Researchers have issued a warning about an increasing threat known as ClearFake, which exploits compromised WordPress sites to distribute malicious fake browser updates. Sekoia researchers believe that this campaign is likely operated by the same threat group responsible for the SocGholish campaigns involving fake browser updates.
ClearFake targets users by displaying fake update pages for popular browsers and offers downloads in various languages, tricking users into installing malware under the guise of legitimate browser updates. This approach, also utilized by other copycat groups, highlights the need for enhanced user education, endpoint protection, and network detection to protect organizations from these evolving threats.
ClearFake gets its name from the lack of obfuscation in its JavaScript-based attacks, and it was first documented by researcher Randy McEoin in August 2023. The attackers behind ClearFake compromise WordPress websites and inject JavaScript code that downloads malicious payloads from attacker-controlled domains or the Binance Smart Chain, further complicating its detection and analysis.
The downloaded payloads create an iframe element to host the fake update interface, designed to conceal the underlying page and mislead users. The victims are presented with a fake update page for browsers like Chrome, Edge, and Firefox, luring them into believing that updating their browser is essential to access the page’s content.
Notably, the fake update pages vary in languages (English, French, German, Spanish, and Portuguese), matching the users’ browser settings, making the ruse more convincing. Users who initiate the download are presented with what appears to be a legitimate browser installer, but it also contains malware, such as HijackLoader and IDAT loader. These malicious payloads can lead to various attacks, including information theft, making it a potent threat.
Security teams are advised to stay vigilant and leverage user education, endpoint protection, and network detection to safeguard against this type of malware distribution.