Hackers Spread JSCEAL Malware via Fake Crypto Apps, Facebook Ads

Fake Crypto Trading Apps on Facebook Spread JSCEAL Malware to Steal Credentials and Wallets

  • Attackers are spreading fake cryptocurrency trading apps using Facebook ads to deliver Malware targeting user credentials and wallets.
  • The malware, called JSCEAL, is delivered through a multi-step infection process and is difficult to detect and analyze.
  • The campaign uses both stolen and new Facebook accounts and has been active since at least March 2024, according to security researchers.
  • JSCEAL steals sensitive data, injects malicious code into websites, and can take full control of infected devices.
  • Researchers warn that this malicious software can bypass many traditional security tools by hiding its code within JavaScript files.

Cybersecurity researchers have identified an ongoing campaign using fake cryptocurrency trading applications to distribute malware that aims to steal users’ credentials and digital wallet information. These attacks are primarily spread through a large volume of malicious advertisements on Facebook, luring victims to install the infected software.

- Advertisement -

The malware, named JSCEAL, uses a complex, multi-layered infection process to avoid detection. The attackers break up the installer’s functions, placing significant portions within JavaScript code found on compromised websites. According to a detailed analysis from Check Point, this approach allows the attackers to adjust their methods and payloads at different stages of the attack.

Some aspects of this operation have been previously reported by Microsoft and WithSecure. WithSecure, which tracks the campaign as WEEVILPROXY, reported that it has been active since March 2024. The attack chain uses script-based fingerprinting and unique execution requirements, including simultaneous activity on both the malicious site and the installer, which increases the difficulty of detecting or analyzing the malware.

Clicking on the links in the malicious Facebook ads begins a series of redirections, eventually sending users to fake sites that replicate well-known trading services or, if the user’s IP or web traffic does not meet specific criteria, to a decoy page. The fake websites host JavaScript files that communicate with a local server on the victim’s device and monitor the installation process, ensuring all malicious components are running as required.

The malicious installer drops several DLL files and establishes a local server to process commands from the website. This infrastructure means that if any part fails, the infection does not proceed. To avoid suspicion, the installer opens a legitimate-looking web page for the targeted application through Microsoft Edge’s proxy process.

- Advertisement -

The JSCEAL malware then collects system data, browser cookies, passwords, and more, sending the information to attackers using a PowerShell-based backdoor. If the targeted device is valuable, the infection proceeds to run JSCEAL using Node.js, enabling further malicious activity.

The malware sets up a proxy to intercept and modify web traffic, especially for banking and cryptocurrency sites, to steal credentials in real time. Other features include stealing Telegram data, capturing screenshots or keystrokes, and manipulating cryptocurrency wallets. Check Point described JSCEAL as resilient and able to evade standard security tools, largely because the attackers heavily obscure their code in JavaScript files, making detection and analysis difficult.

For more technical details, visit Check Point’s full analysis.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Voltage Launches ‘Send Now, Pay Later’ Bitcoin Credit Line

Voltage launched a revolving line of credit allowing instant Lightning payments with USD or...

Can XRP Rebound to $3 in 2026? Analyst Bets on $8

XRP has retreated to around $1.43, following a surge above $3 in 2025, raising...

Coinbase CEO: Quantum Computing ‘Solvable,’ Won’t Break Crypto

Coinbase CEO Brian Armstrong dismissed fears that quantum computing will destroy blockchain technology, calling...

Altman Touts Caution, Not Clarity, on AI Future

OpenAI CEO Sam Altman called for caution regarding superintelligent AI during a speech in...

Michael Saylor’s STRC Ad Deemed Misleading

Michael Saylor's latest AI-generated promotional video likens the company's STRC shares to high-yield insured...

Must Read

How to Buy VPS with Crypto from Hostinger – Step by Step guide

Did you know that nowadays you can use Bitcoin to purchase a Windows VPS? If you’re here, you’re probably wondering how to do it....
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!