
DNS TXT Records Exploited In ClickFix Script For Remote PowerShell Command Execution
Cyber threats evolve fast, and attackers now hide commands in plain sight using everyday DNS features. A new campaign called KongTuke has surfaced, abusing DNS TXT records to stage and execute remote PowerShell scripts. This technique lets malware slip past network defenses by mimicking legitimate DNS traffic. Security researchers recently spotted it in the ongoing […] The post DNS TXT Records Exploited In ClickFix Script For Remote PowerShell Command Execution appeared first on Cyber Security News.