Security Company Check Point: Beware of JSCEAL Malware Activity Targeting Cryptocurrency Users
BlockBeats News, July 31st. Security company Check Point announced that its researchers recently discovered a large-scale malicious campaign named JSCEAL. Attackers exploited a Node.js platform using compiled JavaScript files to target cryptocurrency users. The campaign has been active since March 2024, and attackers have been inducing users to download and install malicious programs posing as nearly 50 mainstream cryptocurrency trading apps through fake advertisements.
In the first half of 2025, around 35,000 malicious ads were related to this campaign, with millions of impressions in the EU alone. The attack process is multi-layered with strong anti-detection capabilities, capable of stealing user credentials, wallets, and other sensitive information. It also has functionalities such as remote control, keylogging, and browser traffic hijacking. The research highlighted that this malicious program has a very low detection rate, and some variants have remained unidentified by mainstream antivirus software for an extended period. Users are advised to remain vigilant and avoid downloading cryptocurrency apps from unofficial sources.
You may also like
Gainers
Latest Crypto News
AZTEC Token Sale is now live, with the current total subscription amount exceeding 15,900 ETH.
MaiCoin’s MSX Surpasses $2 Billion in 24-hour Trading Volume, Season 1 of Token Tournament Concludes
CNBC: Market Remains Confident in Year-End Rally, Cautious Optimism on the Rise
The PENGU project team's token deployment address has transferred a total of 38.811 billion PENGU to a CEX since mid-July.
Trump-Backed Republican Narrowly Wins Tennessee, Midterm Election Outlook Dim
Customer Support:@weikecs
Business Cooperation:@weikecs
Quant Trading & MM:[email protected]
VIP Services:[email protected]