Back to News
malware🌐InternationalBleepingComputer

ClickFix Attack Abuses DNS for PowerShell Payload Delivery

Monday, February 16, 2026

ClickFix Attack Abuses DNS for PowerShell Payload Delivery

What

Threat actors are now using a novel ClickFix attack variant that abuses DNS lookups to deliver malicious PowerShell scripts, marking a significant evolution in their evasion tactics. This technique allows for dynamic payload modification and blends with normal network traffic, making detection more challenging.

Where

Windows systems are targeted, with the campaign observed by Microsoft Defender researchers.

When

Disclosed on February 15, 2026.

Key Factors

  • The attack instructs victims to run an `nslookup` command that queries an attacker-controlled DNS server to receive the second-stage payload.
  • The DNS response's 'NAME:' field contains a malicious PowerShell script which is then executed to download further malware.
  • The final payload is the ModeloRAT remote access trojan, establishing persistence and enabling remote control of compromised systems.

Takeaways

  • Educate users on the dangers of executing unfamiliar commands, especially those involving `nslookup` or custom DNS servers, even when prompted by seemingly legitimate error messages.
  • Implement robust endpoint detection and response (EDR) solutions capable of monitoring DNS queries and PowerShell script execution for anomalous behavior.
Read Full Article

Opens original article on BleepingComputer

Similar News