National Cyber Warfare Foundation (NCWF)

Cyberattackers Exploit DNS TXT Records in ClickFix Script to Execute Malicious PowerShell Commands


0 user ratings
2026-02-05 05:00:28
milo
Red Team (CNA)

A new evolution in the “ClickFix” social engineering campaigns, dubbed KongTuke. This latest variant, observed actively since late December 2025, distinguishes itself by leveraging DNS TXT records to stage and retrieve malicious payloads, marking a significant shift in evasion tactics. The “ClickFix” technique typically involves compromising legitimate websites or creating fake landing pages that display a deceptive “Verify […]


The post Cyberattackers Exploit DNS TXT Records in ClickFix Script to Execute Malicious PowerShell Commands appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.



Mayura Kathir

Source: gbHackers
Source Link: https://gbhackers.com/dns-txt-records/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



Copyright 2012 through 2026 - National Cyber Warfare Foundation - All rights reserved worldwide.