Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Unveils DNS ClickFix Attack Using Nslookup

Microsoft Unveils DNS ClickFix Attack Using Nslookup

Posted on February 15, 2026 By CWS

Microsoft has revealed a sophisticated variation of the ClickFix attack, leveraging Domain Name System (DNS) lookups to stage malware. This attack uses the ‘nslookup’ command, executed via the Windows Run dialog, to download malicious payloads. Targeting users through phishing, malvertising, and drive-by downloads, ClickFix has become a prevalent method for cybercriminals to trick victims into compromising their systems.

Understanding the ClickFix Tactic

ClickFix has gained traction over the past two years as attackers manipulate users into executing commands on their machines. The approach often involves directing users to deceptive webpages that mimic CAPTCHA verifications or suggest resolving non-existent issues. Once the command is executed, the malware is downloaded, enabling attackers to bypass traditional security measures easily.

Microsoft’s Threat Intelligence team highlighted that the latest DNS-based variation initiates a command through cmd.exe, performing a DNS lookup against an external server. The response is used to trigger the next stage of the attack, illustrating the tactic’s ability to blend malicious activities into standard network traffic.

The Role of DNS in Malware Distribution

Utilizing DNS as a communication channel, attackers can discreetly interact with their infrastructure, adding a validation layer before executing secondary payloads. By minimizing reliance on conventional web requests, this method camouflages the attack within normal activities, making it harder for security solutions to detect.

The malicious payload executes an attack chain that includes downloading a ZIP file from an external server, containing a Python script that conducts reconnaissance and deploys additional malware. This script eventually initiates ModeloRAT, a Python-based remote access trojan, ensuring persistent access through a Windows shortcut file.

Broader Implications and Emerging Threats

Bitdefender has observed a rise in Lumma Stealer activities linked to ClickFix-style attacks, particularly those involving fake CAPTCHA campaigns. These methods often employ CastleLoader, a malware loader used by the threat actor GrayBravo, to infiltrate systems. Despite law enforcement efforts in 2025, Lumma Stealer operations have shown resilience, adapting to alternative methods and hosting providers.

Moreover, several campaigns have emerged, utilizing social engineering to deploy various stealers and loaders. Attackers exploit phishing, malvertising, and even AI platforms to spread malware. A notable macOS campaign employs Odyssey Stealer, targeting cryptocurrency users by exfiltrating sensitive data from browser wallets.

These developments underscore the need for vigilance, as attackers continuously refine their strategies. The DNS-based ClickFix attack highlights the evolving landscape of cyber threats and the importance of robust security practices to counteract these sophisticated methods.

The Hacker News Tags:CastleLoader, ClickFix, Cybersecurity, DNS attack, Lumma Stealer, Malvertising, Malware, Microsoft, Nslookup, Phishing

Post navigation

Previous Post: Windows 11 Update KB5077181 Triggers Endless Reboot Issues

Related Posts

295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager 295 Malicious IPs Launch Coordinated Brute-Force Attacks on Apache Tomcat Manager The Hacker News
MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors The Hacker News
Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt Iran-Linked Hackers Mapped Ship AIS Data Days Before Real-World Missile Strike Attempt The Hacker News
The Unusual Suspect: Git Repos The Unusual Suspect: Git Repos The Hacker News
Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices The Hacker News
New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT New EVALUSION ClickFix Campaign Delivers Amatera Stealer and NetSupport RAT The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Unveils DNS ClickFix Attack Using Nslookup
  • Windows 11 Update KB5077181 Triggers Endless Reboot Issues
  • AI Pentest Tool Enhances Security Testing with New Features
  • ClickFix Attack Uses DNS Hijacking to Deploy Malware
  • Data Breach by Over 300 Chrome Extensions Uncovered

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Unveils DNS ClickFix Attack Using Nslookup
  • Windows 11 Update KB5077181 Triggers Endless Reboot Issues
  • AI Pentest Tool Enhances Security Testing with New Features
  • ClickFix Attack Uses DNS Hijacking to Deploy Malware
  • Data Breach by Over 300 Chrome Extensions Uncovered

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News