Browser-native C2 is no longer theoretical.
ClearFake shows how JavaScript, content delivery, and smart contract lookups can replace beaconing malware entirely. No binaries. No callbacks.
blackcastle.com.au/blog/clearfa...
#ClearFake #C2 #LOTL #BrowserSecurity #ThreatResearch #MalwareAnalysis
🚨Spotting Stealthy #CLEARFAKE Campaign!!
With following #Powershell Command Snippet, I was able to pull some fresh cases of ClearFake!
"POwErsHeLL -w 1 &"
IP
83.219.248.37
172.67.202.94
172.67.219.189
199.188.201.106
83.219.248.37
172.67.132.82
172.67.202.94
github.com/TheRavenFile...
ClickFix Malware Campaign Exploits CAPTCHAs to Spread Cross-Platform Infections
⚠️ ClickFix malware campaign replaces ClearFake — no downloads, just fake CAPTCHAs + clipboard hijacks.
☑️ Uses Google Scripts
☑️ Cross-platform (Win/macOS)
☑️ Obfuscated JS payloads in legit sources
Guardio Labs: “A chilling list of techniques…”
#ClickFix #Malware #CAPTCHAgeddon #Phishing #ClearFake
Captchageddon evolve la minaccia ClickFix con fake captcha che attivano malware stealer via clipboard, eludendo download e antivirus.
#browser #Captchageddon #ClearFake #ClickFix #fakecaptcha #Guardio #malware #stealer
www.matricedigitale.it/2025/08/06/c...
Etherhide Technique Using Blockchain as C&C Infrastructure OverviewThreat actors have been ut...
https://asec.ahnlab.com/en/88009/
#Public #Trend #BlockChain #C2 #ClearFake #Ethereum #Etherhide #블록체인 #이더리움 #Smargaft
Result Details
🛡️ New blog: #ClearFake evolves with new tactics - #Blockchain obfuscation, fake reCAPTCHAs & more.
Learn how it works, its impact on #Retail & #Hospitality, and how to defend against it.
🔗 rhisac.org/threat-intel...
#CyberSecurity
Here is our in-depth analysis of the latest #ClearFake variant using the Binance Smart Chain and two new ClickFix lures.
ClearFake is injected into thousands of compromised sites to distribute the #Emmental Loader, #Lumma, #Rhadamanthys, and #Vidar.
⬇️
bsky.app/profile/seko...
ClearFake reCAPTCHA scam infects 9,300 websites The ClearFake campaign has infected at least 9,30...
dataconomy.com/2025/03/20/clearfake-rec...
#Cybersecurity #News #ClearFake #reCAPTCHA
Event Attributes
ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers reconbee.com/clearfake-in...
#clearfake #reCAPTCHA #infostealers #turnstile
#cyberattacks
TDR analysts published an analysis of the new #ClearFake variant that relies on compromised websites injected with the malicious JavaScript framework, the #EtherHiding technique, and the #ClickFix social engineering tactic.
buff.ly/vbiVbsN
#ClearFake variant is now spreading #Rhadamanthys Stealer via #Emmenhtal Loader.
cc @plebourhis.bsky.social @sekoia.io
1. ClearFake framework is injected on compromised WordPress and relies on EtherHiding
2. The #ClickFix lure uses a fake Cloudflare Turnstile with unusual web traffic
⬇️
The contract’s content is clearly malicious and connects over WebSocket to suckerity[.]xyz (behind Cloudflare), not related to #ClearFake, but reminds us #Magecart related injections:
#etherhiding (hiding malicious code in blockchain based smart contracts) is not only by #ClearFake related actors – but now also for #Magecart 👇
2025-02-05 (Wednesday): #ClearFake / #ClickFix style fake CAPTCHA leads to possible #Vidar.
Vidar C2 using eteherealpath[.]top behind Cloudflare.
Details at github.com/malware-traf...
#ClearFake / #ClickFix is back infecting directly legit but vulnerable websites, delivering in the end #Lumma / #LummaStealer
New Swiss centered malware campaign in German using some #ClearFake / #ClickFix tricks impersonating Ricardo, one of the biggest Swiss online second-hand marketplace:
Finally we also witnessed in the wild one of those #ClearFake / #ClickFix bait delivered per email as reported by Proofpoint in June - ending with a #brutel / #Latrodectus / #BruteRatel
payload www.proofpoint.com/au/blog/thre...
After mucking around a bit finally got a working Dropbox URL and file for the #Clearfake distributed #AtomicStealer fake Chrome sample urlscan.io/result/376ad... tria.ge/240806-sahwj... and now it's a different IP 45.134.26[.]7 for the c2
What is old is new again, #atomicstealer being distributed via #clearfake campaign. Haven't seen that in a while!
Clearfake domain: cejecuu4[.]xyz
C2: 193.124.185[.]23
Payload staged in Dropbox
#macosmalware #infostealers #amos #fakebrowserupdates #fakechrome
#ClearFake related contract 0xa6165aa33ac710ad5dcd4f4d6379466825476fde was updated recently and points now to daslkjfhi2[.]lol, displaying a new type of lure to visitors:
#ClearFake updated the TDS in contract 0x34585777843Abb908a1C5FbD6F3f620bC56874AA 3 times today:
v7yen47u2e[.]xyz
cv2b8uz46e[.]xyz
b9y3b7ner2[.]xyz (currently used)
The last round of updates on this contract was on May 30th - also with 3 different domains.
#clearfake changed the contract used to deliver the TDS URL: bscscan.com/address/0x10...
Fake browser updates host malicious files on decentralized blockchain, evading takedowns. An evolution of the #ClearFake scam, now leveraging #BinanceSmartChain, uncovers a dangerous blend of #cybersecurity threats and #blockchain tech: krebsonsecurity.com/2023/10/the-... #InfoSec