BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

Hackers Spread JSCEAL Malware via Fake Crypto Apps, Facebook Ads

Fake Crypto Trading Apps on Facebook Spread JSCEAL Malware to Steal Credentials and Wallets

  • Attackers are spreading fake cryptocurrency trading apps using Facebook ads to deliver Malware targeting user credentials and wallets.
  • The malware, called JSCEAL, is delivered through a multi-step infection process and is difficult to detect and analyze.
  • The campaign uses both stolen and new Facebook accounts and has been active since at least March 2024, according to security researchers.
  • JSCEAL steals sensitive data, injects malicious code into websites, and can take full control of infected devices.
  • Researchers warn that this malicious software can bypass many traditional security tools by hiding its code within JavaScript files.

Cybersecurity researchers have identified an ongoing campaign using fake cryptocurrency trading applications to distribute malware that aims to steal users’ credentials and digital wallet information. These attacks are primarily spread through a large volume of malicious advertisements on Facebook, luring victims to install the infected software.

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading

The malware, named JSCEAL, uses a complex, multi-layered infection process to avoid detection. The attackers break up the installer’s functions, placing significant portions within JavaScript code found on compromised websites. According to a detailed analysis from Check Point, this approach allows the attackers to adjust their methods and payloads at different stages of the attack.

Some aspects of this operation have been previously reported by Microsoft and WithSecure. WithSecure, which tracks the campaign as WEEVILPROXY, reported that it has been active since March 2024. The attack chain uses script-based fingerprinting and unique execution requirements, including simultaneous activity on both the malicious site and the installer, which increases the difficulty of detecting or analyzing the malware.

Clicking on the links in the malicious Facebook ads begins a series of redirections, eventually sending users to fake sites that replicate well-known trading services or, if the user’s IP or web traffic does not meet specific criteria, to a decoy page. The fake websites host JavaScript files that communicate with a local server on the victim’s device and monitor the installation process, ensuring all malicious components are running as required.

The malicious installer drops several DLL files and establishes a local server to process commands from the website. This infrastructure means that if any part fails, the infection does not proceed. To avoid suspicion, the installer opens a legitimate-looking web page for the targeted application through Microsoft Edge’s proxy process.

- Advertisement -

The JSCEAL malware then collects system data, browser cookies, passwords, and more, sending the information to attackers using a PowerShell-based backdoor. If the targeted device is valuable, the infection proceeds to run JSCEAL using Node.js, enabling further malicious activity.

The malware sets up a proxy to intercept and modify web traffic, especially for banking and cryptocurrency sites, to steal credentials in real time. Other features include stealing Telegram data, capturing screenshots or keystrokes, and manipulating cryptocurrency wallets. Check Point described JSCEAL as resilient and able to evade standard security tools, largely because the attackers heavily obscure their code in JavaScript files, making detection and analysis difficult.

For more technical details, visit Check Point’s full analysis.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

Gamblers Threaten Israeli Reporter Over Bet Loss

Polymarket users allegedly threatened the life of an Israeli journalist, Emanuel Fabian, after his...

T. Rowe Price updates its active crypto ETF bid

T. Rowe Price has updated its prospectus for an actively managed crypto ETF, naming...

GitHub Malware Steals Python Repos via Force-Pushing

A GitHub account takeover campaign uses stolen tokens to inject malware into hundreds of...

Alphabet’s AI Capex Spurred by Strong Cash Flow, Analysts Say

Alphabet (GOOGL) is significantly increasing its AI-focused capital spending, with analysts viewing this as...

IBM Expands Free Quantum Access Amid Bitcoin Fears

IBM expanded its free quantum computing program, giving researchers more runtime and access to...

Must Read

Buy Domain With Bitcoin: Top 8 Domain Registrars That Accept Bitcoin And Crypto

You are here because you want to buy a domain with bitcoin, right? If you are looking for domain registrars that accept bitcoin or...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading