Most of the security systems offer some sort of DNS protection, to host a malware script in DNS system, this would require unusually long and random domains. If users/admins are blocking new domains (for example through ControlD, NextDNS or solutions for businesses), attackers will need to wait for these domains to gain the necessary reputation.
In addition, solutions such as the AVG, Avast, NortonLifeLock Web Shield, Check Point AntiBot, McAfee GTI and so on, look at the communication patterns. And last but not least, this requires malicious code already running to retrieve (load) the additional malicious code.
So the picture is not as apocalyptic as it looks, attackers have been doing it for years.