Security Company Check Point: Beware of JSCEAL Malware Activity Targeting Cryptocurrency Users
BlockBeats News, July 31st. Security company Check Point announced that its researchers recently discovered a large-scale malicious campaign named JSCEAL. Attackers exploited a Node.js platform using compiled JavaScript files to target cryptocurrency users. The campaign has been active since March 2024, and attackers have been inducing users to download and install malicious programs posing as nearly 50 mainstream cryptocurrency trading apps through fake advertisements.
In the first half of 2025, around 35,000 malicious ads were related to this campaign, with millions of impressions in the EU alone. The attack process is multi-layered with strong anti-detection capabilities, capable of stealing user credentials, wallets, and other sensitive information. It also has functionalities such as remote control, keylogging, and browser traffic hijacking. The research highlighted that this malicious program has a very low detection rate, and some variants have remained unidentified by mainstream antivirus software for an extended period. Users are advised to remain vigilant and avoid downloading cryptocurrency apps from unofficial sources.
Potrebbe interessarti anche
Chi ha guadagnato
Ultime notizie crypto
Dark Pool DEX HumidiFi rilascia le linee guida ICO, round di vendita pubblica a 69 milioni di dollari FDV Vendendo il 2% della fornitura di token
L'indirizzo sospetto affiliato a Ethena ha aumentato le sue partecipazioni in ENA di 46,79 milioni, portando le partecipazioni totali a oltre 450 milioni di ENA.
Trump suggerisce che Hassett assumerà la presidenza della Fed, ancora una volta critica Powell per non aver tagliato i tassi
Tabella di marcia per la quotazione delle monete Aggiunge 5 nuove monete: JUP, PLUME, WET e altro
Il mercato crypto ha subito un rimbalzo con un'impennata diffusa. SUI e PENGU salgono di oltre il 20%.
Assistenza clienti:@weikecs
Cooperazione aziendale:@weikecs
Trading quantitativo e MM:[email protected]
Servizi VIP:[email protected]