How Does LeakNet Use ClickFix and Deno to Scale Attacks?

In the rapidly shifting world of cybercrime, few groups have demonstrated as much agility as LeakNet, a ransomware collective that has moved from a modest three victims per month to a highly scalable operation. Leading this evolution is a sophisticated combination of social engineering and advanced technical evasion, specifically through the use of “ClickFix” lures and a custom-built loader that leverages legitimate developer tools to stay under the radar. By examining their move away from traditional access brokers toward more autonomous, memory-resident attacks, we gain a clearer picture of how modern threat actors are bypassing multi-million dollar defense systems.

LeakNet has shifted from purchasing credentials to using ClickFix lures on compromised legitimate websites. How does this transition away from initial access brokers change the group’s operational speed, and what specific challenges does hosting lures on trusted domains create for traditional network-layer defenses?

The transition away from initial access brokers is a strategic move that essentially removes a middleman from their supply chain, allowing the group to scale their operations much faster than before. By planting lures on compromised but legitimate websites, they no longer have to wait for brokers to find an entry point or negotiate prices; they simply cast a wide net and wait for users to come to them. This creates a massive headache for network-layer defenses because the traffic originates from trusted, high-reputation domains that are rarely blocked by standard filters. Traditional defenses that rely on blacklisting malicious URLs are rendered ineffective when the “malicious” page is actually a subfolder on a site the company uses every day. This shift forces a move away from perimeter-based security toward a model that scrutinizes the specific actions occurring on the endpoint once a user lands on these pages.

The use of fake Cloudflare Turnstile pages relies on users manually running commands. Why is this social engineering tactic becoming a preferred delivery method for malware, and what specific behavioral indicators should security teams prioritize when a user bypasses domain-based blocking?

This social engineering tactic is gaining popularity because it effectively tricks the user into doing the heavy lifting for the attacker, which helps the malware bypass automated security sandboxes that struggle with manual human interaction. In 2025, this method already accounts for the distribution of 59% of the top malware families, proving that the “human element” remains the most reliable vulnerability. When a user is convinced to run a command to “verify” themselves, they often bypass the very protections designed to keep them safe. To counter this, security teams must prioritize monitoring for suspicious msiexec commands and unexpected outbound connections that occur immediately after web browsing activity. These behavioral signals are much more reliable indicators of a breach than trying to keep up with an ever-changing list of compromised domains.

Attackers are now employing a “bring-your-own-runtime” strategy by installing the legitimate Deno executable to run malicious code. How does executing base64-encoded payloads via data URLs bypass signature-based tools, and what are the technical hurdles in detecting scripts like Romeo.ps1 or Juliet.vbs?

The “bring-your-own-runtime” strategy is particularly clever because it utilizes a legitimate, signed executable—the Deno runtime—which is a tool developers use globally and is unlikely to be flagged as malicious by itself. By feeding base64-encoded payloads directly into the runtime via data URLs, the attackers ensure that the malicious code never exists as a standalone file on the hard drive for a scanner to find. This bypasses signature-based tools entirely because there is no file hash to check or malicious binary to analyze. The technical hurdle with scripts like Romeo.ps1 and Juliet.vbs is that they often look like standard administrative tasks or simple loaders that call a legitimate program. Without deep inspection of the command-line arguments and the subsequent memory behavior, these scripts can easily blend into the background noise of a busy enterprise network.

Once the Deno loader is active, it fingerprints the system and binds to a local port to prevent duplicate instances. What are the most effective ways to identify this type of memory-resident activity, and how should an organization’s incident response plan change to address payloads that never touch the disk?

Identifying memory-resident activity requires a shift in focus from static file analysis to active process and network monitoring. One of the most effective ways to spot the Deno loader is to look for the specific behavior of the runtime binding to a local port for instance control, which is an unusual state for a typical user workstation. Organizations should also look for processes that are consuming unusual amounts of memory or making persistent outbound calls to command-and-control servers that are only a few weeks old. Incident response plans must evolve to prioritize memory forensics and live response tools rather than just “wiping and reloading” a machine. If the payload never touches the disk, traditional “file recovery” or “disk imaging” won’t show the full story, making it vital to capture the state of the system’s RAM before the process is terminated or the machine is rebooted.

Post-exploitation involves lateral movement using PsExec and sideloading jli.dll in specific directories like USOShared. Beyond restricting administrative tools, what granular monitoring strategies can catch these movements, and how can isolating a host at the first sign of an S3 bucket connection prevent a full ransomware deployment?

To catch these more subtle movements, security teams should implement granular monitoring for DLL sideloading, specifically watching for any instances of jli.dll appearing in directories like C:ProgramDataUSOShared, which is a favorite hiding spot for this group. Beyond just blocking PsExec, you should monitor for any unauthorized execution of administrative tools across the network, especially those initiated by non-IT accounts. The connection to an S3 bucket is often a critical “canary in the coal mine” because it typically indicates the staging or exfiltration of data right before the encryption phase. Isolating the host the moment an unexpected S3 connection is detected can break the attack chain, preventing the attackers from completing their objective and saving the rest of the network from a full-scale ransomware deployment.

What is your forecast for LeakNet and the evolution of runtime-based loaders?

I expect LeakNet and similar groups to move further away from custom malware and lean even more heavily into “living-off-the-land” techniques using varied runtimes like Python, Node.js, or Go that are common in modern environments. As defenders get better at spotting Deno-based attacks, these groups will likely rotate through different legitimate interpreters to keep security teams guessing and to ensure their payloads remain memory-resident. We will likely see a surge in “polymorphic runtimes” where the loader itself changes its behavior based on the specific security tools it detects on the victim’s machine. The battleground is shifting from the hard drive to the system’s memory and legitimate administrative channels, meaning that the organizations that succeed will be those that prioritize behavioral visibility and rapid, automated isolation over traditional perimeter defenses.

Explore more

How Firm Size Shapes Embedded Finance Strategy

The rapid transformation of mundane business platforms into sophisticated financial ecosystems has effectively redrawn the competitive boundaries for companies operating in the modern economy. In this environment, the integration of banking, payments, and lending services directly into a non-financial company’s digital interface is no longer a luxury for the avant-garde but a baseline requirement for economic viability. Whether a company

What Is Embedded Finance vs. BaaS in the 2026 Landscape?

The modern consumer no longer wakes up with the intention of visiting a bank, because the very concept of a financial institution has migrated from a physical storefront into the digital oxygen of everyday life. This transformation marks the definitive end of banking as a standalone chore, replacing it with a fluid experience where capital management is an invisible byproduct

How Can Payroll Analytics Improve Government Efficiency?

While the hum of a government office often suggests a routine of paperwork and protocol, the digital pulses within its payroll systems represent the heartbeat of a nation’s economic stability. In many public administrations, payroll data is viewed as little more than a digital receipt—a record of transactions that concludes once a salary reaches a bank account. Yet, this information

Global RPA Market to Hit $50 Billion by 2033 as AI Adoption Surges

The quiet hum of high-speed data processing has replaced the frantic clicking of keyboards in modern back offices, marking a permanent shift in how global businesses manage their most critical internal operations. This transition is not merely about speed; it is about the fundamental transformation of human-led workflows into self-sustaining digital systems. As organizations move deeper into the current decade,

New AGILE Framework to Guide AI in Canada’s Financial Sector

The quiet hum of servers across Canada’s financial heartland now dictates more than just basic transactions; it increasingly determines who qualifies for a mortgage or how a retirement fund reacts to global volatility. As algorithms transition from the shadows of back-office automation to the forefront of consumer-facing decisions, the stakes for oversight have never been higher. The findings from the