New ClickFix attack abuses nslookup to retrieve PowerShell payload via DNS
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读文章内容,抓住主要信息。 文章讲的是威胁行为者利用DNS查询作为ClickFix社会工程攻击的一部分,来传播恶意软件。这是第一次在这些活动中使用DNS作为渠道。攻击者通过控制DNS服务器,在DNS查询中传递恶意PowerShell脚本,进而下载更多的恶意软件,最终植入远程访问木马ModeloRAT。 我需要把这些关键点浓缩到100字以内。要注意包括攻击方式、利用的技术、恶意软件的传播过程以及最终的影响。 可能的结构是:威胁行为者利用DNS查询进行ClickFix攻击,传播恶意软件,通过控制DNS服务器传递PowerShell脚本,下载更多恶意软件并植入远程访问木马ModeloRAT。 这样既涵盖了主要信息,又符合字数限制。 </think> 威胁行为者利用DNS查询进行ClickFix社会工程攻击,通过控制DNS服务器传递恶意PowerShell脚本以传播恶意软件,并最终植入远程访问木马ModeloRAT。 2026-2-16 00:30:18 Author: www.bleepingcomputer.com(查看原文) 阅读量:0 收藏

Hacker starting at a box

Threat actors are now abusing DNS queries as part of ClickFix social engineering attacks to deliver malware, making this the first known use of DNS as a channel in these campaigns.

ClickFix attacks typically trick users into manually executing malicious commands under the guise of fixing errors, installing updates, or enabling functionality.

However, this new variant uses a novel technique in which an attacker-controlled DNS server delivers the second-stage payload via DNS lookups.

Wiz

DNS queries deliver a malicious PowerShell script

In a new ClickFix campaign seen by Microsoft, victims are instructed to run the nslookup command that queries an attacker-controlled DNS server instead of the system's default DNS server.

The command returns a query containing a malicious PowerShell script that is then executed on the device to install malware.

"Microsoft Defender researchers observed attackers using yet another evasion approach to the ClickFix technique: Asking targets to run a command that executes a custom DNS lookup and parses the Name: response to receive the next-stage payload for execution," reads an X post from Microsoft Threat Intelligence.

Microsoft tweet

While it is unclear what the lure is to trick users into running the command, Microsoft says the ClickFix attack instructs users to run the command in the Windows Run dialog box.

This command will issue a DNS lookup for the hostname "example.com" against the threat actor's DNS server at 84[.]21.189[.]20 and then execute the resulting response via the Windows command interpreter (cmd.exe).

This DNS response returns a "NAME:" field that contains the second PowerShell payload that is executed on the device.

DNS query response containing the second PowerShell command to execute
DNS query response containing the second PowerShell command to execute
Source: Microsoft

While this server is no longer available, Microsoft says that the second-stage PowerShell command downloaded additional malware from attacker-controlled infrastructure.

This attack ultimately downloads a ZIP archive containing a Python runtime executable and malicious scripts that perform reconnaissance on the infected device and domain.

The attack then establishes persistence by creating %APPDATA%\WPy64-31401\python\script.vbs and a %STARTUP%\MonitoringService.lnk shortcut to launch the VBScript file on startup.

The final payload is a remote access trojan known as ModeloRAT, which allows attackers to control compromised systems remotely.

Unlike the usual ClickFix attacks, which commonly retrieve payloads via HTTP, this technique uses DNS as a communication and staging channel.

By using DNS responses to deliver malicious PowerShell scripts, attackers can modify payloads on the fly while blending in with normal DNS traffic.

ClickFix attacks rapidly evolving

ClickFix attacks have rapidly evolved over the past year, with threat actors experimenting with new delivery tactics and payload types that target a wide variety of operating systems.

Previously reported ClickFix campaigns relied on convincing users to execute PowerShell or shell commands directly on their operating systems to install malware.

In more recent campaigns, attackers have expanded their techniques beyond traditional malware payload delivery over the web.

For example, a recent ClickFix attack called "ConsentFix" abuses the Azure CLI OAuth app to hijack Microsoft accounts without a password and bypass multi-factor authentication (MFA).

With the rise in popularity of AI LLMs for everyday use, threat actors have begun using shared ChatGPT and Grok pages, as well as Claude Artifact pages, to promote fake guides for ClickFix attacks.

BleepingComputer also reported today about a novel ClickFix attack promoted through Pastebin comments that tricked cryptocurrency users into executing malicious JavaScript directly in their browser while visiting a cryptocurrency exchange to hijack transactions. 

This is one of the first ClickFix campaigns designed to execute JavaScript in the browser and hijack web application functionality rather than deploy malware.

tines

The future of IT infrastructure is here

Modern IT infrastructure moves faster than manual workflows can handle.

In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.


文章来源: https://www.bleepingcomputer.com/news/security/new-clickfix-attack-abuses-nslookup-to-retrieve-powershell-payload-via-dns/
如有侵权请联系:admin#unsafe.sh