{"id":7226,"date":"2021-04-26T04:34:00","date_gmt":"2021-04-26T01:34:00","guid":{"rendered":"https:\/\/alfacash.blog\/?p=7226"},"modified":"2024-02-19T21:51:51","modified_gmt":"2024-02-19T18:51:51","slug":"crypto-stealing-malware-windows-10-benutzer","status":"publish","type":"post","link":"https:\/\/alfacash.blog\/de\/2021\/04\/26\/crypto-stealing-malware-windows-10-benutzer\/","title":{"rendered":"Neue Krypto-stehlende Malware lauert Windows 10-Benutzer"},"content":{"rendered":"<p>Die Hacker machen nie eine Pause und geschweige denn, wenn der Kryptow\u00e4hrungsmarkt bullisch ist. Ihre Kryptow\u00e4hrungen sind m\u00f6glicherweise in Ihrem Ger\u00e4t oder in Ihrer bevorzugten B\u00f6rse sicher, aber sie haben immer die M\u00f6glichkeit, die M\u00fcnzen zu stehlen. <strong>Eine Krypto-stehlende Malware, die als Funktion von Windows 10 getarnt ist, ist die letzte dieser M\u00f6glichkeiten.<\/strong><\/p>\n\n\n\n<p>Um genauer zu sein, haben die Hacker a <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-microsoft-directx-12-site-pushes-crypto-stealing-malware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">gef\u00e4lschte Website<\/a> zum Herunterladen von DirectX 12 unter Windows 10. Mit diesem Funktionspaket k\u00f6nnen Multimedia-Inhalte, insbesondere Videospiele, entwickelt und ausgef\u00fchrt werden. So m\u00f6chten beispielsweise viele Spieler m\u00f6glicherweise DirectX aktualisieren und stattdessen die schreckliche \u00dcberraschung finden.<\/p>\n\n\n\n<p>Die Phishing-Seite wurde detailliert gestaltet. Es enth\u00e4lt eine Datenschutzrichtlinie, einen Haftungsausschluss, ein Kontaktformular und auf den ersten Blick alles, was ein legitimes Web haben sollte. Wenn der Benutzer auf die Download-Schaltfl\u00e4chen klickt, wird er auf eine externe Seite umgeleitet, um die Dateien abzurufen. <strong>Nach der Installation sammelt die Malware die Daten des Benutzers stillschweigend<\/strong>, einschlie\u00dflich Cookies, Dateien und Informationen \u00fcber das System und die Programme. Es k\u00f6nnen sogar Screenshots gemacht werden.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"797\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-1024x797.jpg\" alt=\"Exploit-Bug-Crypto-Defi\" class=\"wp-image-6091\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-1024x797.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-300x233.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-150x117.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-15x12.jpg 15w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-231x180.jpg 231w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-662x515.jpg 662w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-653x508.jpg 653w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-370x288.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-554x431.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-306x238.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-315x245.jpg 315w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-257x200.jpg 257w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-87x67.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Das Schlimmste ist jedoch wahrscheinlich, dass die Malware im System nach Kryptow\u00e4hrungs-Wallets sucht, um die Anmeldeinformationen, Kennw\u00f6rter und letztendlich die dort gespeicherten Gelder zu stehlen. So kann die b\u00f6sartige Software Brieftaschen wie identifizieren <a href=\"https:\/\/alfacash.blog\/2020\/12\/12\/new-campaign-fake-ledger-emails-can-steal-crypto\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ledger Live<\/a>, Waves.Exchange, Coinomi, Electrum, Electron Cash, BTCP Electrum, Jaxx, Exodus, MultiBit HD, Aomtic und <a href=\"https:\/\/alfacash.blog\/2021\/03\/29\/discover-monero-how-use-it-full-privacy\/\" target=\"_blank\" rel=\"noreferrer noopener\">Monero<\/a>.<\/p>\n\n\n\n<p>Alle gestohlenen Daten werden komprimiert und automatisch an die beteiligten Hacker gesendet. So alles <a href=\"https:\/\/alfacash.blog\/2021\/02\/03\/how-to-choose-first-crypto-wallet-tips-tricks\/\" target=\"_blank\" rel=\"noreferrer noopener\">deine Brieftaschen<\/a> kann in k\u00fcrzester Zeit geleert werden, wenn Sie nicht vorsichtig genug sind.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Vermeiden Sie den Diebstahl von Malware durch Krypto<\/strong><\/h2>\n\n\n\n<p>Das oben Genannte ist ein klassischer Phishing-Fall. Erinnern wir uns daran <strong>Phishing tritt auf, wenn einige Hacker eine gef\u00e4lschte Version von etwas erstellen<\/strong> (Website, App, Software, Nachricht, Anruf\u2026), um Menschen zu t\u00e4uschen und von ihnen wertvolle Informationen zu erhalten, wie Bank oder <a href=\"https:\/\/alfacash.blog\/2020\/08\/18\/what-is-cryptocurrency-why-should-care-reasons\/\" target=\"_blank\" rel=\"noreferrer noopener\">Kryptow\u00e4hrung<\/a> Anmeldeinformationen und Schl\u00fcssel.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-1024x682.jpg\" alt=\"\" class=\"wp-image-5920\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Die Hacker klonen also Websites oder Software oder geben sich per E-Mail oder Anruf als Dienst, Unternehmen oder Person aus, um ihre b\u00f6swilligen Ziele zu erreichen. Vermeiden Sie diese Art von <a href=\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\" target=\"_blank\" rel=\"noreferrer noopener\">Krypto-Diebstahl von Malware<\/a> ist allerdings ziemlich einfach.<\/p>\n\n\n\n<p><strong>Laden Sie zun\u00e4chst Dateien und Software nur von den offiziellen Websites herunter<\/strong> (Microsoft in diesem Fall). \u00dcberpr\u00fcfen Sie die URLs zweimal, um sicherzugehen. Ebenso ist es wichtig, das Betriebssystem, das Virenschutzprogramm und die Firmware aller Ihrer Smart-Ger\u00e4te auf dem neuesten Stand zu halten und keine Links oder angeh\u00e4ngten Dateien aus zweifelhaften E-Mails zu \u00f6ffnen.<\/p>\n\n\n\n<p><br><em>Ausgew\u00e4hltes Bild von Elchinator \/ Pixabay<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"has-text-align-center\"><em>M\u00f6chten Sie Bitcoin und andere Token handeln? Du kannst es schaffen<\/em>&nbsp;<em>sicher&nbsp;<\/em><em><a href=\"https:\/\/www.alfa.cash\/de\/buy\/bitcoin\" target=\"_blank\" rel=\"noreferrer noopener\">auf Alfacash<\/a><\/em><em>! Und vergessen Sie nicht, dass wir in unseren sozialen Medien \u00fcber dieses und viele andere Dinge sprechen.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/twitter.com\/alfacash_crypto\" target=\"_blank\" rel=\"noreferrer noopener\">Twitter<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/t.me\/AlfacashCommunity\" target=\"_blank\" rel=\"noreferrer noopener\">Telegramm<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/www.facebook.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/www.instagram.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Instagram<\/a> * <a href=\"https:\/\/www.youtube.com\/channel\/UCOl4fdRHj8AseQ5b6z9udaw\" target=\"_blank\" rel=\"noreferrer noopener\">Youtube<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/vk.com\/alfacashcrypto\" target=\"_blank\" rel=\"noreferrer noopener\">Vkontakte<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Hacker ruhen sich nicht aus, daher m\u00fcssen wir uns jetzt einer neuen Art von Malware stellen, die Krypto stiehlt. Diesmal sind die Hauptopfer Windows 10-Benutzer.<\/p>","protected":false},"author":5,"featured_media":7235,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[47],"tags":[61,135,282,231,127,60,320],"class_list":{"0":"post-7226","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-market-trends-alfacash","8":"tag-cryptocurrencies","9":"tag-cybersecurity","10":"tag-games","11":"tag-hackers","12":"tag-malware","13":"tag-wallets","14":"tag-windows"},"featured_image_src":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","author_info":{"display_name":"Isabel P\u00e9rez","author_link":"https:\/\/alfacash.blog\/de\/author\/isabel\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New crypto-stealing malware lurks Windows 10 users - alfa.cash blog<\/title>\n<meta name=\"description\" content=\"Hackers don&#039;t rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/alfacash.blog\/de\/2021\/04\/26\/crypto-stealing-malware-windows-10-benutzer\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New crypto-stealing malware lurks Windows 10 users\" \/>\n<meta property=\"og:description\" content=\"Hackers don&#039;t rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/alfacash.blog\/de\/2021\/04\/26\/crypto-stealing-malware-windows-10-benutzer\/\" \/>\n<meta property=\"og:site_name\" content=\"alfa.cash blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/alfacashstore\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-26T01:34:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T18:51:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Isabel P\u00e9rez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AlfacashStore\" \/>\n<meta name=\"twitter:site\" content=\"@AlfacashStore\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\"},\"author\":{\"name\":\"Isabel P\u00e9rez\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\"},\"headline\":\"New crypto-stealing malware lurks Windows 10 users\",\"datePublished\":\"2021-04-26T01:34:00+00:00\",\"dateModified\":\"2024-02-19T18:51:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\"},\"wordCount\":443,\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"keywords\":[\"cryptocurrencies\",\"Cybersecurity\",\"Games\",\"hackers\",\"malware\",\"wallets\",\"Windows\"],\"articleSection\":[\"Market trends\"],\"inLanguage\":\"de-DE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\",\"url\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\",\"name\":\"New crypto-stealing malware lurks Windows 10 users - alfa.cash blog\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"datePublished\":\"2021-04-26T01:34:00+00:00\",\"dateModified\":\"2024-02-19T18:51:51+00:00\",\"description\":\"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.\",\"breadcrumb\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"width\":270,\"height\":152,\"caption\":\"crypto-stealing-malware-Windows\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/alfacash.blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New crypto-stealing malware lurks Windows 10 users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/alfacash.blog\/#website\",\"url\":\"https:\/\/alfacash.blog\/\",\"name\":\"Alfacash Blog\",\"description\":\"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi\",\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"alternateName\":\"alfacash.blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/alfacash.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/alfacash.blog\/#organization\",\"name\":\"Alfacash Blog\",\"alternateName\":\"alfacash.blog\",\"url\":\"https:\/\/alfacash.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"width\":696,\"height\":696,\"caption\":\"Alfacash Blog\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/alfacashstore\",\"https:\/\/x.com\/AlfacashStore\",\"https:\/\/t.me\/AlfacashCommunity\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\",\"name\":\"Isabel P\u00e9rez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"caption\":\"Isabel P\u00e9rez\"},\"description\":\"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/\"],\"url\":\"https:\/\/alfacash.blog\/de\/author\/isabel\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"New crypto-stealing malware lurks Windows 10 users - alfa.cash blog","description":"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/alfacash.blog\/de\/2021\/04\/26\/crypto-stealing-malware-windows-10-benutzer\/","og_locale":"de_DE","og_type":"article","og_title":"New crypto-stealing malware lurks Windows 10 users","og_description":"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.","og_url":"https:\/\/alfacash.blog\/de\/2021\/04\/26\/crypto-stealing-malware-windows-10-benutzer\/","og_site_name":"alfa.cash blog","article_publisher":"https:\/\/www.facebook.com\/alfacashstore","article_published_time":"2021-04-26T01:34:00+00:00","article_modified_time":"2024-02-19T18:51:51+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","type":"image\/jpeg"}],"author":"Isabel P\u00e9rez","twitter_card":"summary_large_image","twitter_creator":"@AlfacashStore","twitter_site":"@AlfacashStore","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#article","isPartOf":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/"},"author":{"name":"Isabel P\u00e9rez","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749"},"headline":"New crypto-stealing malware lurks Windows 10 users","datePublished":"2021-04-26T01:34:00+00:00","dateModified":"2024-02-19T18:51:51+00:00","mainEntityOfPage":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/"},"wordCount":443,"publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"image":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","keywords":["cryptocurrencies","Cybersecurity","Games","hackers","malware","wallets","Windows"],"articleSection":["Market trends"],"inLanguage":"de-DE"},{"@type":"WebPage","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/","url":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/","name":"New crypto-stealing malware lurks Windows 10 users - alfa.cash blog","isPartOf":{"@id":"https:\/\/alfacash.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage"},"image":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","datePublished":"2021-04-26T01:34:00+00:00","dateModified":"2024-02-19T18:51:51+00:00","description":"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.","breadcrumb":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","width":270,"height":152,"caption":"crypto-stealing-malware-Windows"},{"@type":"BreadcrumbList","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/alfacash.blog\/"},{"@type":"ListItem","position":2,"name":"New crypto-stealing malware lurks Windows 10 users"}]},{"@type":"WebSite","@id":"https:\/\/alfacash.blog\/#website","url":"https:\/\/alfacash.blog\/","name":"Alfacash Blog","description":"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi","publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"alternateName":"alfacash.blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/alfacash.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/alfacash.blog\/#organization","name":"Alfacash Blog","alternateName":"alfacash.blog","url":"https:\/\/alfacash.blog\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","width":696,"height":696,"caption":"Alfacash Blog"},"image":{"@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/alfacashstore","https:\/\/x.com\/AlfacashStore","https:\/\/t.me\/AlfacashCommunity"]},{"@type":"Person","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749","name":"Isabel P\u00e9rez","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","caption":"Isabel P\u00e9rez"},"description":"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.","sameAs":["https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/"],"url":"https:\/\/alfacash.blog\/de\/author\/isabel\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/alfacash.blog\/de\/wp-json\/wp\/v2\/posts\/7226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alfacash.blog\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alfacash.blog\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/de\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/de\/wp-json\/wp\/v2\/comments?post=7226"}],"version-history":[{"count":6,"href":"https:\/\/alfacash.blog\/de\/wp-json\/wp\/v2\/posts\/7226\/revisions"}],"predecessor-version":[{"id":7238,"href":"https:\/\/alfacash.blog\/de\/wp-json\/wp\/v2\/posts\/7226\/revisions\/7238"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/de\/wp-json\/wp\/v2\/media\/7235"}],"wp:attachment":[{"href":"https:\/\/alfacash.blog\/de\/wp-json\/wp\/v2\/media?parent=7226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alfacash.blog\/de\/wp-json\/wp\/v2\/categories?post=7226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alfacash.blog\/de\/wp-json\/wp\/v2\/tags?post=7226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}