Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Exposes Kazuar Malware’s Modular P Details Malware’s
May 15, 2026
VMware Fusion Vulnerability Let Attackers Escalate Privilege to Root
May 15, 2026
Hackers Abuse Scheduled Tasks for FrostyNeighbor Persistence
May 15, 2026
Home/Threats/ClickFix Script Uses DNS TXT Records to Run PowerShell Commands
Threats

ClickFix Script Uses DNS TXT Records to Run PowerShell Commands

The KongTuke campaign has evolved, presenting a sophisticated new threat to the cybersecurity landscape. Active since mid-2025, this threat actor group consistently refines its techniques to bypass...

Jennifer sherman
Jennifer sherman
February 5, 2026 2 Min Read
5 0

The KongTuke campaign has evolved, presenting a sophisticated new threat to the cybersecurity landscape. Active since mid-2025, this threat actor group consistently refines its techniques to bypass conventional enterprise security filters.

Their primary weapon remains the “ClickFix” strategy, a social engineering vector that deceives unsuspecting users into manually fixing simulated website errors.

In these attacks, victims encounter fake browser glitches or verification captchas on compromised legitimate websites.

Deceptive instructions prompt them to copy a malicious script and paste it directly into the Windows Run dialog or a PowerShell terminal.

This “self-infection” method effectively bypasses automated download protections by leveraging the user’s own system privileges to execute unauthorized code.

However, a significant escalation in technical tradecraft has recently surfaced. Unit 42 analysts identified that the latest KongTuke iterations now employ DNS TXT records to stealthily mask their next stage.

Instead of reaching out to a flagged web server via HTTP, the initial script queries a legitimate-looking domain’s DNS records to retrieve malicious staging instructions from the record.

We discovered the #KongTuke campaign using #DNS TXT records in its #ClickFix script. These DNS TXT records staged a command to retrieve and run a PowerShell script. We continue to monitor ClickFix campaigns for any future occurrences. Details at https://t.co/nU4KHPPlk5 pic.twitter.com/JGIMcpyrlk

— Unit 42 (@Unit42_Intel) February 4, 2026

This method significantly complicates detection for defenders relying on standard HTTP traffic analysis.

By embedding the payload within DNS responses, attackers seamlessly blend their malicious traffic with the constant background noise of internet resolution.

The ultimate goal remains the deployment of severe malware, often leading to the installation of the Interlock remote access trojan or other persistent threats within the network.

Mechanism of DNS TXT Staging

The technical innovation lies in the payload retrieval mechanism. When the victim executes the initial ClickFix snippet, it does not immediately download a file.

Instead, it triggers a PowerShell command that performs a DNS lookup for a specific TXT record.

These records, normally designed to hold text information for domain verification, contain the staged command string needed to fetch and execute the final payload.

Security controls often permit DNS traffic freely to ensure connectivity, creating a dangerous blind spot.

The script parses the text from the DNS response and executes it in memory, leaving minimal traces on the disk.

This “fileless” retrieval allows the KongTuke campaign to maintain a low profile while establishing persistence on compromised endpoints.

Recommendations include blocking newly registered domains, validating DNS traffic for anomalies, and strictly monitoring PowerShell execution logs for suspicious DNS lookup commands.​

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityMalwareSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

TP-Link OS Command Injection Flaws Give Attackers Admin

Next Post

Amaranth-Dragon Exploits WinRAR Flaw for Persistent

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Next.js Flaw Exposes Cloud Vulnerability Credentials
May 15, 2026
OpenAI Confirms Security Breach from TanStack npm Attack
May 15, 2026
Cisco Catalyst SD-WAN Controller 0-Day Actively Exploited to Gain
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us