Science
Criminals Revive Ancient ‘Finger’ Command for Malicious Attacks
A software tool that has largely faded from common use is now being exploited by cybercriminals for malicious purposes. The ancient “finger” command, originally designed to retrieve user information on Unix and later Windows systems, is witnessing a resurgence in attacks aimed at executing harmful code. Security researchers have reported a notable increase in campaigns utilizing this tool, particularly in scams known as “ClickFix,” where users are tricked into executing seemingly innocuous commands.
The Finger service, despite being considered outdated, is still supported by most operating systems, making it a target for attackers. According to research from Bleeping Computer, recent attacks leverage the Finger service as a conduit for harmful scripts. In one incident shared on social media platform Reddit, a user unwittingly executed a command after responding to a fake Captcha prompt. This command initiated a Finger call, which relayed information directly to the Windows command prompt, allowing malicious code to be reloaded and executed instantly.
Security experts have analyzed these attacks and discovered that the Finger responses often contain scripts that create temporary directories, rename essential system tools such as “curl,” and download malware from designated servers. In one documented case, a fake PDF archive was unpacked, revealing a Python module designed for spying. Other variations of the attack delivered the remote maintenance Trojan NetSupport Manager, which provides attackers with extensive control over compromised systems.
In some instances, these malicious routines are programmed to detect security analysis tools like Wireshark or Process Hacker. If found, the malware will terminate its own processes to avoid detection. Experts believe that these attacks likely originate from a single actor, highlighting the method’s effectiveness despite its simplicity. The reliance on social engineering tactics ensures that users inadvertently execute dangerous commands themselves.
To mitigate these risks, security researchers recommend blocking outgoing connections through TCP port 79, which is the port associated with the Finger service. Additionally, users should be cautioned against executing commands from unknown sources in the command line, regardless of how harmless they may appear.
As cyber threats evolve, it is crucial for users and organizations to remain vigilant. Awareness and education about these tactics can significantly reduce the likelihood of falling victim to such scams.
-
Entertainment3 weeks agoJayda Cheaves Claims Lil Baby and Ari Fletcher Had an Affair
-
Top Stories2 months agoRachel Campos-Duffy Exits FOX Noticias; Andrea Linares Steps In
-
Top Stories1 month agoPiper Rockelle Shatters Record with $2.3M First Day on OnlyFans
-
Science2 weeks agoHarvard Physicist Proposes Cosmic Location for Heaven at 273 Billion Trillion Miles
-
Health3 months agoTerry Bradshaw Updates Fans on Health After Absence from FOX NFL Sunday
-
Top Stories1 month agoMeta’s 2026 AI Policy Sparks Outrage Over Privacy Concerns
-
Sports1 month agoLeon Goretzka Considers Barcelona Move as Transfer Window Approaches
-
Top Stories1 month agoUrgent Update: Denver Fire Forces Mass Evacuations, 100+ Firefighters Battling Blaze
-
Top Stories1 month agoOnlyFans Creator Lily Phillips Reconnects with Faith in Rebaptism
-
Top Stories3 weeks agoPatriots Face Altitude Challenge in AFC Championship; Experts Weigh In
-
Top Stories1 month agoOregon Pilot and Three Niece Die in Arizona Helicopter Crash
-
Sports1 month agoSouth Carolina Faces Arkansas in Key Women’s Basketball Clash
