In recent months, cybersecurity researchers have detected an active campaign distributing fake cryptocurrency applications designed to install advanced malware called JSCEAL. This malicious software can steal your credentials, your digital wallets, and even spy on your activity in real time.
What’s concerning is that this campaign uses thousands of malicious Facebook ads to lure victims like you to fraudulent websites that mimic legitimate platforms. From there, you’re invited to download a supposed trading app, which is actually the start of a well-orchestrated attack.
It all begins with paid ads that appear on your Facebook feed. They can look very convincing: well-known logos, professional images, and even names of legitimate brands like TradingView. Many of these ads are run from stolen or newly created accounts to avoid suspicion.
When you click, a chain of redirections takes you to a site that looks authentic. If your IP address or the referral source doesn’t match what they expect, they may even show you a decoy page to avoid raising suspicions.
The page offers you an installer (usually in MSI format). When opened, this file extracts several libraries (DLLs) and establishes communication with your device through port 30303.
This way, the infection won’t progress if one of the components fails. Everything is designed so that the malware runs only in favorable conditions and remains undetected by security systems.
To avoid raising suspicion, the installer opens a web window through msedge_proxy.exe, showing you the legitimate page of the application you thought you were installing. You believe everything went fine, while in the background your data is already being collected.
Attack Chain (Source: Check Point)
You might also be interested in: The Evolution of Artificial Intelligence Driven Malware
Once installed, JSCEAL activates a set of functions designed to gain full control of your device:
It performs all this stealthily, using compiled and heavily obfuscated JavaScript files to evade traditional security tools.
If you download one of these fake apps, you expose your device and data to serious risks:
At TecnetOne, we want you to always stay protected. Here are practical recommendations:
If you see a Facebook ad offering a free cryptocurrency or AI app with “instant” results, be wary.
Instead of clicking the ad, search directly for the official page in your browser. Check that the domain is legitimate and has an HTTPS certificate.
Enable two-factor authentication (2FA) on your most important accounts, especially those related to banking and cryptocurrencies.
The first barrier is you and your team. A short training session on malvertising and safe downloads can make all the difference.
Learn More: Ransomware Gangs Increasingly Use Skitnet Malware
Attackers have found Facebook malvertising to be the perfect channel for spreading malware like JSCEAL. With well-designed ads and advanced techniques, they manage to steal credentials, digital wallets, and control devices without you noticing.
At TecnetOne, we remind you: the best defense is prevention. Stay alert, keep your systems updated, and avoid downloading apps from unofficial links. Because in digital security, one click can be the difference between being protected and being exposed.