Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Microsoft Warns of ClickFix Attack Abusing DNS Lookups
    Cybersecurity

    Microsoft Warns of ClickFix Attack Abusing DNS Lookups

    adminBy adminFebruary 17, 2026No Comments2 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    DNS Vulnerabilities
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Microsoft has warned users that threat actors are leveraging a new variant of the ClickFix technique to deliver malware.

    The ClickFix attack method has been increasingly used in the past year by both cybercriminals and state-sponsored threat groups.

    The attack involves attackers displaying a fake error message on a compromised or malicious site. The message instructs the target to address the issue by pressing specific keys, then performing additional steps (eg, running a command). By following the attacker’s instructions, the user unknowingly grants elevated permissions, downloads malware, or executes attacker-supplied scripts.

    In a recent ClickFix attack observed by Microsoft the attacker asked targets to run a command that executes a custom DNS lookoup.

    “The initial command runs through cmd.exe and performs a DNS lookup against a hard-coded external DNS server, rather than the system’s default resolver. The output is filtered to extract the ‘Name:’ DNS response, which is executed as the second-stage payload,” Microsoft explained.

    This tactic enables the attacker to reach their infrastructure and validate execution of the second-stage payload, increasing their chances of evading detection by blending malicious traffic into regular network traffic. 

    The second-stage payload downloads and executes a malicious Python script designed for reconnaissance. The final payload is then dropped and a persistence mechanism is deployed.

    Advertisement. Scroll to continue reading.

    The final payload is a remote access trojan named ModeloRAT, which enables attackers to collect information about the compromised system and execute other payloads.

    While Microsoft has not shared any information on the attacks, Huntress reported recently that a threat actor tracked as KongTuke had been deploying ModeloRAT through a ClickFix variant dubbed CrashFix. The campaign was aimed at corporate environments. 

    Related: Over 300 Malicious Chrome Extensions Caught Leaking or Stealing User Data

    Related: RATs in the Machine: Inside a Pakistan-Linked Three-Pronged Cyber Assault on India

    Related: New ‘ZeroDayRAT’ Spyware Kit Enables Total Compromise of iOS, Android Devices

    Abusing Attack ClickFix DNS Lookups Microsoft warns
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleAre top-trim sports cars still worth it? Why the best driving experience may cost less
    Next Article Nothing crashes Apple’s party with cheeky Phone 4a series launch teaser
    admin
    • Website

    Related Posts

    Some Windows servers enter reboot loops after April patches

    April 17, 2026

    Cursor AI Vulnerability Exposed Developer Devices

    April 17, 2026

    Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

    April 17, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    OnePlus’ Europe exit isn’t official yet, but the signs aren’t great

    April 17, 2026

    Some Windows servers enter reboot loops after April patches

    April 17, 2026

    Why your website is now the source of truth in local AI search

    April 17, 2026

    Cursor AI Vulnerability Exposed Developer Devices

    April 17, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,360)
    • Privacy & Online Earning (170)
    • SEO & Digital Marketing (835)
    • Tech Tools & Mobile / Apps (1,626)
    • WiFi / Internet & Networking (227)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    OnePlus’ Europe exit isn’t official yet, but the signs aren’t great

    April 17, 2026

    Some Windows servers enter reboot loops after April patches

    April 17, 2026

    Why your website is now the source of truth in local AI search

    April 17, 2026
    Most Popular
    • OnePlus’ Europe exit isn’t official yet, but the signs aren’t great
    • Some Windows servers enter reboot loops after April patches
    • Why your website is now the source of truth in local AI search
    • Cursor AI Vulnerability Exposed Developer Devices
    • Tux Manager is the perfect Linux Task Manager replacement for Windows refugees
    • Your AI Visibility Strategy Doesn’t Work Outside English
    • Anker’s ultra-compact 45W charger with a screen drops to its best price ever
    • Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.