Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…


Finger.exe & ClickFix, (Sun, Nov 16th)

0
Medium
Vulnerability
Published: Sun Nov 16 2025 (11/16/2025, 07:27:55 UTC)
Source: SANS ISC Handlers Diary

Description

The finger.exe command is used in ClickFix attacks.

AI-Powered Analysis

AILast updated: 11/16/2025, 07:30:31 UTC

Technical Analysis

The threat involves the use of finger.exe, a legacy Windows executable implementing the finger protocol originally from UNIX systems, which communicates over TCP port 79. In the ClickFix attacks, adversaries exploit finger.exe to retrieve malicious scripts via the finger protocol. The finger protocol is fixed to TCP port 79 and cannot be changed, and finger.exe is not proxy-aware, meaning it does not route traffic through configured proxies. This characteristic allows network defenders to block or allow finger.exe communications based on proxy configurations and firewall rules. Specifically, in corporate environments with explicit proxies that block direct Internet connections except through the proxy, finger.exe cannot communicate externally. However, in networks with transparent proxies that allow TCP connections to port 79, finger.exe can successfully retrieve malicious payloads. The attack leverages a rarely used protocol and a legacy executable that is still present on Windows systems, making it a living-off-the-land binary (LOLBin) technique. This approach can evade detection by traditional security tools focused on more common protocols and executables. Although no known exploits are currently active in the wild, the medium severity rating reflects the potential for script retrieval and execution leading to further compromise. The threat highlights the importance of monitoring and controlling legacy protocols and binaries that may be exploited for malicious purposes.

Potential Impact

For European organizations, the impact of this threat primarily lies in the potential for attackers to stealthily retrieve and execute malicious scripts using a legacy protocol and executable that may be overlooked by standard security controls. Successful exploitation could lead to initial footholds in networks, enabling further lateral movement or payload deployment. Organizations with legacy Windows systems and network environments that permit TCP port 79 traffic are particularly vulnerable. The use of finger.exe bypasses proxy-based filtering if transparent proxies allow port 79, potentially circumventing perimeter defenses. This could result in unauthorized data access, system compromise, or persistence mechanisms being established. However, the lack of known active exploits and the medium severity rating suggest that the threat is currently limited in scope and impact. Nonetheless, the presence of this attack vector increases the attack surface and requires attention to prevent exploitation. European organizations with critical infrastructure or sensitive data are at risk of targeted attacks leveraging this technique, especially if network segmentation and outbound traffic controls are insufficient.

Mitigation Recommendations

1. Block outbound TCP traffic on port 79 at network firewalls and perimeter devices to prevent finger protocol communications. 2. Disable or restrict the use of finger.exe on Windows systems through application whitelisting or group policy to prevent its misuse. 3. Implement explicit proxy configurations that block direct Internet access except through the proxy, ensuring finger.exe cannot bypass filtering. 4. Monitor network traffic for any use of TCP port 79 and finger protocol communications, using intrusion detection systems or network monitoring tools to detect anomalous activity. 5. Educate security teams about the risks associated with legacy protocols and LOLBins like finger.exe to improve detection and response capabilities. 6. Conduct regular audits of legacy tools and protocols present in the environment and remove or restrict those not required. 7. Apply network segmentation to limit the ability of compromised hosts to communicate externally using uncommon protocols. 8. Incorporate detection rules in endpoint detection and response (EDR) solutions to flag execution of finger.exe retrieving external scripts. These targeted measures go beyond generic advice by focusing on controlling the specific protocol and executable involved in the ClickFix attack.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://isc.sans.edu/diary/rss/32492","fetched":true,"fetchedAt":"2025-11-16T07:30:20.949Z","wordCount":273}

Threat ID: 69197d8c349a492776829d47

Added to database: 11/16/2025, 7:30:20 AM

Last enriched: 11/16/2025, 7:30:31 AM

Last updated: 1/7/2026, 3:57:21 AM

Views: 706

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats