{"id":4225,"date":"2020-10-04T04:51:17","date_gmt":"2020-10-04T01:51:17","guid":{"rendered":"https:\/\/alfacash.blog\/?p=4225"},"modified":"2024-02-19T21:53:10","modified_gmt":"2024-02-19T18:53:10","slug":"malware-puede-robar-criptos-como-evitarlo","status":"publish","type":"post","link":"https:\/\/alfacash.blog\/es\/2020\/10\/04\/malware-puede-robar-criptos-como-evitarlo\/","title":{"rendered":"Malware que puede robar todas tus criptomonedas y c\u00f3mo evitarlo"},"content":{"rendered":"<p>La cadena de bloques es segura e imposible de piratear, dicen. Nuestros criptoactivos est\u00e1n all\u00ed, as\u00ed que nos sentimos muy confiados con nuestros fondos ... porque est\u00e1n totalmente bien, con seguridad de primera, \u00bfverdad? Bueno, la respuesta a eso ser\u00eda s\u00ed y no al mismo tiempo.<\/p>\n\n\n\n<p>S\u00ed, porque alguien necesitar\u00eda una computadora cu\u00e1ntica que a\u00fan no existe para romper un <a href=\"https:\/\/alfacash.blog\/2020\/08\/30\/dummies-what-is-blockchain-how-it-works\/\" target=\"_blank\" rel=\"noreferrer noopener\">potente blockchain<\/a>; y no porque los factores de riesgo van m\u00e1s all\u00e1, lamentablemente. <strong>La cuesti\u00f3n es que un humano siempre puede ser atra\u00eddo y enga\u00f1ado.<\/strong> Las propias personas son el tal\u00f3n de Aquiles en ciberseguridad, y nadie est\u00e1 exento de sufrir un ciberataque.<\/p>\n\n\n\n<p>Por eso debemos ser muy conscientes de las malas posibilidades y el malware a evitar a toda costa. Prevenir antes de curar, as\u00ed que, conoce aqu\u00ed el malware que puede robar todas tus criptomonedas y c\u00f3mo cuidarlo.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Secuestro de datos<\/strong><\/h2>\n\n\n\n<p>La palabra no se form\u00f3 arbitrariamente: proviene de la combinaci\u00f3n de \u201crescate\u201d y \u201cmalware\u201d y define muy bien el concepto. Se trata de un tipo de malware que, una vez instalado en tu dispositivo, cifra los archivos personales (documentos, im\u00e1genes, audio, v\u00eddeo\u2026) o todo el disco duro y te pide un rescate (a menudo en criptomonedas) para devolverlos.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"725\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-1024x725.jpg\" alt=\"\" class=\"wp-image-4230\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-1024x725.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-300x212.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-150x106.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-254x180.jpg 254w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-728x515.jpg 728w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-718x508.jpg 718w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-370x262.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-554x392.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-306x217.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-346x245.jpg 346w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-260x184.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-87x62.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Imagen de mohamed Hassan \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>En los albores de su popularidad, en 2013, los m\u00e1s afectados por esto fueron los dispositivos personales, y el rescate solicitado fueron de 100 a 300 USD en <a href=\"https:\/\/alfacash.blog\/2020\/08\/20\/how-buy-bitcoin-simple-steps-nice-recipe\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bitcoin (BTC)<\/a>. Los piratas inform\u00e1ticos incluso sol\u00edan entregar instrucciones para usar la criptomoneda.<\/p>\n\n\n\n<p>Hasta la fecha, hay muchos tipos y se ha convertido en un <a href=\"https:\/\/www.healthitoutcomes.com\/doc\/ransomware-cyber-crime-s-billion-dollar-industry-0001\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">industria multimillonaria<\/a> en el cual <strong>los m\u00e1s afectados son las empresas y no los usuarios personales<\/strong>. El rescate por ellos ahora puede ascender a millones de d\u00f3lares en Bitcoin, Monero (XMR), Zcash (ZEC) y otros criptoactivos.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>\u00bfC\u00f3mo se infecta?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Correos electr\u00f3nicos con spam en su bandeja de entrada, entregando enlaces dudosos.<\/li><li>Descargas no oficiales de sitios web externos o software P2P (como BitTorrent).<\/li><li>Explotaciones en sistemas operativos (SO) no actualizados, es decir, Windows XP o versiones antiguas de firmware en <a href=\"https:\/\/alfacash.blog\/2020\/10\/02\/coffe-hijacked-mine-monero-other-things\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dispositivos IoT<\/a> (recuerde estos tres primeros como la &quot;tr\u00edada del mal&quot;).<\/li><li>Un ataque dirigido especialmente planeado y dise\u00f1ado para un objetivo, a menudo institucional (organizaciones y empresas).<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Consejos \u00fatiles<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Mantenga actualizado el sistema operativo, antivirus y firmware de todos sus dispositivos inteligentes.<\/li><li>No abra enlaces o archivos adjuntos de correos electr\u00f3nicos dudosos.<\/li><li>Descargue archivos y software solo de los sitios web oficiales (recuerde estos tres primeros como la &quot;tr\u00edada del escudo&quot;).<\/li><li>Haga copias de seguridad de toda su informaci\u00f3n y archivos importantes en dispositivos externos, preferiblemente sin conexi\u00f3n.<\/li><li>En caso de infecci\u00f3n, vaya a ayudar a sitios web como <a href=\"https:\/\/www.nomoreransom.org\/en\/index.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">No m\u00e1s rescate<\/a> o llame a la divisi\u00f3n cibern\u00e9tica de sus autoridades locales. No se recomienda pagar el rescate directamente y su \u00e9xito no est\u00e1 garantizado.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Registradores de teclas<\/strong><\/h2>\n\n\n\n<p>Podemos decir que esto no es <em>malware<\/em> per se, pero los ciberdelincuentes lo utilizan como herramienta de espionaje. Como el ransomware, su nombre lo dice todo: este es un software o hardware dise\u00f1ado para registrar (y a menudo enviar) cada pulsaci\u00f3n de tecla que se escribe en el teclado de un dispositivo. A veces, incluso pueden grabar clics, audio y video.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-1024x682.jpg\" alt=\"\" class=\"wp-image-4232\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Imagen de Gerd Altmann \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>Por lo tanto, si un <a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/keylogger\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">registrador de teclas<\/a> se instala sigilosamente en un dispositivo, <strong>es capaz de registrar contrase\u00f1as y credenciales que luego se enviar\u00edan a un pirata inform\u00e1tico malintencionado.<\/strong> Entre esas credenciales puede estar la contrase\u00f1a o la clave privada de un <a href=\"https:\/\/alfacash.blog\/2020\/08\/18\/what-is-cryptocurrency-why-should-care-reasons\/\" target=\"_blank\" rel=\"noreferrer noopener\">billetera de criptomonedas<\/a>, lo que significa que te robar\u00e1n de esta manera.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>\u00bfC\u00f3mo se infecta?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>La tr\u00edada del mal, como dijimos antes.<\/li><li>Sitios web y extensiones de navegador falsos (phishing).<\/li><li>Dominios web infectados, lo que significa ataques dirigidos a servicios como tiendas e intercambios vulnerables.<\/li><li>Alguien dej\u00f3 un peque\u00f1o dispositivo divertido conectado a su computadora, como un adaptador USB dudoso o un cable adicional (es un keylogger de hardware).<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Consejos \u00fatiles<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Aplica la tr\u00edada de escudo confiable, como dijimos antes.<\/li><li>Adem\u00e1s del antivirus, aseg\u00farese de tener una soluci\u00f3n de ciberseguridad llamada anti-keylogger.<\/li><li>Registre sus credenciales y contrase\u00f1as en el navegador de su dispositivo habitual o utilice un software para administrar sus credenciales.<\/li><li>Evite los sitios y aplicaciones de phishing con solo mirar la URL, que siempre es diferente de la original.<\/li><li>Presta atenci\u00f3n a las novedades de tus sitios web y servicios favoritos: deben anunciar a sus clientes si est\u00e1n bajo ciberataque.<\/li><li>No deje hardware desconocido conectado en su dispositivo.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Troyano de acceso remoto (RAT)<\/strong><\/h2>\n\n\n\n<p>Esta es una infecci\u00f3n muy mala, porque no es m\u00e1s que una puerta trasera abierta para permitir que los piratas inform\u00e1ticos entren y controlen su dispositivo de forma remota. Una vez instalado el software, la RAT habilita el control administrativo, <strong>lo que significa que su hacker puede ver y hacer casi todo lo que quiera en el dispositivo,<\/strong> desde monitorear los datos y el comportamiento silenciosamente hasta distribuir otro malware y formatear unidades.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-1024x682.jpg\" alt=\"\" class=\"wp-image-4233\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Imagen de StockSnap \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>Por supuesto, tambi\u00e9n podr\u00edan robar sus criptomonedas, solo ingresando en su billetera despu\u00e9s de registrar sus movimientos. Y probablemente no notar\u00e1 este software sigiloso antes de que sea demasiado tarde.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>\u00bfC\u00f3mo se infecta?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>La tr\u00edada del mal, peor que nunca. De hecho, es muy com\u00fan encontrarlo escondido dentro de juegos y software crackeados.<\/li><li>Usando dudoso <a href=\"https:\/\/themerkle.com\/open-source-remote-access-trojan-targets-telegram-users\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">bots en Telegram<\/a>.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Consejos \u00fatiles<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>\u00a1Aplica la tr\u00edada del escudo y estar\u00e1s bien!<\/li><li>Adem\u00e1s, siempre puede buscar comentarios y rese\u00f1as de otros usuarios de las aplicaciones y programas que va a descargar. Incluidos los bots en Telegram, s\u00ed.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Secuestrador de Clipper \/ Portapapeles<\/strong><\/h2>\n\n\n\n<p>Los ciberdelincuentes conocen muy bien los modales generales de los usuarios de criptomonedas. Saben, por ejemplo, que nadie escribe a mano las largas y complejas direcciones de billetera, pero las copia y pega cuando es necesario. Ese es exactamente el punto que eligen para secuestrar las direcciones originales y reemplazarlas por las suyas, utilizando un software malicioso llamado &quot;Clipper&quot; o &quot;secuestrador del portapapeles&quot;.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"665\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-1024x665.jpg\" alt=\"\" class=\"wp-image-4234\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-1024x665.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-300x195.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-150x97.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-270x175.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-770x500.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-782x508.jpg 782w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-793x515.jpg 793w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-370x240.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-554x360.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-306x199.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-260x169.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-87x56.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Imagen de Pete Linforth \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>Lo principal que hace este malware es <strong>secuestrar el portapapeles en el dispositivo del usuario y detectar cuando el propietario copia una direcci\u00f3n de billetera criptogr\u00e1fica<\/strong>. Luego, esta se reemplaza por la direcci\u00f3n de la billetera del pirata inform\u00e1tico, por lo que, si el usuario no presta atenci\u00f3n, puede terminar enviando los fondos al destino equivocado.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>\u00bfC\u00f3mo se infecta?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Tr\u00edada del mal de nuevo, s\u00ed. Esta vez, el m\u00e1s com\u00fan <a href=\"https:\/\/www.binarydefense.com\/threat_watch\/clipper-cryptocurrency-stealing-malware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">vector de infecci\u00f3n<\/a> son aplicaciones falsas o infectadas en Play Store.<\/li><li>Adobe Flash u otros anuncios de banners falsos en sitios web dudosos.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Consejos \u00fatiles<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Aplica la tr\u00edada del escudo (funciona para casi todo).<\/li><li>\u00a1Presta atenci\u00f3n a las direcciones de las billeteras! No importa si cree que no tiene ning\u00fan clipper en su dispositivo (estos no producen ning\u00fan s\u00edntoma visible). Compare y verifique su direcci\u00f3n original y la versi\u00f3n pegada dos veces antes de compartir o enviar.<\/li><li>Si es posible, prefiera usar sus fondos a trav\u00e9s de c\u00f3digos QR en lugar de mensajes de texto.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Suplantaci\u00f3n de identidad<\/strong><\/h2>\n\n\n\n<p>Podemos decir <a href=\"https:\/\/www.phishing.org\/what-is-phishing\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">el phishing<\/a> es en parte malware y en parte una estafa porque es solo una versi\u00f3n falsa de algo (sitio web, aplicaci\u00f3n, software, mensaje, llamada ...), especialmente dise\u00f1ado <a href=\"https:\/\/alfacash.blog\/2020\/09\/07\/getting-rich-wrecking-most-popular-cryptocurrency-myths\/\" target=\"_blank\" rel=\"noreferrer noopener\">enga\u00f1ar a la gente<\/a> y obtenga de ellos informaci\u00f3n valiosa, como claves y credenciales bancarias o de criptomonedas. Entonces, los piratas inform\u00e1ticos clonan sitios web o software, o se hacen pasar por alg\u00fan servicio, empresa o persona por correo electr\u00f3nico o llamada para lograr sus objetivos maliciosos.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-1024x682.jpg\" alt=\"\" class=\"wp-image-4235\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Imagen de leo2014 \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>Puede encontrar una versi\u00f3n falsa de su <a href=\"https:\/\/www.alfa.cash\/es\" target=\"_blank\" rel=\"noreferrer noopener\">intercambio de criptomonedas confiable<\/a>, por ejemplo. <strong>Parece id\u00e9ntico, pero, al mismo tiempo, algunas cosas est\u00e1n mal.<\/strong> Tal vez sea mala gram\u00e1tica, enlaces rotos o faltan textos; pero hay algo en los sitios web de phishing que siempre los delata: la URL.<\/p>\n\n\n\n<p>No puede ser exactamente el mismo dominio que el original (porque debe comprar un dominio y no puede comprar algo que el propietario leg\u00edtimo no venda). Siempre son similares, pero se cambiar\u00e1 al menos un car\u00e1cter (es decir, www.<strong>esparto<\/strong>.cash vs www.<strong>alfaexchange<\/strong>.dinero en efectivo). Y es lo mismo para las direcciones de correo: si no tiene el dominio original de la empresa (es decir, hr @<strong>alfa.im <\/strong>vs hr @<strong>gmail.com<\/strong>), debe sospechar de inmediato.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>\u00bfC\u00f3mo se infecta?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Tr\u00edada del mal, especialmente por correo electr\u00f3nico.<\/li><li>A\u00f1adidos dudosos en la parte superior de los resultados del navegador. Cualquiera (incluso los actores maliciosos) puede pagar por ese tipo de anuncio, por lo que estar\u00e1n all\u00ed hasta que alguien lo informe.<\/li><li>El hacker \/ estafador encontrado <a href=\"https:\/\/alfacash.blog\/2020\/08\/26\/easiest-guide-top-up-phone-cryptocurrencies\/\" target=\"_blank\" rel=\"noreferrer noopener\">su tel\u00e9fono<\/a> de alguna manera y te est\u00e1 llamando, haci\u00e9ndose pasar por una autoridad.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Consejos \u00fatiles<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Tr\u00edada de escudos al rescate de nuevo.<\/li><li>Acceda a sus sitios web m\u00e1s utilizados a trav\u00e9s de la lista de marcadores \/ favoritos y evite los resultados del navegador tanto como pueda.<\/li><li>Sospeche de cualquier mensaje \/ correo \/ llamada en la que alguien le est\u00e9 pidiendo credenciales personales o dinero. Recuerde: las empresas \/ organizaciones no suelen hacer eso en absoluto.<\/li><li>Si va a enviar \/ recibir criptomonedas a trav\u00e9s de un sitio web o aplicaci\u00f3n, siempre verifique la URL y las revisiones anteriores.<\/li><\/ul>\n\n\n\n<p>Pero sobre todo, \u00a1no te preocupes! Protegerse a s\u00ed mismo y a sus criptomonedas es f\u00e1cil. Simplemente siga nuestros \u00fatiles consejos y estar\u00e1 perfectamente bien.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"has-text-align-center\"><em>\u00bfQuieres intercambiar BTC, ETH y otros tokens? Puedes hacerlo<\/em>\u00a0<em>sin peligro\u00a0<a href=\"https:\/\/www.alfa.cash\/buy\/bitcoin\" target=\"_blank\" rel=\"noreferrer noopener\">en Alfacash<\/a>! Y no olvides que estamos hablando de esto y muchas otras cosas en nuestras redes sociales.<br><br><\/em><a href=\"https:\/\/twitter.com\/alfacash_crypto\" target=\"_blank\" rel=\"noreferrer noopener\">Gorjeo<\/a>\u00a0*\u00a0<a href=\"https:\/\/t.me\/AlfacashCommunity\" target=\"_blank\" rel=\"noreferrer noopener\">Telegrama<\/a>\u00a0*\u00a0<a href=\"https:\/\/www.instagram.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Instagram<\/a> * <a href=\"https:\/\/www.youtube.com\/channel\/UCOl4fdRHj8AseQ5b6z9udaw\" target=\"_blank\" rel=\"noreferrer noopener\">Youtube<\/a>\u00a0*<a href=\"https:\/\/www.facebook.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook<\/a>\u00a0\u00a0*\u00a0<a href=\"https:\/\/vk.com\/alfacashcrypto\" target=\"_blank\" rel=\"noreferrer noopener\">Vkontakte<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Dentro del mundo de las criptomonedas, debemos ser muy conscientes de las malas posibilidades. Entonces, conoce aqu\u00ed el malware que puede robar todas tus criptomonedas y c\u00f3mo evitarlo.<\/p>","protected":false},"author":5,"featured_media":4228,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[48],"tags":[133,42,132,127,134,129,131],"class_list":{"0":"post-4225","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-learn","8":"tag-clipper","9":"tag-cryptocurrency","10":"tag-keylogger","11":"tag-malware","12":"tag-phishing","13":"tag-ransomware","14":"tag-rat"},"featured_image_src":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","author_info":{"display_name":"Isabel P\u00e9rez","author_link":"https:\/\/alfacash.blog\/es\/author\/isabel\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malware that can steal all your cryptos and how to avoid it - alfa.cash blog<\/title>\n<meta name=\"description\" content=\"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/alfacash.blog\/es\/2020\/10\/04\/malware-puede-robar-criptos-como-evitarlo\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware that can steal all your cryptos and how to avoid it\" \/>\n<meta property=\"og:description\" content=\"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/alfacash.blog\/es\/2020\/10\/04\/malware-puede-robar-criptos-como-evitarlo\/\" \/>\n<meta property=\"og:site_name\" content=\"alfa.cash blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/alfacashstore\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-04T01:51:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T18:53:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2123\" \/>\n\t<meta property=\"og:image:height\" content=\"1120\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Isabel P\u00e9rez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AlfacashStore\" \/>\n<meta name=\"twitter:site\" content=\"@AlfacashStore\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\"},\"author\":{\"name\":\"Isabel P\u00e9rez\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\"},\"headline\":\"Malware that can steal all your cryptos and how to avoid it\",\"datePublished\":\"2020-10-04T01:51:17+00:00\",\"dateModified\":\"2024-02-19T18:53:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\"},\"wordCount\":1511,\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"keywords\":[\"Clipper\",\"cryptocurrency\",\"Keylogger\",\"malware\",\"Phishing\",\"Ransomware\",\"RAT\"],\"articleSection\":[\"Learn\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\",\"url\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\",\"name\":\"Malware that can steal all your cryptos and how to avoid it - alfa.cash blog\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"datePublished\":\"2020-10-04T01:51:17+00:00\",\"dateModified\":\"2024-02-19T18:53:10+00:00\",\"description\":\"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.\",\"breadcrumb\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"width\":270,\"height\":142,\"caption\":\"Malware-steal-cryptocurrency-tips\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/alfacash.blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware that can steal all your cryptos and how to avoid it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/alfacash.blog\/#website\",\"url\":\"https:\/\/alfacash.blog\/\",\"name\":\"Alfacash Blog\",\"description\":\"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi\",\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"alternateName\":\"alfacash.blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/alfacash.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/alfacash.blog\/#organization\",\"name\":\"Alfacash Blog\",\"alternateName\":\"alfacash.blog\",\"url\":\"https:\/\/alfacash.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"width\":696,\"height\":696,\"caption\":\"Alfacash Blog\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/alfacashstore\",\"https:\/\/x.com\/AlfacashStore\",\"https:\/\/t.me\/AlfacashCommunity\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\",\"name\":\"Isabel P\u00e9rez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"caption\":\"Isabel P\u00e9rez\"},\"description\":\"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/\"],\"url\":\"https:\/\/alfacash.blog\/es\/author\/isabel\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Malware that can steal all your cryptos and how to avoid it - alfa.cash blog","description":"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/alfacash.blog\/es\/2020\/10\/04\/malware-puede-robar-criptos-como-evitarlo\/","og_locale":"es_ES","og_type":"article","og_title":"Malware that can steal all your cryptos and how to avoid it","og_description":"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.","og_url":"https:\/\/alfacash.blog\/es\/2020\/10\/04\/malware-puede-robar-criptos-como-evitarlo\/","og_site_name":"alfa.cash blog","article_publisher":"https:\/\/www.facebook.com\/alfacashstore","article_published_time":"2020-10-04T01:51:17+00:00","article_modified_time":"2024-02-19T18:53:10+00:00","og_image":[{"width":2123,"height":1120,"url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","type":"image\/jpeg"}],"author":"Isabel P\u00e9rez","twitter_card":"summary_large_image","twitter_creator":"@AlfacashStore","twitter_site":"@AlfacashStore","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#article","isPartOf":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/"},"author":{"name":"Isabel P\u00e9rez","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749"},"headline":"Malware that can steal all your cryptos and how to avoid it","datePublished":"2020-10-04T01:51:17+00:00","dateModified":"2024-02-19T18:53:10+00:00","mainEntityOfPage":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/"},"wordCount":1511,"publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"image":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","keywords":["Clipper","cryptocurrency","Keylogger","malware","Phishing","Ransomware","RAT"],"articleSection":["Learn"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/","url":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/","name":"Malware that can steal all your cryptos and how to avoid it - alfa.cash blog","isPartOf":{"@id":"https:\/\/alfacash.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage"},"image":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","datePublished":"2020-10-04T01:51:17+00:00","dateModified":"2024-02-19T18:53:10+00:00","description":"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.","breadcrumb":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","width":270,"height":142,"caption":"Malware-steal-cryptocurrency-tips"},{"@type":"BreadcrumbList","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/alfacash.blog\/"},{"@type":"ListItem","position":2,"name":"Malware that can steal all your cryptos and how to avoid it"}]},{"@type":"WebSite","@id":"https:\/\/alfacash.blog\/#website","url":"https:\/\/alfacash.blog\/","name":"Alfacash Blog","description":"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi","publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"alternateName":"alfacash.blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/alfacash.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/alfacash.blog\/#organization","name":"Alfacash Blog","alternateName":"alfacash.blog","url":"https:\/\/alfacash.blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","width":696,"height":696,"caption":"Alfacash Blog"},"image":{"@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/alfacashstore","https:\/\/x.com\/AlfacashStore","https:\/\/t.me\/AlfacashCommunity"]},{"@type":"Person","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749","name":"Isabel P\u00e9rez","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","caption":"Isabel P\u00e9rez"},"description":"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.","sameAs":["https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/"],"url":"https:\/\/alfacash.blog\/es\/author\/isabel\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/posts\/4225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/comments?post=4225"}],"version-history":[{"count":4,"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/posts\/4225\/revisions"}],"predecessor-version":[{"id":8756,"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/posts\/4225\/revisions\/8756"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/media\/4228"}],"wp:attachment":[{"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/media?parent=4225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/categories?post=4225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/tags?post=4225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}