radar

ONE Sentinel

securitySecurity/THREATS/HIGH

LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader

sourceThe Hacker News
calendar_todayMarch 17, 2026
schedule2 min read
lightbulb

EXECUTIVE SUMMARY

LeakNet Ransomware Innovates with ClickFix Tactic and Deno Loader

Summary

The LeakNet ransomware group has adopted a novel approach using the ClickFix social engineering tactic to gain initial access via compromised websites. This method involves tricking users into executing malicious commands under the guise of fixing non-existent errors.

Key Points

  • LeakNet ransomware uses the ClickFix tactic for initial access.
  • ClickFix involves social engineering through compromised websites.
  • Users are deceived into running malicious commands to fix fake errors.
  • This approach marks a shift from traditional methods like stolen credentials.
  • LeakNet also employs a Deno in-memory loader for payload deployment.

Analysis

The adoption of the ClickFix tactic by LeakNet represents a significant evolution in ransomware attack strategies, emphasizing the increasing sophistication of social engineering techniques. By leveraging compromised websites to trick users into executing harmful commands, LeakNet circumvents traditional security measures that rely on credential protection. The use of a Deno in-memory loader further complicates detection and mitigation efforts, highlighting the need for enhanced user awareness and robust endpoint protection.

Conclusion

IT professionals should prioritize user education on recognizing social engineering tactics like ClickFix and ensure robust endpoint security solutions are in place. Regularly updating security protocols to address evolving threats is crucial to mitigate the risks posed by advanced ransomware operations like LeakNet.