Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
DNS TXT Records Exploited in Advanced Cyber Attacks

DNS TXT Records Exploited in Advanced Cyber Attacks

Posted on February 5, 2026 By CWS

The cybersecurity world is witnessing a troubling trend as threat actors refine their techniques to evade traditional security measures. The KongTuke group, active since mid-2025, is at the forefront of this evolution, employing sophisticated strategies to breach enterprise defenses.

New Tactics in the KongTuke Campaign

KongTuke remains notorious for its ‘ClickFix’ method, a social engineering ploy that tricks users into resolving fabricated web issues. Victims are often presented with fake browser errors or verification prompts on compromised sites. The deception involves users copying a harmful script into the Windows Run dialog or a PowerShell terminal, inadvertently sidestepping automated security protocols.

Recently, KongTuke’s tactics have advanced, as revealed by Unit 42 analysts. The group now utilizes DNS TXT records to clandestinely carry out their operations. This shift from HTTP-based communication to DNS queries complicates detection efforts for security teams, as malicious traffic is masked within the regular DNS activity.

Understanding DNS TXT Record Exploitation

The innovation in KongTuke’s approach lies in how they retrieve malicious payloads. Instead of a direct file download, the initial ClickFix script activates a PowerShell command to perform a DNS lookup for a specific TXT record. These records, typically for domain verification, now contain the instructions for downloading and executing the final payload.

This technique exploits the generally unrestricted nature of DNS traffic, creating a critical vulnerability. The script extracts and executes the command from the DNS response in memory, a method known as ‘fileless’ execution, which minimizes detectable traces on the system.

Implications and Defensive Strategies

The ultimate aim of KongTuke’s advanced attacks is the deployment of severe malware, such as the Interlock remote access trojan, establishing persistent threats within networks. The reliance on DNS TXT records poses a significant challenge for defenders who primarily monitor HTTP traffic.

To counter these sophisticated tactics, experts recommend blocking newly registered domains, scrutinizing DNS traffic for irregularities, and rigorously monitoring PowerShell execution logs for anomalous DNS queries. Such measures are crucial in mitigating the risks posed by these evolving cyber threats.

Stay informed on the latest developments in cybersecurity by following us on Google News, LinkedIn, and X. Set CSN as your preferred information source on Google to receive instant updates.

Cyber Security News Tags:ClickFix, Cybersecurity, DNS TXT records, fileless attack, KongTuke, Malware, network security, PowerShell, remote access trojan, social engineering

Post navigation

Previous Post: NGINX Vulnerability Exploited in Web Traffic Hijacking
Next Post: Critical n8n Vulnerability Allows System Commands Execution

Related Posts

Best Network Security Providers for Healthcare Best Network Security Providers for Healthcare Cyber Security News
Supply Chain Security Mitigating Third-Party Risks Supply Chain Security Mitigating Third-Party Risks Cyber Security News
New ModStealer Evade Antivirus Detection to Attack macOS Users and Steal Sensitive Data New ModStealer Evade Antivirus Detection to Attack macOS Users and Steal Sensitive Data Cyber Security News
New Charon Ransomware Employs DLL Sideloading, and Anti-EDR Capabilities to Attack Organizations New Charon Ransomware Employs DLL Sideloading, and Anti-EDR Capabilities to Attack Organizations Cyber Security News
Deep Dive into Endpoint Security Deep Dive into Endpoint Security Cyber Security News
Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • APT28 Exploits Microsoft Office Flaw Targeting Europe
  • Critical n8n Vulnerability Allows System Commands Execution
  • DNS TXT Records Exploited in Advanced Cyber Attacks
  • NGINX Vulnerability Exploited in Web Traffic Hijacking
  • New Malvertising Threat Exploits Facebook Ads for Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • APT28 Exploits Microsoft Office Flaw Targeting Europe
  • Critical n8n Vulnerability Allows System Commands Execution
  • DNS TXT Records Exploited in Advanced Cyber Attacks
  • NGINX Vulnerability Exploited in Web Traffic Hijacking
  • New Malvertising Threat Exploits Facebook Ads for Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark