{"id":11863,"date":"2026-02-16T12:50:16","date_gmt":"2026-02-16T12:50:16","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=11863"},"modified":"2026-02-16T12:50:16","modified_gmt":"2026-02-16T12:50:16","slug":"microsoft-warns-of-clickfix-assault-abusing-dns-lookups","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=11863","title":{"rendered":"Microsoft Warns of ClickFix Assault Abusing DNS Lookups"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><strong>Microsoft has warned customers that risk actors are leveraging a brand new variant of the ClickFix method to ship malware.<\/strong><\/p>\n<p>The <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/topics\/clickfix\/\">ClickFix<\/a> assault technique has been more and more used up to now 12 months by each cybercriminals and state-sponsored risk teams.<\/p>\n<p>The assault includes attackers displaying a pretend error message on a compromised or malicious web site. The message instructs the goal to handle the problem by urgent particular keys, then performing further steps (eg, operating a command). By following the attacker\u2019s directions, the consumer unknowingly grants elevated permissions, downloads malware, or executes attacker-supplied scripts.<\/p>\n<p>In a latest ClickFix assault noticed by Microsoft the attacker requested targets to run a command that executes a customized DNS lookoup.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"504\" src=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2026\/02\/ClickFix-DNS-1024x504.jpg\" alt=\"\" class=\"wp-image-45384\" style=\"width:652px;height:auto\" srcset=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2026\/02\/ClickFix-DNS-1024x504.jpg 1024w, https:\/\/www.securityweek.com\/wp-content\/uploads\/2026\/02\/ClickFix-DNS-360x177.jpg 360w, https:\/\/www.securityweek.com\/wp-content\/uploads\/2026\/02\/ClickFix-DNS-768x378.jpg 768w, https:\/\/www.securityweek.com\/wp-content\/uploads\/2026\/02\/ClickFix-DNS-1536x756.jpg 1536w, https:\/\/www.securityweek.com\/wp-content\/uploads\/2026\/02\/ClickFix-DNS.jpg 1683w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"\/><\/figure>\n<\/div>\n<p>\u201cThe preliminary command runs by cmd.exe and performs a DNS lookup towards a hard-coded exterior DNS server, somewhat than the system\u2019s default resolver. The output is filtered to extract the \u2018Title:\u2019 DNS response, which is executed because the second-stage payload,\u201d Microsoft <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/x.com\/MsftSecIntel\/status\/2022456612120629742\">defined<\/a>.<\/p>\n<p>This tactic allows the attacker to achieve their infrastructure and validate execution of the second-stage payload, rising their probabilities of evading detection by mixing malicious site visitors into common community site visitors.\u00a0<\/p>\n<p>The second-stage payload downloads and executes a malicious Python script designed for reconnaissance. The ultimate payload is then dropped and a persistence mechanism is deployed.<\/p>\n<div class=\"zox-post-ad-wrap\"><span class=\"zox-ad-label\">Commercial. Scroll to proceed studying.<\/span><\/div>\n<p>The ultimate payload is a distant entry trojan named ModeloRAT, which allows attackers to gather details about the compromised system and execute different payloads.<\/p>\n<p>Whereas Microsoft has not shared any info on the assaults, Huntress reported just lately {that a} risk actor tracked as KongTuke had been deploying ModeloRAT by a ClickFix variant dubbed <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/malicious-chrome-extension-crashes-browser-in-clickfix-variant-crashfix\/\">CrashFix<\/a>. The marketing campaign was geared toward company environments.\u00a0<\/p>\n<p><strong>Associated<\/strong>: <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/over-300-malicious-chrome-extensions-caught-leaking-or-stealing-user-data\/\">Over 300 Malicious Chrome Extensions Caught Leaking or Stealing Person Knowledge<\/a><\/p>\n<p><strong>Associated<\/strong>: <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/rats-in-the-machine-inside-a-pakistan-linked-three-pronged-cyber-assault-on-india\/\">RATs within the Machine: Inside a Pakistan-Linked Three-Pronged Cyber Assault on India<\/a><\/p>\n<p><strong>Associated<\/strong>: <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.securityweek.com\/new-zerodayrat-spyware-kit-enables-total-compromise-of-ios-android-devices\/\">New \u2018ZeroDayRAT\u2019 Adware Equipment Allows Whole Compromise of iOS, Android Gadgets<\/a>\n\t\t\t<\/p>\n<\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Microsoft has warned customers that risk actors are leveraging a brand new variant of the ClickFix method to ship malware. The ClickFix assault technique has been more and more used up to now 12 months by each cybercriminals and state-sponsored risk teams. The assault includes attackers displaying a pretend error message on a compromised or [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":11865,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[5203,717,3639,5464,7877,618,2030],"class_list":["post-11863","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-abusing","tag-attack","tag-clickfix","tag-dns","tag-lookups","tag-microsoft","tag-warns"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11863","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11863"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11863\/revisions"}],"predecessor-version":[{"id":11864,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/11863\/revisions\/11864"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/11865"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69c6f7b5190636d50e9f6768. Config Timestamp: 2026-03-27 21:33:41 UTC, Cached Timestamp: 2026-04-09 18:06:45 UTC -->