ClickFix Attack Abuses nslookup to Deliver PowerShell Malware via DNS

Related

Lotus Blossom Hackers Compromised Notepad++ Hosting Infrastructure to Deliver Malware

What happened The state-sponsored threat group Lotus Blossom breached the...

Lithuania Launches National Initiative to Counter AI-Driven Cyber Fraud

What happened Lithuania has launched a government-funded national initiative aimed...

ClickFix Attack Abuses nslookup to Deliver PowerShell Malware via DNS

What happened Threat actors have introduced a new ClickFix attack...

Snail Mail Phishing Campaign Targets Trezor and Ledger Crypto Wallet Users

What happened Threat actors have launched a phishing campaign using...

Share

What happened

Threat actors have introduced a new ClickFix attack variant that uses DNS queries and the Windows nslookup utility to deliver malware payloads. According to Microsoft Threat Intelligence, victims are instructed to run a command that performs a DNS lookup against an attacker-controlled server, which returns a malicious PowerShell script embedded in the DNS response. 

The returned PowerShell command is executed on the system and downloads additional malware from attacker infrastructure. The attack retrieves a ZIP archive containing a Python runtime and scripts that perform reconnaissance on the infected device and domain, establish persistence using startup shortcuts, and ultimately deploy the ModeloRAT remote access trojan. 

Unlike earlier ClickFix campaigns that delivered payloads over HTTP, this method uses DNS as a staging and communication channel, allowing attackers to modify payloads dynamically while blending malicious traffic with normal DNS activity. 

Who is affected

Windows users who are tricked into executing malicious nslookup commands during ClickFix social engineering campaigns are affected, as the attack installs malware and establishes persistent remote access through ModeloRAT.

Why CISOs should care

The use of DNS as a malware delivery channel demonstrates evolving attacker techniques designed to evade detection by blending malicious activity into legitimate network traffic, increasing the difficulty of identifying compromise.

3 practical actions

  • Monitor DNS query activity. Detect suspicious DNS lookups directed to attacker-controlled servers or unusual DNS responses.
  • Audit PowerShell execution events. Identify unauthorized or unexpected PowerShell commands initiated by user activity.
  • Educate users on command-based social engineering. Train users to avoid executing unfamiliar commands provided through websites, prompts, or support instructions.