{"id":4225,"date":"2020-10-04T04:51:17","date_gmt":"2020-10-04T01:51:17","guid":{"rendered":"https:\/\/alfacash.blog\/?p=4225"},"modified":"2024-02-19T21:53:10","modified_gmt":"2024-02-19T18:53:10","slug":"malware-peut-voler-cryptos-comment-eviter","status":"publish","type":"post","link":"https:\/\/alfacash.blog\/fr\/2020\/10\/04\/malware-peut-voler-cryptos-comment-eviter\/","title":{"rendered":"Un logiciel malveillant qui peut voler tous vos cryptos et comment l&#039;\u00e9viter"},"content":{"rendered":"<p>La blockchain est s\u00fbre et inattaquable, disent-ils. Nos crypto-actifs sont \u00e0 l&#039;int\u00e9rieur, donc, nous nous sentons tellement en confiance avec nos fonds ... parce qu&#039;ils sont tout \u00e0 fait bien, avec une s\u00e9curit\u00e9 haut de gamme, non? Eh bien, la r\u00e9ponse \u00e0 cette question serait oui et non en m\u00eame temps.<\/p>\n\n\n\n<p>Oui, car quelqu&#039;un aurait besoin d&#039;un ordinateur quantique qui n&#039;existe pas encore pour briser un <a href=\"https:\/\/alfacash.blog\/2020\/08\/30\/dummies-what-is-blockchain-how-it-works\/\" target=\"_blank\" rel=\"noreferrer noopener\">blockchain puissante<\/a>; et non parce que les facteurs de risque vont au-del\u00e0, malheureusement. <strong>La chose est: un humain peut toujours \u00eatre attir\u00e9 et tromp\u00e9.<\/strong> Les gens eux-m\u00eames sont le talon d&#039;Achille en mati\u00e8re de cybers\u00e9curit\u00e9, et personne n&#039;est \u00e0 l&#039;abri d&#039;une cyberattaque.<\/p>\n\n\n\n<p>C&#039;est pourquoi nous devons \u00eatre tr\u00e8s conscients des mauvaises possibilit\u00e9s et des logiciels malveillants \u00e0 \u00e9viter \u00e0 tout prix. Pr\u00e9venez avant de gu\u00e9rir, alors, rencontrez ici les logiciels malveillants qui peuvent voler tous vos cryptos et comment en prendre soin.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Ransomware<\/strong><\/h2>\n\n\n\n<p>Le mot n&#039;a pas \u00e9t\u00e9 compos\u00e9 de mani\u00e8re arbitraire: il vient du m\u00e9lange de \u00abran\u00e7on\u00bb et de \u00abmalware\u00bb et d\u00e9finit tr\u00e8s bien le concept. Il s&#039;agit d&#039;une sorte de malware qui, une fois install\u00e9 sur votre appareil, crypte les fichiers personnels (documents, images, audio, vid\u00e9o\u2026) ou l&#039;int\u00e9gralit\u00e9 du disque dur et vous demande une ran\u00e7on (souvent en crypto-monnaie) pour les restituer.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"725\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-1024x725.jpg\" alt=\"\" class=\"wp-image-4230\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-1024x725.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-300x212.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-150x106.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-254x180.jpg 254w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-728x515.jpg 728w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-718x508.jpg 718w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-370x262.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-554x392.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-306x217.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-346x245.jpg 346w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-260x184.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-87x62.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Image par mohamed Hassan \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>\u00c0 l&#039;aube de sa popularit\u00e9, en 2013, les appareils personnels les plus touch\u00e9s \u00e9taient les appareils personnels, et la ran\u00e7on demand\u00e9e \u00e9tait de 100 \u00e0 300 USD en <a href=\"https:\/\/alfacash.blog\/2020\/08\/20\/how-buy-bitcoin-simple-steps-nice-recipe\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bitcoin (BTC)<\/a>. Les pirates informatiques avaient m\u00eame l&#039;habitude de fournir des instructions d&#039;utilisation de la crypto-monnaie.<\/p>\n\n\n\n<p>\u00c0 ce jour, il existe de nombreux types et il a \u00e9volu\u00e9 pour devenir un <a href=\"https:\/\/www.healthitoutcomes.com\/doc\/ransomware-cyber-crime-s-billion-dollar-industry-0001\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">industrie milliardaire<\/a> dans lequel <strong>les plus touch\u00e9s sont les entreprises et non les particuliers<\/strong>. La ran\u00e7on pour eux peut d\u00e9sormais s&#039;\u00e9lever \u00e0 un million de dollars en Bitcoin, Monero (XMR), Zcash (ZEC) et d&#039;autres crypto-actifs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Comment \u00eates-vous infect\u00e9?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Des e-mails de spam dans votre bo\u00eete de r\u00e9ception, fournissant des liens douteux.<\/li><li>T\u00e9l\u00e9chargements non officiels \u00e0 partir de sites Web externes ou de logiciels P2P (comme BitTorrent).<\/li><li>Exploits dans les syst\u00e8mes d&#039;exploitation (OS) non mis \u00e0 jour, c&#039;est-\u00e0-dire Windows XP ou d&#039;anciennes versions de firmware dans <a href=\"https:\/\/alfacash.blog\/2020\/10\/02\/coffe-hijacked-mine-monero-other-things\/\" target=\"_blank\" rel=\"noreferrer noopener\">Appareils IoT<\/a> (souvenez-vous de ces trois premiers comme \u00e9tant la \u00abtriade du mal\u00bb).<\/li><li>Une attaque cibl\u00e9e sp\u00e9cialement planifi\u00e9e et con\u00e7ue pour un objectif, souvent institutionnel (organisations et entreprises).<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conseils utiles<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Mettez \u00e0 jour le syst\u00e8me d&#039;exploitation, l&#039;antivirus et le micrologiciel de tous vos appareils intelligents.<\/li><li>N&#039;ouvrez pas de liens ou de fichiers joints \u00e0 partir d&#039;e-mails douteux.<\/li><li>T\u00e9l\u00e9chargez des fichiers et des logiciels uniquement \u00e0 partir des sites Web officiels (rappelez-vous ces trois premiers comme la \u00abtriade du bouclier\u00bb).<\/li><li>Faites des sauvegardes de toutes vos informations et fichiers importants sur des p\u00e9riph\u00e9riques externes, de pr\u00e9f\u00e9rence hors ligne.<\/li><li>En cas d&#039;infection, acc\u00e9dez \u00e0 des sites Web d&#039;aide tels que <a href=\"https:\/\/www.nomoreransom.org\/en\/index.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Plus de ran\u00e7on<\/a> ou appelez la division cybern\u00e9tique de vos autorit\u00e9s locales. Le paiement direct de la ran\u00e7on n&#039;est pas recommand\u00e9 et son succ\u00e8s n&#039;est pas garanti.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Enregistreurs de frappe<\/strong><\/h2>\n\n\n\n<p>On peut dire que ce n&#039;est pas <em>malware<\/em> en soi, mais il est utilis\u00e9 par les cybercriminels comme un outil d&#039;espionnage. En tant que ransomware, son nom dit tout: celui-ci est un logiciel ou un mat\u00e9riel con\u00e7u pour enregistrer (et souvent envoyer) chaque frappe tap\u00e9e sur le clavier d&#039;un appareil. Parfois, ils peuvent m\u00eame enregistrer des clics, de l&#039;audio et de la vid\u00e9o.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-1024x682.jpg\" alt=\"\" class=\"wp-image-4232\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Image par Gerd Altmann \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>Ainsi, si un <a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/keylogger\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">keylogger<\/a> est install\u00e9 furtivement sur un appareil, <strong>il est capable d&#039;enregistrer les mots de passe et les informations d&#039;identification qui seraient ensuite envoy\u00e9s \u00e0 un pirate informatique malveillant.<\/strong> Parmi ces informations d&#039;identification peuvent figurer le mot de passe ou la cl\u00e9 priv\u00e9e d&#039;un <a href=\"https:\/\/alfacash.blog\/2020\/08\/18\/what-is-cryptocurrency-why-should-care-reasons\/\" target=\"_blank\" rel=\"noreferrer noopener\">portefeuille de crypto-monnaie<\/a>, ce qui signifie que vous seriez vol\u00e9 de cette fa\u00e7on.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Comment \u00eates-vous infect\u00e9?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>La triade du mal, comme nous l&#039;avons d\u00e9j\u00e0 dit.<\/li><li>Faux sites Web et extensions de navigateur (phishing).<\/li><li>Domaines Web infect\u00e9s, ce qui signifie des attaques cibl\u00e9es contre des services tels que les magasins et les bourses vuln\u00e9rables.<\/li><li>Quelqu&#039;un a laiss\u00e9 un dr\u00f4le de petit appareil connect\u00e9 \u00e0 votre ordinateur, comme un adaptateur USB douteux ou un fil suppl\u00e9mentaire (c&#039;est un keylogger mat\u00e9riel).<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conseils utiles<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Appliquez la triade de bouclier fiable, comme nous l&#039;avons d\u00e9j\u00e0 dit.<\/li><li>Outre l&#039;antivirus, assurez-vous de disposer d&#039;une solution de cybers\u00e9curit\u00e9 appel\u00e9e anti-keylogger.<\/li><li>Enregistrez vos informations d&#039;identification et mots de passe dans le navigateur de votre appareil habituel ou utilisez un logiciel pour g\u00e9rer vos informations d&#039;identification.<\/li><li>\u00c9vitez les sites et applications de phishing simplement en regardant l&#039;URL, qui est toujours diff\u00e9rente de l&#039;original.<\/li><li>Faites attention aux actualit\u00e9s de vos sites Web et services pr\u00e9f\u00e9r\u00e9s: ils doivent annoncer leurs clients s&#039;ils font l&#039;objet d&#039;une cyberattaque.<\/li><li>Ne laissez pas de mat\u00e9riel inconnu connect\u00e9 dans votre appareil.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Cheval de Troie d&#039;acc\u00e8s \u00e0 distance (RAT)<\/strong><\/h2>\n\n\n\n<p>C&#039;est une tr\u00e8s mauvaise infection, car ce n&#039;est rien de plus qu&#039;une porte d\u00e9rob\u00e9e ouverte pour permettre aux pirates d&#039;entrer et de contr\u00f4ler votre appareil \u00e0 distance. Une fois le logiciel install\u00e9, le RAT permet un contr\u00f4le administratif, <strong>ce qui signifie que son hacker peut voir et faire presque tout ce qu&#039;il veut dans l&#039;appareil,<\/strong> de surveiller les donn\u00e9es et le comportement en silence pour distribuer d&#039;autres logiciels malveillants et formater des lecteurs.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-1024x682.jpg\" alt=\"\" class=\"wp-image-4233\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Image par StockSnap \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>Bien s\u00fbr, ils pourraient \u00e9galement voler vos cryptos, simplement en entrant dans votre portefeuille apr\u00e8s avoir enregistr\u00e9 vos mouvements. Et vous ne remarquerez probablement pas ce logiciel furtif avant qu&#039;il ne soit trop tard.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Comment \u00eates-vous infect\u00e9?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>La triade diabolique, pire que jamais. En effet, il est tr\u00e8s courant de le trouver cach\u00e9 dans des jeux et logiciels pirat\u00e9s.<\/li><li>Utilisation douteuse <a href=\"https:\/\/themerkle.com\/open-source-remote-access-trojan-targets-telegram-users\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">bots dans Telegram<\/a>.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conseils utiles<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Appliquez la triade du bouclier et tout ira bien!<\/li><li>De plus, vous pouvez toujours rechercher des commentaires et des critiques d&#039;autres utilisateurs des applications et des programmes que vous allez t\u00e9l\u00e9charger. Y compris les bots dans Telegram, oui.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Pirate de l&#039;air Clipper \/ Clipboard<\/strong><\/h2>\n\n\n\n<p>Les cybercriminels connaissent tr\u00e8s bien les mani\u00e8res g\u00e9n\u00e9rales des utilisateurs de crypto-monnaie. Ils savent, par exemple, que personne n&#039;\u00e9crit \u00e0 la main les adresses de portefeuille longues et complexes, mais les copier et les coller lorsque cela est n\u00e9cessaire. C&#039;est exactement le point qu&#039;ils choisissent de d\u00e9tourner les adresses d&#039;origine et de les remplacer par les leurs, en utilisant un logiciel malveillant appel\u00e9 \u00abClipper\u00bb ou \u00abClipboard hijacker\u00bb.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"665\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-1024x665.jpg\" alt=\"\" class=\"wp-image-4234\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-1024x665.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-300x195.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-150x97.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-270x175.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-770x500.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-782x508.jpg 782w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-793x515.jpg 793w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-370x240.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-554x360.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-306x199.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-260x169.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-87x56.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Image par Pete Linforth \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>La principale chose que fait ce malware est <strong>d\u00e9tourner le presse-papiers de l&#039;appareil de l&#039;utilisateur et d\u00e9tecter lorsqu&#039;une adresse de crypto-portefeuille est copi\u00e9e par le propri\u00e9taire<\/strong>. Ensuite, celui-ci est remplac\u00e9 par l&#039;adresse du portefeuille du pirate, donc, si l&#039;utilisateur ne fait pas attention, il peut finir par envoyer les fonds \u00e0 la mauvaise destination.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Comment \u00eates-vous infect\u00e9?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Triade mal\u00e9fique encore, oui. Cette fois, le plus courant <a href=\"https:\/\/www.binarydefense.com\/threat_watch\/clipper-cryptocurrency-stealing-malware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">vecteur d&#039;infection<\/a> est des applications fausses ou infect\u00e9es sur le Play Store.<\/li><li>Adobe Flash ou d&#039;autres fausses banni\u00e8res publicitaires sur des sites Web douteux.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conseils utiles<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Appliquez la triade de bouclier (cela fonctionne pour presque tout).<\/li><li>Faites attention aux adresses du portefeuille! Peu importe si vous pensez ne pas avoir de tondeuse sur votre appareil (cela ne produit aucun sympt\u00f4me visible). Comparez et v\u00e9rifiez votre adresse d&#039;origine et la version coll\u00e9e deux fois avant de partager ou d&#039;envoyer.<\/li><li>Si possible, pr\u00e9f\u00e9rez utiliser vos fonds via des codes QR plut\u00f4t que par du texte.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Hame\u00e7onnage<\/strong><\/h2>\n\n\n\n<p>On peut dire <a href=\"https:\/\/www.phishing.org\/what-is-phishing\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">le phishing<\/a> est en partie un malware et en partie une arnaque car il ne s&#039;agit que d&#039;une fausse version de quelque chose (site Web, application, logiciel, message, appel\u2026), sp\u00e9cialement con\u00e7u <a href=\"https:\/\/alfacash.blog\/2020\/09\/07\/getting-rich-wrecking-most-popular-cryptocurrency-myths\/\" target=\"_blank\" rel=\"noreferrer noopener\">tromper les gens<\/a> et obtenez d&#039;eux des informations pr\u00e9cieuses, comme des informations d&#039;identification et des cl\u00e9s bancaires ou de crypto-monnaie. Ainsi, les pirates clonent des sites Web ou des logiciels, ou se font passer pour un service, une entreprise ou une personne par e-mail ou par appel pour atteindre leurs objectifs malveillants.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-1024x682.jpg\" alt=\"\" class=\"wp-image-4235\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Image par leo2014 \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>Vous pouvez trouver une fausse version de votre <a href=\"https:\/\/www.alfa.cash\/fr\" target=\"_blank\" rel=\"noreferrer noopener\">\u00e9change de crypto-monnaie fiable<\/a>, par exemple. <strong>Cela semble identique, mais, en m\u00eame temps, certaines choses ne fonctionnent pas.<\/strong> C&#039;est peut-\u00eatre une mauvaise grammaire, des liens bris\u00e9s ou des textes manquants; mais il y a quelque chose sur les sites Web de phishing qui les r\u00e9v\u00e8le toujours: l&#039;URL.<\/p>\n\n\n\n<p>Il ne peut pas s&#039;agir exactement du m\u00eame domaine que l&#039;original (car vous devez acheter un domaine et vous ne pouvez pas acheter quelque chose que le propri\u00e9taire l\u00e9gitime ne vend pas). Ils sont toujours similaires, mais au moins un caract\u00e8re sera modifi\u00e9 (c.-\u00e0-d. Www.<strong>alfa<\/strong>.cash contre www.<strong>alfaexchange<\/strong>.en esp\u00e8ces). Et c&#039;est la m\u00eame chose pour les adresses mail: si elle n&#039;a pas le domaine d&#039;origine de l&#039;entreprise (ie hr @<strong>alfa.im <\/strong>vs hr @<strong>gmail.com<\/strong>), vous devez suspecter imm\u00e9diatement.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Comment \u00eates-vous infect\u00e9?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Triade mal\u00e9fique, en particulier par e-mail.<\/li><li>Dubious ajoute en haut des r\u00e9sultats du navigateur. N&#039;importe qui (m\u00eame les acteurs malveillants) peut payer pour ce genre d&#039;ajout, donc, ils seront l\u00e0 jusqu&#039;\u00e0 ce que quelqu&#039;un le signale.<\/li><li>Le hacker \/ escroc trouv\u00e9 <a href=\"https:\/\/alfacash.blog\/2020\/08\/26\/easiest-guide-top-up-phone-cryptocurrencies\/\" target=\"_blank\" rel=\"noreferrer noopener\">ton t\u00e9l\u00e9phone<\/a> d&#039;une certaine mani\u00e8re et cela vous appelle, vous fait passer pour une autorit\u00e9.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conseils utiles<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Bouclier triade \u00e0 la rescousse \u00e0 nouveau.<\/li><li>Acc\u00e9dez \u00e0 vos sites Web les plus utilis\u00e9s via la liste des signets \/ favoris et \u00e9vitez les r\u00e9sultats du navigateur autant que vous le pouvez.<\/li><li>M\u00e9fiez-vous de tout message \/ e-mail \/ appel dans lequel quelqu&#039;un vous demande des informations d&#039;identification personnelles ou de l&#039;argent. N&#039;oubliez pas: les entreprises \/ organisations n&#039;ont pas l&#039;habitude de faire cela du tout.<\/li><li>Si vous allez envoyer \/ recevoir de la crypto-monnaie via un site Web ou une application, v\u00e9rifiez toujours l&#039;URL et les commentaires pr\u00e9c\u00e9dents.<\/li><\/ul>\n\n\n\n<p>Mais surtout, ne vous inqui\u00e9tez pas! Se prot\u00e9ger et prot\u00e9ger vos crypto-monnaies est facile. Suivez simplement nos conseils utiles, et tout devrait aller bien.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"has-text-align-center\"><em>Vous voulez \u00e9changer des BTC, des ETH et d&#039;autres jetons\u00a0? Tu peux le faire<\/em>\u00a0<em>sans encombre\u00a0<a href=\"https:\/\/www.alfa.cash\/buy\/bitcoin\" target=\"_blank\" rel=\"noreferrer noopener\">sur Alfacash<\/a>! Et n&#039;oubliez pas que nous parlons de cela et de beaucoup d&#039;autres choses sur nos m\u00e9dias sociaux.<br><br><\/em><a href=\"https:\/\/twitter.com\/alfacash_crypto\" target=\"_blank\" rel=\"noreferrer noopener\">Twitter<\/a>\u00a0*\u00a0<a href=\"https:\/\/t.me\/AlfacashCommunity\" target=\"_blank\" rel=\"noreferrer noopener\">T\u00e9l\u00e9gramme<\/a>\u00a0*\u00a0<a href=\"https:\/\/www.instagram.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Instagram<\/a> * <a href=\"https:\/\/www.youtube.com\/channel\/UCOl4fdRHj8AseQ5b6z9udaw\" target=\"_blank\" rel=\"noreferrer noopener\">Youtube<\/a>\u00a0*<a href=\"https:\/\/www.facebook.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook<\/a>\u00a0\u00a0*\u00a0<a href=\"https:\/\/vk.com\/alfacashcrypto\" target=\"_blank\" rel=\"noreferrer noopener\">Vkontakte<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>\u00c0 l&#039;int\u00e9rieur du monde cryptographique, nous devrions \u00eatre tr\u00e8s conscients des mauvaises possibilit\u00e9s. Alors, retrouvez ici les logiciels malveillants qui peuvent voler tous vos cryptos et comment les \u00e9viter.<\/p>","protected":false},"author":5,"featured_media":4228,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[48],"tags":[133,42,132,127,134,129,131],"class_list":{"0":"post-4225","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-learn","8":"tag-clipper","9":"tag-cryptocurrency","10":"tag-keylogger","11":"tag-malware","12":"tag-phishing","13":"tag-ransomware","14":"tag-rat"},"featured_image_src":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","author_info":{"display_name":"Isabel P\u00e9rez","author_link":"https:\/\/alfacash.blog\/fr\/author\/isabel\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malware that can steal all your cryptos and how to avoid it - alfa.cash blog<\/title>\n<meta name=\"description\" content=\"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/alfacash.blog\/fr\/2020\/10\/04\/malware-peut-voler-cryptos-comment-eviter\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware that can steal all your cryptos and how to avoid it\" \/>\n<meta property=\"og:description\" content=\"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/alfacash.blog\/fr\/2020\/10\/04\/malware-peut-voler-cryptos-comment-eviter\/\" \/>\n<meta property=\"og:site_name\" content=\"alfa.cash blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/alfacashstore\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-04T01:51:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T18:53:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2123\" \/>\n\t<meta property=\"og:image:height\" content=\"1120\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Isabel P\u00e9rez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AlfacashStore\" \/>\n<meta name=\"twitter:site\" content=\"@AlfacashStore\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\"},\"author\":{\"name\":\"Isabel P\u00e9rez\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\"},\"headline\":\"Malware that can steal all your cryptos and how to avoid it\",\"datePublished\":\"2020-10-04T01:51:17+00:00\",\"dateModified\":\"2024-02-19T18:53:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\"},\"wordCount\":1511,\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"keywords\":[\"Clipper\",\"cryptocurrency\",\"Keylogger\",\"malware\",\"Phishing\",\"Ransomware\",\"RAT\"],\"articleSection\":[\"Learn\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\",\"url\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\",\"name\":\"Malware that can steal all your cryptos and how to avoid it - alfa.cash blog\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"datePublished\":\"2020-10-04T01:51:17+00:00\",\"dateModified\":\"2024-02-19T18:53:10+00:00\",\"description\":\"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.\",\"breadcrumb\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"width\":270,\"height\":142,\"caption\":\"Malware-steal-cryptocurrency-tips\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/alfacash.blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware that can steal all your cryptos and how to avoid it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/alfacash.blog\/#website\",\"url\":\"https:\/\/alfacash.blog\/\",\"name\":\"Alfacash Blog\",\"description\":\"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi\",\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"alternateName\":\"alfacash.blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/alfacash.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/alfacash.blog\/#organization\",\"name\":\"Alfacash Blog\",\"alternateName\":\"alfacash.blog\",\"url\":\"https:\/\/alfacash.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"width\":696,\"height\":696,\"caption\":\"Alfacash Blog\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/alfacashstore\",\"https:\/\/x.com\/AlfacashStore\",\"https:\/\/t.me\/AlfacashCommunity\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\",\"name\":\"Isabel P\u00e9rez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"caption\":\"Isabel P\u00e9rez\"},\"description\":\"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/\"],\"url\":\"https:\/\/alfacash.blog\/fr\/author\/isabel\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Malware that can steal all your cryptos and how to avoid it - alfa.cash blog","description":"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/alfacash.blog\/fr\/2020\/10\/04\/malware-peut-voler-cryptos-comment-eviter\/","og_locale":"fr_FR","og_type":"article","og_title":"Malware that can steal all your cryptos and how to avoid it","og_description":"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.","og_url":"https:\/\/alfacash.blog\/fr\/2020\/10\/04\/malware-peut-voler-cryptos-comment-eviter\/","og_site_name":"alfa.cash blog","article_publisher":"https:\/\/www.facebook.com\/alfacashstore","article_published_time":"2020-10-04T01:51:17+00:00","article_modified_time":"2024-02-19T18:53:10+00:00","og_image":[{"width":2123,"height":1120,"url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","type":"image\/jpeg"}],"author":"Isabel P\u00e9rez","twitter_card":"summary_large_image","twitter_creator":"@AlfacashStore","twitter_site":"@AlfacashStore","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#article","isPartOf":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/"},"author":{"name":"Isabel P\u00e9rez","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749"},"headline":"Malware that can steal all your cryptos and how to avoid it","datePublished":"2020-10-04T01:51:17+00:00","dateModified":"2024-02-19T18:53:10+00:00","mainEntityOfPage":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/"},"wordCount":1511,"publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"image":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","keywords":["Clipper","cryptocurrency","Keylogger","malware","Phishing","Ransomware","RAT"],"articleSection":["Learn"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/","url":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/","name":"Malware that can steal all your cryptos and how to avoid it - alfa.cash blog","isPartOf":{"@id":"https:\/\/alfacash.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage"},"image":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","datePublished":"2020-10-04T01:51:17+00:00","dateModified":"2024-02-19T18:53:10+00:00","description":"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.","breadcrumb":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","width":270,"height":142,"caption":"Malware-steal-cryptocurrency-tips"},{"@type":"BreadcrumbList","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/alfacash.blog\/"},{"@type":"ListItem","position":2,"name":"Malware that can steal all your cryptos and how to avoid it"}]},{"@type":"WebSite","@id":"https:\/\/alfacash.blog\/#website","url":"https:\/\/alfacash.blog\/","name":"Alfacash Blog","description":"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi","publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"alternateName":"alfacash.blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/alfacash.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/alfacash.blog\/#organization","name":"Alfacash Blog","alternateName":"alfacash.blog","url":"https:\/\/alfacash.blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","width":696,"height":696,"caption":"Alfacash Blog"},"image":{"@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/alfacashstore","https:\/\/x.com\/AlfacashStore","https:\/\/t.me\/AlfacashCommunity"]},{"@type":"Person","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749","name":"Isabel P\u00e9rez","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","caption":"Isabel P\u00e9rez"},"description":"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.","sameAs":["https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/"],"url":"https:\/\/alfacash.blog\/fr\/author\/isabel\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/alfacash.blog\/fr\/wp-json\/wp\/v2\/posts\/4225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alfacash.blog\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alfacash.blog\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/fr\/wp-json\/wp\/v2\/comments?post=4225"}],"version-history":[{"count":4,"href":"https:\/\/alfacash.blog\/fr\/wp-json\/wp\/v2\/posts\/4225\/revisions"}],"predecessor-version":[{"id":8756,"href":"https:\/\/alfacash.blog\/fr\/wp-json\/wp\/v2\/posts\/4225\/revisions\/8756"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/fr\/wp-json\/wp\/v2\/media\/4228"}],"wp:attachment":[{"href":"https:\/\/alfacash.blog\/fr\/wp-json\/wp\/v2\/media?parent=4225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alfacash.blog\/fr\/wp-json\/wp\/v2\/categories?post=4225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alfacash.blog\/fr\/wp-json\/wp\/v2\/tags?post=4225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}