{"id":4225,"date":"2020-10-04T04:51:17","date_gmt":"2020-10-04T01:51:17","guid":{"rendered":"https:\/\/alfacash.blog\/?p=4225"},"modified":"2024-02-19T21:53:10","modified_gmt":"2024-02-19T18:53:10","slug":"malware-can-kradnout-kryptos-jak-se-tomu-vyhnout","status":"publish","type":"post","link":"https:\/\/alfacash.blog\/cs\/2020\/10\/04\/malware-can-kradnout-kryptos-jak-se-tomu-vyhnout\/","title":{"rendered":"Malware, kter\u00fd m\u016f\u017ee ukr\u00e1st v\u0161echna va\u0161e krypta a jak se mu vyhnout"},"content":{"rendered":"<p>Blockchain je podle nich bezpe\u010dn\u00fd a ne\u0161ikovn\u00fd. Na\u0161e kryptoassety jsou uvnit\u0159, tak\u017ee se sv\u00fdmi prost\u0159edky c\u00edt\u00edme tak sebejist\u011b ... proto\u017ee jsou naprosto v po\u0159\u00e1dku a maj\u00ed \u0161pi\u010dkov\u00e9 zabezpe\u010den\u00ed, \u017ee? Odpov\u011b\u010f na tuto ot\u00e1zku by byla ano i ne sou\u010dasn\u011b.<\/p>\n\n\n\n<p>Ano, proto\u017ee n\u011bkdo by k rozbit\u00ed a pot\u0159eboval dosud neexistuj\u00edc\u00ed kvantov\u00fd po\u010d\u00edta\u010d <a href=\"https:\/\/alfacash.blog\/2020\/08\/30\/dummies-what-is-blockchain-how-it-works\/\" target=\"_blank\" rel=\"noreferrer noopener\">siln\u00fd blockchain<\/a>; a ne, proto\u017ee rizikov\u00e9 faktory jdou bohu\u017eel d\u00e1le. <strong>Jde o to: \u010dlov\u011bka lze v\u017edy nal\u00e1kat a oklamat.<\/strong> Lid\u00e9 sami jsou Achillovou patou v kybernetick\u00e9 bezpe\u010dnosti a nikdo nen\u00ed osvobozen od kybernetick\u00e9ho \u00fatoku.<\/p>\n\n\n\n<p>Proto bychom si m\u011bli b\u00fdt velmi dob\u0159e v\u011bdomi \u0161patn\u00fdch mo\u017enost\u00ed a malwaru, kter\u00e9mu bychom se m\u011bli za ka\u017edou cenu vyhnout. Zabra\u0148te p\u0159ed vyl\u00e9\u010den\u00edm, setkejte se zde tedy s malwarem, kter\u00fd dok\u00e1\u017ee ukr\u00e1st v\u0161echny va\u0161e kryptom\u011bny a jak se o n\u011b starat.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Ransomware<\/strong><\/h2>\n\n\n\n<p>Slovo nebylo sestaveno libovoln\u011b: poch\u00e1z\u00ed ze sm\u011bsi \u201ev\u00fdkupn\u00e9ho\u201c a \u201emalwaru\u201c a velmi dob\u0159e definuje koncept. Jedn\u00e1 se o druh malwaru, kter\u00fd po instalaci do va\u0161eho za\u0159\u00edzen\u00ed za\u0161ifruje osobn\u00ed soubory (dokumenty, obr\u00e1zky, zvuk, video ...) nebo cel\u00fd pevn\u00fd disk a po\u017e\u00e1d\u00e1 v\u00e1s o v\u00fdkupn\u00e9 (\u010dasto v kryptom\u011bn\u011b) za jejich vr\u00e1cen\u00ed.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"725\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-1024x725.jpg\" alt=\"\" class=\"wp-image-4230\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-1024x725.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-300x212.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-150x106.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-254x180.jpg 254w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-728x515.jpg 728w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-718x508.jpg 718w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-370x262.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-554x392.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-306x217.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-346x245.jpg 346w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-260x184.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-87x62.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Obr\u00e1zek mohamed Hassan \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>Na \u00fasvitu sv\u00e9 popularity tam v roce 2013 nejv\u00edce zas\u00e1hla osobn\u00ed za\u0159\u00edzen\u00ed a \u017e\u00e1dan\u00e9 v\u00fdkupn\u00e9 za n\u011b \u010dinilo 100 - 300 USD <a href=\"https:\/\/alfacash.blog\/2020\/08\/20\/how-buy-bitcoin-simple-steps-nice-recipe\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bitcoin (BTC)<\/a>. Hacke\u0159i dokonce doru\u010dovali pokyny k pou\u017eit\u00ed kryptom\u011bny.<\/p>\n\n\n\n<p>K dne\u0161n\u00edmu dni existuje mnoho typ\u016f a vyvinulo se do form\u00e1tu <a href=\"https:\/\/www.healthitoutcomes.com\/doc\/ransomware-cyber-crime-s-billion-dollar-industry-0001\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">miliard\u00e1\u0159sk\u00fd pr\u016fmysl<\/a> ve kter\u00e9m <strong>nejv\u00edce posti\u017een\u00e9 jsou spole\u010dnosti a ne osobn\u00ed u\u017eivatel\u00e9<\/strong>. V\u00fdkupn\u00e9 za n\u011b nyn\u00ed m\u016f\u017ee \u010dinit miliony dolar\u016f v kryptom\u011btech Bitcoin, Monero (XMR), Zcash (ZEC) a dal\u0161\u00edch.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Jak se nakaz\u00edte?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Spamov\u00e9 e -maily ve va\u0161\u00ed doru\u010den\u00e9 po\u0161t\u011b, doru\u010duj\u00edc\u00ed pochybn\u00e9 odkazy.<\/li><li>Neofici\u00e1ln\u00ed stahov\u00e1n\u00ed z extern\u00edch web\u016f nebo softwaru P2P (jako BitTorrent).<\/li><li>Vyu\u017eit\u00ed v neaktualizovan\u00fdch opera\u010dn\u00edch syst\u00e9mech (OS), tj. Windows XP nebo star\u00e9 verze firmwaru v <a href=\"https:\/\/alfacash.blog\/2020\/10\/02\/coffe-hijacked-mine-monero-other-things\/\" target=\"_blank\" rel=\"noreferrer noopener\">IoT za\u0159\u00edzen\u00ed<\/a> (pamatujte na tyto prvn\u00ed t\u0159i jako na \u201ezlou tri\u00e1du\u201c).<\/li><li>C\u00edlen\u00fd \u00fatok speci\u00e1ln\u011b napl\u00e1novan\u00fd a navr\u017een\u00fd pro jeden c\u00edl, \u010dasto institucion\u00e1ln\u00ed (organizace a spole\u010dnosti).<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>U\u017eite\u010dn\u00e9 tipy<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Udr\u017eujte aktualizovan\u00fd opera\u010dn\u00ed syst\u00e9m, antivirov\u00fd program a firmware v\u0161ech va\u0161ich chytr\u00fdch za\u0159\u00edzen\u00ed.<\/li><li>Neotev\u00edrejte odkazy ani p\u0159ipojen\u00e9 soubory z pochybn\u00fdch e -mail\u016f.<\/li><li>Stahujte soubory a software pouze z ofici\u00e1ln\u00edch webov\u00fdch str\u00e1nek (tyto prvn\u00ed t\u0159i si pamatujte jako \u201e\u0161t\u00edtovou tri\u00e1du\u201c).<\/li><li>Z\u00e1lohujte si v\u0161echny d\u016fle\u017eit\u00e9 informace a soubory na extern\u00ed za\u0159\u00edzen\u00ed, nejl\u00e9pe offline.<\/li><li>V p\u0159\u00edpad\u011b infekce p\u0159ejd\u011bte na pomoc web\u016fm jako <a href=\"https:\/\/www.nomoreransom.org\/en\/index.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">\u017d\u00e1dn\u00e9 dal\u0161\u00ed v\u00fdkupn\u00e9<\/a> nebo zavolejte na kybernetickou divizi va\u0161ich m\u00edstn\u00edch \u00fa\u0159ad\u016f. Platit v\u00fdkupn\u00e9 p\u0159\u00edmo se nedoporu\u010duje a jeho \u00fasp\u011bch nen\u00ed zaru\u010den.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Keyloggery<\/strong><\/h2>\n\n\n\n<p>M\u016f\u017eeme \u0159\u00edci, \u017ee nen\u00ed <em>malware<\/em> per se, ale kyberzlo\u010dinci ho pou\u017e\u00edvaj\u00ed jako \u0161pion\u00e1\u017en\u00ed n\u00e1stroj. Jak ransomware \u0159\u00edk\u00e1, jeho n\u00e1zev mluv\u00ed za v\u0161e: toto je software nebo hardware navr\u017een\u00fd tak, aby zaznamen\u00e1val (a \u010dasto odes\u00edlal) ka\u017ed\u00e9 stisknut\u00ed kl\u00e1vesy na kl\u00e1vesnici za\u0159\u00edzen\u00ed. N\u011bkdy mohou dokonce zaznamen\u00e1vat kliknut\u00ed, zvuk a video.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-1024x682.jpg\" alt=\"\" class=\"wp-image-4232\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Obr\u00e1zek Gerd Altmann \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>Pokud tedy a <a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/keylogger\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">keylogger<\/a> je tajn\u011b nainstalov\u00e1n na za\u0159\u00edzen\u00ed, <strong>je schopen zaznamen\u00e1vat hesla a p\u0159ihla\u0161ovac\u00ed \u00fadaje, kter\u00e9 by byly pozd\u011bji odesl\u00e1ny \u0161kodliv\u00e9mu hackerovi.<\/strong> Mezi t\u011bmito pov\u011b\u0159en\u00edmi m\u016f\u017ee b\u00fdt heslo nebo soukrom\u00fd kl\u00ed\u010d a <a href=\"https:\/\/alfacash.blog\/2020\/08\/18\/what-is-cryptocurrency-why-should-care-reasons\/\" target=\"_blank\" rel=\"noreferrer noopener\">kryptom\u011bnov\u00e1 pen\u011b\u017eenka<\/a>, co\u017e znamen\u00e1, \u017ee t\u011b takto okradou.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Jak se nakaz\u00edte?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Zl\u00e1 tri\u00e1da, jak jsme ji\u017e \u0159ekli.<\/li><li>Fale\u0161n\u00e9 webov\u00e9 str\u00e1nky a roz\u0161\u00ed\u0159en\u00ed prohl\u00ed\u017ee\u010de (phishing).<\/li><li>Infikovan\u00e9 webov\u00e9 dom\u00e9ny, co\u017e znamen\u00e1 c\u00edlen\u00e9 \u00fatoky na slu\u017eby, jako jsou zraniteln\u00e9 obchody a burzy.<\/li><li>N\u011bkdo nechal k va\u0161emu po\u010d\u00edta\u010di p\u0159ipojen\u00e9 legra\u010dn\u00ed mal\u00e9 za\u0159\u00edzen\u00ed, nap\u0159\u00edklad pochybn\u00fd USB adapt\u00e9r nebo kabel nav\u00edc (je to hardwarov\u00fd keylogger).<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>U\u017eite\u010dn\u00e9 tipy<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Jak jsme ji\u017e \u0159ekli, pou\u017eijte spolehlivou \u0161t\u00edtovou tri\u00e1du.<\/li><li>Krom\u011b antiviru se ujist\u011bte, \u017ee m\u00e1te tak\u00e9 \u0159e\u0161en\u00ed pro kybernetickou bezpe\u010dnost s n\u00e1zvem anti-keylogger.<\/li><li>Zaznamenejte si p\u0159ihla\u0161ovac\u00ed \u00fadaje a hesla do prohl\u00ed\u017ee\u010de ve sv\u00e9m obvykl\u00e9m za\u0159\u00edzen\u00ed nebo pomoc\u00ed softwaru sv\u00e9 p\u0159ihla\u0161ovac\u00ed \u00fadaje spravujte.<\/li><li>Vyhn\u011bte se phishingov\u00fdm web\u016fm a aplikac\u00edm pouh\u00fdm pohledem na adresu URL, kter\u00e1 se v\u017edy li\u0161\u00ed od p\u016fvodn\u00ed.<\/li><li>V\u011bnujte pozornost novink\u00e1m o va\u0161ich obl\u00edben\u00fdch webech a slu\u017eb\u00e1ch: m\u011bli by ozn\u00e1mit sv\u00e9 z\u00e1kazn\u00edky, pokud jsou pod kybernetick\u00fdm \u00fatokem.<\/li><li>Nenech\u00e1vejte v za\u0159\u00edzen\u00ed p\u0159ipojen\u00fd nezn\u00e1m\u00fd hardware.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Vzd\u00e1len\u00fd p\u0159\u00edstup Trojan (RAT)<\/strong><\/h2>\n\n\n\n<p>Je to velmi \u0161patn\u00e1 infekce, proto\u017ee to nen\u00ed nic jin\u00e9ho ne\u017e otev\u0159en\u00e9 zadn\u00ed dve\u0159e, kter\u00e9 umo\u017en\u00ed hacker\u016fm vstoupit a ovl\u00e1dat va\u0161e za\u0159\u00edzen\u00ed na d\u00e1lku. Po instalaci softwaru RAT umo\u017e\u0148uje spr\u00e1vu, <strong>co\u017e znamen\u00e1, \u017ee jeho hacker m\u016f\u017ee v za\u0159\u00edzen\u00ed vid\u011bt a d\u011blat t\u00e9m\u011b\u0159 cokoli, co chce,<\/strong> od tich\u00e9ho sledov\u00e1n\u00ed dat a chov\u00e1n\u00ed k distribuci dal\u0161\u00edho malwaru a form\u00e1tovac\u00edch jednotek.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-1024x682.jpg\" alt=\"\" class=\"wp-image-4233\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Obr\u00e1zek od StockSnap \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>Samoz\u0159ejm\u011b by mohli ukr\u00e1st i va\u0161e kryptom\u011bny, a to pouh\u00fdm zad\u00e1n\u00edm do pen\u011b\u017eenky po zaznamen\u00e1n\u00ed va\u0161ich pohyb\u016f. A tohoto nen\u00e1padn\u00e9ho softwaru si pravd\u011bpodobn\u011b nev\u0161imnete, dokud nebude p\u0159\u00edli\u0161 pozd\u011b.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Jak se nakaz\u00edte?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Zl\u00e1 tri\u00e1da, hor\u0161\u00ed ne\u017e kdy jindy. Ve skute\u010dnosti je velmi b\u011b\u017en\u00e9, \u017ee je skryt\u00fd uvnit\u0159 popraskan\u00fdch her a softwaru.<\/li><li>Pou\u017e\u00edv\u00e1n\u00ed pochybn\u00fdch <a href=\"https:\/\/themerkle.com\/open-source-remote-access-trojan-targets-telegram-users\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">roboti v Telegramu<\/a>.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>U\u017eite\u010dn\u00e9 tipy<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Pou\u017eijte \u0161t\u00edtovou tri\u00e1du a budete v po\u0159\u00e1dku!<\/li><li>Krom\u011b toho m\u016f\u017eete kdykoli vyhledat koment\u00e1\u0159e a recenze od ostatn\u00edch u\u017eivatel\u016f aplikac\u00ed a program\u016f, kter\u00e9 se chyst\u00e1te st\u00e1hnout. V\u010detn\u011b robot\u016f v Telegramu, ano.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\u00danosce Clipper \/ Clipboard<\/strong><\/h2>\n\n\n\n<p>Kyberzlo\u010dinci velmi dob\u0159e znaj\u00ed obecn\u00e9 zp\u016fsoby u\u017eivatel\u016f kryptom\u011bny. V\u011bd\u00ed nap\u0159\u00edklad, \u017ee nikdo nep\u00ed\u0161e ru\u010dn\u011b dlouh\u00e9 a slo\u017eit\u00e9 adresy pen\u011b\u017eenek, ale v p\u0159\u00edpad\u011b pot\u0159eby je zkop\u00edruje a vlo\u017e\u00ed. To je p\u0159esn\u011b ten bod, kter\u00fd se rozhodnou un\u00e9st p\u016fvodn\u00ed adresy a nahradit je vlastn\u00edmi, pomoc\u00ed \u0161kodliv\u00e9ho softwaru, kter\u00e9mu se p\u0159ezd\u00edv\u00e1 \u201eClipper\u201c nebo \u201eClipboard hijacker\u201c.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"665\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-1024x665.jpg\" alt=\"\" class=\"wp-image-4234\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-1024x665.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-300x195.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-150x97.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-270x175.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-770x500.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-782x508.jpg 782w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-793x515.jpg 793w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-370x240.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-554x360.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-306x199.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-260x169.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-87x56.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Obr\u00e1zek Pete Linforth \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>Hlavn\u00ed v\u011bc, kterou tento malware d\u011bl\u00e1, je <strong>uneste schr\u00e1nku v za\u0159\u00edzen\u00ed u\u017eivatele a zjist\u011bte, kdy vlastn\u00edk zkop\u00edruje adresu krypto pen\u011b\u017eenky<\/strong>. Pot\u00e9 je tato adresa nahrazena adresou hackersk\u00e9 pen\u011b\u017eenky, tak\u017ee pokud u\u017eivatel nev\u011bnuje pozornost, m\u016f\u017ee skon\u010dit odesl\u00e1n\u00edm finan\u010dn\u00edch prost\u0159edk\u016f na nespr\u00e1vn\u00e9 m\u00edsto ur\u010den\u00ed.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Jak se nakaz\u00edte?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Ano, op\u011bt tri\u00e1da zla. Tentokr\u00e1t nejb\u011b\u017en\u011bj\u0161\u00ed <a href=\"https:\/\/www.binarydefense.com\/threat_watch\/clipper-cryptocurrency-stealing-malware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">vektor infekce<\/a> jsou fale\u0161n\u00e9 nebo infikovan\u00e9 aplikace v Obchod\u011b Play.<\/li><li>Reklamy Adobe Flash nebo jin\u00e9 fale\u0161n\u00e9 bannery na pochybn\u00fdch webech.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>U\u017eite\u010dn\u00e9 tipy<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Pou\u017eijte \u0161t\u00edtovou tri\u00e1du (funguje t\u00e9m\u011b\u0159 na v\u0161echno).<\/li><li>V\u011bnujte pozornost adres\u00e1m pen\u011b\u017eenky! Nez\u00e1le\u017e\u00ed na tom, pokud si mysl\u00edte, \u017ee ve sv\u00e9m za\u0159\u00edzen\u00ed nem\u00e1te \u017e\u00e1dn\u00fd zast\u0159ihova\u010d (tyto nevyvol\u00e1vaj\u00ed \u017e\u00e1dn\u00e9 viditeln\u00e9 p\u0159\u00edznaky). P\u0159ed sd\u00edlen\u00edm nebo odesl\u00e1n\u00edm dvakr\u00e1t porovnejte a ov\u011b\u0159te svou p\u016fvodn\u00ed adresu a vlo\u017eenou verzi.<\/li><li>Pokud je to mo\u017en\u00e9, up\u0159ednostn\u011bte pou\u017eit\u00ed sv\u00fdch prost\u0159edk\u016f prost\u0159ednictv\u00edm QR k\u00f3d\u016f m\u00edsto textu.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Phishing<\/strong><\/h2>\n\n\n\n<p>M\u016f\u017eeme \u0159\u00edct <a href=\"https:\/\/www.phishing.org\/what-is-phishing\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">phishing<\/a> je \u010d\u00e1ste\u010dn\u011b malware a \u010d\u00e1ste\u010dn\u011b podvod, proto\u017ee je to jen fale\u0161n\u00e1 verze n\u011b\u010deho (webov\u00e9 str\u00e1nky, aplikace, software, zpr\u00e1va, vol\u00e1n\u00ed ...), speci\u00e1ln\u011b navr\u017een\u00e1 <a href=\"https:\/\/alfacash.blog\/2020\/09\/07\/getting-rich-wrecking-most-popular-cryptocurrency-myths\/\" target=\"_blank\" rel=\"noreferrer noopener\">oklamat lidi<\/a> a z\u00edskat od nich cenn\u00e9 informace, jako jsou bankovn\u00ed a kryptom\u011bnov\u00e9 \u00fadaje a kl\u00ed\u010de. Hacke\u0159i tedy klonuj\u00ed webov\u00e9 str\u00e1nky nebo software nebo se vyd\u00e1vaj\u00ed za n\u011bjakou slu\u017ebu, spole\u010dnost nebo osobu prost\u0159ednictv\u00edm e -mailu nebo vol\u00e1n\u00ed, aby dos\u00e1hli sv\u00fdch \u0161kodliv\u00fdch c\u00edl\u016f.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-1024x682.jpg\" alt=\"\" class=\"wp-image-4235\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Obr\u00e1zek leo2014 \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>M\u016f\u017eete tam zjistit fale\u0161nou verzi va\u0161eho <a href=\"https:\/\/www.alfa.cash\/\" target=\"_blank\" rel=\"noreferrer noopener\">spolehliv\u00e1 sm\u011bna kryptom\u011bn<\/a>, p\u0159\u00edkladem. <strong>Vypad\u00e1 to identicky, ale z\u00e1rove\u0148 jsou n\u011bkter\u00e9 v\u011bci vypnut\u00e9.<\/strong> Mo\u017en\u00e1 je to \u0161patn\u00e1 gramatika, nefunk\u010dn\u00ed odkazy nebo chyb\u011bj\u00edc\u00ed texty; ale na phishingov\u00fdch webech je v\u017edy n\u011bco, co je prozrad\u00ed: adresa URL.<\/p>\n\n\n\n<p>Nem\u016f\u017ee to b\u00fdt \u00fapln\u011b stejn\u00e1 dom\u00e9na jako p\u016fvodn\u00ed (proto\u017ee byste si m\u011bli koupit dom\u00e9nu a nem\u016f\u017eete si koupit n\u011bco, co legitimn\u00ed vlastn\u00edk neprod\u00e1v\u00e1). V\u017edy jsou si podobn\u00ed, ale minim\u00e1ln\u011b jeden znak bude zm\u011bn\u011bn (tj. Www.<strong>alfa<\/strong>.cash vs www.<strong>v\u00fdm\u011bna alfa<\/strong>.hotovost). A u po\u0161tovn\u00edch adres je to stejn\u00e9: pokud nem\u00e1 p\u016fvodn\u00ed dom\u00e9nu spole\u010dnosti (tj. Hr@<strong>alfa.im <\/strong>vs hr@<strong>gmail.com<\/strong>), m\u011bli byste okam\u017eit\u011b podez\u0159\u00edvat.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Jak se nakaz\u00edte?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Zl\u00e1 tri\u00e1da, zejm\u00e9na prost\u0159ednictv\u00edm e -mailu.<\/li><li>Dubious p\u0159id\u00e1v\u00e1 v horn\u00ed \u010d\u00e1sti v\u00fdsledk\u016f prohl\u00ed\u017ee\u010de. Kdokoli (dokonce i zlomysln\u00ed herci) m\u016f\u017ee za tento druh p\u0159id\u00e1n\u00ed zaplatit, tak\u017ee tam bude, dokud to n\u011bkdo nenahl\u00e1s\u00ed.<\/li><li>Hacker\/podvodn\u00edk nalezen <a href=\"https:\/\/alfacash.blog\/2020\/08\/26\/easiest-guide-top-up-phone-cryptocurrencies\/\" target=\"_blank\" rel=\"noreferrer noopener\">tv\u016fj telefon<\/a> n\u011bjak\u00fdm zp\u016fsobem a vol\u00e1 v\u00e1s to, vyd\u00e1v\u00e1 se za n\u011bjakou autoritu.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>U\u017eite\u010dn\u00e9 tipy<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Tri\u00e1da \u0161t\u00edtu op\u011bt na z\u00e1chranu.<\/li><li>Z\u00edskejte p\u0159\u00edstup ke sv\u00fdm nejpou\u017e\u00edvan\u011bj\u0161\u00edm web\u016fm prost\u0159ednictv\u00edm seznamu z\u00e1lo\u017eek\/obl\u00edben\u00fdch a vyhn\u011bte se v\u00fdsledk\u016fm prohl\u00ed\u017ee\u010de, jak jen m\u016f\u017eete.<\/li><li>Bu\u010fte podez\u0159el\u00ed z jak\u00e9koli zpr\u00e1vy\/e -mailu\/hovoru, ve kter\u00e9m po v\u00e1s n\u011bkdo \u017e\u00e1d\u00e1 osobn\u00ed \u00fadaje nebo pen\u00edze. Pamatujte: spole\u010dnosti\/organizace to v\u016fbec nepou\u017e\u00edvaj\u00ed.<\/li><li>Pokud se chyst\u00e1te odes\u00edlat\/p\u0159ij\u00edmat kryptom\u011bnu prost\u0159ednictv\u00edm webov\u00e9 str\u00e1nky nebo aplikace, v\u017edy zkontrolujte adresu URL a p\u0159edchoz\u00ed recenze.<\/li><\/ul>\n\n\n\n<p>Ale nade v\u0161e se nebojte! Chr\u00e1nit sebe a sv\u00e9 kryptom\u011bny je snadn\u00e9. Postupujte podle na\u0161ich u\u017eite\u010dn\u00fdch tip\u016f a m\u011bli byste b\u00fdt v po\u0159\u00e1dku.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"has-text-align-center\"><em>Chcete obchodovat BTC, ETH a dal\u0161\u00ed tokeny? M\u016f\u017ee\u0161 to ud\u011blat<\/em>\u00a0<em>bezpe\u010dn\u011b\u00a0<a href=\"https:\/\/www.alfa.cash\/buy\/bitcoin\" target=\"_blank\" rel=\"noreferrer noopener\">na Alfacash<\/a>! A nezapome\u0148te, \u017ee mluv\u00edme o tomto a mnoha dal\u0161\u00edch v\u011bcech na na\u0161ich soci\u00e1ln\u00edch m\u00e9di\u00edch.<br><br><\/em><a href=\"https:\/\/twitter.com\/alfacash_crypto\" target=\"_blank\" rel=\"noreferrer noopener\">Cvrlik\u00e1n\u00ed<\/a>\u00a0*\u00a0<a href=\"https:\/\/t.me\/AlfacashCommunity\" target=\"_blank\" rel=\"noreferrer noopener\">Telegram<\/a>\u00a0*\u00a0<a href=\"https:\/\/www.instagram.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Instagram<\/a> * <a href=\"https:\/\/www.youtube.com\/channel\/UCOl4fdRHj8AseQ5b6z9udaw\" target=\"_blank\" rel=\"noreferrer noopener\">Youtube<\/a>\u00a0*<a href=\"https:\/\/www.facebook.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook<\/a>\u00a0\u00a0*\u00a0<a href=\"https:\/\/vk.com\/alfacashcrypto\" target=\"_blank\" rel=\"noreferrer noopener\">Vkontakte<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Uvnit\u0159 krypto-sv\u011bta bychom si m\u011bli b\u00fdt velmi dob\u0159e v\u011bdomi \u0161patn\u00fdch mo\u017enost\u00ed. Seznamte se tedy s malwarem, kter\u00fd v\u00e1m m\u016f\u017ee ukr\u00e1st v\u0161echna krypta a jak se mu vyhnout.<\/p>","protected":false},"author":5,"featured_media":4228,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[48],"tags":[133,42,132,127,134,129,131],"class_list":{"0":"post-4225","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-learn","8":"tag-clipper","9":"tag-cryptocurrency","10":"tag-keylogger","11":"tag-malware","12":"tag-phishing","13":"tag-ransomware","14":"tag-rat"},"featured_image_src":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","author_info":{"display_name":"Isabel P\u00e9rez","author_link":"https:\/\/alfacash.blog\/cs\/author\/isabel\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malware that can steal all your cryptos and how to avoid it - alfa.cash blog<\/title>\n<meta name=\"description\" content=\"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/alfacash.blog\/cs\/2020\/10\/04\/malware-can-kradnout-kryptos-jak-se-tomu-vyhnout\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware that can steal all your cryptos and how to avoid it\" \/>\n<meta property=\"og:description\" content=\"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/alfacash.blog\/cs\/2020\/10\/04\/malware-can-kradnout-kryptos-jak-se-tomu-vyhnout\/\" \/>\n<meta property=\"og:site_name\" content=\"alfa.cash blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/alfacashstore\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-04T01:51:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T18:53:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2123\" \/>\n\t<meta property=\"og:image:height\" content=\"1120\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Isabel P\u00e9rez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AlfacashStore\" \/>\n<meta name=\"twitter:site\" content=\"@AlfacashStore\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\"},\"author\":{\"name\":\"Isabel P\u00e9rez\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\"},\"headline\":\"Malware that can steal all your cryptos and how to avoid it\",\"datePublished\":\"2020-10-04T01:51:17+00:00\",\"dateModified\":\"2024-02-19T18:53:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\"},\"wordCount\":1511,\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"keywords\":[\"Clipper\",\"cryptocurrency\",\"Keylogger\",\"malware\",\"Phishing\",\"Ransomware\",\"RAT\"],\"articleSection\":[\"Learn\"],\"inLanguage\":\"cs\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\",\"url\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\",\"name\":\"Malware that can steal all your cryptos and how to avoid it - alfa.cash blog\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"datePublished\":\"2020-10-04T01:51:17+00:00\",\"dateModified\":\"2024-02-19T18:53:10+00:00\",\"description\":\"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.\",\"breadcrumb\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb\"},\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"width\":270,\"height\":142,\"caption\":\"Malware-steal-cryptocurrency-tips\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/alfacash.blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware that can steal all your cryptos and how to avoid it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/alfacash.blog\/#website\",\"url\":\"https:\/\/alfacash.blog\/\",\"name\":\"Alfacash Blog\",\"description\":\"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi\",\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"alternateName\":\"alfacash.blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/alfacash.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"cs\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/alfacash.blog\/#organization\",\"name\":\"Alfacash Blog\",\"alternateName\":\"alfacash.blog\",\"url\":\"https:\/\/alfacash.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"width\":696,\"height\":696,\"caption\":\"Alfacash Blog\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/alfacashstore\",\"https:\/\/x.com\/AlfacashStore\",\"https:\/\/t.me\/AlfacashCommunity\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\",\"name\":\"Isabel P\u00e9rez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"caption\":\"Isabel P\u00e9rez\"},\"description\":\"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/\"],\"url\":\"https:\/\/alfacash.blog\/cs\/author\/isabel\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Malware that can steal all your cryptos and how to avoid it - alfa.cash blog","description":"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/alfacash.blog\/cs\/2020\/10\/04\/malware-can-kradnout-kryptos-jak-se-tomu-vyhnout\/","og_locale":"cs_CZ","og_type":"article","og_title":"Malware that can steal all your cryptos and how to avoid it","og_description":"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.","og_url":"https:\/\/alfacash.blog\/cs\/2020\/10\/04\/malware-can-kradnout-kryptos-jak-se-tomu-vyhnout\/","og_site_name":"alfa.cash blog","article_publisher":"https:\/\/www.facebook.com\/alfacashstore","article_published_time":"2020-10-04T01:51:17+00:00","article_modified_time":"2024-02-19T18:53:10+00:00","og_image":[{"width":2123,"height":1120,"url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","type":"image\/jpeg"}],"author":"Isabel P\u00e9rez","twitter_card":"summary_large_image","twitter_creator":"@AlfacashStore","twitter_site":"@AlfacashStore","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#article","isPartOf":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/"},"author":{"name":"Isabel P\u00e9rez","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749"},"headline":"Malware that can steal all your cryptos and how to avoid it","datePublished":"2020-10-04T01:51:17+00:00","dateModified":"2024-02-19T18:53:10+00:00","mainEntityOfPage":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/"},"wordCount":1511,"publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"image":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","keywords":["Clipper","cryptocurrency","Keylogger","malware","Phishing","Ransomware","RAT"],"articleSection":["Learn"],"inLanguage":"cs"},{"@type":"WebPage","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/","url":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/","name":"Malware that can steal all your cryptos and how to avoid it - alfa.cash blog","isPartOf":{"@id":"https:\/\/alfacash.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage"},"image":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","datePublished":"2020-10-04T01:51:17+00:00","dateModified":"2024-02-19T18:53:10+00:00","description":"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.","breadcrumb":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb"},"inLanguage":"cs","potentialAction":[{"@type":"ReadAction","target":["https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/"]}]},{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","width":270,"height":142,"caption":"Malware-steal-cryptocurrency-tips"},{"@type":"BreadcrumbList","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/alfacash.blog\/"},{"@type":"ListItem","position":2,"name":"Malware that can steal all your cryptos and how to avoid it"}]},{"@type":"WebSite","@id":"https:\/\/alfacash.blog\/#website","url":"https:\/\/alfacash.blog\/","name":"Alfacash Blog","description":"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi","publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"alternateName":"alfacash.blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/alfacash.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs"},{"@type":"Organization","@id":"https:\/\/alfacash.blog\/#organization","name":"Alfacash Blog","alternateName":"alfacash.blog","url":"https:\/\/alfacash.blog\/","logo":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","width":696,"height":696,"caption":"Alfacash Blog"},"image":{"@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/alfacashstore","https:\/\/x.com\/AlfacashStore","https:\/\/t.me\/AlfacashCommunity"]},{"@type":"Person","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749","name":"Isabel P\u00e9rez","image":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","caption":"Isabel P\u00e9rez"},"description":"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.","sameAs":["https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/"],"url":"https:\/\/alfacash.blog\/cs\/author\/isabel\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/posts\/4225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/comments?post=4225"}],"version-history":[{"count":4,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/posts\/4225\/revisions"}],"predecessor-version":[{"id":8756,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/posts\/4225\/revisions\/8756"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/media\/4228"}],"wp:attachment":[{"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/media?parent=4225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/categories?post=4225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/tags?post=4225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}