Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Alert fatigue, data overload, and traditional SIEM falls

Shaping the Leader of Tomorrow through a PhD Fusion Engineering

Illegal planets can form their own miniature solar system

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps
Identity

Hackers use Facebook ads to spread JSCEAL malware via fake cryptocurrency trading apps

userBy userJuly 30, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 30, 2025Ravi LakshmananCryptocurrency/Browser Security

Fake cryptocurrency trading app

Cybersecurity researchers can bring attention to the ongoing campaigns that distribute fake cryptocurrency trading apps and deploy compiled V8 JavaScript (JSC) malware called JSCEAL to capture data from their credentials and wallets.

According to Checkpoint, activity leverages thousands of malicious ads posted to Facebook to redirect unsuspecting victims to fake sites that direct them to install fake apps. These ads are shared through stolen or newly created accounts.

“Actors separate the installer functionality into different components and move some functionality into JavaScript files within the most notably infected website,” the company said in its analysis. “The flow of modular, multi-layered infections allows attackers to adapt new tactics and payloads at every stage of the surgery.”

Cybersecurity

It is worth noting that some aspects of the activity were previously documented by Microsoft in April 2025 and are as secure as this month, with the latter being tracked as Weevilproxy. According to a Finnish security vendor, the campaign has been active since March 2024.

The attack chain has been found to employ a new anti-analytic mechanism that relies on script-based fingerprints before providing the final JSC payload.

“Threat actors have implemented a unique mechanism that requires both malicious sites and installers to run in parallel for successful execution.

Clicking on a Facebook ad link triggers a redirect chain, leading the victim to a fake landing page that mimics legitimate services like TradingView or Decoy websites if the target’s IP address is not within the desired range, or if the referral is not Facebook.

In addition to hosting two other JavaScript scripts responsible for tracking the installation process and initiating POST requests processed by components within the MSI installer, the website also includes a JavaScript file that attempts to communicate with the localhost server on port 30303.

For that part, the installer file downloaded from the site unpacks many DLL libraries and simultaneously starts an HTTP listener with localhost:30303 to process incoming post requests from fake sites. This interdependency means that if any of these components fails, the infection chain cannot progress further.

“To ensure that the victim does not suspect abnormal activity, the installer opens a WebView using msedge_proxy.exe and directs the victim to the legitimate website of the application,” Check Point said.

The DLL module is designed to parse POST requests from websites, gather system information and start the fingerprinting process. The PowerShell backdoor then extracts information captured by the attacker in the form of a JSON file.

If the victim’s host is considered valuable, the infection chain moves to the final stage and leads to the execution of JSCEAL malware by leveraging node.js.

Cybersecurity

In addition to establishing a connection with a remote server to receive further instructions, malware also sets up a local proxy with the aim of intercepting victims’ web traffic and stealing malicious scripts in real time to banks, cryptocurrency, and other sensitive websites.

Other features of JSCEAL include collecting system information, browser cookies, automatic filling passwords, telegram account data, screenshots, keystrokes, and commanding cryptocurrency wallets for attacks and manipulation of intermediate (AITM) attacks. It can also act as a remote access trojan.

“This sophisticated malware is designed to be resilient to traditional security tools, while still gaining absolute control over the victim machine,” Checkpoint said. “The combination of compiled code and heavy obfuscation took the analytical effort and time while displaying a variety of features.”

“JSC files allow attackers to easily and effectively hide their code, bypass security mechanisms, and make analysis difficult.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFunksec Ransomware Decryptor was published for free after the group was dormant
Next Article Zuckerberg Signal Meta does not open source all of its “Superintelligence” AI models
user
  • Website

Related Posts

Alert fatigue, data overload, and traditional SIEM falls

July 31, 2025

Hackers exploit critical WordPress theme flaws to hijacking sites via remote plugins

July 31, 2025

Funksec Ransomware Decryptor was published for free after the group was dormant

July 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Alert fatigue, data overload, and traditional SIEM falls

Shaping the Leader of Tomorrow through a PhD Fusion Engineering

Illegal planets can form their own miniature solar system

UKAEA updates £9 million framework for fusion engineering

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

New Internet Era: Berners-Lee Sets the Pace as Zuckerberg Pursues Metaverse

TwinH Transforms Belgian Student Life: Hendrik’s Journey to Secure Digital Identity

Tim Berners-Lee Unveils the “Missing Link”: How the Web’s Architect Is Building AI’s Trusted Future

Dispatch from London Tech Week: Keir Starmer, The Digital Twin Boom, and FySelf’s Game-Changing TwinH

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.