ClickFix added nslookup commands to its arsenal for downloading RATs
好的,我现在需要帮用户总结这篇文章的内容。用户的要求是用中文总结,控制在100字以内,并且不需要以“文章内容总结”或“这篇文章”这样的开头,直接写描述即可。 首先,我快速浏览一下文章。文章主要讲的是ClickFix恶意软件活动,骗子如何诱骗受害者感染自己的设备。他们利用nslookup这个工具来传播恶意软件,因为传统的mshta和Powershell命令被安全软件阻止了。 接下来,文章描述了攻击的初始阶段,包括假的验证码、解决不存在的问题、浏览器崩溃等,目的是让受害者运行恶意命令。恶意命令会被复制到剪贴板,指导受害者粘贴到运行对话框或终端中。 然后,详细解释了nslookup是如何被滥用的。它本来是用来查DNS的,但攻击者配置服务器返回包含恶意指令的数据。这些指令下载ZIP文件,提取恶意Python脚本,最终释放ModeloRAT远程木马。 最后,文章给出了防范建议:不要急着执行命令、避免运行不可信来源的脚本、手动输入命令、安装防病毒软件、了解攻击手法等。 现在我要把这些信息浓缩到100字以内。重点包括:ClickFix利用nslookup传播恶意软件,诱骗用户执行命令下载并运行ModeloRAT远程木马。同时提醒用户不要轻易复制粘贴代码,并保持设备安全。 确保语言简洁明了,不使用复杂的术语。最后检查字数是否符合要求。 </think> ClickFix恶意软件活动通过诱导用户运行恶意命令感染设备。攻击者利用nslookup工具伪装成正常网络诊断工具,实际用于传播恶意指令和下载ZIP文件中的Python脚本及ModeloRAT远程木马。用户需警惕复制粘贴代码并保持设备安全。 2026-2-16 13:9:37 Author: www.malwarebytes.com(查看原文) 阅读量:1 收藏

ClickFix malware campaigns are all about tricking the victim into infecting their own machine.

Apparently, the criminals behind these campaigns have figured out that mshta and Powershell commands are increasingly being blocked by security software, so they have developed a new method using nslookup.

The initial stages are pretty much the same as we have seen before: fake CAPTCHA instructions to prove you’re not a bot, solving non-existing computer problems or updates, causing browser crashes,  and even instruction videos.

The idea is to get victims to run malicious commands to infect their own machine. The malicious command often gets copied to the victim’s clipboard with instructions to copy it into the Windows Run dialog or the Mac terminal.

Nslookup is a built‑in tool to use the internet “phonebook,” and the criminals are basically abusing that phonebook to smuggle in instructions and malware instead of just getting an address.

It exists to troubleshoot network problems, check if DNS is configured correctly, and investigate odd domains, not to download or run programs. But the criminals configured a server to reply with data that is crafted so that part of the “answer” is actually another command or a pointer to malware, not just a normal IP address.

Microsoft provided these examples of malicious commands:

nslookup command examples

These commands start an infection chain that downloads a ZIP archive from an external server. From that archive, it extracts a malicious Python script that runs routines to conduct reconnaissance, run discovery commands, and eventually drop a Visual Basic Script which drops and executes ModeloRAT.

ModeloRAT is a Python‑based remote access trojan (RAT) that gives attackers hands‑on control over an infected Windows machine.

Long story short, the cybercriminals have found yet another way to use a trusted technical tool and make it secretly carry the next step of the attack, all triggered by the victim following what looks like harmless copy‑paste support instructions. At which point they might hand over the control over their system.

How to stay safe

With ClickFix running rampant—and it doesn’t look like it’s going away anytime soon—it’s important to be aware, careful, and protected.

  • Slow down. Don’t rush to follow instructions on a webpage or prompt, especially if it asks you to run commands on your device or copy-paste code. Attackers rely on urgency to bypass your critical thinking, so be cautious of pages urging immediate action. Sophisticated ClickFix pages add countdowns, user counters, or other pressure tactics to make you act quickly.
  • Avoid running commands or scripts from untrusted sources. Never run code or commands copied from websites, emails, or messages unless you trust the source and understand the action’s purpose. Verify instructions independently. If a website tells you to execute a command or perform a technical action, check through official documentation or contact support before proceeding.
  • Limit the use of copy-paste for commands. Manually typing commands instead of copy-pasting can reduce the risk of unknowingly running malicious payloads hidden in copied text.
  • Secure your devices. Use an up-to-date, real-time anti-malware solution with a web protection component.
  • Educate yourself on evolving attack techniques. Understanding that attacks may come from unexpected vectors and evolve helps maintain vigilance. Keep reading our blog!

Pro tip: Did you know that the free Malwarebytes Browser Guard extension warns you when a website tries to copy something to your clipboard?


We don’t just report on threats—we help safeguard your entire digital identity

Cybersecurity risks should never spread beyond a headline. Protect your, and your family’s, personal information by using identity protection.

About the author

Was a Microsoft MVP in consumer security for 12 years running. Can speak four languages. Smells of rich mahogany and leather-bound books.


文章来源: https://www.malwarebytes.com/blog/news/2026/02/clickfix-added-nslookup-commands-to-its-arsenal-for-downloading-rats
如有侵权请联系:admin#unsafe.sh