top of page

Microsoft Warns of DNS-Based ClickFix Attacks Targeting Windows Users

  • 4 days ago
  • 2 min read

Key Findings


  • Microsoft has disclosed details of a new version of the ClickFix social engineering tactic that uses DNS lookups to retrieve malware payloads.

  • The attack tricks users into running commands through the Windows Run dialog that perform a DNS lookup to an external server controlled by the attackers.

  • The DNS response is then executed as the second-stage payload, allowing the threat actors to reach infrastructure under their control and establish a new validation layer.

  • The downloaded payload initiates an attack chain leading to the deployment of ModeloRAT, a Python-based remote access trojan.

  • The malware also creates a Windows shortcut (LNK) file in the Startup folder to establish persistence.

  • Bitdefender has warned of a surge in Lumma Stealer activity driven by ClickFix-style fake CAPTCHA campaigns that distribute an AutoIt version of CastleLoader.

  • CastleLoader is a malware loader associated with the GrayBravo threat actor group, incorporating checks to bypass security solutions before launching the stealer.


Background


ClickFix is an increasingly popular social engineering tactic that tricks unsuspecting users into running commands to infect their own machines with malware, allowing threat actors to bypass security controls. The method has spawned several variants, such as FileFix, JackFix, ConsentFix, CrashFix, and GlitchFix.


DNS-Based Malware Staging


  • The latest DNS-based ClickFix attack uses the `nslookup` command to perform a DNS lookup against a hard-coded external server, rather than the system's default resolver.

  • The DNS response is filtered to extract the `Name:` field, which is then executed as the second-stage payload.

  • This approach reduces the dependency on traditional web requests and helps blend the malicious activity into normal network traffic.


Lumma Stealer Campaigns


  • Bitdefender has observed a surge in Lumma Stealer activity, driven by ClickFix-style fake CAPTCHA campaigns that deploy an AutoIt version of CastleLoader.

  • CastleLoader incorporates checks to determine the presence of virtualization software and security programs before decrypting and launching the stealer malware in memory.

  • Websites advertising cracked software and pirated movies also serve as bait for CastleLoader-based attack chains, deceiving users into downloading rogue installers or executables.

  • Lumma Stealer operations have demonstrated resilience, rapidly migrating to new hosting providers and adapting alternative loaders and delivery techniques.


Conclusion


The effectiveness of ClickFix lies in its abuse of procedural trust rather than technical vulnerabilities, as the instructions often resemble troubleshooting steps or verification workarounds that users may have encountered previously. This highlights the importance of user awareness and the need for robust security measures to protect against such social engineering attacks.


Sources


  • https://thehackernews.com/2026/02/microsoft-discloses-dns-based-clickfix.html

  • https://x.com/TheCyberSecHub/status/2023050328518873213

  • https://x.com/AdliceSoftware/status/2023064774435541163

  • https://www.cypro.se/2026/02/15/microsoft-discloses-dns-based-clickfix-attack-using-nslookup-for-malware-staging/

  • https://www.ctrlaltnod.com/news/microsoft-warns-of-dns-based-clickfix-attacks-on-windows-users/

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page