More

    How an ancient Unix tool resurfaced to execute hidden commands and steal data without any user noticing



    • The “finger” command remains exploitable for remote code execution even after years of disuse
    • Attackers use batch scripts to channel server responses directly into Windows command sessions
    • Hidden Python programs are delivered through archives disguised as harmless documents

    The finger command is an old network lookup tool originally used to fetch basic information about remote or local system users on Unix and later on Windows.

    It was gradually abandoned as modern authentication and user query systems became standard, but this decade-old threat has now apparently quietly resurfaced in malicious operations targeting users who unknowingly execute remote instructions pulled through the outdated protocol.


    https://cdn.mos.cms.futurecdn.net/L3eMPKdkBm7FWUtjEYWaw7-1920-80.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img