ClickFix Malware Uses DNS Hijacking to Evade Detection and Install RATs


ClickFix attacks now trick users into running DNS lookup commands. These fetch second-stage payloads from attacker servers. The technique blends with normal traffic to dodge security tools.

Crooks show fake CAPTCHAs or “fix issue” popups on hacked sites. Victims copy scripts to clipboard and paste into Run dialog or PowerShell. New variant skips browser crashes for stealthy DNS staging.

Scripts use cmd.exe for nslookup against rogue DNS servers. They parse the Name: field in responses. This field holds executable code, not domains. Attackers confirm live targets before heavy downloads.

Microsoft Defender spots this as Trojan:Win32/ClickFix.R!ml. Chain pulls ZIPs with Python recon tools. VBScript drops MonitoringService.lnk to Startup for persistence. Final payload: ModeloRAT for remote control.

DNS queries look normal. Networks rarely block them. Technique validates targets cheaply before full attacks.

Microsoft Threat Intelligence states: “Attackers use DNS as lightweight staging channel to reach infrastructure under control. This reduces web request dependency and blends with normal traffic.”

Microsoft LinkedIn posts confirm: “Initial command performs DNS lookup against external server. Output extracts Name: field executed as second-stage payload.”

Attack Chain Table

StageActionPayload
1Fake CAPTCHA/Run scriptDNS nslookup trigger
2Parse Name: fieldExecute staging code
3Download ZIPPortable Python bundle
4Recon + VBS dropMonitoringService.lnk
5RAT deploymentModeloRAT controlโ€‹

Evasion Tactics

DNS traffic volume hides commands. No HTTP downloads raise flags. Attackers pivot servers fast. Validates victims before wasting bandwidth.

Python bundles run portable. No installs needed. Startup persistence survives reboots.

Detection Signatures

  • Trojan:Win32/ClickFix.R!ml
  • Suspicious nslookup to rogue DNS
  • MonitoringService.lnk in Startup
  • ModeloRAT network beacons

Protection Steps

  • Block PowerShell/Run clipboard pastes via GPO
  • Monitor DNS to unknown servers
  • Train users on fake CAPTCHAs
  • Enable Defender real-time protection
ControlMethodImpact
AppLockerBlock cmd.exe scriptsHigh
DNS FilteringRogue server blocksMedium
EDR RulesNslookup parsingHigh
User TrainingIgnore fix promptsEssential โ€‹

ClickFix variants: CrashFix, FileFix, JackFix, ConsentFix. All social engineer command execution. Lumma Stealer surges via similar CAPTCHAs.

FAQ

How does ClickFix use DNS?

Nslookup fetches code in Name: field from rogue servers.

What RAT deploys?

ModeloRAT via Python/VBS persistence.

Detection name?

Trojan:Win32/ClickFix.R!ml by Defender.

Why DNS for staging?

Blends with normal traffic; cheap target validation.

Prevention tips?

Block script execution; monitor DNS queries.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages