{"id":7226,"date":"2021-04-26T04:34:00","date_gmt":"2021-04-26T01:34:00","guid":{"rendered":"https:\/\/alfacash.blog\/?p=7226"},"modified":"2024-02-19T21:51:51","modified_gmt":"2024-02-19T18:51:51","slug":"crypto-stealing-malware-windows-10-brukere","status":"publish","type":"post","link":"https:\/\/alfacash.blog\/nb\/2021\/04\/26\/crypto-stealing-malware-windows-10-brukere\/","title":{"rendered":"Ny kryptostjeling av skadelig programvare lurer p\u00e5 Windows 10-brukere"},"content":{"rendered":"<p>Hackerne tar aldri en pause, og enn si hvis kryptovalutamarkedet er bullish. Dine kryptovalutaer kan v\u00e6re trygge p\u00e5 enheten eller favorittb\u00f8rsen, men de har alltid sine m\u00e5ter \u00e5 stjele myntene p\u00e5. <strong>En kryptostjeling av malware forkledd som en funksjon i Windows 10 er den siste av disse m\u00e5tene.<\/strong><\/p>\n\n\n\n<p>For \u00e5 v\u00e6re mer spesifikk, designet hackerne en <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-microsoft-directx-12-site-pushes-crypto-stealing-malware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">falske nettsteder<\/a> for \u00e5 laste ned DirectX 12 i Windows 10. Denne pakken med funksjoner jobber med \u00e5 utvikle og kj\u00f8re multimediainnhold, spesielt videospill. S\u00e5, for eksempel, mange spillere vil kanskje oppdatere DirectX og finne den forferdelige overraskelsen i stedet.<\/p>\n\n\n\n<p>Phishing-siden ble designet for detaljer. Det inkluderer en personvernpolicy, ansvarsfraskrivelse, kontaktskjema, og ved f\u00f8rste \u00f8yekast alt som et legitimt nett burde ha. Hvis brukeren klikker p\u00e5 Last ned-knappene, blir de omdirigert til en ekstern side for \u00e5 hente filene. <strong>N\u00e5r den er installert, vil skadelig programvare h\u00f8ste brukerens data stille<\/strong>, inkludert informasjonskapsler, filer og informasjon om systemet og programmene. Det kan til og med ta skjermbilder.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"797\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-1024x797.jpg\" alt=\"utnytte-bug-crypto-defi\" class=\"wp-image-6091\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-1024x797.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-300x233.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-150x117.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-15x12.jpg 15w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-231x180.jpg 231w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-662x515.jpg 662w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-653x508.jpg 653w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-370x288.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-554x431.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-306x238.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-315x245.jpg 315w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-257x200.jpg 257w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-87x67.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Men sannsynligvis er det verste at malware leter etter kryptovaluta-lommeb\u00f8ker inne i systemet for \u00e5 stjele legitimasjonen, passordene og til slutt pengene som er lagret der inne. S\u00e5, den ondsinnede programvaren kan identifisere lommeb\u00f8ker som <a href=\"https:\/\/alfacash.blog\/2020\/12\/12\/new-campaign-fake-ledger-emails-can-steal-crypto\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ledger Live<\/a>, Waves.Exchange, Coinomi, Electrum, Electron Cash, BTCP Electrum, Jaxx, Exodus, MultiBit HD, Aomtic og <a href=\"https:\/\/alfacash.blog\/2021\/03\/29\/discover-monero-how-use-it-full-privacy\/\" target=\"_blank\" rel=\"noreferrer noopener\">Monero<\/a>.<\/p>\n\n\n\n<p>Alle stj\u00e5lne data komprimeres og sendes automatisk til de involverte hackerne. S\u00e5 alt <a href=\"https:\/\/alfacash.blog\/2021\/02\/03\/how-to-choose-first-crypto-wallet-tips-tricks\/\" target=\"_blank\" rel=\"noreferrer noopener\">lommeb\u00f8kene dine<\/a> kan t\u00f8mmes p\u00e5 kort tid hvis du ikke er forsiktig nok.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Unng\u00e5 kryptostjeling av skadelig programvare<\/strong><\/h2>\n\n\n\n<p>Det nevnte er et klassisk phishing-tilfelle. La oss huske det <strong>phishing oppst\u00e5r n\u00e5r noen hackere lager en falsk versjon av noe<\/strong> (nettsted, app, programvare, melding, samtale ...) for \u00e5 lure folk og f\u00e5 verdifull informasjon fra dem, som bank eller <a href=\"https:\/\/alfacash.blog\/2020\/08\/18\/what-is-cryptocurrency-why-should-care-reasons\/\" target=\"_blank\" rel=\"noreferrer noopener\">kryptovaluta<\/a> legitimasjon og n\u00f8kler.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-1024x682.jpg\" alt=\"\" class=\"wp-image-5920\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>S\u00e5 hackerne kloner nettsteder eller programvare, eller etterligner noen tjenester, selskaper eller personer via e-post eller ring for \u00e5 oppn\u00e5 sine ondsinnede m\u00e5l. Unng\u00e5 denne typen <a href=\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\" target=\"_blank\" rel=\"noreferrer noopener\">kryptostjeling av skadelig programvare<\/a> er ganske enkelt, skj\u00f8nt.<\/p>\n\n\n\n<p><strong>F\u00f8rst og fremst laster du bare ned filer og programvare fra de offisielle nettstedene<\/strong> (Microsoft, i dette tilfellet). Kontroller to ganger URL-ene for \u00e5 v\u00e6re sikre. P\u00e5 samme m\u00e5te er det viktig \u00e5 holde OS, antivirus og fastvare oppdatert p\u00e5 alle smarte enheter, og ikke \u00e5pne lenker eller vedlagte filer fra tvilsomme e-poster.<\/p>\n\n\n\n<p><br><em>Utvalgt bilde av Elchinator \/ Pixabay<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"has-text-align-center\"><em>Vil du handle Bitcoin og andre tokens? Du kan gj\u00f8re det<\/em>&nbsp;<em>trygt&nbsp;<\/em><em><a href=\"https:\/\/www.alfa.cash\/buy\/bitcoin\" target=\"_blank\" rel=\"noreferrer noopener\">p\u00e5 Alfacash<\/a><\/em><em>! Og ikke glem at vi snakker om dette og mange andre ting p\u00e5 v\u00e5re sosiale medier.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/twitter.com\/alfacash_crypto\" target=\"_blank\" rel=\"noreferrer noopener\">Twitter<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/t.me\/AlfacashCommunity\" target=\"_blank\" rel=\"noreferrer noopener\">Telegram<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/www.facebook.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/www.instagram.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Instagram<\/a> * <a href=\"https:\/\/www.youtube.com\/channel\/UCOl4fdRHj8AseQ5b6z9udaw\" target=\"_blank\" rel=\"noreferrer noopener\">Youtube<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/vk.com\/alfacashcrypto\" target=\"_blank\" rel=\"noreferrer noopener\">Vkontakte<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Hackere hviler ikke, s\u00e5 vi m\u00e5 n\u00e5 m\u00f8te et nytt utvalg av kryptostjelende skadelig programvare. Denne gangen er Windows 10-brukere de viktigste ofrene.<\/p>","protected":false},"author":5,"featured_media":7235,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[47],"tags":[61,135,282,231,127,60,320],"class_list":{"0":"post-7226","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-market-trends-alfacash","8":"tag-cryptocurrencies","9":"tag-cybersecurity","10":"tag-games","11":"tag-hackers","12":"tag-malware","13":"tag-wallets","14":"tag-windows"},"featured_image_src":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","author_info":{"display_name":"Isabel P\u00e9rez","author_link":"https:\/\/alfacash.blog\/nb\/author\/isabel\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New crypto-stealing malware lurks Windows 10 users - alfa.cash blog<\/title>\n<meta name=\"description\" content=\"Hackers don&#039;t rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/alfacash.blog\/nb\/2021\/04\/26\/crypto-stealing-malware-windows-10-brukere\/\" \/>\n<meta property=\"og:locale\" content=\"nb_NO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New crypto-stealing malware lurks Windows 10 users\" \/>\n<meta property=\"og:description\" content=\"Hackers don&#039;t rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/alfacash.blog\/nb\/2021\/04\/26\/crypto-stealing-malware-windows-10-brukere\/\" \/>\n<meta property=\"og:site_name\" content=\"alfa.cash blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/alfacashstore\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-26T01:34:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T18:51:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Isabel P\u00e9rez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AlfacashStore\" \/>\n<meta name=\"twitter:site\" content=\"@AlfacashStore\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\"},\"author\":{\"name\":\"Isabel P\u00e9rez\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\"},\"headline\":\"New crypto-stealing malware lurks Windows 10 users\",\"datePublished\":\"2021-04-26T01:34:00+00:00\",\"dateModified\":\"2024-02-19T18:51:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\"},\"wordCount\":443,\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"keywords\":[\"cryptocurrencies\",\"Cybersecurity\",\"Games\",\"hackers\",\"malware\",\"wallets\",\"Windows\"],\"articleSection\":[\"Market trends\"],\"inLanguage\":\"nb-NO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\",\"url\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\",\"name\":\"New crypto-stealing malware lurks Windows 10 users - alfa.cash blog\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"datePublished\":\"2021-04-26T01:34:00+00:00\",\"dateModified\":\"2024-02-19T18:51:51+00:00\",\"description\":\"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.\",\"breadcrumb\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb\"},\"inLanguage\":\"nb-NO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nb-NO\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"width\":270,\"height\":152,\"caption\":\"crypto-stealing-malware-Windows\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/alfacash.blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New crypto-stealing malware lurks Windows 10 users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/alfacash.blog\/#website\",\"url\":\"https:\/\/alfacash.blog\/\",\"name\":\"Alfacash Blog\",\"description\":\"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi\",\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"alternateName\":\"alfacash.blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/alfacash.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nb-NO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/alfacash.blog\/#organization\",\"name\":\"Alfacash Blog\",\"alternateName\":\"alfacash.blog\",\"url\":\"https:\/\/alfacash.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nb-NO\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"width\":696,\"height\":696,\"caption\":\"Alfacash Blog\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/alfacashstore\",\"https:\/\/x.com\/AlfacashStore\",\"https:\/\/t.me\/AlfacashCommunity\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\",\"name\":\"Isabel P\u00e9rez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nb-NO\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"caption\":\"Isabel P\u00e9rez\"},\"description\":\"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/\"],\"url\":\"https:\/\/alfacash.blog\/nb\/author\/isabel\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"New crypto-stealing malware lurks Windows 10 users - alfa.cash blog","description":"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/alfacash.blog\/nb\/2021\/04\/26\/crypto-stealing-malware-windows-10-brukere\/","og_locale":"nb_NO","og_type":"article","og_title":"New crypto-stealing malware lurks Windows 10 users","og_description":"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.","og_url":"https:\/\/alfacash.blog\/nb\/2021\/04\/26\/crypto-stealing-malware-windows-10-brukere\/","og_site_name":"alfa.cash blog","article_publisher":"https:\/\/www.facebook.com\/alfacashstore","article_published_time":"2021-04-26T01:34:00+00:00","article_modified_time":"2024-02-19T18:51:51+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","type":"image\/jpeg"}],"author":"Isabel P\u00e9rez","twitter_card":"summary_large_image","twitter_creator":"@AlfacashStore","twitter_site":"@AlfacashStore","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#article","isPartOf":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/"},"author":{"name":"Isabel P\u00e9rez","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749"},"headline":"New crypto-stealing malware lurks Windows 10 users","datePublished":"2021-04-26T01:34:00+00:00","dateModified":"2024-02-19T18:51:51+00:00","mainEntityOfPage":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/"},"wordCount":443,"publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"image":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","keywords":["cryptocurrencies","Cybersecurity","Games","hackers","malware","wallets","Windows"],"articleSection":["Market trends"],"inLanguage":"nb-NO"},{"@type":"WebPage","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/","url":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/","name":"New crypto-stealing malware lurks Windows 10 users - alfa.cash blog","isPartOf":{"@id":"https:\/\/alfacash.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage"},"image":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","datePublished":"2021-04-26T01:34:00+00:00","dateModified":"2024-02-19T18:51:51+00:00","description":"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.","breadcrumb":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb"},"inLanguage":"nb-NO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/"]}]},{"@type":"ImageObject","inLanguage":"nb-NO","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","width":270,"height":152,"caption":"crypto-stealing-malware-Windows"},{"@type":"BreadcrumbList","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/alfacash.blog\/"},{"@type":"ListItem","position":2,"name":"New crypto-stealing malware lurks Windows 10 users"}]},{"@type":"WebSite","@id":"https:\/\/alfacash.blog\/#website","url":"https:\/\/alfacash.blog\/","name":"Alfacash Blog","description":"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi","publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"alternateName":"alfacash.blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/alfacash.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nb-NO"},{"@type":"Organization","@id":"https:\/\/alfacash.blog\/#organization","name":"Alfacash Blog","alternateName":"alfacash.blog","url":"https:\/\/alfacash.blog\/","logo":{"@type":"ImageObject","inLanguage":"nb-NO","@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","width":696,"height":696,"caption":"Alfacash Blog"},"image":{"@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/alfacashstore","https:\/\/x.com\/AlfacashStore","https:\/\/t.me\/AlfacashCommunity"]},{"@type":"Person","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749","name":"Isabel P\u00e9rez","image":{"@type":"ImageObject","inLanguage":"nb-NO","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","caption":"Isabel P\u00e9rez"},"description":"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.","sameAs":["https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/"],"url":"https:\/\/alfacash.blog\/nb\/author\/isabel\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/alfacash.blog\/nb\/wp-json\/wp\/v2\/posts\/7226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alfacash.blog\/nb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alfacash.blog\/nb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/nb\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/nb\/wp-json\/wp\/v2\/comments?post=7226"}],"version-history":[{"count":6,"href":"https:\/\/alfacash.blog\/nb\/wp-json\/wp\/v2\/posts\/7226\/revisions"}],"predecessor-version":[{"id":7238,"href":"https:\/\/alfacash.blog\/nb\/wp-json\/wp\/v2\/posts\/7226\/revisions\/7238"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/nb\/wp-json\/wp\/v2\/media\/7235"}],"wp:attachment":[{"href":"https:\/\/alfacash.blog\/nb\/wp-json\/wp\/v2\/media?parent=7226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alfacash.blog\/nb\/wp-json\/wp\/v2\/categories?post=7226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alfacash.blog\/nb\/wp-json\/wp\/v2\/tags?post=7226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}