Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
ClickFix Attack Uses DNS Hijacking to Deploy Malware

ClickFix Attack Uses DNS Hijacking to Deploy Malware

Posted on February 14, 2026 By CWS

A novel variant of the ClickFix social engineering campaign is now leveraging a custom DNS hijacking tactic to propagate malware. This sophisticated attack exploits DNS queries to execute further infection stages, effectively evading conventional detection mechanisms by blending into standard network operations.

How ClickFix Attacks Deceive Users

ClickFix attacks employ deception through fake error alerts, such as counterfeit CAPTCHA challenges or misleading ‘fix this issue’ prompts on compromised web pages. These tactics manipulate users into copying a specific script to their clipboard and executing it via basic system dialogs like the Run command or PowerShell.

While earlier versions like CrashFix used fake browser crashes to create urgency, the latest iteration employs an advanced evasion technique involving the Domain Name System (DNS). This method facilitates the attack’s stealth and efficacy.

The Technical Evade Strategy

Upon execution of the initial harmful command, the script uses cmd.exe to perform a DNS lookup directed at an attacker-controlled server, bypassing the system’s usual internet resolver. The script analyzes this DNS response, specifically extracting data from the Name: field, which contains the code for the subsequent payload stage.

This innovative approach transforms DNS into a lightweight staging environment, enabling attackers to verify target activity before deploying more substantial malware components. Given the ubiquitous nature of DNS traffic in networks, this method effectively conceals malicious actions.

Infection Process and Impact

Microsoft Defender researchers have noted that following the DNS-triggered second stage, the attack sequence downloads a ZIP archive with a portable Python setup. The malicious Python script executes to perform host and domain reconnaissance, ensuring continued access by deploying a VBScript and establishing a shortcut named MonitoringService.lnk in the Windows Startup directory.

The campaign’s final payload is a Remote Access Trojan (RAT) known as ModeloRAT, which is detected and neutralized by Microsoft Defender Antivirus under the threat signature Trojan:Win32/ClickFix.R!ml. This threat highlights the importance of robust cybersecurity measures to counter evolving attack strategies.

Stay updated on the latest cybersecurity news by following us on Google News, LinkedIn, and X. Reach out to feature your stories.

Cyber Security News Tags:Attack, ClickFix, Cybersecurity, DNS, DNS hijacking, Malware, Microsoft Defender, ModeloRAT, network traffic, RAT

Post navigation

Previous Post: Data Breach by Over 300 Chrome Extensions Uncovered
Next Post: AI Pentest Tool Enhances Security Testing with New Features

Related Posts

10 Best Data Loss Prevention Software in 2025 10 Best Data Loss Prevention Software in 2025 Cyber Security News
Google Finalizes Historic  Billion Wiz Acquisition Google Finalizes Historic $32 Billion Wiz Acquisition Cyber Security News
Malware Disguised as Teams and Zoom Apps Targets Enterprises Malware Disguised as Teams and Zoom Apps Targets Enterprises Cyber Security News
New Android Spyware Attacking Android Users Mimic as Signal and ToTok Apps New Android Spyware Attacking Android Users Mimic as Signal and ToTok Apps Cyber Security News
Microsoft Patch Tuesday June 2025 Microsoft Patch Tuesday June 2025 Cyber Security News
UK Police Arrested Man Linked to Ransomware Attack That Crippeled European Airports UK Police Arrested Man Linked to Ransomware Attack That Crippeled European Airports Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Introduces Easy Gmail Username Changes
  • CrewAI Flaws Enable Remote Code Attacks
  • Google Launches Android Developer Verification Initiative
  • Healthcare Firm Faces Cyberattack Exposing Patient Data
  • Venom Stealer: Revolutionizing Cyber Threats with Persistent Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Introduces Easy Gmail Username Changes
  • CrewAI Flaws Enable Remote Code Attacks
  • Google Launches Android Developer Verification Initiative
  • Healthcare Firm Faces Cyberattack Exposing Patient Data
  • Venom Stealer: Revolutionizing Cyber Threats with Persistent Credential Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark