{"id":4225,"date":"2020-10-04T04:51:17","date_gmt":"2020-10-04T01:51:17","guid":{"rendered":"https:\/\/alfacash.blog\/?p=4225"},"modified":"2024-02-19T21:53:10","modified_gmt":"2024-02-19T18:53:10","slug":"malware-pode-roubar-cryptos-como-evitar-isso","status":"publish","type":"post","link":"https:\/\/alfacash.blog\/pt\/2020\/10\/04\/malware-pode-roubar-cryptos-como-evitar-isso\/","title":{"rendered":"Malware que pode roubar todas as suas criptografias e como evit\u00e1-lo"},"content":{"rendered":"<p>O blockchain \u00e9 seguro e intranspon\u00edvel, dizem eles. Nossos criptoassets est\u00e3o l\u00e1 dentro, ent\u00e3o, a gente se sente muito confiante com nossos fundos ... porque eles est\u00e3o totalmente bem, com seguran\u00e7a de primeira linha, certo? Bem, a resposta para essa pergunta seria sim e n\u00e3o ao mesmo tempo.<\/p>\n\n\n\n<p>Sim, porque algu\u00e9m precisaria de um computador qu\u00e2ntico que ainda n\u00e3o existe para quebrar um <a href=\"https:\/\/alfacash.blog\/2020\/08\/30\/dummies-what-is-blockchain-how-it-works\/\" target=\"_blank\" rel=\"noreferrer noopener\">blockchain poderoso<\/a>; e n\u00e3o porque os fatores de risco v\u00e3o al\u00e9m disso, infelizmente. <strong>A quest\u00e3o \u00e9: um humano sempre pode ser enganado e enganado.<\/strong> As pr\u00f3prias pessoas s\u00e3o o calcanhar de Aquiles da seguran\u00e7a cibern\u00e9tica e ningu\u00e9m est\u00e1 isento de sofrer um ataque cibern\u00e9tico.<\/p>\n\n\n\n<p>\u00c9 por isso que devemos estar muito cientes das possibilidades ruins e do malware para evitar a todo custo. Previna antes da cura, ent\u00e3o, conhe\u00e7a aqui o malware que pode roubar todos os seus criptos e como cuidar disso.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Ransomware<\/strong><\/h2>\n\n\n\n<p>A palavra n\u00e3o foi colocada de forma arbitr\u00e1ria: ela vem da mistura de \u201cresgate\u201d e \u201cmalware\u201d e define muito bem o conceito. \u00c9 um tipo de malware que, uma vez instalado no seu dispositivo, criptografa os arquivos pessoais (documentos, imagens, \u00e1udio, v\u00eddeo ...) ou todo o disco r\u00edgido e pede um resgate (muitas vezes em criptomoeda) para devolv\u00ea-los.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"725\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-1024x725.jpg\" alt=\"\" class=\"wp-image-4230\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-1024x725.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-300x212.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-150x106.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-254x180.jpg 254w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-728x515.jpg 728w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-718x508.jpg 718w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-370x262.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-554x392.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-306x217.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-346x245.jpg 346w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-260x184.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-87x62.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Imagem de mohamed Hassan \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>No in\u00edcio de sua popularidade, l\u00e1 em 2013, os mais afetados por isso foram os dispositivos pessoais, e o resgate pedido por eles foi de 100 - 300 d\u00f3lares em <a href=\"https:\/\/alfacash.blog\/2020\/08\/20\/how-buy-bitcoin-simple-steps-nice-recipe\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bitcoin (BTC)<\/a>. Os hackers costumavam entregar instru\u00e7\u00f5es de uso da criptomoeda.<\/p>\n\n\n\n<p>At\u00e9 o momento, existem muitos tipos e evoluiu para um <a href=\"https:\/\/www.healthitoutcomes.com\/doc\/ransomware-cyber-crime-s-billion-dollar-industry-0001\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ind\u00fastria bilion\u00e1ria<\/a> no qual <strong>os mais afetados s\u00e3o empresas e n\u00e3o usu\u00e1rios pessoais<\/strong>. O resgate por eles agora pode chegar a milh\u00f5es de d\u00f3lares em Bitcoin, Monero (XMR), Zcash (ZEC) e outros criptoassets.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Como voc\u00ea \u00e9 infectado?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>E-mails com spam em sua caixa de entrada, entregando links duvidosos.<\/li><li>Downloads n\u00e3o oficiais de sites externos ou software P2P (como BitTorrent).<\/li><li>Explora\u00e7\u00f5es em sistemas operacionais (SO) n\u00e3o atualizados, ou seja, Windows XP ou vers\u00f5es antigas de firmware em <a href=\"https:\/\/alfacash.blog\/2020\/10\/02\/coffe-hijacked-mine-monero-other-things\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dispositivos IoT<\/a> (lembre-se desses tr\u00eas primeiros como a \u201ctr\u00edade do mal\u201d).<\/li><li>Um ataque direcionado especialmente planejado e projetado para um objetivo, geralmente institucional (organiza\u00e7\u00f5es e empresas).<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Dicas \u00fateis<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Mantenha atualizado o sistema operacional, antiv\u00edrus e firmware de todos os seus dispositivos inteligentes.<\/li><li>N\u00e3o abra links ou arquivos anexados de e-mails duvidosos.<\/li><li>Baixe arquivos e software apenas dos sites oficiais (lembre-se desses tr\u00eas primeiros como a \u201ctr\u00edade de escudo\u201d).<\/li><li>Fa\u00e7a backups de todas as suas informa\u00e7\u00f5es e arquivos importantes em dispositivos externos, de prefer\u00eancia offline.<\/li><li>Em caso de infec\u00e7\u00e3o, acesse sites de ajuda como <a href=\"https:\/\/www.nomoreransom.org\/en\/index.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Chega de resgate<\/a> ou ligue para a divis\u00e3o cibern\u00e9tica das autoridades locais. Pagar o resgate diretamente n\u00e3o \u00e9 recomendado e seu sucesso n\u00e3o \u00e9 garantido.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Keyloggers<\/strong><\/h2>\n\n\n\n<p>Podemos dizer que isso n\u00e3o \u00e9 <em>malware<\/em> per se, mas \u00e9 usado por cibercriminosos como uma ferramenta de espionagem. Assim como o ransomware, seu nome diz tudo: este \u00e9 um software ou hardware projetado para registrar (e frequentemente enviar) cada tecla digitada no teclado de um dispositivo. \u00c0s vezes, eles podem at\u00e9 gravar cliques, \u00e1udio e v\u00eddeo.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-1024x682.jpg\" alt=\"\" class=\"wp-image-4232\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Imagem de Gerd Altmann \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>Assim, se um <a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/keylogger\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">keylogger<\/a> \u00e9 instalado furtivamente em um dispositivo, <strong>\u00e9 capaz de registrar senhas e credenciais que mais tarde seriam enviadas a um hacker malicioso.<\/strong> Entre essas credenciais pode estar a senha ou chave privada de um <a href=\"https:\/\/alfacash.blog\/2020\/08\/18\/what-is-cryptocurrency-why-should-care-reasons\/\" target=\"_blank\" rel=\"noreferrer noopener\">carteira de criptomoeda<\/a>, o que significa que voc\u00ea seria roubado dessa forma.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Como voc\u00ea \u00e9 infectado?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>A tr\u00edade do mal, como dissemos antes.<\/li><li>Sites e extens\u00f5es de navegador falsos (phishing).<\/li><li>Dom\u00ednios da web infectados, o que significa ataques direcionados a servi\u00e7os como lojas e trocas vulner\u00e1veis.<\/li><li>Algu\u00e9m deixou um pequeno dispositivo engra\u00e7ado conectado ao seu computador, como um adaptador USB duvidoso ou um fio extra (\u00e9 um keylogger de hardware).<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Dicas \u00fateis<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Aplique a tr\u00edade de escudo confi\u00e1vel, como dissemos antes.<\/li><li>Al\u00e9m do antiv\u00edrus, certifique-se de ter uma solu\u00e7\u00e3o de ciberseguran\u00e7a chamada anti-keylogger.<\/li><li>Registre suas credenciais e senhas no navegador de seu dispositivo normal ou use um software para administrar suas credenciais.<\/li><li>Evite sites e aplicativos de phishing apenas olhando o URL, que \u00e9 sempre diferente do original.<\/li><li>Preste aten\u00e7\u00e3o nas novidades de seus sites e servi\u00e7os favoritos: eles devem anunciar seus clientes se estiverem sob ataque cibern\u00e9tico.<\/li><li>N\u00e3o deixe hardware desconhecido conectado em seu dispositivo.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Trojan de acesso remoto (RAT)<\/strong><\/h2>\n\n\n\n<p>Esta \u00e9 uma infec\u00e7\u00e3o muito ruim, porque nada mais \u00e9 do que uma porta dos fundos aberta para permitir que hackers entrem e controlem seu dispositivo remotamente. Uma vez instalado o software, o RAT permite o controle administrativo, <strong>o que significa que seu hacker pode ver e fazer quase tudo o que quiserem no dispositivo,<\/strong> desde monitorar os dados e o comportamento silenciosamente para distribuir outro malware e formatar unidades.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-1024x682.jpg\" alt=\"\" class=\"wp-image-4233\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Imagem de StockSnap \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>Claro, eles tamb\u00e9m podem roubar seus criptos, bastando inserir na sua carteira ap\u00f3s registrar seus movimentos. E voc\u00ea provavelmente n\u00e3o notar\u00e1 este software furtivo antes que seja tarde demais.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Como voc\u00ea \u00e9 infectado?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>A tr\u00edade do mal, pior do que nunca. Na verdade, \u00e9 muito comum encontr\u00e1-lo escondido dentro de jogos e softwares crackeados.<\/li><li>Usando duvidoso <a href=\"https:\/\/themerkle.com\/open-source-remote-access-trojan-targets-telegram-users\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">bots no Telegram<\/a>.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Dicas \u00fateis<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Aplique a tr\u00edade de escudo e voc\u00ea ficar\u00e1 bem!<\/li><li>Al\u00e9m disso, voc\u00ea sempre pode procurar coment\u00e1rios e an\u00e1lises de outros usu\u00e1rios sobre os aplicativos e programas que deseja baixar. Incluindo os bots no Telegram, sim.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Sequestrador de Clipper \/ Clipboard<\/strong><\/h2>\n\n\n\n<p>Os cibercriminosos conhecem muito bem as maneiras gerais dos usu\u00e1rios de criptomoedas. Eles sabem, por exemplo, que ningu\u00e9m escreve \u00e0 m\u00e3o os endere\u00e7os de carteira longos e complexos, mas os copia e cola quando \u00e9 necess\u00e1rio. Esse \u00e9 exatamente o ponto que eles escolhem para sequestrar os endere\u00e7os originais e substitu\u00ed-los por seus pr\u00f3prios, usando um software malicioso chamado \u201cClipper\u201d ou \u201cClipboard hijacker\u201d.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"665\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-1024x665.jpg\" alt=\"\" class=\"wp-image-4234\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-1024x665.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-300x195.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-150x97.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-270x175.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-770x500.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-782x508.jpg 782w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-793x515.jpg 793w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-370x240.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-554x360.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-306x199.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-260x169.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-87x56.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Imagem de Pete Linforth \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>A principal coisa que esse malware faz \u00e9 <strong>sequestrar a \u00e1rea de transfer\u00eancia no dispositivo do usu\u00e1rio e detectar quando um endere\u00e7o de carteira criptografada \u00e9 copiado pelo propriet\u00e1rio<\/strong>. Ent\u00e3o, esse \u00e9 substitu\u00eddo pelo endere\u00e7o da carteira do hacker, ent\u00e3o, se o usu\u00e1rio n\u00e3o prestar aten\u00e7\u00e3o, pode acabar enviando o dinheiro para o destino errado.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Como voc\u00ea \u00e9 infectado?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Tr\u00edade do mal novamente, sim. Desta vez, o mais comum <a href=\"https:\/\/www.binarydefense.com\/threat_watch\/clipper-cryptocurrency-stealing-malware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">vetor de infec\u00e7\u00e3o<\/a> s\u00e3o apps falsos ou infectados na Play Store.<\/li><li>Adobe Flash ou outros banners falsos em sites duvidosos.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Dicas \u00fateis<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Aplique a tr\u00edade de escudo (funciona para quase tudo).<\/li><li>Preste aten\u00e7\u00e3o aos endere\u00e7os das carteiras! N\u00e3o importa se voc\u00ea acha que n\u00e3o tem nenhum aparador no seu dispositivo (eles n\u00e3o produzem nenhum sintoma vis\u00edvel). Compare e verifique seu endere\u00e7o original e a vers\u00e3o colada duas vezes antes de compartilhar ou enviar.<\/li><li>Se poss\u00edvel, prefira usar seus fundos por meio de c\u00f3digos QR em vez de texto.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Phishing<\/strong><\/h2>\n\n\n\n<p>N\u00f3s podemos dizer <a href=\"https:\/\/www.phishing.org\/what-is-phishing\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">o phishing<\/a> \u00e9 parcialmente malware e parcialmente scam porque \u00e9 apenas uma vers\u00e3o falsa de algo (site, aplicativo, software, mensagem, chamada ...), especialmente projetada <a href=\"https:\/\/alfacash.blog\/2020\/09\/07\/getting-rich-wrecking-most-popular-cryptocurrency-myths\/\" target=\"_blank\" rel=\"noreferrer noopener\">para enganar as pessoas<\/a> e obter deles informa\u00e7\u00f5es valiosas, como credenciais e chaves de banco ou criptomoeda. Assim, os hackers clonam sites ou software, ou se fazem passar por algum servi\u00e7o, empresa ou pessoa por e-mail ou liga\u00e7\u00e3o para atingir seus objetivos maliciosos.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-1024x682.jpg\" alt=\"\" class=\"wp-image-4235\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Imagem por leo2014 \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>Voc\u00ea pode descobrir l\u00e1 uma vers\u00e3o falsa de seu <a href=\"https:\/\/www.alfa.cash\/pt\" target=\"_blank\" rel=\"noreferrer noopener\">troca confi\u00e1vel de criptomoedas<\/a>, por exemplo. <strong>Parece id\u00eantico, mas, ao mesmo tempo, algumas coisas est\u00e3o erradas.<\/strong> Talvez seja m\u00e1 gram\u00e1tica, links quebrados ou textos ausentes; mas h\u00e1 algo nos sites de phishing que sempre os denuncia: o URL.<\/p>\n\n\n\n<p>N\u00e3o pode ser exatamente o mesmo dom\u00ednio do original (porque voc\u00ea deve comprar um dom\u00ednio e n\u00e3o pode comprar algo que o propriet\u00e1rio leg\u00edtimo n\u00e3o esteja vendendo). Eles s\u00e3o sempre semelhantes, mas pelo menos um caractere ser\u00e1 alterado (ou seja, www.<strong>alfa<\/strong>.cash vs www.<strong>alfaexchange<\/strong>.dinheiro). E \u00e9 o mesmo para endere\u00e7os de e-mail: se n\u00e3o tiver o dom\u00ednio original da empresa (ou seja, hr @<strong>alfa.im <\/strong>vs hr @<strong>gmail.com<\/strong>), voc\u00ea deve suspeitar imediatamente.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Como voc\u00ea \u00e9 infectado?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Tr\u00edade do mal, especialmente por e-mail.<\/li><li>Adicionais duvidosos na parte superior dos resultados do navegador. Qualquer pessoa (at\u00e9 mesmo atores mal-intencionados) pode pagar por esse tipo de adi\u00e7\u00e3o, ent\u00e3o, eles estar\u00e3o l\u00e1 at\u00e9 que algu\u00e9m denuncie.<\/li><li>O hacker \/ scammer encontrado <a href=\"https:\/\/alfacash.blog\/2020\/08\/26\/easiest-guide-top-up-phone-cryptocurrencies\/\" target=\"_blank\" rel=\"noreferrer noopener\">seu telefone<\/a> de alguma forma e est\u00e1 chamando voc\u00ea, personificando alguma autoridade.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Dicas \u00fateis<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Proteja a tr\u00edade no resgate novamente.<\/li><li>Acesse seus sites mais usados por meio da lista de marcadores \/ favoritos e evite os resultados do navegador o m\u00e1ximo que puder.<\/li><li>Suspeite de qualquer mensagem \/ e-mail \/ liga\u00e7\u00e3o em que algu\u00e9m esteja solicitando credenciais pessoais ou dinheiro. Lembre-se: as empresas \/ organiza\u00e7\u00f5es n\u00e3o costumam fazer isso.<\/li><li>Se voc\u00ea for enviar \/ receber criptomoedas por meio de um site ou aplicativo, verifique sempre a URL e as avalia\u00e7\u00f5es anteriores.<\/li><\/ul>\n\n\n\n<p>Mas acima de tudo, n\u00e3o se preocupe! Proteger voc\u00ea e suas criptomoedas \u00e9 f\u00e1cil. Basta seguir nossas dicas \u00fateis e voc\u00ea ficar\u00e1 totalmente bem.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"has-text-align-center\"><em>Quer negociar BTC, ETH e outros tokens? Voc\u00ea consegue<\/em>\u00a0<em>com seguran\u00e7a\u00a0<a href=\"https:\/\/www.alfa.cash\/buy\/bitcoin\" target=\"_blank\" rel=\"noreferrer noopener\">em Alfacash<\/a>! E n\u00e3o se esque\u00e7a de que estamos falando sobre isso e muitas outras coisas em nossas redes sociais.<br><br><\/em><a href=\"https:\/\/twitter.com\/alfacash_crypto\" target=\"_blank\" rel=\"noreferrer noopener\">Twitter<\/a>\u00a0*\u00a0<a href=\"https:\/\/t.me\/AlfacashCommunity\" target=\"_blank\" rel=\"noreferrer noopener\">Telegrama<\/a>\u00a0*\u00a0<a href=\"https:\/\/www.instagram.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Instagram<\/a> * <a href=\"https:\/\/www.youtube.com\/channel\/UCOl4fdRHj8AseQ5b6z9udaw\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>\u00a0*<a href=\"https:\/\/www.facebook.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook<\/a>\u00a0\u00a0*\u00a0<a href=\"https:\/\/vk.com\/alfacashcrypto\" target=\"_blank\" rel=\"noreferrer noopener\">Vkontakte<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Dentro do mundo criptogr\u00e1fico, devemos estar muito cientes das possibilidades ruins. Ent\u00e3o, conhe\u00e7a aqui o malware que pode roubar todos os seus cryptos e como evit\u00e1-lo.<\/p>","protected":false},"author":5,"featured_media":4228,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[48],"tags":[133,42,132,127,134,129,131],"class_list":{"0":"post-4225","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-learn","8":"tag-clipper","9":"tag-cryptocurrency","10":"tag-keylogger","11":"tag-malware","12":"tag-phishing","13":"tag-ransomware","14":"tag-rat"},"featured_image_src":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","author_info":{"display_name":"Isabel P\u00e9rez","author_link":"https:\/\/alfacash.blog\/pt\/author\/isabel\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malware that can steal all your cryptos and how to avoid it - alfa.cash blog<\/title>\n<meta name=\"description\" content=\"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/alfacash.blog\/pt\/2020\/10\/04\/malware-pode-roubar-cryptos-como-evitar-isso\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware that can steal all your cryptos and how to avoid it\" \/>\n<meta property=\"og:description\" content=\"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/alfacash.blog\/pt\/2020\/10\/04\/malware-pode-roubar-cryptos-como-evitar-isso\/\" \/>\n<meta property=\"og:site_name\" content=\"alfa.cash blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/alfacashstore\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-04T01:51:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T18:53:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2123\" \/>\n\t<meta property=\"og:image:height\" content=\"1120\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Isabel P\u00e9rez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AlfacashStore\" \/>\n<meta name=\"twitter:site\" content=\"@AlfacashStore\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\"},\"author\":{\"name\":\"Isabel P\u00e9rez\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\"},\"headline\":\"Malware that can steal all your cryptos and how to avoid it\",\"datePublished\":\"2020-10-04T01:51:17+00:00\",\"dateModified\":\"2024-02-19T18:53:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\"},\"wordCount\":1511,\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"keywords\":[\"Clipper\",\"cryptocurrency\",\"Keylogger\",\"malware\",\"Phishing\",\"Ransomware\",\"RAT\"],\"articleSection\":[\"Learn\"],\"inLanguage\":\"pt-PT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\",\"url\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\",\"name\":\"Malware that can steal all your cryptos and how to avoid it - alfa.cash blog\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"datePublished\":\"2020-10-04T01:51:17+00:00\",\"dateModified\":\"2024-02-19T18:53:10+00:00\",\"description\":\"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.\",\"breadcrumb\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"width\":270,\"height\":142,\"caption\":\"Malware-steal-cryptocurrency-tips\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/alfacash.blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware that can steal all your cryptos and how to avoid it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/alfacash.blog\/#website\",\"url\":\"https:\/\/alfacash.blog\/\",\"name\":\"Alfacash Blog\",\"description\":\"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi\",\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"alternateName\":\"alfacash.blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/alfacash.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/alfacash.blog\/#organization\",\"name\":\"Alfacash Blog\",\"alternateName\":\"alfacash.blog\",\"url\":\"https:\/\/alfacash.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"width\":696,\"height\":696,\"caption\":\"Alfacash Blog\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/alfacashstore\",\"https:\/\/x.com\/AlfacashStore\",\"https:\/\/t.me\/AlfacashCommunity\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\",\"name\":\"Isabel P\u00e9rez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"caption\":\"Isabel P\u00e9rez\"},\"description\":\"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/\"],\"url\":\"https:\/\/alfacash.blog\/pt\/author\/isabel\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Malware that can steal all your cryptos and how to avoid it - alfa.cash blog","description":"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/alfacash.blog\/pt\/2020\/10\/04\/malware-pode-roubar-cryptos-como-evitar-isso\/","og_locale":"pt_PT","og_type":"article","og_title":"Malware that can steal all your cryptos and how to avoid it","og_description":"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.","og_url":"https:\/\/alfacash.blog\/pt\/2020\/10\/04\/malware-pode-roubar-cryptos-como-evitar-isso\/","og_site_name":"alfa.cash blog","article_publisher":"https:\/\/www.facebook.com\/alfacashstore","article_published_time":"2020-10-04T01:51:17+00:00","article_modified_time":"2024-02-19T18:53:10+00:00","og_image":[{"width":2123,"height":1120,"url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","type":"image\/jpeg"}],"author":"Isabel P\u00e9rez","twitter_card":"summary_large_image","twitter_creator":"@AlfacashStore","twitter_site":"@AlfacashStore","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#article","isPartOf":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/"},"author":{"name":"Isabel P\u00e9rez","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749"},"headline":"Malware that can steal all your cryptos and how to avoid it","datePublished":"2020-10-04T01:51:17+00:00","dateModified":"2024-02-19T18:53:10+00:00","mainEntityOfPage":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/"},"wordCount":1511,"publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"image":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","keywords":["Clipper","cryptocurrency","Keylogger","malware","Phishing","Ransomware","RAT"],"articleSection":["Learn"],"inLanguage":"pt-PT"},{"@type":"WebPage","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/","url":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/","name":"Malware that can steal all your cryptos and how to avoid it - alfa.cash blog","isPartOf":{"@id":"https:\/\/alfacash.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage"},"image":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","datePublished":"2020-10-04T01:51:17+00:00","dateModified":"2024-02-19T18:53:10+00:00","description":"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.","breadcrumb":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","width":270,"height":142,"caption":"Malware-steal-cryptocurrency-tips"},{"@type":"BreadcrumbList","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/alfacash.blog\/"},{"@type":"ListItem","position":2,"name":"Malware that can steal all your cryptos and how to avoid it"}]},{"@type":"WebSite","@id":"https:\/\/alfacash.blog\/#website","url":"https:\/\/alfacash.blog\/","name":"Alfacash Blog","description":"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi","publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"alternateName":"alfacash.blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/alfacash.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/alfacash.blog\/#organization","name":"Alfacash Blog","alternateName":"alfacash.blog","url":"https:\/\/alfacash.blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","width":696,"height":696,"caption":"Alfacash Blog"},"image":{"@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/alfacashstore","https:\/\/x.com\/AlfacashStore","https:\/\/t.me\/AlfacashCommunity"]},{"@type":"Person","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749","name":"Isabel P\u00e9rez","image":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","caption":"Isabel P\u00e9rez"},"description":"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.","sameAs":["https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/"],"url":"https:\/\/alfacash.blog\/pt\/author\/isabel\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/posts\/4225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/comments?post=4225"}],"version-history":[{"count":4,"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/posts\/4225\/revisions"}],"predecessor-version":[{"id":8756,"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/posts\/4225\/revisions\/8756"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/media\/4228"}],"wp:attachment":[{"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/media?parent=4225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/categories?post=4225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/tags?post=4225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}