Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Microsoft Alerts to ClickFix Technique Exploiting DNS Queries

Microsoft Alerts to ClickFix Technique Exploiting DNS Queries

Posted on February 16, 2026 By CWS

Microsoft has issued an alert regarding a sophisticated method known as ClickFix, which is being used by cybercriminals to distribute malware through DNS query manipulation. This technique has gained traction over the past year among both independent cybercriminals and state-backed groups.

Understanding the ClickFix Technique

The ClickFix strategy involves displaying a deceptive error message on compromised or malicious websites. Victims are then instructed to resolve the fabricated issue by pressing specific keys and undertaking additional steps, such as executing commands. These actions inadvertently grant attackers elevated permissions, allowing them to download malicious software or run harmful scripts.

In a recent incident observed by Microsoft, the attack involved instructing victims to execute a command that performs a custom DNS lookup. This initial command is executed through cmd.exe, targeting an external DNS server instead of the usual system resolver. The output is filtered to extract specific DNS responses, which are used as a secondary payload.

Leveraging DNS for Stealth

This approach enables attackers to establish connections to their own infrastructure while masking the operation within normal network traffic, thus improving their chances of avoiding detection. The subsequent payload is a Python script tailor-made for reconnaissance activities. Once executed, it downloads further malicious components and establishes a persistence mechanism.

The final stage involves deploying a remote access trojan (RAT) called ModeloRAT. This tool provides attackers with the capability to gather intelligence from the compromised system and deploy additional payloads as required.

Implications and Recent Findings

Although Microsoft has yet to release detailed information about specific attacks, cybersecurity firm Huntress has identified a group known as KongTuke utilizing a ClickFix variant named CrashFix to distribute ModeloRAT. This campaign has primarily targeted corporate environments, posing significant risks to organizational cybersecurity.

With the growing sophistication of these attacks, it is essential for organizations and individuals to remain vigilant and implement robust security measures to protect against such threats.

Related articles highlight additional cyber threats, such as over 300 malicious Chrome extensions and other advanced spyware kits, underscoring the need for comprehensive threat awareness.

Security Week News Tags:ClickFix, CrashFix, Cyberattack, Cybersecurity, DNS lookup, KongTuke, Malware, Microsoft, ModeloRAT, Reconnaissance, remote access trojan, Threat Actors

Post navigation

Previous Post: ZeroDayRAT Spyware Threatens Android and iOS Security
Next Post: Critical Joomla Framework Vulnerabilities Exposed

Related Posts

Apono Raises  Million for Cloud Identity Management Platform Apono Raises $34 Million for Cloud Identity Management Platform Security Week News
AI Emerges as the Hope—and Risk—for Overloaded SOCs AI Emerges as the Hope—and Risk—for Overloaded SOCs Security Week News
Prison Sentence for Man Involved in SEC X Account Hack Prison Sentence for Man Involved in SEC X Account Hack Security Week News
High-Severity Remote Code Execution Vulnerability Patched in OpenSSL High-Severity Remote Code Execution Vulnerability Patched in OpenSSL Security Week News
Up to 25% of Internet-Exposed ICS Are Honeypots: Researchers Up to 25% of Internet-Exposed ICS Are Honeypots: Researchers Security Week News
RegScale Raises  Million for GRC Platform RegScale Raises $30 Million for GRC Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Exploit Trusted Platforms to Target Philippine Bank Users
  • China-Linked TA416 Intensifies Cyber Attacks on Europe
  • Urgent Security Alert: Thousands of F5 BIG-IP Devices at Risk
  • Microsoft Reveals Cookie-Based PHP Web Shell Threats
  • Social Engineering Attack Compromises Popular Axios Library

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Exploit Trusted Platforms to Target Philippine Bank Users
  • China-Linked TA416 Intensifies Cyber Attacks on Europe
  • Urgent Security Alert: Thousands of F5 BIG-IP Devices at Risk
  • Microsoft Reveals Cookie-Based PHP Web Shell Threats
  • Social Engineering Attack Compromises Popular Axios Library

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark