The Finger protocol — a relic from the early internet used to query user info on remote hosts — has quietly reappeared in modern malware campaigns. Attackers are weaponizing Finger as a low‑noise remote script delivery channel inside ClickFix social‑engineering attacks: victims are tricked into running a short Windows command that runs the Finger query and pipes its output into cmd.exe, which then executes remote instructions. The result is a compact, resilient delivery chain that bypasses some detection patterns, installs loaders or RATs (NetSupport, Python infostealers), and establishes persistent access.
How the attack works (simple flow)
- Victim receives a ClickFix-style prompt (fake captcha or verification) instructing them to run a short command (e.g., via Win+R).
- The command runs the Finger client to query a malicious Finger server (TCP port 79) and pipes the server response into cmd.exe..
- The server‑supplied response contains shell commands that download and unpack payloads (often disguised as PDFs), copy utilities (curl), and run staged malware.
- Malware installs persistence (scheduled tasks, registry Run keys) and deploys remote access, keylogging, or infostealer components.
- The victim sees a benign “verify you are human” message while the compromise proceeds in the background.
Why this is effective and dangerous
- Low‑visibility channel: Finger traffic over port 79 is uncommon in modern environments and may not be profiled or inspected by many defenses.
- Minimal user interaction required: The social engineering step is short and plausible (a verification prompt), and victims are coaxed into running a single command.
- Simple execution chain: By piping command text from the Finger server directly into cmd.exe, attackers avoid hosting obvious script files on the target.
- Evasion checks: Some campaigns probe for analysis tools and abort if sandbox artifacts are present, reducing the chance of detection and public reporting.
- Diverse payloads: Campaigns have dropped Python packages, loaders, and NetSupport RAT, enabling credential theft, remote control, and lateral movement.
Actionable defenses (what defenders should do now)
- Block and monitor port 79 egress: Prevent outbound TCP 79 where policy allows; at minimum log and alert on it (proxy, FW, NDR).
- Educate users about ClickFix and short-run commands: Train staff never to paste or run commands from web pages, chats, or pop-ups; treat “paste this command” prompts as high‑risk.
- Restrict command execution on user endpoints: Use application allow‑listing and PowerShell/Win32exec restrictions; block execution of cmd/curl/python from nonstandard locations.
- Detect clipboard and run‑dialog abuse: Alert on patterns where browsers or web pages trigger clipboard changes followed by Run dialog commands or immediate cmd.exe invocations.
- Harden admin workstations: Prevent admin tooling downloads from search results; restrict admin tasks to hardened jump hosts with controlled software catalogs.
- EDR hunting: Search for indicators — commands piping external input into cmd.exe, curl being copied to unusual filenames, scheduled tasks created by user contexts, and Python packages executed by pythonw.exe..
- Network detection: Look for Finger protocol traffic or unusual HTTP/HTTPS alternates to finger servers; flag repeated small TCP flows to uncommon hosts.
Incident response checklist (if you detect activity)
- Isolate affected host(s) and preserve volatile data (memory, process lists, clipboard history if possible).
- Collect forensic artifacts: cmd histories, scheduled tasks, registry Run keys, downloaded ZIPs, unpacked files, and network captures.
- Revoke and rotate credentials that may have been accessed; reset sessions for impacted accounts.
- Reimage compromised hosts if persistence or credential theft is confirmed; otherwise remove persistence and harden before returning to production.
- Hunt broadly for lateral movement and other compromised hosts using similar indicators.
- Report IoCs and update blocklists for internal tooling and threat intel sharing communities.
Final thought
The Finger abuse is a textbook example of how old, rarely monitored protocols become attractive to attackers: they offer novel channels that slip past maturity gaps in defenses. The fix is straightforward in principle — block or monitor atypical protocols, reduce the temptation for users to execute ad‑hoc commands, and harden endpoint execution policies — but requires coordinated changes across network, endpoint, and user awareness programs. Treat uncommon network ports and simple “paste this command” social engineering as first‑class risks.
Leave a Reply