JSCEAL Malware Campaign Spreads via Fake Crypto Apps and Facebook Ads, Warn Researchers

JSCEAL Malware Campaign Spreads via Fake Crypto Apps and Facebook Ads, Warn Researchers

Cybersecurity experts are warning about a sophisticated malware campaign that is distributing fake cryptocurrency trading applications to deploy a powerful JavaScript-based malware variant known as JSCEAL. This malware is capable of stealing sensitive user data, including login credentials, browser cookies, wallets, and even Telegram account details.

According to a recent analysis by Check Point, the campaign uses malicious Facebook ads to lure users to counterfeit websites that encourage them to download these rogue apps. The attackers often utilize both compromised and newly created Facebook accounts to run the ads, which mimic popular platforms like TradingView.

“The actors separate the installer’s functionality into different components and most notably move some functionality to the JavaScript files inside the infected websites,” Check Point said. This modular architecture allows attackers to dynamically alter tactics and payloads throughout the attack chain.

The campaign, active since at least March 2024, was previously highlighted by Microsoft in April 2025 and WithSecure, which tracks it as WEEVILPROXY. It includes advanced anti-analysis techniques, such as JavaScript-based fingerprinting, and a mechanism requiring both the infected website and installer to be active simultaneously—complicating detection and reverse engineering.

When a victim clicks the Facebook ad, they’re funneled through a redirection sequence to a fake landing page resembling legitimate crypto services. If the visitor’s IP address doesn’t meet specific conditions or if the referral isn’t from Facebook, they’re shown a decoy site instead. Meanwhile, the site hosts JavaScript files that attempt to connect to localhost on port 30303, initiating the malware deployment sequence.

The downloaded MSI installer unpacks several DLL files and launches msedge_proxy.exe to show the real website, masking suspicious behavior. These DLLs handle POST requests from the website, extract system information, and send it back via a PowerShell-based backdoor.

If the system appears valuable, the final JSCEAL malware is deployed using Node.js. It then sets up a local proxy to intercept user traffic, insert malicious scripts into banking and crypto websites, and capture data in real time. JSCEAL also performs keystroke logging, screenshot capture, AitM attacks, and can act as a full remote access trojan (RAT).

“This sophisticated piece of malware is designed to gain absolute control of the victim machine, while being resilient against conventional security tools,” Check Point added. Its compiled and obfuscated JavaScript code makes it particularly difficult to detect and analyze.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch