ClickFix Abuses DNS Command to Deliver ModeloRAT

Article Highlights
Off On

Cybercriminals are continually refining their methods to bypass modern security defenses, often by repurposing legitimate system tools for malicious ends. A recent evolution in ClickFix attacks demonstrates this trend with alarming effectiveness, now employing a new command to trick users into compromising their own Windows devices with a potent Remote Access Trojan (RAT) called ModeloRAT. Security researchers first identified the change in these attacks, which have been ongoing since 2024, noting that threat actors had developed “yet another evasion approach.” This new technique leverages the nslookup command, a standard networking utility, to replace previously used PowerShell or mshta commands. Attackers now prompt targets to run a command that executes a custom DNS lookup, parsing the “Name:” response to retrieve and execute the next-stage payload. This clever abuse of the Domain Name System (DNS) significantly reduces the attack’s reliance on traditional web requests, allowing malicious activity to blend seamlessly with normal network traffic, making it incredibly difficult to detect, even within sophisticated enterprise environments.

1. The Mechanics of a Deceptive Command

The nslookup command is a ubiquitous utility found in most operating systems, designed for network administrators and users to troubleshoot connectivity problems, verify DNS configurations, and investigate domain information; it was never intended to download or execute programs. However, threat actors behind the ClickFix campaign have co-opted this tool precisely because of its legitimate nature. Recognizing that security software is increasingly flagging and blocking the use of PowerShell and mshta for suspicious activities, they have pivoted to nslookup as a less-monitored alternative. By embedding instructions and malware components within DNS records, the attackers are essentially using the internet’s “phonebook” to smuggle malicious code past security perimeters. This method allows the attack to bypass firewalls and proxies that might otherwise inspect and block direct web downloads, as DNS queries are a fundamental and heavily trafficked part of network operations, making it challenging to isolate malicious lookups from legitimate ones. Once a user is tricked into executing the malicious nslookup command, a multi-stage infection chain is initiated to deliver the final payload. The command first reaches out to a threat actor-controlled server to download a ZIP archive. This archive contains a malicious Python script, which, upon extraction, is responsible for the next phase of the attack. The script proceeds to drop a Visual Basic Script (VBS) onto the victim’s machine. This VBS file is the final trigger, executing the ModeloRAT malware. ModeloRAT is a Python-based Remote Access Trojan that provides attackers with extensive, hands-on control over the infected Windows system. With this level of access, cybercriminals can perform a wide range of malicious actions, including stealing sensitive data, monitoring user activity, installing additional malware, and using the compromised machine as a launchpad for further attacks within the network, transforming a single user’s mistake into a significant organizational breach.

2. A Familiar Playbook With a New Twist

Despite the novel use of the nslookup command, the initial stages of the attack follow a well-established social engineering playbook designed to manipulate user trust and urgency. The process often begins by presenting the target with a fake CAPTCHA challenge, a common security feature used to distinguish humans from bots. By mimicking this familiar verification step, attackers create a false sense of security, making the user believe they are engaging in a legitimate and safe online interaction. Following this bogus challenge, the attackers employ various deceptive tactics to persuade the individual to take a specific action. These tactics may include displaying fake error messages about non-existent computer problems, prompting for a necessary software update to continue browsing, or even causing the browser to crash. In some cases, they provide instructional videos that calmly walk the user through the process of pasting a malicious command into their system, framing it as the solution to the manufactured problem.

The evolution of these attacks underscores a persistent effort by cybercriminals to exploit trusted technical tools to achieve their objectives. This campaign, which has been actively adapting since it was first documented by researchers nearly two years ago, highlights the dynamic nature of cyber threats. The latest pivot to the nslookup command is a direct response to heightened security around previously abused commands, demonstrating the attackers’ agility in identifying and exploiting new vectors. While this specific campaign delivers the ModeloRAT, the underlying ClickFix framework has been used to distribute various forms of malware in the past, including information stealers designed to harvest credentials and financial data. In other instances, state-sponsored advanced persistent threat (APT) groups have leveraged similar techniques to deploy backdoors for long-term espionage, illustrating the versatility and danger of this social engineering-driven attack method. The core of the threat remains the manipulation of the user, turning them into an unwitting accomplice in the compromise of their own device.

3. Strategies for Proactive Defense

Given the sophisticated and evolving nature of ClickFix attacks, user awareness and caution are the most critical lines of defense. It is essential for individuals to adopt a skeptical mindset when navigating the web and to proceed slowly when encountering unexpected instructions or prompts on a webpage, especially any that request running commands or copying and pasting code. Attackers frequently use psychological manipulation, such as displaying timers or countdowns for a supposed update or fix, to create a sense of urgency. This tactic is designed to pressure the user into acting quickly, bypassing their critical thinking and leading them to follow malicious instructions without proper consideration. Resisting this manufactured urgency is paramount. Taking a moment to question the legitimacy of the request, such as why a website would need the user to manually run a command-line tool, can often be the difference between staying safe and falling victim to an attack. This deliberate and cautious approach is crucial in disrupting the social engineering lifecycle.

This recent campaign has underscored the critical need for verifying instructions from any unconfirmed source before taking action. Commands or scripts from unfamiliar websites, unsolicited emails, or instant messages should never be executed unless the source is thoroughly trusted and the purpose of the action is completely understood. A prudent step is to independently verify any such instructions through official documentation or by contacting the organization’s customer support directly. Furthermore, limiting the practice of copying and pasting commands can significantly reduce the risk of compromise. Manually typing commands, while more cumbersome, forces a user to see and process the entire command, making it harder for attackers to hide malicious payloads within seemingly innocuous copied text. Ultimately, these attacks succeed by exploiting a user’s trust and their willingness to follow on-screen directions. The primary defense rested not just on technology, but on the informed skepticism and deliberate actions of every individual user, which proved to be the most effective barrier against such deceptive schemes.

Explore more

Trend Analysis: Career Adaptation in AI Era

The long-standing illusion that a stable career is built solely upon years of dedicated service to a single institution is rapidly evaporating under the heat of technological disruption. Historically, professionals viewed consistency and institutional knowledge as the ultimate safeguards against the volatility of the economy. However, as Artificial Intelligence integrates into the core of global operations, these traditional virtues are

Trend Analysis: Modern Workplace Productivity Paradox

The seamless integration of sophisticated intelligence into every digital interface has created a landscape where the output of a novice often looks indistinguishable from that of a veteran. While automation and generative tools promised to liberate the human spirit from the drudgery of repetitive tasks, the reality on the ground suggests a far more taxing environment. Today, the average professional

How Data Analytics and AI Shape Modern Business Strategy

The shift from traditional intuition-based management to a framework defined by empirical evidence has fundamentally altered how global enterprises identify opportunities and mitigate risks in a volatile economy. This evolution is driven by data analytics, a discipline that has transitioned from a supporting back-office function to the primary engine of corporate strategy and operational excellence. Organizations now navigate increasingly complex

Trend Analysis: Robust Statistics in Data Science

The pristine, bell-curved datasets found in academic textbooks rarely survive a first encounter with the chaotic realities of industrial data streams. In the current landscape of 2026, the reliance on idealized assumptions has proven to be a liability rather than a foundation. Real-world data is notoriously messy, characterized by extreme outliers, heavily skewed distributions, and inconsistent variances that render traditional

Trend Analysis: B2B Decision Environments

The rigid, mechanical architecture of the traditional sales funnel has finally buckled under the weight of a modern buyer who demands total autonomy throughout the purchasing process. Marketing departments that once relied on pushing leads through a linear pipeline now face a reality where the buyer is the one in control, often lurking in the shadows of self-education long before