JSCEAL Malware Targets Crypto Apps in Sophisticated Campaign Leveraging Facebook Ads

Published on July 31, 2025
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

A new and sophisticated cyber threat, JSCEAL malware, was seen targeting cryptocurrency application users. The campaign utilizes advanced techniques to steal sensitive user data through fake websites, primarily promoted via Facebook advertisements.  

Tactics of the JSCEAL Campaign  

The JSCEAL malware leverages malicious advertisements to lure users into installing fake cryptocurrency trading applications, impersonating nearly 50 reputable crypto platforms like Binance and Revolut. 

Check Point Research (CPR) uncovered that during the first half of 2025 alone, approximately 35,000 deceptive advertisements garnered millions of views across the European Union.  

The infection process is highly modular, using Node.js-based compiled JavaScript (JSC) files. 

Malicious advertisements on Facebook
Malicious advertisements on Facebook | Source: CPR 

This multi-layered approach involves redirection chains from malicious advertisements to landing pages hosting infected MSI installers. Once executed, these installers initiate staged attacks, including detailed machine profiling and deployment of malware payloads designed to steal crypto assets and user credentials.  

Abstract infection flow
Abstract infection flow | Source: CPR

A unique mechanism was implemented, which requires the malicious site and the installer to run simultaneously for successful execution. The threat actors also use decoy websites if the target’s IP address is not within the desired range or the referrer is not Facebook.

The malware also implements advanced anti-detection mechanisms, such as script-based fingerprinting and obfuscation techniques. Notably, it uses compiled V8 JavaScript to bypass static analysis tools.   

Protecting Against JSCEAL  

CPR emphasizes vigilance for all crypto users and institutions. Recommendations include verifying app authenticity, using advanced threat prevention tools, and avoiding suspicious advertisements. 

Fake websites that impersonate brands to distribute malware like JSCEAL are not new. In the latest news, a phishing campaign leveraged fake Microsoft 365 login pages for BEC scams and a malicious Telegram APK campaign exploits fake domains and Android vulnerabilities.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: