ClickFix Abuses DNS Command to Deliver ModeloRAT

Article Highlights
Off On

Cybercriminals are continually refining their methods to bypass modern security defenses, often by repurposing legitimate system tools for malicious ends. A recent evolution in ClickFix attacks demonstrates this trend with alarming effectiveness, now employing a new command to trick users into compromising their own Windows devices with a potent Remote Access Trojan (RAT) called ModeloRAT. Security researchers first identified the change in these attacks, which have been ongoing since 2024, noting that threat actors had developed “yet another evasion approach.” This new technique leverages the nslookup command, a standard networking utility, to replace previously used PowerShell or mshta commands. Attackers now prompt targets to run a command that executes a custom DNS lookup, parsing the “Name:” response to retrieve and execute the next-stage payload. This clever abuse of the Domain Name System (DNS) significantly reduces the attack’s reliance on traditional web requests, allowing malicious activity to blend seamlessly with normal network traffic, making it incredibly difficult to detect, even within sophisticated enterprise environments.

1. The Mechanics of a Deceptive Command

The nslookup command is a ubiquitous utility found in most operating systems, designed for network administrators and users to troubleshoot connectivity problems, verify DNS configurations, and investigate domain information; it was never intended to download or execute programs. However, threat actors behind the ClickFix campaign have co-opted this tool precisely because of its legitimate nature. Recognizing that security software is increasingly flagging and blocking the use of PowerShell and mshta for suspicious activities, they have pivoted to nslookup as a less-monitored alternative. By embedding instructions and malware components within DNS records, the attackers are essentially using the internet’s “phonebook” to smuggle malicious code past security perimeters. This method allows the attack to bypass firewalls and proxies that might otherwise inspect and block direct web downloads, as DNS queries are a fundamental and heavily trafficked part of network operations, making it challenging to isolate malicious lookups from legitimate ones. Once a user is tricked into executing the malicious nslookup command, a multi-stage infection chain is initiated to deliver the final payload. The command first reaches out to a threat actor-controlled server to download a ZIP archive. This archive contains a malicious Python script, which, upon extraction, is responsible for the next phase of the attack. The script proceeds to drop a Visual Basic Script (VBS) onto the victim’s machine. This VBS file is the final trigger, executing the ModeloRAT malware. ModeloRAT is a Python-based Remote Access Trojan that provides attackers with extensive, hands-on control over the infected Windows system. With this level of access, cybercriminals can perform a wide range of malicious actions, including stealing sensitive data, monitoring user activity, installing additional malware, and using the compromised machine as a launchpad for further attacks within the network, transforming a single user’s mistake into a significant organizational breach.

2. A Familiar Playbook With a New Twist

Despite the novel use of the nslookup command, the initial stages of the attack follow a well-established social engineering playbook designed to manipulate user trust and urgency. The process often begins by presenting the target with a fake CAPTCHA challenge, a common security feature used to distinguish humans from bots. By mimicking this familiar verification step, attackers create a false sense of security, making the user believe they are engaging in a legitimate and safe online interaction. Following this bogus challenge, the attackers employ various deceptive tactics to persuade the individual to take a specific action. These tactics may include displaying fake error messages about non-existent computer problems, prompting for a necessary software update to continue browsing, or even causing the browser to crash. In some cases, they provide instructional videos that calmly walk the user through the process of pasting a malicious command into their system, framing it as the solution to the manufactured problem.

The evolution of these attacks underscores a persistent effort by cybercriminals to exploit trusted technical tools to achieve their objectives. This campaign, which has been actively adapting since it was first documented by researchers nearly two years ago, highlights the dynamic nature of cyber threats. The latest pivot to the nslookup command is a direct response to heightened security around previously abused commands, demonstrating the attackers’ agility in identifying and exploiting new vectors. While this specific campaign delivers the ModeloRAT, the underlying ClickFix framework has been used to distribute various forms of malware in the past, including information stealers designed to harvest credentials and financial data. In other instances, state-sponsored advanced persistent threat (APT) groups have leveraged similar techniques to deploy backdoors for long-term espionage, illustrating the versatility and danger of this social engineering-driven attack method. The core of the threat remains the manipulation of the user, turning them into an unwitting accomplice in the compromise of their own device.

3. Strategies for Proactive Defense

Given the sophisticated and evolving nature of ClickFix attacks, user awareness and caution are the most critical lines of defense. It is essential for individuals to adopt a skeptical mindset when navigating the web and to proceed slowly when encountering unexpected instructions or prompts on a webpage, especially any that request running commands or copying and pasting code. Attackers frequently use psychological manipulation, such as displaying timers or countdowns for a supposed update or fix, to create a sense of urgency. This tactic is designed to pressure the user into acting quickly, bypassing their critical thinking and leading them to follow malicious instructions without proper consideration. Resisting this manufactured urgency is paramount. Taking a moment to question the legitimacy of the request, such as why a website would need the user to manually run a command-line tool, can often be the difference between staying safe and falling victim to an attack. This deliberate and cautious approach is crucial in disrupting the social engineering lifecycle.

This recent campaign has underscored the critical need for verifying instructions from any unconfirmed source before taking action. Commands or scripts from unfamiliar websites, unsolicited emails, or instant messages should never be executed unless the source is thoroughly trusted and the purpose of the action is completely understood. A prudent step is to independently verify any such instructions through official documentation or by contacting the organization’s customer support directly. Furthermore, limiting the practice of copying and pasting commands can significantly reduce the risk of compromise. Manually typing commands, while more cumbersome, forces a user to see and process the entire command, making it harder for attackers to hide malicious payloads within seemingly innocuous copied text. Ultimately, these attacks succeed by exploiting a user’s trust and their willingness to follow on-screen directions. The primary defense rested not just on technology, but on the informed skepticism and deliberate actions of every individual user, which proved to be the most effective barrier against such deceptive schemes.

Explore more

Orange Marketing’s Model for Flawless CRM Adoption

The landscape of B2B technology is littered with powerful software platforms that promised transformation but ultimately gathered digital dust, a testament to the staggering failure rate of many CRM implementations. These expensive failures often stem not from a lack of technical features but from a fundamental misunderstanding of the human element involved in adopting new systems. When a company invests

The Brutal Truth About Why You’re Not Getting Hired

It’s Not Just You: Navigating the Modern Job Hunt Gauntlet The demoralizing feeling is all too familiar for countless job seekers: you have meticulously submitted dozens, perhaps even hundreds, of applications into the vast digital void, only to be met with a cascade of automated rejection emails or, worse, deafening silence. With over 200 million job applications submitted in the

Data Centers Evolve PUE with System-Level Energy Integration

The immense thermal footprint generated by artificial intelligence accelerators has quietly become one of the most significant and costly operational challenges facing the digital infrastructure industry today. As the backbone of modern computing, data centers have long measured their efficiency through the lens of Power Usage Effectiveness (PUE), a metric that has driven remarkable innovation. However, the relentless escalation of

AI Empowers Low-Skilled Hackers With Vibe Extortion

The landscape of digital threats has taken a bizarre turn as unsophisticated cybercriminals begin to leverage the power of artificial intelligence to orchestrate extortion campaigns with an unnerving, albeit artificial, professionalism. Researchers at Palo Alto Networks’ Unit 42 recently coined the term “vibe extortion” to describe this emerging phenomenon after investigating a particularly striking incident where a visibly intoxicated attacker

Apple iOS Security Updates – Review

The digital fortress protecting personal data on a smartphone has become more critical than ever, with Apple’s latest security initiatives signaling a significant shift from reactive defense to proactive, system-wide fortification. This review explores the evolution of iOS security, focusing on the key features introduced in the iOS 26.4 beta, their performance implications, and the impact they have on user