radar

ONE Sentinel

securitySecurity/THREATS/HIGH

LeakNet ransomware uses ClickFix, Deno runtime in stealthy attacks

sourceBleeping Computer
calendar_todayMarch 17, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

LeakNet Ransomware Employs ClickFix and Deno Runtime for Stealthy Infiltrations

Summary

The LeakNet ransomware group has adopted the ClickFix technique for gaining initial access to corporate networks and is utilizing a malware loader based on the Deno runtime. This approach enhances their stealth capabilities during attacks.

Key Points

  • LeakNet ransomware gang is using the ClickFix technique for initial access.
  • The malware loader is based on the open-source Deno runtime, which supports JavaScript and TypeScript.
  • This method allows for stealthier attacks, making detection more challenging.
  • The use of Deno runtime signifies a shift towards leveraging modern development environments for malicious purposes.

Analysis

The adoption of ClickFix and Deno runtime by the LeakNet ransomware group highlights a sophisticated approach to infiltrating corporate environments. By using modern development tools, attackers can evade traditional detection mechanisms, posing a significant threat to IT security infrastructures. This trend underscores the need for updated security measures that can detect and mitigate such advanced techniques.

Conclusion

IT professionals should enhance monitoring and detection capabilities to identify unusual activities associated with ClickFix and Deno runtime usage. Regular updates to security protocols and employee training on recognizing phishing attempts are crucial to mitigating these advanced threats.