Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Clickfix Attack Exploits finger.exe Tool to Trick Users into Execute Malicious Code

New Clickfix Attack Exploits finger.exe Tool to Trick Users into Execute Malicious Code

Posted on December 15, 2025December 15, 2025 By CWS

A novel social engineering marketing campaign, dubbed ClickFix, has been recognized, which cleverly employs an previous Home windows command-line device, finger.exe, to put in malware on victims’ programs.

This assault begins with a misleading CAPTCHA verification web page, tricking customers into working a script that initiates the an infection course of.

The method has been in use since at the least November 2025 and continues to be a persistent risk.

The assault’s reliance on the finger protocol, a legacy networking device for retrieving person data, is a novel attribute.

Risk actors are abusing this seemingly innocent utility to fetch malicious payloads from distant servers.

This methodology permits the attackers to bypass some safety measures that aren’t configured to observe or block visitors over the finger protocol’s designated TCP port 79.

Web Storm Heart analysts/researchers famous this exercise and have been monitoring two outstanding campaigns using this method: KongTuke and SmartApeSG.

Faux CAPTCHA pages

Each campaigns leverage faux CAPTCHA pages to lure customers into executing the preliminary finger command, demonstrating a shared methodology.

Faux CAPTCHA web page (Supply – Web Storm Heart)

The continued use of this tactic highlights its effectiveness in environments the place legacy protocols aren’t adequately secured.

Upon execution, the finger command contacts a command-and-control server. For example, the KongTuke marketing campaign makes use of a command like finger gcaptcha@captchaver[.]prime.

Discovering finger visitors utilizing the finger filter in Wireshark (Supply – Web Storm Heart)

The server responds with a PowerShell command containing Base64 encoded textual content, which then executes on the person’s machine to hold out additional malicious actions.

The SmartApeSG marketing campaign operates equally, utilizing a command reminiscent of finger [email protected][.]108 to retrieve a script.

Textual content returned from the server in response to the finger command (Supply – Web Storm Heart)

This script then downloads and executes a malicious file, which exhibits the script retrieving a file named yhb.jpg that accommodates the malicious payload.

This multi-stage course of permits the malware to determine a foothold on the compromised system.

Whereas company networks with express proxies could block TCP port 79, many programs stay weak if this port will not be explicitly blocked, making these assaults a continued concern for community directors.

Comply with us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Attack, ClickFix, Code, Execute, Exploits, finger.exe, Malicious, Tool, Trick, Users

Post navigation

Previous Post: Atlassian Patches Critical Apache Tika Flaw
Next Post: Soverli Raises $2.6 Million for Secure Smartphone OS

Related Posts

UNC2891 Threat Actors Hacked ATM Networks Using 4G Raspberry Pi Device UNC2891 Threat Actors Hacked ATM Networks Using 4G Raspberry Pi Device Cyber Security News
Threat Actors Using Typosquatted PyPI Packages to Steal Cryptocurrency from Bittensor Wallets Threat Actors Using Typosquatted PyPI Packages to Steal Cryptocurrency from Bittensor Wallets Cyber Security News
Your Tier 1 Analyst at SOC Team Is Failing at Effective Triage Your Tier 1 Analyst at SOC Team Is Failing at Effective Triage Cyber Security News
Tomiris Hacker Group Added New Tools and Techniques to Attack Organizations Globally Tomiris Hacker Group Added New Tools and Techniques to Attack Organizations Globally Cyber Security News
Microsoft Reveals Techniques To Defending Against Advancing AiTM Attacks Microsoft Reveals Techniques To Defending Against Advancing AiTM Attacks Cyber Security News
Apache Hadoop Vulnerability Exposes Systems Potential Crashes or Data Corruption Apache Hadoop Vulnerability Exposes Systems Potential Crashes or Data Corruption Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News