ClearFake Malware Framework: Latest Variant Analysis and Mitigation Strategies
Overview
A recent variant of the ClearFake malware framework has been identified, leveraging fake reCAPTCHA and Cloudflare Turnstile challenges to deceive users into executing malicious PowerShell commands. This evolution marks a significant escalation in the threat’s capabilities, as it continues to exploit Web3 technologies for malware delivery.
Evolution of ClearFake
ClearFake, first detected in July 2023, initially used JavaScript injections on compromised websites to trick users into downloading fake browser updates. However, by December 2024, it had evolved to incorporate:
Fake reCAPTCHA and Cloudflare Turnstile verifications to add legitimacy to phishing pages.
Web3 integration, using smart contracts on the Binance Smart Chain (BSC) to store obfuscated JavaScript and PowerShell commands.
ClickFix Lure, a deceptive tactic that presents users with error messages prompting them to execute commands in the Windows Run dialog.
Emmenhtal Loader & Lumma Stealer as payloads, designed to steal sensitive user data.
Attack Chain
Compromised Websites: Malicious JavaScript is injected into legitimate websites.
Fake Security Challenges: Users are presented with fraudulent Cloudflare Turnstile or reCAPTCHA verifications.
ClickFix Deception: If the verification fails, users are shown error messages suggesting they need to execute a PowerShell command.
Binance Smart Chain Fetch: The PowerShell command retrieves obfuscated scripts from smart contracts stored on the BSC.
Payload Deployment: The downloaded scripts execute further malware, such as Emmenhtal Loader, which installs Lumma Stealer.
Notable Technical Features
Use of Blockchain: Malicious payloads and obfuscated scripts are stored on Binance Smart Chain, making takedown efforts challenging.
PowerShell-Based Execution: The attack relies on obfuscated PowerShell scripts to bypass traditional security mechanisms.
Decentralized Malware Hosting: Hosting lure HTML files on Cloudflare Pages makes the attack infrastructure resilient.
Mitigation Strategies
For Users:
Do not run commands from error messages: Legitimate security verifications never require manual execution of commands.
Use an updated web browser and security extensions: Anti-phishing and ad-blocking tools can help detect suspicious web content.
Inspect URLs carefully: Hover over links and ensure they are from legitimate sources. Even URLs which appear correct may not be, malicious operators have been defeating this for years, quite easily.
For Organizations:
Network Monitoring: Look for outbound requests to Binance Smart Chain and suspicious PowerShell executions.
Disable Unnecessary PowerShell Execution: Implement PowerShell Constrained Language Mode or remove execution rights for non-administrators.
Threat Intelligence Feeds: Regularly update IoC lists, including compromised URLs and wallet addresses associated with ClearFake.
Endpoint Detection and Response (EDR): Deploy EDR solutions capable of detecting and blocking obfuscated script execution.
Conclusion
The ClearFake malware framework continues to evolve, leveraging sophisticated deception tactics and blockchain-based infrastructure to distribute malware. Organizations and individuals must remain vigilant, implementing robust security controls to detect and prevent infections. Sekoia.io and other cybersecurity researchers are actively monitoring ClearFake for further developments.
For the latest IoCs and compromised URLs, refer to Sekoia-IO's Community GitHub repository.