Security Company Check Point: Beware of JSCEAL Malware Activity Targeting Cryptocurrency Users
BlockBeats News, July 31st. Security company Check Point announced that its researchers recently discovered a large-scale malicious campaign named JSCEAL. Attackers exploited a Node.js platform using compiled JavaScript files to target cryptocurrency users. The campaign has been active since March 2024, and attackers have been inducing users to download and install malicious programs posing as nearly 50 mainstream cryptocurrency trading apps through fake advertisements.
In the first half of 2025, around 35,000 malicious ads were related to this campaign, with millions of impressions in the EU alone. The attack process is multi-layered with strong anti-detection capabilities, capable of stealing user credentials, wallets, and other sensitive information. It also has functionalities such as remote control, keylogging, and browser traffic hijacking. The research highlighted that this malicious program has a very low detection rate, and some variants have remained unidentified by mainstream antivirus software for an extended period. Users are advised to remain vigilant and avoid downloading cryptocurrency apps from unofficial sources.
También te puede interesar
Ganadores
Últimas noticias sobre criptomonedas
Anthropic is launching IPO preparations and may go public as early as 2026
Trump will make a statement on Wednesday at 2:30 PM ET
Dark Pool DEX HumidiFi Releases ICO Guidelines, Public Sale Round at $69 Million FDV Selling 2% of Token Supply
Suspected Ethena-affiliated address increased its ENA holdings by 46.79 million, bringing the total holdings to over 450 million ENA.
Trump Suggests Hassett Will Take Over as Fed Chair, Once Again Criticizes Powell for Not Cutting Rates
Atención al cliente:@weikecs
Cooperación empresarial:@weikecs
Trading cuantitativo y MM:[email protected]
Programa VIP:[email protected]