Microsoft Discloses DNS-Based ClickFix Attack Using Nslookup for Malware Staging

Microsoft has disclosed details of a new version of the ClickFix social engineering tactic in which the attackers trick unsuspecting users into running commands that carry out a Domain Name System (DNS) lookup to retrieve the next-stage payload.
Specifically, the attack relies on using the “nslookup” (short for nameserver lookup) command to execute a custom DNS lookup triggered via the Windows

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

Next Post

New Chrome Zero-Day (CVE-2026-2441) Under Active Attack — Patch Released

Related Posts
Total
0
Share