Monday, February 16, 2026
HomeTechnologyNew ClickFix assault abuses nslookup to retrieve PowerShell payload by way of...

New ClickFix assault abuses nslookup to retrieve PowerShell payload by way of DNS

New ClickFix assault abuses nslookup to retrieve PowerShell payload by way of DNS

Menace actors are actually abusing DNS queries as a part of ClickFix social engineering assaults to ship malware, making this the primary identified use of DNS as a channel in these campaigns.

ClickFix assaults usually trick customers into manually executing malicious instructions underneath the guise of fixing errors, putting in updates, or enabling performance.

Nevertheless, this new variant makes use of a novel method during which an attacker-controlled DNS server delivers the second-stage payload by way of DNS lookups.

Wiz

DNS queries ship a malicious PowerShell script

In a brand new ClickFix marketing campaign seen by Microsoft, victims are instructed to run the nslookup command that queries an attacker-controlled DNS server as an alternative of the system’s default DNS server.

The command returns a question containing a malicious PowerShell script that’s then executed on the machine to put in malware.

“Microsoft Defender researchers noticed attackers utilizing one more evasion method to the ClickFix method: Asking targets to run a command that executes a customized DNS lookup and parses the Identify: response to obtain the next-stage payload for execution,” reads an X publish from Microsoft Menace Intelligence.

Microsoft tweet

Whereas it’s unclear what the lure is to trick customers into operating the command, Microsoft says the ClickFix assault instructs customers to run the command within the Home windows Run dialog field.

This command will challenge a DNS lookup for the hostname “instance.com” in opposition to the menace actor’s DNS server at 84[.]21.189[.]20 after which execute the ensuing response by way of the Home windows command interpreter (cmd.exe).

This DNS response returns a “NAME:” discipline that comprises the second PowerShell payload that’s executed on the machine.

DNS query response containing the second PowerShell command to execute
DNS question response containing the second PowerShell command to execute
Supply: Microsoft

Whereas this server is now not accessible, Microsoft says that the second-stage PowerShell command downloaded further malware from attacker-controlled infrastructure.

This assault in the end downloads a ZIP archive containing a Python runtime executable and malicious scripts that carry out reconnaissance on the contaminated machine and area.

The assault then establishes persistence by creating %APPDATApercentWPy64-31401pythonscript.vbs and a %STARTUPpercentMonitoringService.lnk shortcut to launch the VBScript file on startup.

The ultimate payload is a distant entry trojan often called ModeloRAT, which permits attackers to manage compromised programs remotely.

In contrast to the standard ClickFix assaults, which generally retrieve payloads by way of HTTP, this method makes use of DNS as a communication and staging channel.

By utilizing DNS responses to ship malicious PowerShell scripts, attackers can modify payloads on the fly whereas mixing in with regular DNS visitors.

ClickFix assaults quickly evolving

ClickFix assaults have quickly advanced over the previous yr, with menace actors experimenting with new supply ways and payload varieties that focus on all kinds of working programs.

Beforehand reported ClickFix campaigns relied on convincing customers to execute PowerShell or shell instructions instantly on their working programs to put in malware.

In newer campaigns, attackers have expanded their strategies past conventional malware payload supply over the net.

For instance, a latest ClickFix assault referred to as “ConsentFix” abuses the Azure CLI OAuth app to hijack Microsoft accounts with out a password and bypass multi-factor authentication (MFA).

With the rise in reputation of AI LLMs for on a regular basis use, menace actors have begun utilizing shared ChatGPT and Grok pages, in addition to Claude Artifact pages, to advertise pretend guides for ClickFix assaults.

BleepingComputer additionally reported in the present day a couple of novel ClickFix assault promoted by Pastebin feedback that tricked cryptocurrency customers into executing malicious JavaScript instantly of their browser whereas visiting a cryptocurrency trade to hijack transactions. 

This is without doubt one of the first ClickFix campaigns designed to execute JavaScript within the browser and hijack internet utility performance fairly than deploy malware.

Fashionable IT infrastructure strikes sooner than guide workflows can deal with.

On this new Tines information, learn the way your workforce can scale back hidden guide delays, enhance reliability by automated response, and construct and scale clever workflows on high of instruments you already use.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments