
An estimated 10 million people globally have been exposed to online advertisements spruiking fake crypto apps with malware, warns cybersecurity firm Check Point.
Check Point Research said on Tuesday that it had been tracking a malware campaign it named âJSCEALâ that targets crypto users by impersonating common crypto trading apps.
The campaign has been active since at least March 2024 and has âgradually evolved over time,â the company added. It uses advertisements to trick victims into installing fake apps that âimpersonate almost 50 common cryptocurrency trading apps,â including Binance, MetaMask and Kraken.
Crypto users are a key target of various malicious campaigns as victims of crypto theft have little recourse to recover their funds, and blockchains anonymize bad actors, making it difficult to uncover those behind the schemes.
10 million are estimated to be targeted by malicious ads
Check Point said Metaâs ad tools showed 35,000 malicious ads were promoted in the first half of 2025, which led to âa few million views in the EU alone.â
The firm estimated that at least 3.5 million were exposed to the ad campaigns within the EU, but they also âimpersonated Asian crypto and financial institutionsâ â regions with a comparably higher number of social media users.
âThe global reach could easily exceed 10 million,â Check Point said.
The firm noted that itâs typically impossible to determine the full scope of a malware campaign and that advertising reach âdoes not equal the number of victims.â
Malware uses âunique anti-evasion methodsâ
The latest iteration of the malware campaign uses âunique anti-evasion methods,â which resulted in âextremely low detection ratesâ and allowed it to go undetected for so long, Check Point said.
Victims who click a malicious ad are directed to a legitimate-appearing but fake site to download the malware, and the attackerâs website and installation software run simultaneously, which Check Point said âsignificantly complicates analysis and detection effortsâ as theyâre hard to detect in isolation.
The fake app opens a program that directs to the legit site of the app a victim believes they have downloaded to deceive them, but in the background, itâs collecting âsensitive user information, primarily crypto-related.â
Related: Threat actors using âelaborate social engineering schemeâ to target crypto users â ReportÂ
The malware uses the popular programming language JavaScript, which doesnât need the victimâs input to run. Check Point said a âcombination of compiled code and heavy obfuscationâ made its effort to analyse the malware âchallenging and time-consuming.â
Accounts and passwords scooped up in malwareâs net
Check Point said that the malwareâs main purpose is to gather as much information on the infected device as possible to send it to a threat actor to use.
Some of the information that the programs were collecting was user keyboard inputs â which can reveal passwords â along with stealing Telegram account information and autocomplete passwords.
The malware also collects browser cookies, which can show what websites a victim visits often, and it can manipulate crypto-related web extensions such as MetaMask.
It said that anti-malware software that detects malicious JavaScript executions would be âvery effectiveâ at stopping an attack on an already-infected device.
Magazine: Inside a 30,000 phone bot farm stealing crypto airdrops from real usersÂ

