← Back to Archive

DNS-Based ClickFix Attacks Emerge as Major Threat Vector; ShinyHunters Breach Exposes 600K Customer Records

Critical Infrastructure Intelligence Briefing

Reporting Period: February 9-16, 2026
Published: Monday, February 16, 2026


1. Executive Summary

Major Developments

  • Novel ClickFix Attack Evolution: Microsoft and multiple security researchers have disclosed a significant evolution in ClickFix social engineering tactics, now leveraging DNS queries via nslookup to stage and deliver malware payloads. This represents the first known use of DNS as a delivery channel in these campaigns, potentially bypassing traditional web-based security controls.
  • Major Data Breach: The ShinyHunters data extortion group claims responsibility for compromising over 600,000 Canada Goose customer records, including personal and payment-related data. This incident highlights ongoing threats to retail sector data security and supply chain integrity.
  • Infostealer Campaign Exploiting Legitimate Services: CTM360 has identified a large-scale malware distribution campaign abusing Google Groups and Google-hosted URLs to spread Lumma Stealer malware and trojanized browser software, with over 4,000 malicious Google Groups identified.
  • Windows Boot Failures Resolved: Microsoft has addressed a critical Windows 11 bug causing boot failures on commercial systems following security updates, an important development for enterprise IT and OT environments.

Key Takeaways for Infrastructure Operators

  • DNS monitoring and filtering capabilities should be reviewed given the emergence of DNS-based malware staging techniques
  • User awareness training should be updated to address evolving ClickFix social engineering tactics
  • Organizations should verify Windows 11 systems have received KB5077181 to prevent boot failures
  • Cryptocurrency-related operations face targeted threats through browser-based attacks

2. Threat Landscape

Emerging Attack Vectors

DNS-Based ClickFix Attacks

Threat Level: HIGH

A significant evolution in the ClickFix social engineering framework has been observed, with threat actors now using DNS queries to retrieve malicious payloads:

  • Technique: Attackers trick users into running nslookup commands that retrieve encoded PowerShell payloads via DNS TXT records
  • Significance: This is the first documented use of DNS as a delivery channel for ClickFix attacks
  • Evasion Capability: DNS-based delivery may bypass web proxies, URL filtering, and traditional endpoint detection mechanisms
  • Attack Chain: Social engineering → User executes nslookup command → DNS query retrieves encoded payload → PowerShell execution → Malware deployment

Sources: The Hacker News | Bleeping Computer

ClickFix Cryptocurrency Targeting

A parallel ClickFix campaign is targeting cryptocurrency users through Pastebin comments:

  • Malicious JavaScript designed to hijack cryptocurrency swap transactions
  • Users tricked into executing code directly in browser developer consoles
  • Financial services and individual cryptocurrency holders at risk

Source: Bleeping Computer

Cybercriminal Developments

ShinyHunters Data Extortion Activity

The well-known data extortion group ShinyHunters has claimed a significant breach:

  • Victim: Canada Goose (retail/apparel)
  • Scope: 600,000+ customer records
  • Data Types: Personal information and payment-related data
  • Status: Company investigating; data reportedly being leaked

Implications: While not directly critical infrastructure, this incident demonstrates continued threat actor focus on customer data monetization and the potential for supply chain impacts affecting retail and logistics sectors.

Source: Bleeping Computer

Lumma Stealer Distribution Campaign

CTM360 researchers have uncovered a large-scale infostealer distribution operation:

  • Scale: 4,000+ malicious Google Groups; 3,500+ Google-hosted malicious URLs
  • Malware: Lumma Stealer infostealer and trojanized "Ninja Browser"
  • Technique: Abuse of legitimate Google services for distribution and command-and-control
  • Risk: Credential theft affecting enterprise and critical infrastructure authentication systems

Source: Bleeping Computer


3. Sector-Specific Analysis

Communications & Information Technology

Threat Level: ELEVATED

DNS Infrastructure Concerns

The emergence of DNS-based malware delivery has significant implications for IT infrastructure:

  • DNS is foundational to all networked operations and is often less scrutinized than HTTP/HTTPS traffic
  • Many organizations lack visibility into DNS query content and TXT record responses
  • Internal DNS servers may inadvertently facilitate malware staging if not properly monitored

Recommended Actions:

  • Implement DNS logging and monitoring for anomalous query patterns
  • Consider DNS filtering solutions that inspect TXT record content
  • Review policies for outbound DNS queries from endpoints
  • Evaluate DNS-over-HTTPS (DoH) policies to maintain visibility

Financial Services

Threat Level: ELEVATED

Cryptocurrency Operations at Risk

The Pastebin-based ClickFix campaign specifically targets cryptocurrency transactions:

  • Browser-based attacks can intercept and modify swap transactions
  • Financial institutions with cryptocurrency exposure should review browser security policies
  • Customer-facing cryptocurrency services may need enhanced fraud detection

Credential Theft Implications

The Lumma Stealer campaign poses risks to financial services authentication:

  • Stolen credentials can facilitate account takeover and fraudulent transactions
  • Multi-factor authentication remains critical defense
  • Monitor for credential stuffing attempts using potentially compromised credentials

Energy Sector

Threat Level: BASELINE

No sector-specific threats reported this period. However, energy sector operators should note:

  • DNS-based attack techniques could potentially target OT environments with network connectivity
  • Windows 11 boot failure issues may affect enterprise IT systems supporting energy operations
  • Infostealer campaigns could compromise credentials used for energy sector access

Water & Wastewater Systems

Threat Level: BASELINE

No sector-specific threats reported this period. Standard vigilance recommended:

  • Ensure IT/OT segmentation prevents DNS-based attacks from reaching control systems
  • Review remote access security given ongoing credential theft campaigns

Healthcare & Public Health

Threat Level: BASELINE

No sector-specific threats reported this period. Healthcare organizations should:

  • Monitor for infostealer activity that could compromise patient data access credentials
  • Ensure Windows systems are patched to prevent boot failures affecting clinical operations

Transportation Systems

Threat Level: BASELINE

No sector-specific threats reported this period. Transportation operators should maintain awareness of:

  • Supply chain data security given retail sector breach activity
  • IT system stability following Windows update issues

4. Vulnerability & Mitigation Updates

Critical Patches and Updates

Microsoft Windows 11 KB5077181

Priority: HIGH for affected systems

AttributeDetails
Affected SystemsWindows 11 commercial/enterprise deployments
IssueUNMOUNTABLE_BOOT_VOLUME error after security updates
ResolutionKB5077181 addresses boot failure conditions
Action RequiredDeploy update to affected systems; verify boot stability

Source: Bleeping Computer

Recommended Defensive Measures

DNS Security Enhancements

Given the emergence of DNS-based malware delivery:

  1. Enable DNS Query Logging: Capture and analyze DNS queries, particularly those with large TXT record responses
  2. Implement DNS Filtering: Block known malicious domains and consider content inspection for TXT records
  3. Monitor nslookup Usage: Alert on unusual nslookup command execution, particularly from non-administrative users
  4. Restrict PowerShell: Implement PowerShell Constrained Language Mode where feasible; log all PowerShell execution
  5. Network Segmentation: Ensure OT networks do not have unrestricted DNS access to the internet

Social Engineering Defense

ClickFix attacks rely on user interaction:

  • Update security awareness training to include ClickFix scenarios
  • Warn users about requests to run commands or paste code into terminals/consoles
  • Implement application whitelisting to prevent unauthorized script execution
  • Consider endpoint detection rules for suspicious command-line patterns

Infostealer Mitigation

  • Deploy endpoint detection and response (EDR) solutions with infostealer detection capabilities
  • Implement browser isolation for high-risk activities
  • Enforce multi-factor authentication across all critical systems
  • Monitor for unauthorized browser extensions and applications
  • Consider blocking access to Pastebin and similar services from sensitive networks

5. Resilience & Continuity Planning

Lessons from Current Incidents

Windows Update Boot Failures

The Windows 11 boot failure incident offers several lessons:

  • Staged Deployments: Security updates should be tested on representative systems before broad deployment
  • Recovery Procedures: Ensure documented procedures exist for boot failure recovery
  • Backup Boot Media: Maintain recovery media for critical systems
  • Communication Plans: Have procedures for rapid notification if updates cause operational issues

DNS as Attack Vector

The emergence of DNS-based attacks highlights infrastructure dependencies:

  • DNS is often a "trusted" protocol with less security scrutiny
  • Organizations should map DNS dependencies and potential abuse scenarios
  • Consider DNS security as part of overall network security architecture reviews

Supply Chain Security Considerations

The Canada Goose breach and ongoing infostealer campaigns underscore supply chain risks:

  • Third-party data breaches can expose customer and partner information
  • Credential theft can facilitate supply chain compromise
  • Organizations should assess vendor security practices and breach notification procedures

Cross-Sector Dependencies

This week's threats highlight several cross-sector considerations:

  • DNS Infrastructure: All sectors depend on DNS; compromise affects universal operations
  • Credential Security: Infostealer campaigns can compromise access across multiple sectors
  • Operating System Stability: Windows issues can cascade across all sectors using Microsoft platforms

6. Regulatory & Policy Developments

Upcoming NIST Activities

Note: The following events are scheduled for future dates and represent policy development opportunities:

Supply Chain Network Initiative

NIST has announced work on "Building the Strategic Supply Chain Network" addressing:

  • Vulnerabilities exposed by recent disruptions (pandemics, infrastructure failures, trade policy changes)
  • Coordinated approaches to supply chain resilience
  • Critical infrastructure supply chain dependencies

Scheduled: March 9, 2026
Source: NIST Information Technology

IoT Cybersecurity Workshop

NIST will host a workshop on "Cybersecurity for IoT: Future Directions" covering:

  • Emerging and future trends for IoT technologies
  • Implications for IoT cybersecurity as devices become more sophisticated and ubiquitous
  • Automated and interconnected IoT security challenges

Scheduled: March 31, 2026
Source: NIST Information Technology

Compliance Considerations

Organizations should consider how current threats relate to compliance requirements:

  • DNS Security: May be relevant to network security requirements under various frameworks
  • Patch Management: Windows update issues highlight importance of documented patch procedures
  • Incident Response: Data breaches like Canada Goose may trigger notification requirements for affected parties

7. Training & Resource Spotlight

Recommended Training Focus Areas

Social Engineering Awareness

Given the evolution of ClickFix attacks, organizations should prioritize:

  • Training on recognizing requests to execute commands or code
  • Understanding of how legitimate tools (nslookup, PowerShell) can be abused
  • Reporting procedures for suspicious requests

DNS Security Fundamentals

Security teams should ensure familiarity with:

  • DNS query types and potential abuse scenarios
  • DNS logging and monitoring techniques
  • DNS security solutions and their capabilities

Resources

CISA Resources

Vendor Security Advisories


8. Looking Ahead: Upcoming Events

Conferences and Workshops

DateEventFocus Area
March 9, 2026NIST Strategic Supply Chain NetworkSupply Chain Resilience
March 31, 2026NIST IoT Cybersecurity WorkshopIoT Security Future Directions

Threat Awareness Periods

February-March 2026

  • Tax Season: Increased phishing and social engineering targeting financial information
  • ClickFix Evolution: Expect continued development of DNS-based and other novel delivery techniques
  • Infostealer Activity: Ongoing campaigns abusing legitimate services likely to continue

Anticipated Developments

  • Additional details on DNS-based ClickFix techniques as security researchers analyze campaigns
  • Potential for copycat attacks using DNS for malware staging
  • Continued evolution of social engineering tactics targeting cryptocurrency users
  • Further information on Canada Goose breach scope and impact

Contact and Feedback

This intelligence briefing is produced for critical infrastructure stakeholders to support security decision-making and situational awareness. Recipients are encouraged to share relevant threat information through appropriate channels and participate in sector-specific information sharing organizations.

Report compiled from open-source intelligence. Information is provided as-is for situational awareness purposes. Organizations should validate applicability to their specific environments and risk profiles.

Disclaimer

This briefing is generated using AI analysis of public news sources. Always verify critical information through authoritative sources before taking action.