Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
LeakNet Ransomware Adopts ClickFix for Attacks

LeakNet Ransomware Adopts ClickFix for Attacks

Posted on March 17, 2026 By CWS

LeakNet, a ransomware group, has introduced the ClickFix tactic for initial access, leveraging compromised websites. This method represents a shift from traditional approaches like using stolen credentials, according to a report by ReliaQuest. ClickFix deceives users into executing malicious commands to resolve non-existent issues, diverging from conventional strategies.

Unique Approach to Initial Access

ClickFix offers significant advantages to LeakNet, including reduced reliance on third-party providers and lower acquisition costs per victim. Compromised websites display fake CAPTCHA verifications, tricking users into executing a ‘msiexec.exe’ command in Windows. This broad approach targets multiple industries, aiming for maximum impact.

LeakNet’s strategic shift from Initial Access Brokers (IABs) to ClickFix highlights a deliberate expansion of their operational capabilities. By using legitimate but compromised websites, the group avoids detectable network signals, enhancing stealth and reach.

Advanced Techniques and Tools

In addition to ClickFix, LeakNet employs a Deno-based loader to execute JavaScript in memory, minimizing on-disk traces and evading detection. The payload fingerprints systems, contacts external servers for further malware stages, and loops to fetch new code. This methodology aligns with their consistent post-compromise strategy.

ReliaQuest also noted a Microsoft Teams-based phishing attempt linked to LeakNet. Although attribution remains unclear, this indicates either LeakNet’s expanding tactics or other actors adopting similar methods. The use of DLL side-loading and PsExec for lateral movement further exemplifies their sophisticated approach.

Impact and Industry Response

LeakNet’s activities emphasize the need for robust cybersecurity measures. Their use of S3 buckets for data exfiltration, mimicking normal cloud traffic, complicates detection efforts. Google’s recent report highlights the persistence of ransomware actors, despite internal conflicts, with several groups consistently targeting victims.

As threat actors adapt to maintain profitability, their focus is shifting towards smaller organizations. This development urges companies to enhance their security defenses and remain vigilant against evolving threats. The resilience of the ransomware ecosystem, despite challenges, underscores the importance of proactive cybersecurity strategies.

The ongoing evolution of ransomware tactics, including ClickFix, reflects the dynamic nature of cyber threats. Organizations must stay informed and prepared to counteract these sophisticated attack vectors effectively.

The Hacker News Tags:ClickFix, cyber attacks, cyber threats, Cybersecurity, data exfiltration, Deno loader, DLL side-loading, industrial targets, LeakNet, Malware, Microsoft Teams phishing, network security, Phishing, Ransomware, ReliaQuest

Post navigation

Previous Post: Critical Kubernetes NFS Driver Flaw Exposes Server Risks
Next Post: Security Flaw in UK Companies House Web Application Exposed

Related Posts

Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App Google Exposes Vishing Group UNC6040 Targeting Salesforce with Fake Data Loader App The Hacker News
Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud The Hacker News
Critical Metro4Shell Vulnerability Exploited in React Native Critical Metro4Shell Vulnerability Exploited in React Native The Hacker News
APT28 Exploits MSHTML Vulnerability Before February 2026 Patch APT28 Exploits MSHTML Vulnerability Before February 2026 Patch The Hacker News
Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Login Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Login The Hacker News
An Anti-Sales Guide for MSPs An Anti-Sales Guide for MSPs The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • React Native Packages Targeted by Credential-Stealing Malware
  • Tracebit Secures $20M to Enhance Cybersecurity Solutions
  • Ransomware Tactics Evolve Amid Declining Profits, Google Reports
  • Tech Giants Unite to Tackle Online Scams and Fraud
  • AI Security Concerns in Amazon Bedrock and Other Platforms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • React Native Packages Targeted by Credential-Stealing Malware
  • Tracebit Secures $20M to Enhance Cybersecurity Solutions
  • Ransomware Tactics Evolve Amid Declining Profits, Google Reports
  • Tech Giants Unite to Tackle Online Scams and Fraud
  • AI Security Concerns in Amazon Bedrock and Other Platforms

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News