ClickFix 2.0: How Attackers Are Hijacking DNS to Steal Your Data

A diagram showing how DNS-based ClickFix attacks work, with nslookup commands triggering malicious payloads and blockchain-based delivery methods.

Microsoft just revealed a DNS-based attack that turns your own computer into a trap—no phishing link needed.

Microsoft disclosed a new DNS-based variation of the ClickFix social engineering tactic, using nslookup commands to trigger malicious DNS lookups via the Windows Run dialog.

The output is filtered to extract the `Name:` DNS response, which is executed as the second-stage payload, according to Microsoft's Threat Intelligence team. This attack chain leads to the download of a ZIP archive from "azwsappdev[.]com" containing a Python script and ModeloRAT, a Python-based remote access trojan.

Bitdefender reported a surge in Lumma Stealer activity via ClickFix-style fake CAPTCHA campaigns distributing CastleLoader, which checks for virtualization and security tools before launching malware. "The effectiveness of ClickFix lies in its abuse of procedural trust rather than technical vulnerabilities," Bitdefender noted.

Campaigns using ClickFix now target macOS with stealer malware like Odyssey Stealer, which exfiltrates cryptocurrency wallet data from 203 browser extensions and 18 desktop apps.

A novel technique called EtherHiding leverages blockchain (BNB Smart Chain) to fetch payloads via GitHub, blending malicious traffic with legitimate Web3 activity.

Flare reported 103 Chrome crypto extensions targeted by macOS stealers, exploiting Apple developer signatures to bypass Gatekeeper. "Cryptocurrency users disproportionately use Macs. Once seed phrases are compromised, funds disappear permanently with no recourse," Flare observed.

149 Million Exposed: The Hidden Toll of Infostealing Malware
149 million credentials, including government and banking logins, were exposed in a database hosted in Canada. Infostealing malware automates credential theft, lowering barriers for cybercriminals.
Iran’s Internet Blackout: A New Frontier in Digital Suppression?
Iran’s near-total internet blackout reveals how authoritarian regimes use digital suppression to control dissent during political unrest.