Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Finger.exe & ClickFix, (Sun, Nov 16th)

0
Medium
Vulnerability
Published: Sun Nov 16 2025 (11/16/2025, 07:27:55 UTC)
Source: SANS ISC Handlers Diary

Description

The ClickFix attack leverages the legacy Windows executable finger. exe, which implements the old finger protocol over TCP port 79. Attackers use finger. exe to retrieve malicious scripts via this protocol, bypassing some traditional security controls. Since finger. exe is not proxy-aware and the finger protocol uses a fixed port (79), environments with explicit proxies blocking direct TCP connections to port 79 can prevent this communication. However, transparent proxies that allow TCP connections to port 79 may still be vulnerable. This attack vector exploits a rarely monitored protocol and a legacy tool present in Windows systems, enabling attackers to fetch malicious payloads stealthily. No known exploits are currently observed in the wild, and the threat is assessed as medium severity due to limited impact and exploitation complexity. European organizations with legacy Windows systems and network configurations allowing TCP port 79 traffic are at risk, especially in countries with high Windows usage and less restrictive outbound firewall policies.

AI-Powered Analysis

AILast updated: 11/16/2025, 07:30:31 UTC

Technical Analysis

The threat involves the use of finger.exe, a legacy Windows executable implementing the finger protocol originally from UNIX systems, which communicates over TCP port 79. In the ClickFix attacks, adversaries exploit finger.exe to retrieve malicious scripts via the finger protocol. The finger protocol is fixed to TCP port 79 and cannot be changed, and finger.exe is not proxy-aware, meaning it does not route traffic through configured proxies. This characteristic allows network defenders to block or allow finger.exe communications based on proxy configurations and firewall rules. Specifically, in corporate environments with explicit proxies that block direct Internet connections except through the proxy, finger.exe cannot communicate externally. However, in networks with transparent proxies that allow TCP connections to port 79, finger.exe can successfully retrieve malicious payloads. The attack leverages a rarely used protocol and a legacy executable that is still present on Windows systems, making it a living-off-the-land binary (LOLBin) technique. This approach can evade detection by traditional security tools focused on more common protocols and executables. Although no known exploits are currently active in the wild, the medium severity rating reflects the potential for script retrieval and execution leading to further compromise. The threat highlights the importance of monitoring and controlling legacy protocols and binaries that may be exploited for malicious purposes.

Potential Impact

For European organizations, the impact of this threat primarily lies in the potential for attackers to stealthily retrieve and execute malicious scripts using a legacy protocol and executable that may be overlooked by standard security controls. Successful exploitation could lead to initial footholds in networks, enabling further lateral movement or payload deployment. Organizations with legacy Windows systems and network environments that permit TCP port 79 traffic are particularly vulnerable. The use of finger.exe bypasses proxy-based filtering if transparent proxies allow port 79, potentially circumventing perimeter defenses. This could result in unauthorized data access, system compromise, or persistence mechanisms being established. However, the lack of known active exploits and the medium severity rating suggest that the threat is currently limited in scope and impact. Nonetheless, the presence of this attack vector increases the attack surface and requires attention to prevent exploitation. European organizations with critical infrastructure or sensitive data are at risk of targeted attacks leveraging this technique, especially if network segmentation and outbound traffic controls are insufficient.

Mitigation Recommendations

1. Block outbound TCP traffic on port 79 at network firewalls and perimeter devices to prevent finger protocol communications. 2. Disable or restrict the use of finger.exe on Windows systems through application whitelisting or group policy to prevent its misuse. 3. Implement explicit proxy configurations that block direct Internet access except through the proxy, ensuring finger.exe cannot bypass filtering. 4. Monitor network traffic for any use of TCP port 79 and finger protocol communications, using intrusion detection systems or network monitoring tools to detect anomalous activity. 5. Educate security teams about the risks associated with legacy protocols and LOLBins like finger.exe to improve detection and response capabilities. 6. Conduct regular audits of legacy tools and protocols present in the environment and remove or restrict those not required. 7. Apply network segmentation to limit the ability of compromised hosts to communicate externally using uncommon protocols. 8. Incorporate detection rules in endpoint detection and response (EDR) solutions to flag execution of finger.exe retrieving external scripts. These targeted measures go beyond generic advice by focusing on controlling the specific protocol and executable involved in the ClickFix attack.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://isc.sans.edu/diary/rss/32492","fetched":true,"fetchedAt":"2025-11-16T07:30:20.949Z","wordCount":273}

Threat ID: 69197d8c349a492776829d47

Added to database: 11/16/2025, 7:30:20 AM

Last enriched: 11/16/2025, 7:30:31 AM

Last updated: 11/16/2025, 10:06:38 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats