Threat Brief - 2026-02-15

⚠️ This report is AI-generated. Always validate findings.

Threat Brief — Saturday, February 15, 2026

Executive Summary

Microsoft disclosed a new ClickFix variant using nslookup for DNS-based payload staging—delivers ModeloRAT and Lumma Stealer while evading web request monitoring. Russian-linked CANFAIL malware targeting Ukrainian defense with LLM-assisted reconnaissance. macOS users hit by MacSync stealer distributed through Google Ads and Claude artifacts.


1. DNS-Based ClickFix Attack (ModeloRAT/Lumma Stealer)

🔴 Critical · Social Engineering + Malware Delivery · No CVE · Active Campaigns

Microsoft disclosed new ClickFix variant using nslookup against external DNS servers to retrieve payloads from TXT records. Bypasses web request monitoring by blending into DNS traffic. Delivers ModeloRAT (Python RAT) and Lumma Stealer via CastleLoader.

Sources: The Hacker News · Microsoft

TTPs

TechniqueTacticObservable
T1204.002ExecutionUser runs command via Windows Run dialog
T1059.001Executioncmd.exenslookup with hardcoded external DNS server
T1071.004C2DNS queries to attacker-controlled nameservers
T1059.006ExecutionPython-based ModeloRAT execution
T1547.001PersistenceLNK file in Windows Startup folder

IOCs

  • azwsappdev[.]com — Payload hosting (ZIP archive)
  • Hardcoded external DNS servers (not system resolver)
  • VBScript launching ModeloRAT

Detection

Log Sources: Sysmon (ProcessCreate, NetworkConnect), DNS logs, PowerShell logs

Logic:

# Nslookup to non-standard DNS server
index=sysmon EventCode=1 Image="*nslookup.exe"
| regex CommandLine="nslookup.*\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}"
| where NOT match(CommandLine, "(8\.8\.8\.8|8\.8\.4\.4|1\.1\.1\.1)")

# CMD spawning nslookup then PowerShell
index=sysmon EventCode=1 
| transaction ParentProcessId maxspan=30s
| search Image="*cmd.exe*" Image="*nslookup.exe*" Image="*powershell.exe*"

Existing Coverage:

Action

🔴 Hunt for nslookup with external DNS. Microsoft detects as Trojan:Win32/ClickFix.R!ml. Look for LNK files in Startup folders pointing to VBScript.


2. CANFAIL Malware Targeting Ukraine

🟡 High · Espionage · No CVE · Russian-Linked APT

Google GTIG attributes CANFAIL malware to suspected Russian intelligence. Targeting Ukrainian defense, energy, government. Actor uses LLMs for reconnaissance and lure generation. Phishing impersonates Ukrainian energy orgs.

Sources: The Hacker News · Google Cloud Blog

TTPs

TechniqueTacticObservable
T1566.002Initial AccessGoogle Drive links in phishing emails
T1059.007ExecutionObfuscated JavaScript (.pdf.js)
T1059.001ExecutionPowerShell dropper → memory-only execution
T1204.001ExecutionUser executes RAR archive content
T1102C2WebSocket-based trojan communication

IOCs

  • RAR archives via Google Drive links
  • JavaScript files with double extension (*.pdf.js)
  • Fake Ukrainian energy company domains
  • LLM-generated phishing lures

Detection

Log Sources: Email gateway, Sysmon, PowerShell logs

Logic:

# RAR extraction followed by JS execution
index=sysmon EventCode=1 
| transaction ParentProcessId maxspan=60s
| search (Image="*WinRAR*" OR Image="*7z*") Image="*wscript*" 

# Memory-only PowerShell (no -File parameter)
index=sysmon EventCode=1 Image="*powershell.exe" 
| where NOT match(CommandLine, "-File")
| where match(CommandLine, "-e|EncodedCommand|FromBase64")

Existing Coverage:

Action

🟡 Hunt if in-scope. Relevant for orgs supporting Ukraine or in defense/energy sectors. Look for Google Drive links in phishing leading to RAR→JS→PowerShell chains.


3. macOS MacSync Stealer via Claude/Google Ads

🟡 High · Info Stealer · No CVE · ClickFix Social Engineering

Campaign abuses Google Ads and Anthropic Claude artifacts to deliver MacSync stealer. 15,000+ users exposed. Uses ClickFix technique to trick users into running Terminal commands. Targets keychain, browser data, crypto wallets.

Sources: CyberPress · Moonlock Lab

TTPs

TechniqueTacticObservable
T1583.008Resource DevMalvertising via Google Ads
T1204.002ExecutionUser pastes Base64 command into Terminal
T1059.002Executionosascript piped command execution
T1555Cred AccessKeychain credential theft
T1041ExfiltrationHTTP POST with chunked uploads

IOCs

  • a2abotnet[.]com/dynamic — C2 server
  • a2abotnet[.]com/gate — Data exfil endpoint
  • raxelpak[.]com — Payload hosting
  • apple-mac-disk-space.medium[.]com — Fake Apple article
  • /tmp/osalogging.zip — Staging file

Detection

Log Sources: macOS Unified Logs, EDR, network traffic

Logic:

# Curl piped to osascript
process where process.name == "osascript" and process.parent.name == "curl"

# Base64 decode in Terminal context
process where process.name == "base64" and process.args : "-d" 
  and process.parent.name in ("Terminal", "bash", "zsh")

# Network to known C2
dns.query.name : ("a2abotnet.com", "raxelpak.com")

Existing Coverage:

Action

🟡 Block IOCs at perimeter. Add a2abotnet[.]com and raxelpak[.]com to blocklists. Educate users about fake “DNS resolver” or “disk analyzer” prompts.


Priority Actions

  1. 🔴 ClickFix DNS staging — Hunt for nslookup to external DNS servers followed by PowerShell
  2. 🟡 macOS MacSync — Block a2abotnet[.]com and raxelpak[.]com; educate users on Terminal paste attacks
  3. 🟡 Ukraine-supporting orgs — Hunt for CANFAIL indicators if in defense/energy sectors