Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
  • AI
  • Tech
  • Cybersecurity
  • Finance
  • DeFi & Blockchain
  • Startups
  • Gaming
Dataconomy
  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
Subscribe
No Result
View All Result
Dataconomy
No Result
View All Result

ClearFake reCAPTCHA scam infects 9,300 websites

The attack sequence begins when a user visits a compromised site, leading to the retrieval of intermediate JavaScript code from BSC

byKerem Gülen
March 20, 2025
in Cybersecurity, News
Home News Cybersecurity

The ClearFake campaign has infected at least 9,300 websites, employing fake reCAPTCHA and Cloudflare Turnstile verifications to lure users into downloading malicious software, including Lumma Stealer and Vidar Stealer. First identified in July 2023, ClearFake utilizes compromised WordPress sites as a vector for malware distribution, primarily relying on fake web browser update prompts.

ClearFake campaign infects 9,300 websites

ClearFake has also adopted the EtherHiding technique to enhance the resilience of its attack chain, utilizing Binance’s Smart Chain (BSC) contracts to fetch subsequent payloads. The primary objective of these infection chains is to deliver information-stealing malware targeting both Windows and macOS systems.

By May 2024, ClearFake had incorporated what is referred to as ClickFix, a social engineering tactic designed to trick users into executing malicious PowerShell code under the pretense of resolving a non-existent technical issue. According to Sekoia’s analysis, the new variant maintains its reliance on EtherHiding while also facilitating additional interactions with the Binance Smart Chain.

Stay Ahead of the Curve!

Don't miss out on the latest insights, trends, and analysis in the world of data, technology, and startups. Subscribe to our newsletter and get exclusive content delivered straight to your inbox.

These interactions involve using the smart contract’s Application Binary Interfaces to load multiple JavaScript codes and additional resources. These resources serve to fingerprint the victim’s system and download, decrypt, and display the ClickFix lure. The latest ClearFake iteration has integrated Web3 capabilities to thwart analysis while encrypting the HTML code related to ClickFix.

The attack sequence begins when a user visits a compromised site, leading to the retrieval of intermediate JavaScript code from BSC. This JavaScript is responsible for fingerprinting the system and fetching the encrypted ClickFix code hosted on Cloudflare Pages. If the victim executes the malicious PowerShell command, the Emmenhtal Loader (also known as PEAKLIGHT) deploys, subsequently introducing Lumma Stealer. In late January 2025, an alternate attack chain was observed that used a PowerShell loader to install Vidar Stealer.

ClearFake operators have reportedly updated the framework code, lures, and payload distributions daily. The malware execution now relies on various data stored within the Binance Smart Chain, including JavaScript code, AES keys, URLs for lure HTML files, and ClickFix PowerShell commands. The prevalence of compromised websites suggests that this threat continues to pose a significant risk, with approximately 200,000 unique users potentially exposed to ClearFake lures in July 2024.


Badbox 2.0 malware is infecting a million Android devices right now


In a related finding, over 100 auto dealership websites have been compromised with ClickFix lures that deploy SectopRAT malware. Security researcher Randy McEoin noted that this infection originated not from the dealerships’ own websites but from a third-party video service, LES Automotive (idostream[.]com), which has since removed the malicious JavaScript injection.

These developments coincide with various phishing campaigns aimed at distributing multiple malware families and harvesting credentials. Methods identified include the use of virtual hard disk (VHD) files embedded in archived email attachments to deliver Venom RAT via a Windows batch script, and exploitative Microsoft Excel file attachments utilizing a known security vulnerability (CVE-2017-0199) to download an HTML Application (HTA) that leverages Visual Basic Script (VBS) for further malware deployment.

Additionally, there are reports of exploiting misconfigurations in Microsoft 365 infrastructure to gain control of tenants, create administrative accounts, and deliver phishing content that evades email security measures, ultimately enabling credential harvesting and account takeover (ATO).

As social engineering tactics evolve, organizations must implement robust authentication and access-control mechanisms to guard against Adversary-in-the-Middle (AitM) and Browser-in-the-Middle (BitM) techniques that facilitate account hijacking. A report from Mandiant highlighted the speed at which BitM frameworks can target websites, allowing attackers to serve legitimate sites through attacker-controlled browsers, complicating the distinction between genuine and fraudulent sites for victims.


Featured image credit: Pixabay/Pexels

Tags: Cybersecurity

Related Posts

Spotify Premium to add 24-bit FLAC lossless audio

Spotify Premium to add 24-bit FLAC lossless audio

September 10, 2025
Bending Spoons to acquire Vimeo for .38 billion

Bending Spoons to acquire Vimeo for $1.38 billion

September 10, 2025
Nintendo Direct September 2025: What’s coming for Nintendo Switch and Switch 2?

Nintendo Direct September 2025: What’s coming for Nintendo Switch and Switch 2?

September 10, 2025
China develops SpikingBrain1.0, a brain-inspired AI model

China develops SpikingBrain1.0, a brain-inspired AI model

September 10, 2025
TwinMind raises .7M to launch AI second brain for offline note-taking

TwinMind raises $5.7M to launch AI second brain for offline note-taking

September 10, 2025
YouTube Music tests lyrics paywall for free users

YouTube Music tests lyrics paywall for free users

September 10, 2025

LATEST NEWS

Spotify Premium to add 24-bit FLAC lossless audio

Bending Spoons to acquire Vimeo for $1.38 billion

Nintendo Direct September 2025: What’s coming for Nintendo Switch and Switch 2?

China develops SpikingBrain1.0, a brain-inspired AI model

TwinMind raises $5.7M to launch AI second brain for offline note-taking

YouTube Music tests lyrics paywall for free users

Dataconomy

COPYRIGHT © DATACONOMY MEDIA GMBH, ALL RIGHTS RESERVED.

  • About
  • Imprint
  • Contact
  • Legal & Privacy

Follow Us

  • News
    • Artificial Intelligence
    • Cybersecurity
    • DeFi & Blockchain
    • Finance
    • Gaming
    • Startups
    • Tech
  • Industry
  • Research
  • Resources
    • Articles
    • Guides
    • Case Studies
    • Glossary
    • Whitepapers
  • Newsletter
  • + More
    • Conversations
    • Events
    • About
      • About
      • Contact
      • Imprint
      • Legal & Privacy
      • Partner With Us
No Result
View All Result
Subscribe

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.