Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Microsoft Warns of ClickFix Attack Abusing DNS Lookups
    Cybersecurity

    Microsoft Warns of ClickFix Attack Abusing DNS Lookups

    adminBy adminFebruary 17, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    DNS Vulnerabilities
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Microsoft has warned users that threat actors are leveraging a new variant of the ClickFix technique to deliver malware.

    The ClickFix attack method has been increasingly used in the past year by both cybercriminals and state-sponsored threat groups.

    The attack involves attackers displaying a fake error message on a compromised or malicious site. The message instructs the target to address the issue by pressing specific keys, then performing additional steps (eg, running a command). By following the attacker’s instructions, the user unknowingly grants elevated permissions, downloads malware, or executes attacker-supplied scripts.

    In a recent ClickFix attack observed by Microsoft the attacker asked targets to run a command that executes a custom DNS lookoup.

    “The initial command runs through cmd.exe and performs a DNS lookup against a hard-coded external DNS server, rather than the system’s default resolver. The output is filtered to extract the ‘Name:’ DNS response, which is executed as the second-stage payload,” Microsoft explained.

    This tactic enables the attacker to reach their infrastructure and validate execution of the second-stage payload, increasing their chances of evading detection by blending malicious traffic into regular network traffic. 

    The second-stage payload downloads and executes a malicious Python script designed for reconnaissance. The final payload is then dropped and a persistence mechanism is deployed.

    Advertisement. Scroll to continue reading.

    The final payload is a remote access trojan named ModeloRAT, which enables attackers to collect information about the compromised system and execute other payloads.

    While Microsoft has not shared any information on the attacks, Huntress reported recently that a threat actor tracked as KongTuke had been deploying ModeloRAT through a ClickFix variant dubbed CrashFix. The campaign was aimed at corporate environments. 

    Related: Over 300 Malicious Chrome Extensions Caught Leaking or Stealing User Data

    Related: RATs in the Machine: Inside a Pakistan-Linked Three-Pronged Cyber Assault on India

    Related: New ‘ZeroDayRAT’ Spyware Kit Enables Total Compromise of iOS, Android Devices

    Abusing Attack ClickFix DNS Lookups Microsoft warns
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleAre top-trim sports cars still worth it? Why the best driving experience may cost less
    Next Article Nothing crashes Apple’s party with cheeky Phone 4a series launch teaser
    admin
    • Website

    Related Posts

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    March 3, 2026

    CyberStrikeAI tool adopted by hackers for AI-powered attacks

    March 3, 2026

    Madison Square Garden Data Breach Confirmed Months After Hacker Attack

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    March 3, 2026

    Building a competitive PPC defense

    March 3, 2026

    Amazon Prime Members Can Get Two of These E-Books Free in March 2026

    March 3, 2026

    CyberStrikeAI tool adopted by hackers for AI-powered attacks

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (570)
    • Privacy & Online Earning (79)
    • SEO & Digital Marketing (356)
    • Tech Tools & Mobile / Apps (706)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    March 3, 2026

    Building a competitive PPC defense

    March 3, 2026

    Amazon Prime Members Can Get Two of These E-Books Free in March 2026

    March 3, 2026
    Most Popular
    • How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer
    • Building a competitive PPC defense
    • Amazon Prime Members Can Get Two of These E-Books Free in March 2026
    • CyberStrikeAI tool adopted by hackers for AI-powered attacks
    • 16 Best Checking Accounts of March 2026
    • 3 great Paramount+ movies you’ll want to watch this week (March 2
    • Nvidia partners with optics technology vendors Lumentum and Coherent to enhance AI infrastructure
    • Madison Square Garden Data Breach Confirmed Months After Hacker Attack
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.