{"id":7226,"date":"2021-04-26T04:34:00","date_gmt":"2021-04-26T01:34:00","guid":{"rendered":"https:\/\/alfacash.blog\/?p=7226"},"modified":"2024-02-19T21:51:51","modified_gmt":"2024-02-19T18:51:51","slug":"crypto-stealing-malware-windows-10-users","status":"publish","type":"post","link":"https:\/\/alfacash.blog\/pt\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/","title":{"rendered":"Novo malware para roubo de criptografia espreita os usu\u00e1rios do Windows 10"},"content":{"rendered":"<p>Os hackers nunca fazem uma pausa, muito menos se o mercado de criptomoedas estiver em alta. Suas criptomoedas podem estar seguras em seu dispositivo ou bolsa favorita, mas eles sempre t\u00eam seus meios para roubar as moedas. <strong>Um malware para roubo de criptografia disfar\u00e7ado como um recurso do Windows 10 \u00e9 a \u00faltima dessas formas.<\/strong><\/p>\n\n\n\n<p>Para ser mais espec\u00edfico, os hackers criaram um <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-microsoft-directx-12-site-pushes-crypto-stealing-malware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">site falso<\/a> para baixar DirectX 12 no Windows 10. Este pacote de funcionalidades visa desenvolver e rodar conte\u00fado multim\u00eddia, especialmente videogames. Portanto, muitos jogadores, por exemplo, podem querer atualizar o DirectX e encontrar a terr\u00edvel surpresa.<\/p>\n\n\n\n<p>A p\u00e1gina de phishing foi projetada para detalhes. Inclui pol\u00edtica de privacidade, aviso legal, formul\u00e1rio de contato e, \u00e0 primeira vista, tudo o que uma web leg\u00edtima deve ter. Se o usu\u00e1rio clicar nos bot\u00f5es de download, ele ser\u00e1 redirecionado para uma p\u00e1gina externa para obter os arquivos. <strong>Uma vez instalado, o malware ir\u00e1 coletar silenciosamente os dados do usu\u00e1rio<\/strong>, incluindo cookies, arquivos e informa\u00e7\u00f5es sobre o sistema e programas. Pode at\u00e9 fazer capturas de tela.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"797\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-1024x797.jpg\" alt=\"exploit-bug-crypto-defi\" class=\"wp-image-6091\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-1024x797.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-300x233.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-150x117.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-15x12.jpg 15w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-231x180.jpg 231w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-662x515.jpg 662w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-653x508.jpg 653w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-370x288.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-554x431.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-306x238.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-315x245.jpg 315w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-257x200.jpg 257w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280-87x67.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/11\/bug-4297771_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Mas provavelmente a pior parte \u00e9 que o malware procura carteiras de criptomoedas dentro do sistema para roubar as credenciais, senhas e, em \u00faltima an\u00e1lise, os fundos armazenados nelas. Assim, o software malicioso pode identificar carteiras como <a href=\"https:\/\/alfacash.blog\/2020\/12\/12\/new-campaign-fake-ledger-emails-can-steal-crypto\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ledger Live<\/a>, Waves.Exchange, Coinomi, Electrum, Electron Cash, BTCP Electrum, Jaxx, Exodus, MultiBit HD, Aomtic e <a href=\"https:\/\/alfacash.blog\/2021\/03\/29\/discover-monero-how-use-it-full-privacy\/\" target=\"_blank\" rel=\"noreferrer noopener\">Monero<\/a>.<\/p>\n\n\n\n<p>Todos os dados roubados s\u00e3o compactados e enviados automaticamente para os hackers envolvidos. Ent\u00e3o, todos <a href=\"https:\/\/alfacash.blog\/2021\/02\/03\/how-to-choose-first-crypto-wallet-tips-tricks\/\" target=\"_blank\" rel=\"noreferrer noopener\">suas carteiras<\/a> pode ser esvaziado em nenhum momento se voc\u00ea n\u00e3o for cuidadoso o suficiente.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Evite malware para roubo de criptografia<\/strong><\/h2>\n\n\n\n<p>O acima mencionado \u00e9 um caso cl\u00e1ssico de phishing. Vamos lembrar que <strong>phishing ocorre quando alguns hackers fazem uma vers\u00e3o falsa de algo<\/strong> (site, aplicativo, software, mensagem, chamada ...) para enganar as pessoas e obter delas informa\u00e7\u00f5es valiosas, como banco ou <a href=\"https:\/\/alfacash.blog\/2020\/08\/18\/what-is-cryptocurrency-why-should-care-reasons\/\" target=\"_blank\" rel=\"noreferrer noopener\">criptomoeda<\/a> credenciais e chaves.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-1024x682.jpg\" alt=\"\" class=\"wp-image-5920\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/scam-4126798_1280-1.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p>Assim, os hackers clonam sites ou software ou se fazem passar por algum servi\u00e7o, empresa ou pessoa por e-mail ou chamada para atingir seus objetivos maliciosos. Evite este tipo de <a href=\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware para roubo de criptografia<\/a> \u00e9 meio f\u00e1cil, no entanto.<\/p>\n\n\n\n<p><strong>Em primeiro lugar, baixe arquivos e software apenas dos sites oficiais<\/strong> (Microsoft, neste caso). Verifique duas vezes os URLs para ter certeza. Da mesma forma, \u00e9 importante manter atualizado o SO, antiv\u00edrus e firmware de todos os seus dispositivos inteligentes e n\u00e3o abrir links ou arquivos anexados de e-mails duvidosos.<\/p>\n\n\n\n<p><br><em>Imagem em destaque por Elchinator \/ Pixabay<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"has-text-align-center\"><em>Quer trocar Bitcoin e outros tokens? Voc\u00ea consegue<\/em>&nbsp;<em>com seguran\u00e7a&nbsp;<\/em><em><a href=\"https:\/\/www.alfa.cash\/buy\/bitcoin\" target=\"_blank\" rel=\"noreferrer noopener\">em Alfacash<\/a><\/em><em>! E n\u00e3o se esque\u00e7a de que estamos falando sobre isso e muitas outras coisas em nossas redes sociais.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/twitter.com\/alfacash_crypto\" target=\"_blank\" rel=\"noreferrer noopener\">Twitter<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/t.me\/AlfacashCommunity\" target=\"_blank\" rel=\"noreferrer noopener\">Telegrama<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/www.facebook.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/www.instagram.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Instagram<\/a> * <a href=\"https:\/\/www.youtube.com\/channel\/UCOl4fdRHj8AseQ5b6z9udaw\" target=\"_blank\" rel=\"noreferrer noopener\">YouTube<\/a>&nbsp;*&nbsp;<a href=\"https:\/\/vk.com\/alfacashcrypto\" target=\"_blank\" rel=\"noreferrer noopener\">Vkontakte<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Os hackers n\u00e3o descansam, ent\u00e3o agora temos que enfrentar uma nova variedade de malware para roubo de criptografia. Desta vez, as principais v\u00edtimas s\u00e3o os usu\u00e1rios do Windows 10.<\/p>","protected":false},"author":5,"featured_media":7235,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[47],"tags":[61,135,282,231,127,60,320],"class_list":{"0":"post-7226","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-market-trends-alfacash","8":"tag-cryptocurrencies","9":"tag-cybersecurity","10":"tag-games","11":"tag-hackers","12":"tag-malware","13":"tag-wallets","14":"tag-windows"},"featured_image_src":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","author_info":{"display_name":"Isabel P\u00e9rez","author_link":"https:\/\/alfacash.blog\/pt\/author\/isabel\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New crypto-stealing malware lurks Windows 10 users - alfa.cash blog<\/title>\n<meta name=\"description\" content=\"Hackers don&#039;t rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/alfacash.blog\/pt\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New crypto-stealing malware lurks Windows 10 users\" \/>\n<meta property=\"og:description\" content=\"Hackers don&#039;t rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/alfacash.blog\/pt\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\" \/>\n<meta property=\"og:site_name\" content=\"alfa.cash blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/alfacashstore\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-26T01:34:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T18:51:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Isabel P\u00e9rez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AlfacashStore\" \/>\n<meta name=\"twitter:site\" content=\"@AlfacashStore\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\"},\"author\":{\"name\":\"Isabel P\u00e9rez\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\"},\"headline\":\"New crypto-stealing malware lurks Windows 10 users\",\"datePublished\":\"2021-04-26T01:34:00+00:00\",\"dateModified\":\"2024-02-19T18:51:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\"},\"wordCount\":443,\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"keywords\":[\"cryptocurrencies\",\"Cybersecurity\",\"Games\",\"hackers\",\"malware\",\"wallets\",\"Windows\"],\"articleSection\":[\"Market trends\"],\"inLanguage\":\"pt-PT\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\",\"url\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\",\"name\":\"New crypto-stealing malware lurks Windows 10 users - alfa.cash blog\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"datePublished\":\"2021-04-26T01:34:00+00:00\",\"dateModified\":\"2024-02-19T18:51:51+00:00\",\"description\":\"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.\",\"breadcrumb\":{\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg\",\"width\":270,\"height\":152,\"caption\":\"crypto-stealing-malware-Windows\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/alfacash.blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New crypto-stealing malware lurks Windows 10 users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/alfacash.blog\/#website\",\"url\":\"https:\/\/alfacash.blog\/\",\"name\":\"Alfacash Blog\",\"description\":\"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi\",\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"alternateName\":\"alfacash.blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/alfacash.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/alfacash.blog\/#organization\",\"name\":\"Alfacash Blog\",\"alternateName\":\"alfacash.blog\",\"url\":\"https:\/\/alfacash.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"width\":696,\"height\":696,\"caption\":\"Alfacash Blog\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/alfacashstore\",\"https:\/\/x.com\/AlfacashStore\",\"https:\/\/t.me\/AlfacashCommunity\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\",\"name\":\"Isabel P\u00e9rez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"caption\":\"Isabel P\u00e9rez\"},\"description\":\"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/\"],\"url\":\"https:\/\/alfacash.blog\/pt\/author\/isabel\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"New crypto-stealing malware lurks Windows 10 users - alfa.cash blog","description":"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/alfacash.blog\/pt\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/","og_locale":"pt_PT","og_type":"article","og_title":"New crypto-stealing malware lurks Windows 10 users","og_description":"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.","og_url":"https:\/\/alfacash.blog\/pt\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/","og_site_name":"alfa.cash blog","article_publisher":"https:\/\/www.facebook.com\/alfacashstore","article_published_time":"2021-04-26T01:34:00+00:00","article_modified_time":"2024-02-19T18:51:51+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","type":"image\/jpeg"}],"author":"Isabel P\u00e9rez","twitter_card":"summary_large_image","twitter_creator":"@AlfacashStore","twitter_site":"@AlfacashStore","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#article","isPartOf":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/"},"author":{"name":"Isabel P\u00e9rez","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749"},"headline":"New crypto-stealing malware lurks Windows 10 users","datePublished":"2021-04-26T01:34:00+00:00","dateModified":"2024-02-19T18:51:51+00:00","mainEntityOfPage":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/"},"wordCount":443,"publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"image":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","keywords":["cryptocurrencies","Cybersecurity","Games","hackers","malware","wallets","Windows"],"articleSection":["Market trends"],"inLanguage":"pt-PT"},{"@type":"WebPage","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/","url":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/","name":"New crypto-stealing malware lurks Windows 10 users - alfa.cash blog","isPartOf":{"@id":"https:\/\/alfacash.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage"},"image":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","datePublished":"2021-04-26T01:34:00+00:00","dateModified":"2024-02-19T18:51:51+00:00","description":"Hackers don't rest, so we now have to face a new variety of crypto-stealing malware. This time, the main victims are Windows 10 users.","breadcrumb":{"@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#primaryimage","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2021\/04\/malicious-code-4036349_1280-scaled.jpg","width":270,"height":152,"caption":"crypto-stealing-malware-Windows"},{"@type":"BreadcrumbList","@id":"https:\/\/alfacash.blog\/2021\/04\/26\/crypto-stealing-malware-windows-10-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/alfacash.blog\/"},{"@type":"ListItem","position":2,"name":"New crypto-stealing malware lurks Windows 10 users"}]},{"@type":"WebSite","@id":"https:\/\/alfacash.blog\/#website","url":"https:\/\/alfacash.blog\/","name":"Alfacash Blog","description":"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi","publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"alternateName":"alfacash.blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/alfacash.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/alfacash.blog\/#organization","name":"Alfacash Blog","alternateName":"alfacash.blog","url":"https:\/\/alfacash.blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","width":696,"height":696,"caption":"Alfacash Blog"},"image":{"@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/alfacashstore","https:\/\/x.com\/AlfacashStore","https:\/\/t.me\/AlfacashCommunity"]},{"@type":"Person","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749","name":"Isabel P\u00e9rez","image":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","caption":"Isabel P\u00e9rez"},"description":"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.","sameAs":["https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/"],"url":"https:\/\/alfacash.blog\/pt\/author\/isabel\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/posts\/7226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/comments?post=7226"}],"version-history":[{"count":6,"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/posts\/7226\/revisions"}],"predecessor-version":[{"id":7238,"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/posts\/7226\/revisions\/7238"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/media\/7235"}],"wp:attachment":[{"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/media?parent=7226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/categories?post=7226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alfacash.blog\/pt\/wp-json\/wp\/v2\/tags?post=7226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}