{"id":7226,"date":"2021-04-26T04:34:00","date_gmt":"2021-04-26T01:34:00","guid":{"rendered":"https:\/\/alfacash.blog\/?p=7226"},"modified":"2024-02-19T21:51:51","modified_gmt":"2024-02-19T18:51:51","slug":"malware-robo-de-criptomonedas-usuarios-de-windows-10","status":"publish","type":"post","link":"https:\/\/alfacash.blog\/es\/2021\/04\/26\/malware-robo-de-criptomonedas-usuarios-de-windows-10\/","title":{"rendered":"Un nuevo malware de robo de criptomonedas acecha a los usuarios de Windows 10"},"content":{"rendered":"<p>Los piratas inform\u00e1ticos nunca se toman un descanso, y mucho menos si el mercado de las criptomonedas es alcista. Sus criptomonedas pueden estar seguras en su dispositivo o intercambio favorito, pero siempre tienen sus formas de robar las monedas. <strong>Un malware de robo de criptomonedas disfrazado como una caracter\u00edstica de Windows 10 es la \u00faltima de esas formas.<\/strong><\/p>\n\n\n\n<p>Para ser m\u00e1s espec\u00edficos, los piratas inform\u00e1ticos dise\u00f1aron un <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-microsoft-directx-12-site-pushes-crypto-stealing-malware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">sitio web falso<\/a> para descargar DirectX 12 en Windows 10. Este paquete de funcionalidades sirve para desarrollar y ejecutar contenido multimedia, especialmente videojuegos. Entonces, muchos jugadores, por ejemplo, podr\u00edan querer actualizar DirectX y encontrar la terrible sorpresa en su lugar.<\/p>\n\n\n\n<p>La p\u00e1gina de phishing se dise\u00f1\u00f3 al detalle. Incluye pol\u00edtica de privacidad, descargo de responsabilidad, formulario de contacto y, a primera vista, todo lo que debe tener una web leg\u00edtima. Si el usuario hace clic en los botones Descargar, ser\u00e1 redirigido a una p\u00e1gina externa para obtener los archivos. <strong>Una vez instalado, el malware recopilar\u00e1 silenciosamente los datos del usuario.<\/strong>, incluidas cookies, archivos e informaci\u00f3n sobre el sistema y los programas. Incluso puede tomar capturas de pantalla.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"797\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-1024x797.jpg\" alt=\"exploit-bug-crypto-defi\" class=\"wp-image-6091\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-1024x797.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-300x233.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-150x117.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-15x12.jpg 15w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-231x180.jpg 231w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-662x515.jpg 662w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-653x508.jpg 653w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-370x288.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-554x431.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-306x238.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-315x245.jpg 315w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-257x200.jpg 257w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-87x67.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Pero probablemente la peor parte es que el malware busca carteras de criptomonedas dentro del sistema para robar las credenciales, contrase\u00f1as y, en \u00faltima instancia, los fondos almacenados all\u00ed. Entonces, el software malicioso puede identificar billeteras como <a href=\"https:\/\/alfacash.blog\/2020\/12\/12\/new-campaign-fake-ledger-emails-can-steal-crypto\/\" target=\"_blank\" rel=\"noreferrer noopener\">Libro mayor en vivo<\/a>, Waves.Exchange, Coinomi, Electrum, Electron Cash, BTCP Electrum, Jaxx, Exodus, MultiBit HD, Aomtic y <a href=\"https:\/\/alfacash.blog\/2021\/03\/29\/discover-monero-how-use-it-full-privacy\/\" target=\"_blank\" rel=\"noreferrer noopener\">Monero<\/a>.<\/p>\n\n\n\n<p>Todos los datos robados se comprimen y se env\u00edan autom\u00e1ticamente a los piratas inform\u00e1ticos involucrados. As\u00ed que todo <a href=\"https:\/\/alfacash.blog\/2021\/02\/03\/how-to-choose-first-crypto-wallet-tips-tricks\/\" target=\"_blank\" rel=\"noreferrer noopener\">tus carteras<\/a> podr\u00eda vaciarse en poco tiempo si no tiene suficiente cuidado.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Evite el malware que roba criptomonedas<\/strong><\/h2>\n\n\n\n<p>El mencionado anteriormente es un caso cl\u00e1sico de phishing. Recordemos eso <strong>El phishing ocurre cuando algunos piratas inform\u00e1ticos crean una versi\u00f3n falsa de algo.<\/strong> (sitio web, aplicaci\u00f3n, software, mensaje, llamada ...) para enga\u00f1ar a las personas y obtener de ellas informaci\u00f3n valiosa, como un banco o <a href=\"https:\/\/alfacash.blog\/2020\/08\/18\/what-is-cryptocurrency-why-should-care-reasons\/\" target=\"_blank\" rel=\"noreferrer noopener\">criptomoneda<\/a> credenciales y claves.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-1024x682.jpg\" alt=\"\" class=\"wp-image-5920\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Entonces, los piratas inform\u00e1ticos clonan sitios web o software, o se hacen pasar por alg\u00fan servicio, empresa o persona por correo electr\u00f3nico o llamada para lograr sus objetivos maliciosos. Evite este tipo de <a href=\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware de robo de criptomonedas<\/a> Sin embargo, es algo f\u00e1cil.<\/p>\n\n\n\n<p><strong>En primer lugar, descargue archivos y software solo de los sitios web oficiales<\/strong> (Microsoft, en este caso). Verifique dos veces las URL para estar seguro. Asimismo, es importante mantener actualizado el sistema operativo, antivirus y firmware de todos sus dispositivos inteligentes, y no abrir enlaces o archivos adjuntos de correos electr\u00f3nicos dudosos.<\/p>\n\n\n\n<p><br><em>Imagen destacada de Elchinator \/ Pixabay<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"has-text-align-center\"><em>\u00bfQuieres intercambiar Bitcoin y otros tokens? Puedes hacerlo<\/em>&nbsp;<em>sin peligro&nbsp;<\/em><em><a href=\"https:\/\/www.alfa.cash\/buy\/bitcoin\" target=\"_blank\" rel=\"noreferrer noopener\">en Alfacash<\/a><\/em><em>! Y no olvides que estamos hablando de esto y muchas otras cosas en nuestras redes sociales.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/twitter.com\/alfacash_crypto\" target=\"_blank\" rel=\"noreferrer noopener\">Gorjeo<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/t.me\/AlfacashCommunity\" target=\"_blank\" rel=\"noreferrer noopener\">Telegrama<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/www.facebook.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/www.instagram.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Instagram<\/a> * <a href=\"https:\/\/www.youtube.com\/channel\/UCOl4fdRHj8AseQ5b6z9udaw\" target=\"_blank\" rel=\"noreferrer noopener\">Youtube<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/vk.com\/alfacashcrypto\" target=\"_blank\" rel=\"noreferrer noopener\">Vkontakte<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Los piratas inform\u00e1ticos no descansan, por lo que ahora tenemos que enfrentarnos a una nueva variedad de malware que roba criptograf\u00eda. Esta vez, las principales v\u00edctimas son los usuarios de Windows 10.<\/p>","protected":false},"author":5,"featured_media":7235,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[47],"tags":[61,135,282,231,127,60,320],"class_list":{"0":"post-7226","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-market-trends-alfacash","8":"tag-cryptocurrencies","9":"tag-cybersecurity","10":"tag-games","11":"tag-hackers","12":"tag-malware","13":"tag-wallets","14":"tag-windows"},"featured_image_src":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","author_info":{"display_name":"Isabel P\u00e9rez","author_link":"https:\/\/alfacash.blog\/es\/author\/isabel\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New crypto-stealing malware lurks Windows 10 users - alfa.cash blog<\/title>\n<meta name=\"description\" content=\"Hackers don&#039;t rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/alfacash.blog\/es\/2021\/04\/26\/malware-robo-de-criptomonedas-usuarios-de-windows-10\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New crypto-stealing malware lurks Windows 10 users\" \/>\n<meta property=\"og:description\" content=\"Hackers don&#039;t rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/alfacash.blog\/es\/2021\/04\/26\/malware-robo-de-criptomonedas-usuarios-de-windows-10\/\" \/>\n<meta property=\"og:site_name\" content=\"alfa.cash blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/alfacashstore\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-26T01:34:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T18:51:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Isabel P\u00e9rez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AlfacashStore\" \/>\n<meta name=\"twitter:site\" content=\"@AlfacashStore\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\"},\"author\":{\"name\":\"Isabel P\u00e9rez\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\"},\"headline\":\"New crypto-stealing malware lurks Windows 10 users\",\"datePublished\":\"2021-04-26T01:34:00+00:00\",\"dateModified\":\"2024-02-19T18:51:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\"},\"wordCount\":443,\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"keywords\":[\"cryptocurrencies\",\"Cybersecurity\",\"Games\",\"hackers\",\"malware\",\"wallets\",\"Windows\"],\"articleSection\":[\"Market trends\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\",\"url\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\",\"name\":\"New crypto-stealing malware lurks Windows 10 users - alfa.cash blog\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"datePublished\":\"2021-04-26T01:34:00+00:00\",\"dateModified\":\"2024-02-19T18:51:51+00:00\",\"description\":\"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.\",\"breadcrumb\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"width\":270,\"height\":152,\"caption\":\"crypto-stealing-malware-Windows\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/alfacash.blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New crypto-stealing malware lurks Windows 10 users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/alfacash.blog\/#website\",\"url\":\"https:\/\/alfacash.blog\/\",\"name\":\"Alfacash Blog\",\"description\":\"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi\",\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"alternateName\":\"alfacash.blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/alfacash.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/alfacash.blog\/#organization\",\"name\":\"Alfacash Blog\",\"alternateName\":\"alfacash.blog\",\"url\":\"https:\/\/alfacash.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"width\":696,\"height\":696,\"caption\":\"Alfacash Blog\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/alfacashstore\",\"https:\/\/x.com\/AlfacashStore\",\"https:\/\/t.me\/AlfacashCommunity\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\",\"name\":\"Isabel P\u00e9rez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"caption\":\"Isabel P\u00e9rez\"},\"description\":\"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/\"],\"url\":\"https:\/\/alfacash.blog\/es\/author\/isabel\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"New crypto-stealing malware lurks Windows 10 users - alfa.cash blog","description":"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/alfacash.blog\/es\/2021\/04\/26\/malware-robo-de-criptomonedas-usuarios-de-windows-10\/","og_locale":"es_ES","og_type":"article","og_title":"New crypto-stealing malware lurks Windows 10 users","og_description":"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.","og_url":"https:\/\/alfacash.blog\/es\/2021\/04\/26\/malware-robo-de-criptomonedas-usuarios-de-windows-10\/","og_site_name":"alfa.cash blog","article_publisher":"https:\/\/www.facebook.com\/alfacashstore","article_published_time":"2021-04-26T01:34:00+00:00","article_modified_time":"2024-02-19T18:51:51+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","type":"image\/jpeg"}],"author":"Isabel P\u00e9rez","twitter_card":"summary_large_image","twitter_creator":"@AlfacashStore","twitter_site":"@AlfacashStore","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#article","isPartOf":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/"},"author":{"name":"Isabel P\u00e9rez","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749"},"headline":"New crypto-stealing malware lurks Windows 10 users","datePublished":"2021-04-26T01:34:00+00:00","dateModified":"2024-02-19T18:51:51+00:00","mainEntityOfPage":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/"},"wordCount":443,"publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"image":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","keywords":["cryptocurrencies","Cybersecurity","Games","hackers","malware","wallets","Windows"],"articleSection":["Market trends"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/","url":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/","name":"New crypto-stealing malware lurks Windows 10 users - alfa.cash blog","isPartOf":{"@id":"https:\/\/alfacash.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage"},"image":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","datePublished":"2021-04-26T01:34:00+00:00","dateModified":"2024-02-19T18:51:51+00:00","description":"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.","breadcrumb":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","width":270,"height":152,"caption":"crypto-stealing-malware-Windows"},{"@type":"BreadcrumbList","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/alfacash.blog\/"},{"@type":"ListItem","position":2,"name":"New crypto-stealing malware lurks Windows 10 users"}]},{"@type":"WebSite","@id":"https:\/\/alfacash.blog\/#website","url":"https:\/\/alfacash.blog\/","name":"Alfacash Blog","description":"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi","publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"alternateName":"alfacash.blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/alfacash.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/alfacash.blog\/#organization","name":"Alfacash Blog","alternateName":"alfacash.blog","url":"https:\/\/alfacash.blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","width":696,"height":696,"caption":"Alfacash Blog"},"image":{"@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/alfacashstore","https:\/\/x.com\/AlfacashStore","https:\/\/t.me\/AlfacashCommunity"]},{"@type":"Person","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749","name":"Isabel P\u00e9rez","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","caption":"Isabel P\u00e9rez"},"description":"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.","sameAs":["https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/"],"url":"https:\/\/alfacash.blog\/es\/author\/isabel\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/posts\/7226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/comments?post=7226"}],"version-history":[{"count":6,"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/posts\/7226\/revisions"}],"predecessor-version":[{"id":7238,"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/posts\/7226\/revisions\/7238"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/media\/7235"}],"wp:attachment":[{"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/media?parent=7226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/categories?post=7226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alfacash.blog\/es\/wp-json\/wp\/v2\/tags?post=7226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}