BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Hackers Spread JSCEAL Malware via Fake Crypto Apps, Facebook Ads

Fake Crypto Trading Apps on Facebook Spread JSCEAL Malware to Steal Credentials and Wallets

  • Attackers are spreading fake cryptocurrency trading apps using Facebook ads to deliver Malware targeting user credentials and wallets.
  • The malware, called JSCEAL, is delivered through a multi-step infection process and is difficult to detect and analyze.
  • The campaign uses both stolen and new Facebook accounts and has been active since at least March 2024, according to security researchers.
  • JSCEAL steals sensitive data, injects malicious code into websites, and can take full control of infected devices.
  • Researchers warn that this malicious software can bypass many traditional security tools by hiding its code within JavaScript files.

Cybersecurity researchers have identified an ongoing campaign using fake cryptocurrency trading applications to distribute malware that aims to steal users’ credentials and digital wallet information. These attacks are primarily spread through a large volume of malicious advertisements on Facebook, luring victims to install the infected software.

- Advertisement -

The malware, named JSCEAL, uses a complex, multi-layered infection process to avoid detection. The attackers break up the installer’s functions, placing significant portions within JavaScript code found on compromised websites. According to a detailed analysis from Check Point, this approach allows the attackers to adjust their methods and payloads at different stages of the attack.

Some aspects of this operation have been previously reported by Microsoft and WithSecure. WithSecure, which tracks the campaign as WEEVILPROXY, reported that it has been active since March 2024. The attack chain uses script-based fingerprinting and unique execution requirements, including simultaneous activity on both the malicious site and the installer, which increases the difficulty of detecting or analyzing the malware.

Clicking on the links in the malicious Facebook ads begins a series of redirections, eventually sending users to fake sites that replicate well-known trading services or, if the user’s IP or web traffic does not meet specific criteria, to a decoy page. The fake websites host JavaScript files that communicate with a local server on the victim’s device and monitor the installation process, ensuring all malicious components are running as required.

The malicious installer drops several DLL files and establishes a local server to process commands from the website. This infrastructure means that if any part fails, the infection does not proceed. To avoid suspicion, the installer opens a legitimate-looking web page for the targeted application through Microsoft Edge’s proxy process.

- Advertisement -

The JSCEAL malware then collects system data, browser cookies, passwords, and more, sending the information to attackers using a PowerShell-based backdoor. If the targeted device is valuable, the infection proceeds to run JSCEAL using Node.js, enabling further malicious activity.

The malware sets up a proxy to intercept and modify web traffic, especially for banking and cryptocurrency sites, to steal credentials in real time. Other features include stealing Telegram data, capturing screenshots or keystrokes, and manipulating cryptocurrency wallets. Check Point described JSCEAL as resilient and able to evade standard security tools, largely because the attackers heavily obscure their code in JavaScript files, making detection and analysis difficult.

For more technical details, visit Check Point’s full analysis.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Court to Rule on North Korea-Linked Crypto From Kelp Hack

A legal battle over $71 million in crypto seized from North Korean Hackers will...

OpenMythos Publishes Open-Source “Claude Mythos” Clone

Developer Kye Gomez has published OpenMythos, an open-source architectural guess at Anthropic's unreleased Claude...

Securitize Wins FINRA Approval For Full Broker-Dealer Custody

Securitize has received FINRA approval to custody tokenized securities within its existing broker-dealer, a...

Tether Gold Surges 36% as Investors Seek Safety Amid Uncertainty

Tether Gold (XAUt) saw its market capitalization surge by 36% in Q1 2025, surpassing...

Phishing Campaign Uses Legitimate RMM Tools for Access

A phishing campaign codenamed VENOMOUS#HELPER has targeted over 80 organizations, primarily in the U.S.,...

Must Read

6 Best VPN Providers That Accept Monero

Privacy and anonymity are probably the most important things that we should all consider in today's internet era. Although there are a lot of...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading