Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DNS TXT Records Exploited in Advanced Cyber Attacks

DNS TXT Records Exploited in Advanced Cyber Attacks

Posted on February 5, 2026 By CWS

The cybersecurity world is witnessing a troubling trend as threat actors refine their techniques to evade traditional security measures. The KongTuke group, active since mid-2025, is at the forefront of this evolution, employing sophisticated strategies to breach enterprise defenses.

New Tactics in the KongTuke Campaign

KongTuke remains notorious for its ‘ClickFix’ method, a social engineering ploy that tricks users into resolving fabricated web issues. Victims are often presented with fake browser errors or verification prompts on compromised sites. The deception involves users copying a harmful script into the Windows Run dialog or a PowerShell terminal, inadvertently sidestepping automated security protocols.

Recently, KongTuke’s tactics have advanced, as revealed by Unit 42 analysts. The group now utilizes DNS TXT records to clandestinely carry out their operations. This shift from HTTP-based communication to DNS queries complicates detection efforts for security teams, as malicious traffic is masked within the regular DNS activity.

Understanding DNS TXT Record Exploitation

The innovation in KongTuke’s approach lies in how they retrieve malicious payloads. Instead of a direct file download, the initial ClickFix script activates a PowerShell command to perform a DNS lookup for a specific TXT record. These records, typically for domain verification, now contain the instructions for downloading and executing the final payload.

This technique exploits the generally unrestricted nature of DNS traffic, creating a critical vulnerability. The script extracts and executes the command from the DNS response in memory, a method known as ‘fileless’ execution, which minimizes detectable traces on the system.

Implications and Defensive Strategies

The ultimate aim of KongTuke’s advanced attacks is the deployment of severe malware, such as the Interlock remote access trojan, establishing persistent threats within networks. The reliance on DNS TXT records poses a significant challenge for defenders who primarily monitor HTTP traffic.

To counter these sophisticated tactics, experts recommend blocking newly registered domains, scrutinizing DNS traffic for irregularities, and rigorously monitoring PowerShell execution logs for anomalous DNS queries. Such measures are crucial in mitigating the risks posed by these evolving cyber threats.

Stay informed on the latest developments in cybersecurity by following us on Google News, LinkedIn, and X. Set CSN as your preferred information source on Google to receive instant updates.

Cyber Security News Tags:ClickFix, Cybersecurity, DNS TXT records, fileless attack, KongTuke, Malware, network security, PowerShell, remote access trojan, social engineering

Post navigation

Previous Post: NGINX Vulnerability Exploited in Web Traffic Hijacking
Next Post: Critical n8n Vulnerability Allows System Commands Execution

Related Posts

Researchers Evaded Elastic EDR’s Call Stack Signatures by Exploiting Call Gadgets Researchers Evaded Elastic EDR’s Call Stack Signatures by Exploiting Call Gadgets Cyber Security News
New Nova Stealer Attacking macOS Users by Swapping Legitimate Apps to Steal Cryptocurrency Wallet Data New Nova Stealer Attacking macOS Users by Swapping Legitimate Apps to Steal Cryptocurrency Wallet Data Cyber Security News
CISA Warns of Microsoft SharePoint Code Injection and Authentication Vulnerability Exploited in Wild CISA Warns of Microsoft SharePoint Code Injection and Authentication Vulnerability Exploited in Wild Cyber Security News
WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack Cyber Security News
Microsoft Azure API Management Flaw Enables Cross-Tenant Account Creation, Bypassing Admin Restrictions Microsoft Azure API Management Flaw Enables Cross-Tenant Account Creation, Bypassing Admin Restrictions Cyber Security News
10 Best Cloud Monitoring Tools in 2025 10 Best Cloud Monitoring Tools in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark