ClearFake Malicious Framework Updates Tactics with Binance Smart Chain Obfuscation

Context

Sekoia researchers have released updates on ClearFake, a malicious JavaScript framework that infects compromised websites to deliver malware through drive-by downloads and social engineering tactics. Initially observed in July 2023, ClearFake utilized fake browser update prompts to trick users into downloading malware. The latest 2025 variant introduces new lures, including fake reCAPTCHA and Cloudflare Turnstile verifications, to deceive users into executing malicious PowerShell commands. ClearFake continues to rely on EtherHiding, a technique that leverages Binance Smart Chain smart contracts to store and retrieve payloads, making its infrastructure difficult to disrupt. The framework has been observed distributing Lumma StealerEmmenhtal Loader, and Vidar Stealer, posing a significant global cybersecurity threat.

Community Impact

The latest ClearFake attacks updates pose a serious risk to the retail and hospitality sectors, particularly e-commerce platforms and hotel booking websites that depend on WordPress and other CMS platforms. By injecting malicious JavaScript into compromised websites, ClearFake can deceive customers into downloading malware disguised as security updates or resolving fake technical issues. As such, RH-ISAC Core Members are advised to maintain situational awareness on updated tactics and capabilities for malware like ClearFake and are advised to review the intelligence and indicators of compromise, below, included in this report.

Technical Analysis

ClearFake represents an evolution in JavaScript-based malware frameworks, incorporating Web3 technology and blockchain infrastructure to enhance persistence and evasion techniques. Unlike traditional drive-by downloads, ClearFake’s ClickFix lures deceive users into executing malicious PowerShell commands themselves, making it difficult for endpoint security solutions to classify these actions as malicious activity.

The use of Binance Smart Chain for payload hosting and AES key management is a significant advancement in cybercriminal infrastructure. Storing malicious scripts in Ethereum smart contracts makes removal nearly impossible since blockchain transactions are immutable. This decentralized hosting model ensures ClearFake remains operational even if C2 domains are taken down.

Additionally, Cloudflare Pages is being abused to host and encrypt malware payloads, adding an extra layer of obfuscation. The combination of JavaScript-based injection, blockchain interactions, and social engineering makes ClearFake a highly adaptable, scalable, and persistent cyber threat.

Indicators of Compromise

Sekoia researchers have provided the following IOCs for ingestion as the earliest possible convenience:

hxxps://ert67-o9.pages[.]dev/data

hxxps://f003.backblazeb2[.]com/file/skippp/uu.html

hxxps://f003.backblazeb2[.]com/file/skippp/index.html

hxxps://hostme.pages[.]dev/host

hxxps://ghost-name.pages[.]dev/website

hxxps://gdfg-23rwe.pages[.]dev/index.html

hxxps://sha-11x.pages[.]dev/

hxxps://b1-c1-k8.pages[.]dev/

hxxps://1a-a1.pages[.]dev/

hxxps://sdfwefwg.pages[.]dev/

hxxps://niopg.pages[.]dev/

hxxps://sdfwefwg.pages[.]dev/

hxxps://cleaning-devices-k.pages[.]dev/

hxxps://tour-agency-media.pages[.]dev/

hxxps://fresh-orange-juice.pages[.]dev/

hxxps://you-insk-bad.pages[.]dev/

hxxps://human-verify-7u.pages[.]dev/

hxxps://recaptcha-verify-me-1c.pages[.]dev/

hxxps://macos-browser-update-9n.pages[.]dev/

hxxps://macos-browser-update-5i.pages[.]dev/

hxxps://recaptcha-verify-2e.pages[.]dev/

hxxps://recaptcha-verify-7z.pages[.]dev/

hxxps://recaptcha-verify-1t.pages[.]dev/

hxxps://recaptcha-verify-9m.pages[.]dev/

hxxps://disable-data-collect-ai.pages[.]dev/

hxxps://recaptcha-verify-1r.pages[.]dev/

hxxps://recaptha-verify-5q.pages[.]dev/

hxxps://note1.nz7bn[.]pro/nnp.mp4

hxxps://ai.fdswgw[.]shop/one.mp4

hxxps://mnjk-jk.bsdfg-zmp-q-n[.]shop/1.mp4

hxxps://nbhg-v.iuksdfb-f[.]shop/ajax.mp3

hxxps://hur.bweqlkjr[.]shop/m41.mp4

hxxps://hur.bweqlkjr[.]shop/1a.m4a

hxxps://yob.yrwebsdf[.]shop/1a.m4a

hxxps://yob.yrwebsdf[.]shop/3t.mp4

hxxps://start.cleaning-room-device[.]shop/sha589.m4a

hxxps://discover-travel-agency.pro/joke.m4a

hxxps://discover-travel-agency.pro/walking.mp3

hxxps://discover-travel-agency.pro/1.m4a

hxxps://travel.image-gene-saver.it.com/1.m4a

hxxps://ads.green-pickle-jo[.]shop/1.m4a

hxxps://recaptcha-verify-4h[.]pro/kangarooing.m4a

hxxps://recaptcha-manual[.]shop/kangarooing.m4a

hxxps://recaptcha-verify-4h[.]pro/xfiles/kangarooing.vsdx

hxxps://recaptcha-verify-4h[.]pro/xfiles/verify.mp4

hxxps://human-verify[.]shop/xfiles/verify.mp4

hxxps://human-verify-4r[.]pro/xfiles/verify.mp4

hxxps://human-verify-4r[.]pro/xfiles/human.cpp

hxxps://dns-verify-me[.]pro/xfiles/train.mp4

hxxp://83.217.208[.]130/xfiles/Ohio.mp4

hxxp://83.217.208[.]130/xfiles/VIDA.mp3

hxxp://83.217.208[.]130/xfiles/VIDA.mp4

hxxp://83.217.208[.]130/xfiles/trip.mp4

hxxp://83.217.208[.]130/xfiles/trip.psd

hxxp://80.64.30[.]238/trip.psd

hxxp://80.64.30[.]238/evix.xll

hxxps://raw.githubusercontent[.]com/fuad686337/tyu/refs/heads/main/BEGIMOT.xll

hxxps://domain[.]com/BEGIMOT.xll

hxxps://disable-data-ai-agent.pages.dev

hxxps://tumbl.design-x[.]xyz/glass.mp3

hxxps://f003.backblazeb2[.]com/file/skippp/glass.mp3

hxxps://sandbox.yunqof[.]shop/macan.mp3

hxxps://microsoft-dns-reload-1r.pages[.]dev

hxxps://microsoft-dns-reload-5q.pages[.]dev

More Recent Blog Posts