ClickFix attack campaigns have evolved to use the nslookup DNS lookup command instead of previously blocked PowerShell or mshta commands to deliver ModeloRAT, a Python-based remote access Trojan targeting Windows systems. Attackers abuse DNS to smuggle payloads by parsing the 'Name:' field of DNS responses, blending malicious

5m read timeFrom darkreading.com
Post cover image
Table of contents
Same Attack Playbook With a DNS TwistAdvice for Safe Browsing

Sort: