leverages PsExec, a legitimate Windows tool, to propagate within networks. Payloads are staged on Amazon S3 buckets, enabling flexible and resilient command and control infrastructure. The campaign’s indicators include a set of suspicious IP addresses and domains associated with the infrastructure. The combination of social engineering, in-memory execution, side-loading, and legitimate tool abuse reflects a sophisticated and evasive ransomware operation. Defenders are challenged by the stealthy nature of the Deno loader and the use of legitimate administrative tools, necessitating a focus on behavioral detection and strict access controls.
Potential Impact
Organizations worldwide face increased risk of ransomware infection that can lead to data encryption, operational disruption, and potential data exfiltration. The use of in-memory execution and side-loading techniques reduces the likelihood of detection by traditional antivirus and endpoint detection systems, increasing dwell time and potential damage. Lateral movement via PsExec allows attackers to spread rapidly across networks, potentially compromising multiple systems and critical infrastructure. Staging payloads on cloud storage like S3 buckets enhances the attackers’ resilience and complicates takedown efforts. The shift from initial access brokers to self-run campaigns indicates LeakNet’s growing capabilities and potential for more frequent and widespread attacks. Industries with high-value data or critical operations, such as healthcare, finance, and manufacturing, are particularly vulnerable. The campaign’s reliance on social engineering and compromised websites means organizations with less mature security awareness programs and web defenses are at greater risk. Overall, the threat can cause significant financial loss, reputational damage, and operational downtime.
Mitigation Recommendations
1. Implement advanced behavioral monitoring to detect anomalous in-memory execution and side-loading activities, focusing on processes like jli.dll and Deno runtime usage. 2. Block or closely monitor access to newly registered domains and suspicious IP addresses linked to the campaign. 3. Restrict and audit the use of PsExec and other administrative tools, limiting execution to authorized administrators only. 4. Disable or tightly control Windows Remote Management (Win-R) access to reduce lateral movement opportunities. 5. Employ network segmentation to contain potential lateral movement within internal networks. 6. Harden web infrastructure to prevent compromise and monitor for unauthorized changes or malicious lures like ClickFix. 7. Use endpoint detection and response (EDR) solutions capable of detecting in-memory payload execution and DLL side-loading techniques. 8. Conduct regular user awareness training emphasizing the risks of social engineering and suspicious links. 9. Monitor cloud storage access patterns, especially for S3 buckets, to detect unusual payload staging or data exfiltration activities. 10. Maintain up-to-date backups and test recovery procedures to mitigate ransomware impact.
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://reliaquest.com/blog/threat-spotlight-casting-a-wider-net-clickfix-deno-and-leaknets-scaling-threat"]
- Adversary
- LeakNet
- Pulse Id
- 69ba8419321e1d3c9be7c4cc
- Threat Score
- null
Indicators of Compromise
Ip
| Value | Description | Copy |
|---|---|---|
ip144.31.2.161 | — | |
ip144.31.224.98 | — | |
ip144.31.54.243 | — | |
ip194.31.223.42 | — | |
ip87.121.79.25 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainapiclofront.com | — | |
domaincnoocim.com | — | |
domaincrahdhduf.com | — | |
domaindelhedghogeggs.com | — | |
domainmshealthmetrics.com | — | |
domainneremedysoft.com | — | |
domainokobojirent.com | — | |
domainsendtokenscf.com | — | |
domainserialmenot.com | — | |
domainverify-safeguard.top | — | |
domainwindowallclean.com | — | |
domaintools.usersway.net | — |
Threat ID: 69ba88a2771bdb17497e4f69
Added to database: 3/18/2026, 11:12:34 AM
Last enriched: 3/18/2026, 11:27:48 AM
Last updated: 3/19/2026, 3:39:34 AM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.