Skip to content Dark Web Informer - Cyber Threat Intelligence
IOC

IOC Alert: ClearFake JavaScript Payload Delivered via Compromised Domain

📖 Overview

A domain associated with the ClearFake JavaScript-based malware campaign has been identified. The domain currently displays a Cloudflare phishing warning and has been reported for malicious activity. ClearFake campaigns are known for distributing malicious scripts that deliver payloads or redirect users to further phishing pages. Confidence is assessed at 100%.


📌 Key Details

FieldInformation
TypeDomain
Indicatore1mx.fkur8[.]ru
Threat TypePayload Delivery
Malwarejs.clearfake
Confidence100%
Date13 Oct 2025 – 14:20:47 UTC
TagsClearFake
Reporteranonymous
ReferenceNone

🔎 URLScan Result


📡 Domain & Certificate Info

  • DNS A Records: 172[.]67[.]165[.]142, 104[.]21[.]42[.]196


🛡️ Defensive Guidance

  • Block e1mx.fkur8[.]ru and its associated IPs (172[.]67[.]165[.]142, 104[.]21[.]42[.]196) at DNS, proxy, and endpoint layers.
  • Hunt for signs of ClearFake JavaScript injections, such as script tags referencing external .ru domains or injected HTML code.
  • Monitor for web sessions where users are redirected to fake browser update or security alert pages.
  • Implement web filtering policies to detect and block dynamic JavaScript-based payload delivery mechanisms.

⚠️ This IOC underscores the persistent activity of ClearFake malware operators, who continue to leverage compromised or newly registered domains to deliver JavaScript payloads under the guise of security or software update warnings.

Latest