The ClickFix Evolution: How Hackers Now Use DNS to Bypass Your Defenses

Cybercriminals are always improving their techniques, as evidenced by a recent version of the infamous ClickFix attack. Microsoft has revealed a more advanced form of this social engineering technique that now employs DNS lookups, a fundamental internet function, to distribute malware while evading detection by conventional security measures.
Because ClickFix assaults make the victim an unintentional accomplice, they have become a favorite among hackers. These attacks use convincing phony error messages or CAPTCHA prompts to fool users into running malicious commands manually, rather than taking advantage of a technical flaw. However, the new DNS-based variation is especially harmful since it adds a layer of stealth.
How the DNS-Based ClickFix Attack Works
A traditional social engineering lure, which is frequently distributed through phishing emails, malicious advertisements, or hijacked websites, is the first step in this new assault chain. The victim is told to launch the Windows Run dialog (Win+R) and run a certain command after being shown a phony CAPTCHA or an urgent error warning.
However, the command isn't a direct download link. It deftly queries a malicious server under the attacker's control using the genuine Windows nslookup utility. As a "lightweight staging channel," this first request retrieves the payload for the subsequent stage. This request can easily mix in with regular network activity, evading firewalls and basic security checks because DNS communication is common and frequently trusted.
The following command is found in the malicious DNS server's response and is subsequently carried out automatically. With this command, a ZIP archive is downloaded from a distant server. This package contains a malicious Python script that eventually releases the ModeloRAT remote access trojan. The malware is added to the Windows Startup folder as a shortcut to make sure it survives a reboot.
The Bigger Picture: A Surge in ClickFix Campaigns
This DNS-based strategy is merely the most recent development in a much broader series of ClickFix attacks. Microsoft's revelation follows reports of other campaigns disseminating various malware families employing comparable strategies, such as:
- Lumma Stealer: Frequently distributed via loaders such as CastleLoader and phony CAPTCHA pages and websites with cracked software.
- Odyssey Stealer is a macOS-specific stealer (a variant of Atomic Stealer) that targets cryptocurrency wallets and is disseminated through phishing and malicious advertisements.
- StealC and Stealerium are information thieves that are concealed behind phony verification pages and are used with PowerShell commands.
- The abuse of procedural trust is a recurring theme. It is extremely difficult to identify the threat until it is too late since users are tricked into taking actions that mimic authentic diagnostic procedures.
How to Protect Yourself and Your Organization
Protecting against these changing ClickFix attacks necessitates moving away from just technology and toward a mix of technological safeguards and human attention:
- The most important stage is to educate and train users. Employees should be taught to be extremely wary of any pop-up, error message, or website that asks them to paste a command into a Run dialog box. Reputable businesses don't expect customers to solve issues in this manner.
- Limit PowerShell and Command-Line Tools: IT teams can break the attack chain by putting in place application controls that limit the usage of scripts and command-line tools like PowerShell and nslookup by regular users.
- Implement Advanced Endpoint Detection: Even if the initial download is covert, use Endpoint Detection and Response (EDR) tools that can analyze process behavior and spot malicious script execution.
- The development of ClickFix demonstrates that social engineering is still one of the most effective tools available to hackers. As defenders, we have to constantly adjust our technology and awareness.
We at Bayon Technologies Group assist companies in creating strong technical and human defenses against these changing threats. We make sure your company is ready for the upcoming wave of assaults by providing comprehensive endpoint protection and monitoring, as well as enhanced security awareness training that trains users to recognize social engineering traps. Let us assist you in safeguarding your future.
‹ Back


