Security Company Check Point: Beware of JSCEAL Malware Activity Targeting Cryptocurrency Users
BlockBeats News, July 31st. Security company Check Point announced that its researchers recently discovered a large-scale malicious campaign named JSCEAL. Attackers exploited a Node.js platform using compiled JavaScript files to target cryptocurrency users. The campaign has been active since March 2024, and attackers have been inducing users to download and install malicious programs posing as nearly 50 mainstream cryptocurrency trading apps through fake advertisements.
In the first half of 2025, around 35,000 malicious ads were related to this campaign, with millions of impressions in the EU alone. The attack process is multi-layered with strong anti-detection capabilities, capable of stealing user credentials, wallets, and other sensitive information. It also has functionalities such as remote control, keylogging, and browser traffic hijacking. The research highlighted that this malicious program has a very low detection rate, and some variants have remained unidentified by mainstream antivirus software for an extended period. Users are advised to remain vigilant and avoid downloading cryptocurrency apps from unofficial sources.
Vous pourriez aussi aimer
À la hausse
Dernières actus crypto
Analyste éminent : Ethereum peut-il casser 3 700 $ pour valider la fin du marché haussier
Top Whale Movements Aperçu : "pension-usdt.eth" Court-circuité BTC pour devenir le plus grand ours, "ZEC&MON plus grand ours" augmenté ETH Short Position
Anthropic lance les préparatifs d'introduction en bourse et pourrait entrer en Bourse dès 2026
Trump fera une déclaration mercredi à 14h30 HE
Dark Pool DEX HumidiFi publie les directives de l'ICO, un cycle de vente publique à 69 millions de dollars FDV vendant 2 % de l'offre de jetons
Assistance client:@weikecs
Collaborations commerciales:@weikecs
Trading quantitatif/Market makers:[email protected]
Programme VIP:[email protected]