Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LeakNet Ransomware Adopts ClickFix for Attacks

LeakNet Ransomware Adopts ClickFix for Attacks

Posted on March 17, 2026 By CWS

LeakNet, a ransomware group, has introduced the ClickFix tactic for initial access, leveraging compromised websites. This method represents a shift from traditional approaches like using stolen credentials, according to a report by ReliaQuest. ClickFix deceives users into executing malicious commands to resolve non-existent issues, diverging from conventional strategies.

Unique Approach to Initial Access

ClickFix offers significant advantages to LeakNet, including reduced reliance on third-party providers and lower acquisition costs per victim. Compromised websites display fake CAPTCHA verifications, tricking users into executing a ‘msiexec.exe’ command in Windows. This broad approach targets multiple industries, aiming for maximum impact.

LeakNet’s strategic shift from Initial Access Brokers (IABs) to ClickFix highlights a deliberate expansion of their operational capabilities. By using legitimate but compromised websites, the group avoids detectable network signals, enhancing stealth and reach.

Advanced Techniques and Tools

In addition to ClickFix, LeakNet employs a Deno-based loader to execute JavaScript in memory, minimizing on-disk traces and evading detection. The payload fingerprints systems, contacts external servers for further malware stages, and loops to fetch new code. This methodology aligns with their consistent post-compromise strategy.

ReliaQuest also noted a Microsoft Teams-based phishing attempt linked to LeakNet. Although attribution remains unclear, this indicates either LeakNet’s expanding tactics or other actors adopting similar methods. The use of DLL side-loading and PsExec for lateral movement further exemplifies their sophisticated approach.

Impact and Industry Response

LeakNet’s activities emphasize the need for robust cybersecurity measures. Their use of S3 buckets for data exfiltration, mimicking normal cloud traffic, complicates detection efforts. Google’s recent report highlights the persistence of ransomware actors, despite internal conflicts, with several groups consistently targeting victims.

As threat actors adapt to maintain profitability, their focus is shifting towards smaller organizations. This development urges companies to enhance their security defenses and remain vigilant against evolving threats. The resilience of the ransomware ecosystem, despite challenges, underscores the importance of proactive cybersecurity strategies.

The ongoing evolution of ransomware tactics, including ClickFix, reflects the dynamic nature of cyber threats. Organizations must stay informed and prepared to counteract these sophisticated attack vectors effectively.

The Hacker News Tags:ClickFix, cyber attacks, cyber threats, Cybersecurity, data exfiltration, Deno loader, DLL side-loading, industrial targets, LeakNet, Malware, Microsoft Teams phishing, network security, Phishing, Ransomware, ReliaQuest

Post navigation

Previous Post: Critical Kubernetes NFS Driver Flaw Exposes Server Risks
Next Post: Security Flaw in UK Companies House Web Application Exposed

Related Posts

JanelaRAT Malware Hits Latin American Banks Hard JanelaRAT Malware Hits Latin American Banks Hard The Hacker News
TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution The Hacker News
Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program The Hacker News
Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls Fortinet Confirms Active FortiCloud SSO Bypass on Fully Patched FortiGate Firewalls The Hacker News
Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services The Hacker News
Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository
  • New Security Flaws in Exim Mail Server Demand Immediate Patch
  • Bluekit Phishing Kit Leverages AI for Advanced Features
  • Cybercriminals Exploit Google Services in Facebook Phishing

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark