Skip to content

Comments

New Query: DNS Staging Detection: ClickFix-Inspired nslookup Execution#20

Merged
Polaceka merged 1 commit intomainfrom
submission/e73af614-b9ce-43db-becf-0c71cd2e05db
Feb 20, 2026
Merged

New Query: DNS Staging Detection: ClickFix-Inspired nslookup Execution#20
Polaceka merged 1 commit intomainfrom
submission/e73af614-b9ce-43db-becf-0c71cd2e05db

Conversation

@byteray-cql-hub-bot
Copy link
Contributor

New Query Submission

Name: DNS Staging Detection: ClickFix-Inspired nslookup Execution
Author: cap10
Submission ID: e73af614-b9ce-43db-becf-0c71cd2e05db

Description

Detects nslookup activity used for DNS-based staging, specifically targeting the pattern of querying external nameservers to retrieve and execute malicious payloads, as seen in recent ClickFix attacks. This hunt is highly valuable as it identifies a shift away from heavily-monitored tools like mshta and PowerShell toward abusing trusted network utilities to bypass standard firewalls and blend with legitimate DNS traffic.


This PR was automatically created by the CQL Hub submission pipeline.

@Polaceka Polaceka self-assigned this Feb 20, 2026
@Polaceka Polaceka merged commit 8aaeed3 into main Feb 20, 2026
2 checks passed
@Polaceka Polaceka deleted the submission/e73af614-b9ce-43db-becf-0c71cd2e05db branch February 23, 2026 08:57
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant