{"id":7226,"date":"2021-04-26T04:34:00","date_gmt":"2021-04-26T01:34:00","guid":{"rendered":"https:\/\/alfacash.blog\/?p=7226"},"modified":"2024-02-19T21:51:51","modified_gmt":"2024-02-19T18:51:51","slug":"crypto-stelen-malware-windows-10-gebruikers","status":"publish","type":"post","link":"https:\/\/alfacash.blog\/nl\/2021\/04\/26\/crypto-stelen-malware-windows-10-gebruikers\/","title":{"rendered":"Nieuwe cryptostelende malware schuilt Windows 10-gebruikers"},"content":{"rendered":"<p>De hackers nemen nooit pauze, laat staan als de markt voor cryptocurrency bullish is. Uw cryptocurrencies zijn misschien veilig op uw apparaat of favoriete uitwisseling, maar ze hebben altijd hun manieren om de munten te stelen. <strong>Een crypto-stelende malware vermomd als een functie van Windows 10 is de laatste van die manieren.<\/strong><\/p>\n\n\n\n<p>Om specifieker te zijn, de hackers ontwierpen een <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-microsoft-directx-12-site-pushes-crypto-stealing-malware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">nep website<\/a> om DirectX 12 te downloaden in Windows 10. Dit pakket functionaliteiten werkt om multimedia-inhoud te ontwikkelen en uit te voeren, met name videogames. Dus veel gamers willen bijvoorbeeld de DirectX updaten en in plaats daarvan de vreselijke verrassing vinden.<\/p>\n\n\n\n<p>De phishing-pagina is tot in detail ontworpen. Het bevat een privacybeleid, disclaimer, contactformulier en, op het eerste gezicht, alles wat een legitiem web zou moeten hebben. Als de gebruiker op de downloadknoppen klikt, wordt hij doorgestuurd naar een externe pagina om de bestanden op te halen. <strong>Na installatie verzamelt de malware stilletjes de gegevens van de gebruiker<\/strong>, inclusief cookies, bestanden en informatie over het systeem en programma&#039;s. Het kan zelfs screenshots maken.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"797\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-1024x797.jpg\" alt=\"exploit-bug-crypto-defi\" class=\"wp-image-6091\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-1024x797.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-300x233.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-150x117.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-15x12.jpg 15w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-231x180.jpg 231w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-662x515.jpg 662w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-653x508.jpg 653w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-370x288.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-554x431.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-306x238.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-315x245.jpg 315w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-257x200.jpg 257w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-87x67.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Maar waarschijnlijk het ergste is dat de malware naar cryptocurrency-wallets in het systeem zoekt om de inloggegevens, wachtwoorden en uiteindelijk het geld dat daarin is opgeslagen te stelen. De kwaadaardige software kan dus portefeuilles identificeren zoals: <a href=\"https:\/\/alfacash.blog\/2020\/12\/12\/new-campaign-fake-ledger-emails-can-steal-crypto\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ledger Live<\/a>, Waves.Exchange, Coinomi, Electrum, Electron Cash, BTCP Electrum, Jaxx, Exodus, MultiBit HD, Aomtic en <a href=\"https:\/\/alfacash.blog\/2021\/03\/29\/discover-monero-how-use-it-full-privacy\/\" target=\"_blank\" rel=\"noreferrer noopener\">Monero<\/a>.<\/p>\n\n\n\n<p>Alle gestolen gegevens worden gecomprimeerd en automatisch naar de betrokken hackers gestuurd. Dus, allemaal <a href=\"https:\/\/alfacash.blog\/2021\/02\/03\/how-to-choose-first-crypto-wallet-tips-tricks\/\" target=\"_blank\" rel=\"noreferrer noopener\">je portemonnee<\/a> kan binnen de kortste keren leeg zijn als u niet voorzichtig genoeg bent.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Vermijd crypto-stelende malware<\/strong><\/h2>\n\n\n\n<p>Het bovengenoemde is een klassiek geval van phishing. Laten we dat onthouden <strong>phishing treedt op wanneer sommige hackers een nepversie van iets maken<\/strong> (website, app, software, bericht, oproep\u2026) om mensen te misleiden en waardevolle informatie van hen te krijgen, zoals bank of <a href=\"https:\/\/alfacash.blog\/2020\/08\/18\/what-is-cryptocurrency-why-should-care-reasons\/\" target=\"_blank\" rel=\"noreferrer noopener\">cryptocurrency<\/a> inloggegevens en sleutels.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-1024x682.jpg\" alt=\"\" class=\"wp-image-5920\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Dus de hackers klonen websites of software, of imiteren een dienst, bedrijf of persoon via e-mail of telefoontje om hun kwaadaardige doelen te bereiken. Vermijd dit soort <a href=\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\" target=\"_blank\" rel=\"noreferrer noopener\">crypto-stelende malware<\/a> is wel een beetje makkelijk.<\/p>\n\n\n\n<p><strong>Download allereerst bestanden en software alleen van de offici\u00eble websites<\/strong> (Microsoft, in dit geval). Controleer voor de zekerheid twee keer de URL&#039;s. Evenzo is het belangrijk om het besturingssysteem, antivirus en firmware van al uw slimme apparaten up-to-date te houden en geen links of bijgevoegde bestanden van dubieuze e-mails te openen.<\/p>\n\n\n\n<p><br><em>Uitgelichte afbeelding door Elchinator \/ Pixabay<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"has-text-align-center\"><em>Wil je Bitcoin en andere tokens ruilen? Je kunt het<\/em>&nbsp;<em>veilig&nbsp;<\/em><em><a href=\"https:\/\/www.alfa.cash\/buy\/bitcoin\" target=\"_blank\" rel=\"noreferrer noopener\">op Alfacash<\/a><\/em><em>! En vergeet niet dat we het hier en nog veel meer over hebben op onze sociale media.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/twitter.com\/alfacash_crypto\" target=\"_blank\" rel=\"noreferrer noopener\">Twitter<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/t.me\/AlfacashCommunity\" target=\"_blank\" rel=\"noreferrer noopener\">Telegram<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/www.facebook.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/www.instagram.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Instagram<\/a> * <a href=\"https:\/\/www.youtube.com\/channel\/UCOl4fdRHj8AseQ5b6z9udaw\" target=\"_blank\" rel=\"noreferrer noopener\">Youtube<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/vk.com\/alfacashcrypto\" target=\"_blank\" rel=\"noreferrer noopener\">Vkontakte<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Hackers rusten niet, dus we hebben nu te maken met een nieuwe vari\u00ebteit aan crypto-stelende malware. Deze keer zijn de belangrijkste slachtoffers Windows 10-gebruikers.<\/p>","protected":false},"author":5,"featured_media":7235,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[47],"tags":[61,135,282,231,127,60,320],"class_list":{"0":"post-7226","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-market-trends-alfacash","8":"tag-cryptocurrencies","9":"tag-cybersecurity","10":"tag-games","11":"tag-hackers","12":"tag-malware","13":"tag-wallets","14":"tag-windows"},"featured_image_src":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","author_info":{"display_name":"Isabel P\u00e9rez","author_link":"https:\/\/alfacash.blog\/nl\/author\/isabel\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New crypto-stealing malware lurks Windows 10 users - alfa.cash blog<\/title>\n<meta name=\"description\" content=\"Hackers don&#039;t rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/alfacash.blog\/nl\/2021\/04\/26\/crypto-stelen-malware-windows-10-gebruikers\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New crypto-stealing malware lurks Windows 10 users\" \/>\n<meta property=\"og:description\" content=\"Hackers don&#039;t rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/alfacash.blog\/nl\/2021\/04\/26\/crypto-stelen-malware-windows-10-gebruikers\/\" \/>\n<meta property=\"og:site_name\" content=\"alfa.cash blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/alfacashstore\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-26T01:34:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T18:51:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Isabel P\u00e9rez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AlfacashStore\" \/>\n<meta name=\"twitter:site\" content=\"@AlfacashStore\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\"},\"author\":{\"name\":\"Isabel P\u00e9rez\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\"},\"headline\":\"New crypto-stealing malware lurks Windows 10 users\",\"datePublished\":\"2021-04-26T01:34:00+00:00\",\"dateModified\":\"2024-02-19T18:51:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\"},\"wordCount\":443,\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"keywords\":[\"cryptocurrencies\",\"Cybersecurity\",\"Games\",\"hackers\",\"malware\",\"wallets\",\"Windows\"],\"articleSection\":[\"Market trends\"],\"inLanguage\":\"nl\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\",\"url\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\",\"name\":\"New crypto-stealing malware lurks Windows 10 users - alfa.cash blog\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"datePublished\":\"2021-04-26T01:34:00+00:00\",\"dateModified\":\"2024-02-19T18:51:51+00:00\",\"description\":\"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.\",\"breadcrumb\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb\"},\"inLanguage\":\"nl\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"width\":270,\"height\":152,\"caption\":\"crypto-stealing-malware-Windows\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/alfacash.blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New crypto-stealing malware lurks Windows 10 users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/alfacash.blog\/#website\",\"url\":\"https:\/\/alfacash.blog\/\",\"name\":\"Alfacash Blog\",\"description\":\"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi\",\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"alternateName\":\"alfacash.blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/alfacash.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/alfacash.blog\/#organization\",\"name\":\"Alfacash Blog\",\"alternateName\":\"alfacash.blog\",\"url\":\"https:\/\/alfacash.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"width\":696,\"height\":696,\"caption\":\"Alfacash Blog\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/alfacashstore\",\"https:\/\/x.com\/AlfacashStore\",\"https:\/\/t.me\/AlfacashCommunity\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\",\"name\":\"Isabel P\u00e9rez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"caption\":\"Isabel P\u00e9rez\"},\"description\":\"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/\"],\"url\":\"https:\/\/alfacash.blog\/nl\/author\/isabel\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"New crypto-stealing malware lurks Windows 10 users - alfa.cash blog","description":"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/alfacash.blog\/nl\/2021\/04\/26\/crypto-stelen-malware-windows-10-gebruikers\/","og_locale":"nl_NL","og_type":"article","og_title":"New crypto-stealing malware lurks Windows 10 users","og_description":"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.","og_url":"https:\/\/alfacash.blog\/nl\/2021\/04\/26\/crypto-stelen-malware-windows-10-gebruikers\/","og_site_name":"alfa.cash blog","article_publisher":"https:\/\/www.facebook.com\/alfacashstore","article_published_time":"2021-04-26T01:34:00+00:00","article_modified_time":"2024-02-19T18:51:51+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","type":"image\/jpeg"}],"author":"Isabel P\u00e9rez","twitter_card":"summary_large_image","twitter_creator":"@AlfacashStore","twitter_site":"@AlfacashStore","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#article","isPartOf":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/"},"author":{"name":"Isabel P\u00e9rez","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749"},"headline":"New crypto-stealing malware lurks Windows 10 users","datePublished":"2021-04-26T01:34:00+00:00","dateModified":"2024-02-19T18:51:51+00:00","mainEntityOfPage":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/"},"wordCount":443,"publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"image":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","keywords":["cryptocurrencies","Cybersecurity","Games","hackers","malware","wallets","Windows"],"articleSection":["Market trends"],"inLanguage":"nl"},{"@type":"WebPage","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/","url":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/","name":"New crypto-stealing malware lurks Windows 10 users - alfa.cash blog","isPartOf":{"@id":"https:\/\/alfacash.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage"},"image":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","datePublished":"2021-04-26T01:34:00+00:00","dateModified":"2024-02-19T18:51:51+00:00","description":"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.","breadcrumb":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb"},"inLanguage":"nl","potentialAction":[{"@type":"ReadAction","target":["https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/"]}]},{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","width":270,"height":152,"caption":"crypto-stealing-malware-Windows"},{"@type":"BreadcrumbList","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/alfacash.blog\/"},{"@type":"ListItem","position":2,"name":"New crypto-stealing malware lurks Windows 10 users"}]},{"@type":"WebSite","@id":"https:\/\/alfacash.blog\/#website","url":"https:\/\/alfacash.blog\/","name":"Alfacash Blog","description":"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi","publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"alternateName":"alfacash.blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/alfacash.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl"},{"@type":"Organization","@id":"https:\/\/alfacash.blog\/#organization","name":"Alfacash Blog","alternateName":"alfacash.blog","url":"https:\/\/alfacash.blog\/","logo":{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","width":696,"height":696,"caption":"Alfacash Blog"},"image":{"@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/alfacashstore","https:\/\/x.com\/AlfacashStore","https:\/\/t.me\/AlfacashCommunity"]},{"@type":"Person","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749","name":"Isabel P\u00e9rez","image":{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","caption":"Isabel P\u00e9rez"},"description":"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.","sameAs":["https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/"],"url":"https:\/\/alfacash.blog\/nl\/author\/isabel\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/alfacash.blog\/nl\/wp-json\/wp\/v2\/posts\/7226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alfacash.blog\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alfacash.blog\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/nl\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/nl\/wp-json\/wp\/v2\/comments?post=7226"}],"version-history":[{"count":6,"href":"https:\/\/alfacash.blog\/nl\/wp-json\/wp\/v2\/posts\/7226\/revisions"}],"predecessor-version":[{"id":7238,"href":"https:\/\/alfacash.blog\/nl\/wp-json\/wp\/v2\/posts\/7226\/revisions\/7238"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/nl\/wp-json\/wp\/v2\/media\/7235"}],"wp:attachment":[{"href":"https:\/\/alfacash.blog\/nl\/wp-json\/wp\/v2\/media?parent=7226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alfacash.blog\/nl\/wp-json\/wp\/v2\/categories?post=7226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alfacash.blog\/nl\/wp-json\/wp\/v2\/tags?post=7226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}