Observed in the wild
Unit 42 on X: "We discovered the #KongTuke campaign using #DNS TXT records in its #ClickFix script. These DNS TXT records staged a command to retrieve and run a PowerShell script. We continue to monitor ClickFix campaigns for any future occurrences. Details at https://t.co/nU4KHPPlk5 https://t.co/JGIMcpyrlk" / X
It looks like you're new here! Sign in or register to be able to comment, access member-only content and follow the spaces relevant to you.
Click on a tag to discover all the published content related to it.