radar

ONE Sentinel

securitySecurity/THREATS/HIGH

New ClickFix attack abuses nslookup to retrieve PowerShell payload via DNS

sourceBleeping Computer
calendar_todayFebruary 16, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

New ClickFix Attack Exploits DNS for PowerShell Payload Delivery

Summary

The article discusses a novel ClickFix social engineering attack that leverages DNS queries to deliver malware payloads via PowerShell. This marks the first known instance of using DNS as a channel in ClickFix campaigns.

Key Points

  • Threat actors are utilizing DNS queries in ClickFix attacks to deliver malware.
  • The attack involves the use of 'nslookup' to retrieve PowerShell payloads.
  • This method represents the first known use of DNS in ClickFix campaigns.
  • The attack is a form of social engineering, exploiting user interaction.

Analysis

The significance of this attack lies in its novel use of DNS queries to bypass traditional security measures, highlighting the evolving tactics of threat actors. By using 'nslookup' to retrieve malicious payloads, attackers can exploit a commonly used network tool to evade detection, posing a significant threat to IT security.

Conclusion

IT professionals should enhance monitoring of DNS queries and educate users about the risks of social engineering attacks. Implementing robust security measures to detect and block suspicious DNS activities is crucial.