{"id":9884,"date":"2022-06-15T22:47:00","date_gmt":"2022-06-15T19:47:00","guid":{"rendered":"https:\/\/alfacash.blog\/?p=9884"},"modified":"2024-02-19T21:50:39","modified_gmt":"2024-02-19T18:50:39","slug":"crypto-stealing-malware-avoid-2022","status":"publish","type":"post","link":"https:\/\/alfacash.blog\/cs\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/","title":{"rendered":"+5 Crypto-stealing malware to avoid in 2022"},"content":{"rendered":"<p>Even in a bearish market, hackers and scammers worldwide are looking for unaware victims. They\u2019re using old and new technics to empty crypto wallets right now, or more than this, to steal energy and mine new coins. Therefore, it\u2019s very important to know, at least, the most popular crypto-stealing malware.<\/p>\n\n\n\n<p><strong>There are simple ways to take care of your private keys and funds<\/strong>. The bad signals are also tale-telling at some point. However, it\u2019s also easy to ignore them \u2014or not know them in the first place. So, let\u2019s go to explore some common infections in 2022, and how to avoid them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Glupteba and other cryptojackers<\/strong><\/h2>\n\n\n\n<p>This kind of crypto malware isn\u2019t exactly for stealing cryptocurrencies. Instead, once installed on the computer or running from a malicious Internet window, it starts to steal energy and hardware resources. The purpose is to mine new coins (usually Monero) and send them directly to the hacker(s). This way, the operators don\u2019t spend a cent on energy or computers but keep the tokens anyway.<\/p>\n\n\n\n<p>Besides, probably the major problem with <a href=\"https:\/\/alfacash.blog\/2022\/03\/14\/what-cryptojacking-how-can-you-affected\/\" target=\"_blank\" rel=\"noreferrer noopener\">cryptojackers<\/a> is that they\u2019re very stealthy. The malicious software <strong>tries to take as less resources as possible (to go unnoticed) from as many machines as they can.<\/strong> So, cryptojackers are commonly mixed with \u201cbotnets\u201d: networks of bots designed to control a massive number of devices at the same time.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/christmas-stocking-4721704_1920-1024x683.jpg\" alt=\"Crypto-malware-botnet-cryptojackers\" class=\"wp-image-9891\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/christmas-stocking-4721704_1920-1024x683.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/christmas-stocking-4721704_1920-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/christmas-stocking-4721704_1920-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/christmas-stocking-4721704_1920-1536x1025.jpg 1536w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/christmas-stocking-4721704_1920-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/christmas-stocking-4721704_1920-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/christmas-stocking-4721704_1920-770x515.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/christmas-stocking-4721704_1920-761x508.jpg 761w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/christmas-stocking-4721704_1920-772x515.jpg 772w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/christmas-stocking-4721704_1920-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/christmas-stocking-4721704_1920-554x370.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/christmas-stocking-4721704_1920-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/christmas-stocking-4721704_1920-367x245.jpg 367w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/christmas-stocking-4721704_1920-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/christmas-stocking-4721704_1920-87x58.jpg 87w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>The dubbed \u201cGlupteba\u201d is one of those cryptojackers-botnets. As described by <a href=\"https:\/\/blog.chainalysis.com\/reports\/2022-crypto-crime-report-preview-malware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">\u0158et\u011bzov\u00e1 anal\u00fdza<\/a>, it successfully infected over one million machines only in 2021. After silently kidnapping these devices, the hackers used them to mine <a href=\"https:\/\/alfacash.blog\/2021\/03\/29\/discover-monero-how-use-it-full-privacy\/\" target=\"_blank\" rel=\"noreferrer noopener\">Monero<\/a>. Meanwhile, the victims barely experienced some lagged machines \u2014their hardware, software, and energy being dried out.<\/p>\n\n\n\n<p><strong>Cloud and data companies, GPU farms, and maybe even some <a href=\"https:\/\/alfacash.blog\/2022\/02\/21\/where-are-bitcoin-miners-2022\/\" target=\"_blank\" rel=\"noreferrer noopener\">t\u011b\u017ea\u0159i kryptom\u011bn<\/a> are the favorite targets<\/strong> for cryptojackers since they have more power to offer. But this doesn\u2019t mean that any computer can\u2019t be kidnapped too. For the hackers, the more infected devices, the better.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>RedLine and info stealers<\/strong><\/h2>\n\n\n\n<p>The so-called info stealers can take much more than just cryptocurrency. They\u2019re designed to find (and steal) saved credentials, files, history, cookies, banking data, and <a href=\"https:\/\/alfacash.blog\/2021\/02\/03\/how-to-choose-first-crypto-wallet-tips-tricks\/\" target=\"_blank\" rel=\"noreferrer noopener\">crypto-wallets<\/a> inside the infected device. And they can do many more, if not controlled.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-1024x576.jpg\" alt=\"crypto-stealing-malware-Windows\" class=\"wp-image-7235\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-1024x576.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled-150x84.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled-260x146.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled-87x49.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-300x169.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled-18x10.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-770x433.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-903x508.jpg 903w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-900x506.jpg 900w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-370x208.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-554x312.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-306x172.jpg 306w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>RedLine is a well-known info stealer, available for anyone. Not for anyone to be infected with (also that, though), <strong>but for anyone to buy from the Darknet. It\u2019s even cheap: $150 for monthly access<\/strong> and $800 for lifetime access. And it includes a whole deal with additional (and malicious) tools. Like Chainalysis discovered:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\u201cBuyers also get access to Spectrum Crypt Service, a Telegram-based tool that allows cybercriminals to encrypt Redline so that it\u2019s more difficult for victims\u2019 antivirus software to detect it once it\u2019s been downloaded. The proliferation of cheap access to malware families like Redline means that even relatively low-skilled cybercriminals can use them to steal cryptocurrency.\u201d<\/p><\/blockquote>\n\n\n\n<p>Moreover, <a href=\"https:\/\/www.cisecurity.org\/insights\/blog\/top-10-malware-april-2022\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">podle<\/a> the Center for Internet Security (CIS), RedLine can also have remote functionalities and allow the installation of more types of malicious software. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>(Fake) DeFi wallets<\/strong><\/h2>\n\n\n\n<p>Decentralized Finance (<a href=\"https:\/\/alfacash.blog\/2020\/09\/09\/how-to-make-thousands-dollars-defi\/\" target=\"_blank\" rel=\"noreferrer noopener\">DeFi<\/a>) platforms are quite popular these days, and hackers know this. The ones that aren\u2019t very busy stealing directly from DeFi protocols are dedicated to spreading fake DeFi wallets. <strong>Through social media or email, they promote these fraudulent apps and wait for victims.<\/strong><\/p>\n\n\n\n<p>Once inside a device, the crypto malware actually installs a functional DeFi wallet, along with a Trojanized one. The malicious app replaces the legit one, and the Trojan starts to work silently. It\u2019s a backdoor designed to steal information and even control the device at a certain level. <a href=\"https:\/\/securelist.com\/lazarus-trojanized-defi-app\/106195\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Kaspersky Lab<\/a> identified the criminal North Korean group Lazarus as responsible for this campaign.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"950\" height=\"596\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Fake-DeFi-wallet.-Source-Kaspersky-Lab.jpg\" alt=\"Fake DeFi wallet. Source Kaspersky Lab\" class=\"wp-image-9892\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Fake-DeFi-wallet.-Source-Kaspersky-Lab.jpg 950w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Fake-DeFi-wallet.-Source-Kaspersky-Lab-300x188.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Fake-DeFi-wallet.-Source-Kaspersky-Lab-150x94.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Fake-DeFi-wallet.-Source-Kaspersky-Lab-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Fake-DeFi-wallet.-Source-Kaspersky-Lab-270x169.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Fake-DeFi-wallet.-Source-Kaspersky-Lab-770x483.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Fake-DeFi-wallet.-Source-Kaspersky-Lab-810x508.jpg 810w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Fake-DeFi-wallet.-Source-Kaspersky-Lab-821x515.jpg 821w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Fake-DeFi-wallet.-Source-Kaspersky-Lab-370x232.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Fake-DeFi-wallet.-Source-Kaspersky-Lab-554x348.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Fake-DeFi-wallet.-Source-Kaspersky-Lab-306x192.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Fake-DeFi-wallet.-Source-Kaspersky-Lab-260x163.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Fake-DeFi-wallet.-Source-Kaspersky-Lab-87x55.jpg 87w\" sizes=\"auto, (max-width: 950px) 100vw, 950px\" \/><figcaption>Fake DeFi wallet. Source Kaspersky Lab<\/figcaption><\/figure><\/div>\n\n\n\n<p>Previously, the firm also identified the group <a href=\"https:\/\/securelist.com\/the-bluenoroff-cryptocurrency-hunt-is-still-on\/105488\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">BlueNoroff<\/a> as responsible for several attacks on cryptocurrency companies and users. Like the malicious app by Lazarus, the backdoor spread by this group checks the transaction history of the victim \u2014if they\u2019re crypto users. Then, even if the victim used a hardware wallet, the hackers just waited for a new transaction to happen in connection <a href=\"https:\/\/alfacash.blog\/2021\/08\/26\/crypto-scammers-stealing-opensea-users-discord\/\" target=\"_blank\" rel=\"noreferrer noopener\">with MetaMask<\/a> (widely used for Web3).<\/p>\n\n\n\n<p>At that moment, the malware would change the original parameters of MetaMask in Google Chrome. <strong>They\u2019d change the original destination address and amount to empty the wallet.<\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\u201cWhen the compromised user transfers funds to another account, the transaction is signed on the hardware wallet. However, given that the action was initiated by the user at the very right moment, the user doesn\u2019t suspect anything fishy is going on and confirms the transaction on the secure device without paying attention to the transaction details (\u2026) the attackers modify not only the recipient address, but also push the amount of currency to the limit, essentially draining the account in one move.\u201d<\/p><\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>CryptoWall and more<\/strong><\/h2>\n\n\n\n<p>The ransomware already pushed the United States and Costa Rica into <a href=\"https:\/\/alfacash.blog\/2022\/06\/01\/what-happened-may-cryptocurrency-world-2022\/\" target=\"_blank\" rel=\"noreferrer noopener\">a national emergency<\/a>. This is a kind of malware that, once installed on the device or network, <strong>encrypts all personal files (documents, images, audio, video\u2026) or the entire hard drive<\/strong> and asks for a ransom, often in&nbsp;cryptocurrency, to return them.<\/p>\n\n\n\n<p>This crypto malware is especially dangerous for companies with commercial secrets, and for organizations like governmental agencies (full of private data from citizens) and hospitals (whose vital machines stop working). That\u2019s why the hackers use to ask for millionaire ransoms as soon as possible.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"428\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/CryptoWall-ransomware-capture.-Source-Heimdall-Security.png\" alt=\"Crypto-malware-ransomware-CryptoWall\" class=\"wp-image-9890\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/CryptoWall-ransomware-capture.-Source-Heimdall-Security.png 600w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/CryptoWall-ransomware-capture.-Source-Heimdall-Security-300x214.png 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/CryptoWall-ransomware-capture.-Source-Heimdall-Security-150x107.png 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/CryptoWall-ransomware-capture.-Source-Heimdall-Security-18x12.png 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/CryptoWall-ransomware-capture.-Source-Heimdall-Security-252x180.png 252w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/CryptoWall-ransomware-capture.-Source-Heimdall-Security-370x264.png 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/CryptoWall-ransomware-capture.-Source-Heimdall-Security-554x395.png 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/CryptoWall-ransomware-capture.-Source-Heimdall-Security-306x218.png 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/CryptoWall-ransomware-capture.-Source-Heimdall-Security-343x245.png 343w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/CryptoWall-ransomware-capture.-Source-Heimdall-Security-260x185.png 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/CryptoWall-ransomware-capture.-Source-Heimdall-Security-87x62.png 87w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><figcaption>CryptoWall ransomware capture. Source: Heimdall Security<\/figcaption><\/figure><\/div>\n\n\n\n<p>The variant dubbed \u201cCryptoWall\u201d has been around since 2015, but it\u2019s shown changes over the years. <a href=\"https:\/\/heimdalsecurity.com\/blog\/cryptowall-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The last version<\/a>, 4.0, improved its communication capabilities, also encrypted the name of the files, and included localized messages for the victims \u2014they were delivered in English, French, or German according to the country.<\/p>\n\n\n\n<p><strong>CryptoWall arrives in their infected devices via email.<\/strong> Most ransomware is affecting companies and other big players lately, but they never stopped the infection of personal computers worldwide, either.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>HackBoss and peers<\/strong><\/h2>\n\n\n\n<p>Sadly, clippers aren\u2019t a widely known crypto malware. They hijack the clipboard in the user\u2019s device and detect when a <a href=\"https:\/\/alfacash.blog\/2021\/07\/20\/european-commission-seeks-ban-anonymous-crypto-wallets\/\" target=\"_blank\" rel=\"noreferrer noopener\">crypto wallet address<\/a> is copied by the owner. Then, this one is replaced for the hacker wallet address. So, if the user doesn\u2019t pay attention, they may end up sending the funds to the wrong destination.<\/p>\n\n\n\n<p>As explained by Chainalysis, \u201cHackBoss\u201d has been the more prolific clipper since 2012. <strong>The culprits have succeeded in stealing over $560,000 in Bitcoin (BTC<\/strong>), <strong>Ethereum (ETH), XRP,<\/strong> and other assets.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"731\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Clippers-by-revenue.-Source-Chainalysis.png\" alt=\"Crypto-malware-clippers-chainalysis\" class=\"wp-image-9889\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Clippers-by-revenue.-Source-Chainalysis.png 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Clippers-by-revenue.-Source-Chainalysis-300x214.png 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Clippers-by-revenue.-Source-Chainalysis-150x107.png 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Clippers-by-revenue.-Source-Chainalysis-18x12.png 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Clippers-by-revenue.-Source-Chainalysis-252x180.png 252w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Clippers-by-revenue.-Source-Chainalysis-721x515.png 721w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Clippers-by-revenue.-Source-Chainalysis-712x508.png 712w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Clippers-by-revenue.-Source-Chainalysis-370x264.png 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Clippers-by-revenue.-Source-Chainalysis-554x395.png 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Clippers-by-revenue.-Source-Chainalysis-306x218.png 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Clippers-by-revenue.-Source-Chainalysis-343x245.png 343w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Clippers-by-revenue.-Source-Chainalysis-260x186.png 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/Clippers-by-revenue.-Source-Chainalysis-87x62.png 87w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Clippers by revenue. Source: Chainalysis<\/figcaption><\/figure><\/div>\n\n\n\n<p>Clippers may not be like the billionaire ransomware industry, but they\u2019re probably more dangerous to common people. They don\u2019t offer any red flag to identify the infection upon arrival, and it\u2019s very common to copy and paste the long crypto addresses for transactions. That mix could lead to high losses if the victim doesn\u2019t pay any attention. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Vyhn\u011bte se malwaru, kter\u00fd krade kryptom\u011bny<\/strong><\/h2>\n\n\n\n<p><strong>Over $14 billion in cryptocurrencies were stolen in 2021<\/strong>, <a href=\"https:\/\/go.chainalysis.com\/rs\/503-FAP-074\/images\/Crypto-Crime-Report-2022.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">podle<\/a> Chainalysis. That\u2019s almost an 80% increase in illicit activity, compared to 2020. No wonder, considering that the crypto adoption also increased exponentially. Nevertheless, \u201ctransactions involving illicit addresses represented just 0.15% of cryptocurrency transaction volume in 2021\u201d, as they explained.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"678\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-1024x678.jpg\" alt=\"probl\u00e9my-krypto-platby-volatilita\" class=\"wp-image-5671\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-1024x678.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-300x199.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-150x99.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-770x510.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-767x508.jpg 767w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-777x515.jpg 777w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-370x245.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-554x367.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-306x203.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-260x172.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/09\/magnifier-5245329_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>We can conclude that most crypto activity is legit, but with more adoption comes more crimes as well. Then, it\u2019s important to remember some <a href=\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\" target=\"_blank\" rel=\"noreferrer noopener\">basic security measures<\/a>.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Keep updated on the OS, antivirus, and firmware of all your smart devices.<\/li><li>Neotev\u00edrejte odkazy ani p\u0159ipojen\u00e9 soubory z pochybn\u00fdch e -mail\u016f.<\/li><li>Download files and software only from the official websites.<\/li><li>Make backups of all your important information and files on external devices, preferably offline.<\/li><li>Avoid phishing sites and apps by looking at previous reviews and the URL, which is always different from the original.<\/li><li>Pay attention to the news of your favorite websites and services: they should announce their customers if they\u2019re under cyberattack.<\/li><li>Double-check the wallet addresses! Compare and verify your original address and the pasted version twice before sharing or sending.<\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"has-text-align-center\"><em>Wanna trade BTC, ETH,\u00a0and other tokens? You can do it<\/em>\u00a0<em>bezpe\u010dn\u011b\u00a0<a href=\"https:\/\/www.alfa.cash\/buy\/bitcoin\" target=\"_blank\" rel=\"noreferrer noopener\">na Alfacash<\/a>! A nezapome\u0148te, \u017ee mluv\u00edme o tomto a mnoha dal\u0161\u00edch v\u011bcech na na\u0161ich soci\u00e1ln\u00edch m\u00e9di\u00edch.<br><br><\/em><a href=\"https:\/\/t.me\/AlfacashCommunity\" target=\"_blank\" rel=\"noreferrer noopener\">Telegram<\/a>\u00a0*\u00a0<a href=\"https:\/\/www.instagram.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Instagram<\/a>\u00a0*\u00a0<a href=\"https:\/\/www.youtube.com\/channel\/UCOl4fdRHj8AseQ5b6z9udaw\" target=\"_blank\" rel=\"noreferrer noopener\">Youtube<\/a>\u00a0*<a href=\"https:\/\/www.facebook.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook<\/a>\u00a0\u00a0*<a href=\"https:\/\/twitter.com\/AlfacashStore\" target=\"_blank\" rel=\"noreferrer noopener\">Cvrlik\u00e1n\u00ed<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Even in a bearish market, hackers are looking for unaware victims. Let\u2019s go to explore some common crypto-malware and how to avoid it!<\/p>","protected":false},"author":5,"featured_media":9896,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[51],"tags":[61,474,135,84,127,129],"class_list":{"0":"post-9884","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-crypto-culture","8":"tag-cryptocurrencies","9":"tag-cryptojacking","10":"tag-cybersecurity","11":"tag-defi","12":"tag-malware","13":"tag-ransomware"},"featured_image_src":"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/05-blog.jpg","author_info":{"display_name":"Isabel P\u00e9rez","author_link":"https:\/\/alfacash.blog\/cs\/author\/isabel\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>+5 Crypto-stealing malware to avoid in 2022 - alfa.cash blog<\/title>\n<meta name=\"description\" content=\"Even in a bearish market, hackers are looking for unaware victims. Let\u2019s go to explore some common crypto-malware and how to avoid it!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/alfacash.blog\/cs\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"+5 Crypto-stealing malware to avoid in 2022\" \/>\n<meta property=\"og:description\" content=\"Even in a bearish market, hackers are looking for unaware victims. Let\u2019s go to explore some common crypto-malware and how to avoid it!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/alfacash.blog\/cs\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"alfa.cash blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/alfacashstore\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-15T19:47:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T18:50:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/05-blog-1024x540.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Isabel P\u00e9rez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AlfacashStore\" \/>\n<meta name=\"twitter:site\" content=\"@AlfacashStore\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/\"},\"author\":{\"name\":\"Isabel P\u00e9rez\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\"},\"headline\":\"+5 Crypto-stealing malware to avoid in 2022\",\"datePublished\":\"2022-06-15T19:47:00+00:00\",\"dateModified\":\"2024-02-19T18:50:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/\"},\"wordCount\":1371,\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/05-blog.jpg\",\"keywords\":[\"cryptocurrencies\",\"Cryptojacking\",\"Cybersecurity\",\"DeFi\",\"malware\",\"Ransomware\"],\"articleSection\":[\"Crypto-culture\"],\"inLanguage\":\"cs\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/\",\"url\":\"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/\",\"name\":\"+5 Crypto-stealing malware to avoid in 2022 - alfa.cash blog\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/05-blog.jpg\",\"datePublished\":\"2022-06-15T19:47:00+00:00\",\"dateModified\":\"2024-02-19T18:50:39+00:00\",\"description\":\"Even in a bearish market, hackers are looking for unaware victims. Let\u2019s go to explore some common crypto-malware and how to avoid it!\",\"breadcrumb\":{\"@id\":\"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/#breadcrumb\"},\"inLanguage\":\"cs\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/#primaryimage\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/05-blog.jpg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/05-blog.jpg\",\"width\":2123,\"height\":1120,\"caption\":\"Crypto-stealing-malware-avoid\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/alfacash.blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"+5 Crypto-stealing malware to avoid in 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/alfacash.blog\/#website\",\"url\":\"https:\/\/alfacash.blog\/\",\"name\":\"Alfacash Blog\",\"description\":\"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi\",\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"alternateName\":\"alfacash.blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/alfacash.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"cs\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/alfacash.blog\/#organization\",\"name\":\"Alfacash Blog\",\"alternateName\":\"alfacash.blog\",\"url\":\"https:\/\/alfacash.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"width\":696,\"height\":696,\"caption\":\"Alfacash Blog\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/alfacashstore\",\"https:\/\/x.com\/AlfacashStore\",\"https:\/\/t.me\/AlfacashCommunity\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\",\"name\":\"Isabel P\u00e9rez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"cs\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"caption\":\"Isabel P\u00e9rez\"},\"description\":\"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/\"],\"url\":\"https:\/\/alfacash.blog\/cs\/author\/isabel\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"+5 Crypto-stealing malware to avoid in 2022 - alfa.cash blog","description":"Even in a bearish market, hackers are looking for unaware victims. Let\u2019s go to explore some common crypto-malware and how to avoid it!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/alfacash.blog\/cs\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/","og_locale":"cs_CZ","og_type":"article","og_title":"+5 Crypto-stealing malware to avoid in 2022","og_description":"Even in a bearish market, hackers are looking for unaware victims. Let\u2019s go to explore some common crypto-malware and how to avoid it!","og_url":"https:\/\/alfacash.blog\/cs\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/","og_site_name":"alfa.cash blog","article_publisher":"https:\/\/www.facebook.com\/alfacashstore","article_published_time":"2022-06-15T19:47:00+00:00","article_modified_time":"2024-02-19T18:50:39+00:00","og_image":[{"width":1024,"height":540,"url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/05-blog-1024x540.jpg","type":"image\/jpeg"}],"author":"Isabel P\u00e9rez","twitter_card":"summary_large_image","twitter_creator":"@AlfacashStore","twitter_site":"@AlfacashStore","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/#article","isPartOf":{"@id":"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/"},"author":{"name":"Isabel P\u00e9rez","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749"},"headline":"+5 Crypto-stealing malware to avoid in 2022","datePublished":"2022-06-15T19:47:00+00:00","dateModified":"2024-02-19T18:50:39+00:00","mainEntityOfPage":{"@id":"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/"},"wordCount":1371,"publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"image":{"@id":"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/05-blog.jpg","keywords":["cryptocurrencies","Cryptojacking","Cybersecurity","DeFi","malware","Ransomware"],"articleSection":["Crypto-culture"],"inLanguage":"cs"},{"@type":"WebPage","@id":"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/","url":"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/","name":"+5 Crypto-stealing malware to avoid in 2022 - alfa.cash blog","isPartOf":{"@id":"https:\/\/alfacash.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/#primaryimage"},"image":{"@id":"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/05-blog.jpg","datePublished":"2022-06-15T19:47:00+00:00","dateModified":"2024-02-19T18:50:39+00:00","description":"Even in a bearish market, hackers are looking for unaware victims. Let\u2019s go to explore some common crypto-malware and how to avoid it!","breadcrumb":{"@id":"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/#breadcrumb"},"inLanguage":"cs","potentialAction":[{"@type":"ReadAction","target":["https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/"]}]},{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/#primaryimage","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/05-blog.jpg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2022\/06\/05-blog.jpg","width":2123,"height":1120,"caption":"Crypto-stealing-malware-avoid"},{"@type":"BreadcrumbList","@id":"https:\/\/alfacash.blog\/2022\/06\/15\/crypto-stealing-malware-avoid-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/alfacash.blog\/"},{"@type":"ListItem","position":2,"name":"+5 Crypto-stealing malware to avoid in 2022"}]},{"@type":"WebSite","@id":"https:\/\/alfacash.blog\/#website","url":"https:\/\/alfacash.blog\/","name":"Alfacash Blog","description":"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi","publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"alternateName":"alfacash.blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/alfacash.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs"},{"@type":"Organization","@id":"https:\/\/alfacash.blog\/#organization","name":"Alfacash Blog","alternateName":"alfacash.blog","url":"https:\/\/alfacash.blog\/","logo":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","width":696,"height":696,"caption":"Alfacash Blog"},"image":{"@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/alfacashstore","https:\/\/x.com\/AlfacashStore","https:\/\/t.me\/AlfacashCommunity"]},{"@type":"Person","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749","name":"Isabel P\u00e9rez","image":{"@type":"ImageObject","inLanguage":"cs","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","caption":"Isabel P\u00e9rez"},"description":"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.","sameAs":["https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/"],"url":"https:\/\/alfacash.blog\/cs\/author\/isabel\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/posts\/9884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/comments?post=9884"}],"version-history":[{"count":4,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/posts\/9884\/revisions"}],"predecessor-version":[{"id":10036,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/posts\/9884\/revisions\/10036"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/media\/9896"}],"wp:attachment":[{"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/media?parent=9884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/categories?post=9884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alfacash.blog\/cs\/wp-json\/wp\/v2\/tags?post=9884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}