Attackers Using DNS TXT Records in ClickFix Script to Execute Powershell Commands

The cybersecurity landscape has darkened with the sophisticated evolution of the KongTuke campaign. Active since mid-2025, this threat actor group has continuously refined its techniques to bypass conventional enterprise security filters. Their primary weapon remains the “ClickFix” strategy, a social engineering vector that deceives unsuspecting users into manually fixing simulated website errors. In these attacks, […]

The post Attackers Using DNS TXT Records in ClickFix Script to Execute Powershell Commands appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: