ARTICLE
25 November 2025

Ankura CTIX FLASH Update - November 19, 2025

AC
Ankura Consulting Group LLC

Contributor

Ankura Consulting Group, LLC is an independent global expert services and advisory firm that delivers end-to-end solutions to help clients at critical inflection points related to conflict, crisis, performance, risk, strategy, and transformation. Ankura consists of more than 1,800 professionals and has served 3,000+ clients across 55 countries. Collaborative lateral thinking, hard-earned experience, and multidisciplinary capabilities drive results and Ankura is unrivalled in its ability to assist clients to Protect, Create, and Recover Value. For more information, please visit, ankura.com.
Hackers are now reusing the old "finger" command, once used to look up user info on Unix, Linux, and Windows systems, to deliver malicious software remotely.
Ukraine Technology
Ankura Consulting Group LLC’s articles from Ankura Consulting Group LLC are most popular:
  • with readers working within the Property industries
Ankura Consulting Group LLC are most popular:
  • within Compliance and Insurance topic(s)

Malware Activity

The Return of the Finger Command and Kraken Ransomware

Hackers are now reusing the old "finger" command, once used to look up user info on Unix, Linux, and Windows systems, to deliver malicious software remotely. Through phishing campaigns called ClickFix, attackers trick users into running commands that download malware like remote access tools or malicious scripts, often disguising them as PDFs or legitimate prompts. Experts warn that this method can bypass traditional security defenses, so blocking outgoing traffic on TCP port 79 (used by the finger protocol) is recommended. Separately, Kraken ransomware has become a highly dangerous threat targeting Windows and Linux systems, testing machines for quick encryption to cause maximum damage while avoiding detection. It exploits vulnerabilities to access networks, steals data, and then encrypts critical files, demanding ransoms sometimes as high as $1 million. Kraken also deletes logs and uses secret forums to coordinate, making it a sophisticated and adaptable tool for cyber extortion across many countries. CTIX analysts will continue to report on the latest malware strains and attack methodologies.

Threat Actor Activity

Russian Port Operator Hit with Three Day DDoS Attack and Intrusion Attempts

Russian port operator Port Alliance experienced three (3) days of disruptions due to a cyberattack from abroad targeting its digital infrastructure. This incident is part of a series of cyberattacks affecting critical facilities amid the ongoing conflict between Russia and Ukraine. The attackers launched a distributed denial-of-service (DDoS) assault and attempted network breaches, aiming to destabilize operations and disrupt business processes related to exports of coal and mineral fertilizers through seaports in the Baltic, Azov–Black Sea, Far Eastern, and Arctic regions. Despite the intensity of the attack, Port Alliance reported that its terminals and facilities continued to operate normally, with all key systems remaining functional. The attackers utilized a botnet of over 15,000 unique IP addresses from around the world, including Russia, and adapted tactics to evade defenses. The company operates six (6) maritime terminals with an annual cargo turnover exceeding 50 million tons. A specific hacker group has not been attributed to the attack at this time. Cyberattacks on transport and logistics networks have increased since Russia's invasion of Ukraine in 2022. Similar attacks have been reported in Ukraine and allied nations, including a recent DDoS attack on Danish government websites, allegedly by the pro-Russian group NoName057.

Vulnerabilities

CISA Orders Emergency Patching of Actively Exploited FortiWeb Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive giving Federal Civilian Executive Branch (FCEB) agencies only seven (7) days to patch a critical vulnerability in Fortinet's FortiWeb web application firewall that is under active exploitation worldwide. The flaw, tracked as CVE-2025-64446 (CVSS 9.1/10) combines a path traversal and authentication bypass, allowing unauthenticated attackers to execute administrative commands and create new administrator accounts for persistent access. Affecting FortiWeb versions 7.0.0 through 8.0.1, the issue was quietly resolved in versions 7.0.12, 7.2.12, 7.4.10, 7.6.5, and 8.0.2, though Fortinet did not disclose the fix in release notes. Researchers from Defused, watchTowr, Rapid7, and PwnDefend reported global, indiscriminate exploitation since early October, with exploit code and a zero-day allegedly offered for sale on dark web forums. Rapid7 and Tenable observed hundreds of vulnerable U.S. systems exposed on Shodan. Following reports of widespread compromise, CISA added the bug to its Known Exploited Vulnerabilities catalog, mandating rapid patching or disabling of HTTP/HTTPS interfaces until updates are applied. Fortinet has confirmed exploitation but declined to specify when it learned of the issue, urging customers to upgrade immediately and review logs for unauthorized administrative accounts, as this marks the 21st Fortinet flaw on CISA's exploited vulnerabilities list.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More