{"id":4225,"date":"2020-10-04T04:51:17","date_gmt":"2020-10-04T01:51:17","guid":{"rendered":"https:\/\/alfacash.blog\/?p=4225"},"modified":"2024-02-19T21:53:10","modified_gmt":"2024-02-19T18:53:10","slug":"malware-poate-fura-cryptos-cum-evita-l","status":"publish","type":"post","link":"https:\/\/alfacash.blog\/ro\/2020\/10\/04\/malware-poate-fura-cryptos-cum-evita-l\/","title":{"rendered":"Programele malware care v\u0103 pot fura toate criptotipul \u0219i cum s\u0103 le evita\u021bi"},"content":{"rendered":"<p>Blockchain-ul este sigur \u0219i neacordabil, spun ei. Criptocasetele noastre sunt acolo, a\u0219a c\u0103 ne sim\u021bim at\u00e2t de \u00eencrez\u0103tori \u00een fondurile noastre ... pentru c\u0103 sunt complet bine, cu securitate de v\u00e2rf, nu? Ei bine, r\u0103spunsul la acesta ar fi da \u0219i nu \u00een acela\u0219i timp.<\/p>\n\n\n\n<p>Da, pentru c\u0103 cineva ar avea nevoie de un computer cuantic care nu exist\u0103 \u00eenc\u0103 pentru a sparge un <a href=\"https:\/\/alfacash.blog\/2020\/08\/30\/dummies-what-is-blockchain-how-it-works\/\" target=\"_blank\" rel=\"noreferrer noopener\">blockchain puternic<\/a>; \u0219i nu, deoarece factorii de risc dep\u0103\u0219esc acest lucru, din p\u0103cate. <strong>Lucrul este c\u0103 un om poate fi \u00eentotdeauna atras \u0219i p\u0103c\u0103lit.<\/strong> Oamenii \u00een\u0219i\u0219i sunt c\u0103lc\u00e2iul lui Ahile \u00een securitatea cibernetic\u0103 \u0219i nimeni nu este scutit de a suferi un atac cibernetic.<\/p>\n\n\n\n<p>De aceea, ar trebui s\u0103 fim foarte con\u0219tien\u021bi de posibilit\u0103\u021bile proaste \u0219i malware-ul pe care s\u0103 le evit\u0103m cu orice pre\u021b. Preveni\u021bi \u00eenainte de vindecare, deci, \u00eent\u00e2lni\u021bi aici malware-ul care v\u0103 poate fura toate criptotipul \u0219i cum s\u0103 ave\u021bi grij\u0103 de el.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Ransomware<\/strong><\/h2>\n\n\n\n<p>Cuv\u00e2ntul nu a fost pus laolalt\u0103 \u00een mod arbitrar: provine din amestecul \u201er\u0103scump\u0103rare\u201d \u0219i \u201emalware\u201d \u0219i define\u0219te foarte bine conceptul. Acesta este un fel de malware care, odat\u0103 instalat pe dispozitivul dvs., cripteaz\u0103 fi\u0219ierele personale (documente, imagini, audio, video ...) sau \u00eentregul hard disk \u0219i v\u0103 solicit\u0103 o r\u0103scump\u0103rare (adesea \u00een criptomoned\u0103) pentru a le returna.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"725\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-1024x725.jpg\" alt=\"\" class=\"wp-image-4230\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-1024x725.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-300x212.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-150x106.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-254x180.jpg 254w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-728x515.jpg 728w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-718x508.jpg 718w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-370x262.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-554x392.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-306x217.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-346x245.jpg 346w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-260x184.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280-87x62.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/ransomware-5231739_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Imagine de mohamed Hassan \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>La \u00eenceputul popularit\u0103\u021bii sale, acolo, \u00een 2013, cei mai afecta\u021bi au fost dispozitivele personale, iar r\u0103scump\u0103rarea cerut\u0103 pentru acestea a fost de 100 - 300 USD \u00een <a href=\"https:\/\/alfacash.blog\/2020\/08\/20\/how-buy-bitcoin-simple-steps-nice-recipe\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bitcoin (BTC)<\/a>. Hackerii obi\u0219nuiau chiar s\u0103 ofere instruc\u021biuni de utilizare a criptomonedei.<\/p>\n\n\n\n<p>P\u00e2n\u0103 \u00een prezent, exist\u0103 o mul\u021bime de tipuri \u0219i a evoluat \u00eentr-un <a href=\"https:\/\/www.healthitoutcomes.com\/doc\/ransomware-cyber-crime-s-billion-dollar-industry-0001\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">industrie miliardar\u0103<\/a> in care <strong>cele mai afectate sunt companiile \u0219i nu utilizatorii personali<\/strong>. R\u0103scump\u0103rarea pentru ei acum se poate ridica la milioane de dolari \u00een Bitcoin, Monero (XMR), Zcash (ZEC) \u0219i alte cripto-active.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Cum te infectezi?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Trimite\u021bi e-mailuri spam \u00een Mesaje primite, oferind linkuri dubioase.<\/li><li>Desc\u0103rc\u0103ri neoficiale de pe site-uri web externe sau software P2P (cum ar fi BitTorrent).<\/li><li>Exploat\u0103ri \u00een sisteme operative (SO) neactualizate, adic\u0103 Windows XP sau versiuni vechi de firmware \u00een <a href=\"https:\/\/alfacash.blog\/2020\/10\/02\/coffe-hijacked-mine-monero-other-things\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dispozitive IoT<\/a> (aminti\u021bi-v\u0103 aceste primele trei ca \u201etriada malefic\u0103\u201d).<\/li><li>Un atac special planificat \u0219i conceput pentru un singur obiectiv, adesea institu\u021bional (organiza\u021bii \u0219i companii).<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Sfaturi utile<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>P\u0103stra\u021bi actualizat sistemul de operare, antivirusul \u0219i firmware-ul tuturor dispozitivelor dvs. inteligente.<\/li><li>Nu deschide\u021bi linkuri sau fi\u0219iere ata\u0219ate din e-mailuri dubioase.<\/li><li>Desc\u0103rca\u021bi fi\u0219iere \u0219i software numai de pe site-urile oficiale (aminti\u021bi-v\u0103 aceste trei ca \u201etriada scutului\u201d).<\/li><li>Face\u021bi copii de siguran\u021b\u0103 ale tuturor informa\u021biilor \u0219i fi\u0219ierelor dvs. importante pe dispozitive externe, de preferin\u021b\u0103 offline.<\/li><li>\u00cen caz de infec\u021bie, accesa\u021bi site-uri web de ajutor precum <a href=\"https:\/\/www.nomoreransom.org\/en\/index.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Gata cu r\u0103scump\u0103rarea<\/a> sau apela\u021bi la diviziunea cibernetic\u0103 a autorit\u0103\u021bilor locale. Plata direct\u0103 a r\u0103scump\u0103r\u0103rii nu este recomandat\u0103, iar succesul acesteia nu este garantat.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Keyloggers<\/strong><\/h2>\n\n\n\n<p>Putem spune c\u0103 nu este a\u0219a <em>malware<\/em> \u00een sine, dar este folosit de infractorii cibernetici ca instrument de spionaj. Ca ransomware, numele s\u0103u spune totul: acesta este un software sau hardware conceput pentru a \u00eenregistra (\u0219i a trimite deseori) fiecare ap\u0103sare de tast\u0103 tastat\u0103 pe o tastatur\u0103 a dispozitivului. Uneori, chiar pot \u00eenregistra clicuri, audio \u0219i video.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-1024x682.jpg\" alt=\"\" class=\"wp-image-4232\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/binary-2372130_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Imagine de Gerd Altmann \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>Astfel, dac\u0103 a <a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/keylogger\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">keylogger<\/a> este instalat pe un dispozitiv pe ascuns, <strong>este capabil s\u0103 \u00eenregistreze parole \u0219i acredit\u0103ri care ar fi trimise ulterior unui hacker r\u0103u inten\u021bionat.<\/strong> Printre aceste acredit\u0103ri ar putea fi parola sau cheia privat\u0103 a unui <a href=\"https:\/\/alfacash.blog\/2020\/08\/18\/what-is-cryptocurrency-why-should-care-reasons\/\" target=\"_blank\" rel=\"noreferrer noopener\">portofel criptomoned\u0103<\/a>, ceea ce \u00eenseamn\u0103 c\u0103 vei fi jefuit \u00een acest fel.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Cum te infectezi?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Triada malefic\u0103, a\u0219a cum am spus mai \u00eenainte.<\/li><li>Site-uri web false \u0219i extensii de browser (phishing).<\/li><li>Domenii web infectate, ceea ce \u00eenseamn\u0103 atacuri direc\u021bionate c\u0103tre servicii precum magazine \u0219i schimburi vulnerabile.<\/li><li>Cineva a l\u0103sat un mic dispozitiv amuzant conectat la computer, cum ar fi un adaptor USB dubios sau un fir suplimentar (este un keylogger hardware).<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Sfaturi utile<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Aplica\u021bi triada fiabil\u0103 a scutului, a\u0219a cum am spus mai \u00eenainte.<\/li><li>Pe l\u00e2ng\u0103 antivirus, asigura\u021bi-v\u0103 c\u0103 ave\u021bi o solu\u021bie de securitate cibernetic\u0103 numit\u0103 anti-keylogger.<\/li><li>\u00cenregistra\u021bi acredit\u0103rile \u0219i parolele \u00een browserul dispozitivului dvs. obi\u0219nuit sau utiliza\u021bi software pentru a v\u0103 administra acredit\u0103rile.<\/li><li>Evita\u021bi site-urile \u0219i aplica\u021biile de phishing doar uit\u00e2ndu-v\u0103 la adresa URL, care este \u00eentotdeauna diferit\u0103 de cea original\u0103.<\/li><li>Acorda\u021bi aten\u021bie \u0219tirilor site-urilor \u0219i serviciilor dvs. preferate: ace\u0219tia ar trebui s\u0103 \u00ee\u0219i anun\u021be clien\u021bii dac\u0103 sunt supu\u0219i atacului cibernetic.<\/li><li>Nu l\u0103sa\u021bi hardware necunoscut conectat \u00een dispozitiv.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Troian cu acces la distan\u021b\u0103 (RAT)<\/strong><\/h2>\n\n\n\n<p>Aceasta este o infec\u021bie foarte proast\u0103, deoarece nu este altceva dec\u00e2t o u\u0219\u0103 din spate deschis\u0103 pentru a permite hackerilor s\u0103 intre \u0219i s\u0103 v\u0103 controleze dispozitivul de la distan\u021b\u0103. Odat\u0103 instalat software-ul, RAT permite controlul administrativ, <strong>ceea ce \u00eenseamn\u0103 c\u0103 hackerul s\u0103u poate vedea \u0219i face aproape orice \u00ee\u0219i doresc \u00een dispozitiv,<\/strong> de la monitorizarea silen\u021bioas\u0103 a datelor \u0219i comportamentului p\u00e2n\u0103 la distribuirea altor programe malware \u0219i formate de unit\u0103\u021bi.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-1024x682.jpg\" alt=\"\" class=\"wp-image-4233\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/dark-2597058_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Imagine de StockSnap \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>Desigur, ar putea s\u0103-\u021bi fure \u0219i criptosul, doar intr\u00e2nd \u00een portofel dup\u0103 \u00eenregistrarea mi\u0219c\u0103rilor. \u0218i probabil c\u0103 nu ve\u021bi observa acest software furtiv \u00eenainte de a fi prea t\u00e2rziu.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Cum te infectezi?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Triada malefic\u0103, mai rea ca niciodat\u0103. \u00centr-adev\u0103r, este foarte obi\u0219nuit s\u0103 \u00eel g\u0103se\u0219ti ascuns \u00een jocurile \u0219i software-urile sparte.<\/li><li>Folosind dubioase <a href=\"https:\/\/themerkle.com\/open-source-remote-access-trojan-targets-telegram-users\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">robo\u021bi \u00een Telegram<\/a>.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Sfaturi utile<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Aplica\u021bi triada scutului \u0219i ve\u021bi fi bine!<\/li><li>\u00cen plus, pute\u021bi c\u0103uta \u00eentotdeauna comentarii \u0219i recenzii de la al\u021bi utilizatori ai aplica\u021biilor \u0219i programelor pe care le ve\u021bi desc\u0103rca. Inclusiv robo\u021bii din Telegram, da.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Secerator Clipper \/ Clipboard<\/strong><\/h2>\n\n\n\n<p>Infractorii cibernetici cunosc foarte bine manierele generale ale utilizatorilor de criptomonede. \u0218tiu, de exemplu, c\u0103 nimeni nu scrie cu m\u00e2na adresele de portofel lungi \u0219i complexe, dar le copiaz\u0103 \u0219i lipesc c\u00e2nd este nevoie. Acesta este exact punctul \u00een care aleg s\u0103 deturneze adresele originale \u0219i s\u0103 le \u00eenlocuiasc\u0103 cu ale lor, folosind un software r\u0103u inten\u021bionat numit \u201eClipper\u201d sau \u201eClipboard hijacker\u201d.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"665\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-1024x665.jpg\" alt=\"\" class=\"wp-image-4234\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-1024x665.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-300x195.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-150x97.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-270x175.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-770x500.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-782x508.jpg 782w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-793x515.jpg 793w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-370x240.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-554x360.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-306x199.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-260x169.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280-87x56.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/hacker-2851143_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Imagine de Pete Linforth \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>Principalul lucru pe care \u00eel face acest malware este <strong>deturneaz\u0103 clipboard-ul din dispozitivul utilizatorului \u0219i detecteaz\u0103 c\u00e2nd o adres\u0103 cripto-portofel este copiat\u0103 de proprietar<\/strong>. Apoi, aceasta este \u00eenlocuit\u0103 pentru adresa portofelului hackerilor, astfel \u00eenc\u00e2t, dac\u0103 utilizatorul nu acord\u0103 aten\u021bie, poate ajunge s\u0103 trimit\u0103 fondurile c\u0103tre destina\u021bia gre\u0219it\u0103.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Cum te infectezi?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Din nou triada malefic\u0103, da. De data aceasta, cel mai frecvent <a href=\"https:\/\/www.binarydefense.com\/threat_watch\/clipper-cryptocurrency-stealing-malware\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">vectorul infec\u021biei<\/a> este aplica\u021bii false sau infectate \u00een Magazin Play.<\/li><li>Anun\u021buri Adobe Flash sau alte bannere false pe site-uri web dubioase.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Sfaturi utile<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Aplica\u021bi triada scutului (func\u021bioneaz\u0103 pentru aproape orice).<\/li><li>Fii atent la adresele portofelului! Nu conteaz\u0103 dac\u0103 crede\u021bi c\u0103 nu ave\u021bi niciun t\u0103ietor pe dispozitiv (acestea nu produc niciun simptom vizibil). Compara\u021bi \u0219i verifica\u021bi adresa original\u0103 \u0219i versiunea lipit\u0103 de dou\u0103 ori \u00eenainte de a trimite sau trimite.<\/li><li>Dac\u0103 este posibil, prefera\u021bi s\u0103 utiliza\u021bi fondurile prin coduri QR \u00een loc de text.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Phishing<\/strong><\/h2>\n\n\n\n<p>Putem spune <a href=\"https:\/\/www.phishing.org\/what-is-phishing\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">phishingul<\/a> este par\u021bial malware \u0219i par\u021bial o \u00een\u0219el\u0103torie, deoarece este doar o versiune fals\u0103 a ceva (site web, aplica\u021bie, software, mesaj, apel ...), special conceput <a href=\"https:\/\/alfacash.blog\/2020\/09\/07\/getting-rich-wrecking-most-popular-cryptocurrency-myths\/\" target=\"_blank\" rel=\"noreferrer noopener\">a \u00een\u0219ela oamenii<\/a> \u0219i ob\u021bine\u021bi de la ei informa\u021bii valoroase, cum ar fi acredit\u0103rile \u0219i cheile bancare sau criptomonede. Deci, hackerii cloneaz\u0103 site-uri web sau software, sau suplinesc identitatea unui serviciu, companie sau persoan\u0103 prin e-mail sau apel pentru a-\u0219i atinge obiectivele r\u0103u inten\u021bionate.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-1024x682.jpg\" alt=\"\" class=\"wp-image-4235\" srcset=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-1024x682.jpg 1024w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-300x200.jpg 300w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-150x100.jpg 150w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-18x12.jpg 18w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-270x180.jpg 270w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-770x513.jpg 770w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-762x508.jpg 762w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-773x515.jpg 773w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-370x247.jpg 370w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-554x369.jpg 554w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-306x204.jpg 306w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-368x245.jpg 368w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-260x173.jpg 260w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280-87x58.jpg 87w, https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/mask-4582126_1280.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Imagine de leo2014 \/ Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n<p>Pute\u021bi afla acolo o versiune fals\u0103 a dvs. <a href=\"https:\/\/www.alfa.cash\/\" target=\"_blank\" rel=\"noreferrer noopener\">schimb de criptomonede de \u00eencredere<\/a>, de exemplu. <strong>Arat\u0103 identic, dar, \u00een acela\u0219i timp, unele lucruri sunt oprite.<\/strong> Poate c\u0103 este o gramatic\u0103 proast\u0103, leg\u0103turi rupte sau texte lips\u0103; dar exist\u0103 ceva pe site-urile de phishing care le ofer\u0103 \u00eentotdeauna: adresa URL.<\/p>\n\n\n\n<p>Nu poate fi exact acela\u0219i domeniu ca cel original (pentru c\u0103 ar trebui s\u0103 cump\u0103ra\u021bi un domeniu \u0219i nu pute\u021bi cump\u0103ra ceva pe care proprietarul legitim nu \u00eel vinde). Sunt \u00eentotdeauna similare, dar cel pu\u021bin un personaj va fi schimbat (adic\u0103 www.<strong>alfa<\/strong>.cash vs www.<strong>alfaexchange<\/strong>.bani gheata). \u0218i este la fel pentru adresele de e-mail: dac\u0103 nu are domeniul original al companiei (adic\u0103 hr @<strong>alfa.im <\/strong>vs hr @<strong>gmail.com<\/strong>), ar trebui s\u0103 b\u0103nui\u021bi imediat.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Cum te infectezi?<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Triad\u0103 malefic\u0103, mai ales prin e-mail.<\/li><li>Ad\u0103ug\u0103ri dubioase \u00een partea de sus a rezultatelor browserului. Oricine (chiar \u0219i actorii r\u0103uvoitori) poate pl\u0103ti pentru acest tip de ad\u0103ugare, a\u0219a c\u0103 vor fi acolo p\u00e2n\u0103 c\u00e2nd cineva o raporteaz\u0103.<\/li><li>Hackerul \/ escrocul a g\u0103sit <a href=\"https:\/\/alfacash.blog\/2020\/08\/26\/easiest-guide-top-up-phone-cryptocurrencies\/\" target=\"_blank\" rel=\"noreferrer noopener\">telefonul tau<\/a> \u00eentr-un fel \u0219i te sun\u0103, imit\u00e2nd o anumit\u0103 autoritate.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Sfaturi utile<\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Scut triada din nou la salvare.<\/li><li>Accesa\u021bi cele mai utilizate site-uri web prin lista de marcaje \/ favorite \u0219i evita\u021bi rezultatele browserului c\u00e2t pute\u021bi.<\/li><li>Fi\u021bi suspect de orice mesaj \/ e-mail \/ apel \u00een care cineva v\u0103 solicit\u0103 acredit\u0103ri personale sau bani. Aminti\u021bi-v\u0103: companiile \/ organiza\u021biile nu obi\u0219nuiesc deloc s\u0103 fac\u0103 asta.<\/li><li>Dac\u0103 ave\u021bi de g\u00e2nd s\u0103 trimite\u021bi \/ primi\u021bi criptomonede printr-un site web sau o aplica\u021bie, verifica\u021bi \u00eentotdeauna adresa URL \u0219i recenziile anterioare.<\/li><\/ul>\n\n\n\n<p>Dar, mai presus de toate, nu v\u0103 face\u021bi griji! Protejarea dvs. \u0219i a criptomonedelor dvs. este u\u0219oar\u0103. Urma\u021bi sfaturile noastre utile \u0219i ar trebui s\u0103 v\u0103 sim\u021bi\u021bi bine.<\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p class=\"has-text-align-center\"><em>Dori\u021bi s\u0103 tranzac\u021biona\u021bi BTC, ETH \u0219i alte jetoane? O po\u021bi face<\/em>\u00a0<em>\u00een siguran\u021b\u0103\u00a0<a href=\"https:\/\/www.alfa.cash\/buy\/bitcoin\" target=\"_blank\" rel=\"noreferrer noopener\">pe Alfacash<\/a>! \u0218i nu uita\u021bi c\u0103 vorbim despre acest lucru \u0219i despre multe alte lucruri pe re\u021belele noastre sociale.<br><br><\/em><a href=\"https:\/\/twitter.com\/alfacash_crypto\" target=\"_blank\" rel=\"noreferrer noopener\">Stare de nervozitate<\/a>\u00a0*\u00a0<a href=\"https:\/\/t.me\/AlfacashCommunity\" target=\"_blank\" rel=\"noreferrer noopener\">Telegram\u0103<\/a>\u00a0*\u00a0<a href=\"https:\/\/www.instagram.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Instagram<\/a> * <a href=\"https:\/\/www.youtube.com\/channel\/UCOl4fdRHj8AseQ5b6z9udaw\" target=\"_blank\" rel=\"noreferrer noopener\">Youtube<\/a>\u00a0*<a href=\"https:\/\/www.facebook.com\/alfacashstore\" target=\"_blank\" rel=\"noreferrer noopener\">Facebook<\/a>\u00a0\u00a0*\u00a0<a href=\"https:\/\/vk.com\/alfacashcrypto\" target=\"_blank\" rel=\"noreferrer noopener\">Vkontakte<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>\u00cen interiorul cripto-lumii, ar trebui s\u0103 fim foarte con\u0219tien\u021bi de posibilit\u0103\u021bile proaste. A\u0219adar, \u00eent\u00e2lni\u021bi aici malware-ul care v\u0103 poate fura toate criptele \u0219i cum s\u0103 le evita\u021bi.<\/p>","protected":false},"author":5,"featured_media":4228,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[48],"tags":[133,42,132,127,134,129,131],"class_list":{"0":"post-4225","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-learn","8":"tag-clipper","9":"tag-cryptocurrency","10":"tag-keylogger","11":"tag-malware","12":"tag-phishing","13":"tag-ransomware","14":"tag-rat"},"featured_image_src":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","author_info":{"display_name":"Isabel P\u00e9rez","author_link":"https:\/\/alfacash.blog\/ro\/author\/isabel\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v25.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Malware that can steal all your cryptos and how to avoid it - alfa.cash blog<\/title>\n<meta name=\"description\" content=\"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/alfacash.blog\/ro\/2020\/10\/04\/malware-poate-fura-cryptos-cum-evita-l\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware that can steal all your cryptos and how to avoid it\" \/>\n<meta property=\"og:description\" content=\"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/alfacash.blog\/ro\/2020\/10\/04\/malware-poate-fura-cryptos-cum-evita-l\/\" \/>\n<meta property=\"og:site_name\" content=\"alfa.cash blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/alfacashstore\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-04T01:51:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T18:53:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2123\" \/>\n\t<meta property=\"og:image:height\" content=\"1120\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Isabel P\u00e9rez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@AlfacashStore\" \/>\n<meta name=\"twitter:site\" content=\"@AlfacashStore\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\"},\"author\":{\"name\":\"Isabel P\u00e9rez\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\"},\"headline\":\"Malware that can steal all your cryptos and how to avoid it\",\"datePublished\":\"2020-10-04T01:51:17+00:00\",\"dateModified\":\"2024-02-19T18:53:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\"},\"wordCount\":1511,\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"keywords\":[\"Clipper\",\"cryptocurrency\",\"Keylogger\",\"malware\",\"Phishing\",\"Ransomware\",\"RAT\"],\"articleSection\":[\"Learn\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\",\"url\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\",\"name\":\"Malware that can steal all your cryptos and how to avoid it - alfa.cash blog\",\"isPartOf\":{\"@id\":\"https:\/\/alfacash.blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"datePublished\":\"2020-10-04T01:51:17+00:00\",\"dateModified\":\"2024-02-19T18:53:10+00:00\",\"description\":\"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.\",\"breadcrumb\":{\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg\",\"width\":270,\"height\":142,\"caption\":\"Malware-steal-cryptocurrency-tips\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/alfacash.blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware that can steal all your cryptos and how to avoid it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/alfacash.blog\/#website\",\"url\":\"https:\/\/alfacash.blog\/\",\"name\":\"Alfacash Blog\",\"description\":\"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi\",\"publisher\":{\"@id\":\"https:\/\/alfacash.blog\/#organization\"},\"alternateName\":\"alfacash.blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/alfacash.blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/alfacash.blog\/#organization\",\"name\":\"Alfacash Blog\",\"alternateName\":\"alfacash.blog\",\"url\":\"https:\/\/alfacash.blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"contentUrl\":\"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg\",\"width\":696,\"height\":696,\"caption\":\"Alfacash Blog\"},\"image\":{\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/alfacashstore\",\"https:\/\/x.com\/AlfacashStore\",\"https:\/\/t.me\/AlfacashCommunity\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749\",\"name\":\"Isabel P\u00e9rez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/alfacash.blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g\",\"caption\":\"Isabel P\u00e9rez\"},\"description\":\"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/\"],\"url\":\"https:\/\/alfacash.blog\/ro\/author\/isabel\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Malware that can steal all your cryptos and how to avoid it - alfa.cash blog","description":"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/alfacash.blog\/ro\/2020\/10\/04\/malware-poate-fura-cryptos-cum-evita-l\/","og_locale":"ro_RO","og_type":"article","og_title":"Malware that can steal all your cryptos and how to avoid it","og_description":"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.","og_url":"https:\/\/alfacash.blog\/ro\/2020\/10\/04\/malware-poate-fura-cryptos-cum-evita-l\/","og_site_name":"alfa.cash blog","article_publisher":"https:\/\/www.facebook.com\/alfacashstore","article_published_time":"2020-10-04T01:51:17+00:00","article_modified_time":"2024-02-19T18:53:10+00:00","og_image":[{"width":2123,"height":1120,"url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","type":"image\/jpeg"}],"author":"Isabel P\u00e9rez","twitter_card":"summary_large_image","twitter_creator":"@AlfacashStore","twitter_site":"@AlfacashStore","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#article","isPartOf":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/"},"author":{"name":"Isabel P\u00e9rez","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749"},"headline":"Malware that can steal all your cryptos and how to avoid it","datePublished":"2020-10-04T01:51:17+00:00","dateModified":"2024-02-19T18:53:10+00:00","mainEntityOfPage":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/"},"wordCount":1511,"publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"image":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","keywords":["Clipper","cryptocurrency","Keylogger","malware","Phishing","Ransomware","RAT"],"articleSection":["Learn"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/","url":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/","name":"Malware that can steal all your cryptos and how to avoid it - alfa.cash blog","isPartOf":{"@id":"https:\/\/alfacash.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage"},"image":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage"},"thumbnailUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","datePublished":"2020-10-04T01:51:17+00:00","dateModified":"2024-02-19T18:53:10+00:00","description":"Inside the crypto-world, we should be very aware of the bad possibilities. So, meet here the malware that can steal all your cryptos and how to avoid it.","breadcrumb":{"@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#primaryimage","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2020\/10\/Meet-the-malware-that-can-steal-all-your-cryptos-scaled.jpg","width":270,"height":142,"caption":"Malware-steal-cryptocurrency-tips"},{"@type":"BreadcrumbList","@id":"https:\/\/alfacash.blog\/2020\/10\/04\/malware-can-steal-cryptos-how-avoid-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/alfacash.blog\/"},{"@type":"ListItem","position":2,"name":"Malware that can steal all your cryptos and how to avoid it"}]},{"@type":"WebSite","@id":"https:\/\/alfacash.blog\/#website","url":"https:\/\/alfacash.blog\/","name":"Alfacash Blog","description":"Alfacash blog is about Crypto, Bitcoin, Ethereum, DeFi","publisher":{"@id":"https:\/\/alfacash.blog\/#organization"},"alternateName":"alfacash.blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/alfacash.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/alfacash.blog\/#organization","name":"Alfacash Blog","alternateName":"alfacash.blog","url":"https:\/\/alfacash.blog\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/","url":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","contentUrl":"https:\/\/alfacash.blog\/wp-content\/uploads\/2024\/02\/Transparent.svg","width":696,"height":696,"caption":"Alfacash Blog"},"image":{"@id":"https:\/\/alfacash.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/alfacashstore","https:\/\/x.com\/AlfacashStore","https:\/\/t.me\/AlfacashCommunity"]},{"@type":"Person","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/0c5d337f38e41e7ad754d6752d517749","name":"Isabel P\u00e9rez","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/alfacash.blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43373ef58d2993ad0d7e7ca541859e533849fec2c4ad5f7a028689d120be1af8?s=96&d=mm&r=g","caption":"Isabel P\u00e9rez"},"description":"I'm a literature professional in the crypto world since 2016. It doesn't sound very compatible, but I've been learning and teaching about blockchain and cryptos for international portals since then. After hundreds of articles and diverse content about the topic, now you can find me here on Alfacash, working for more decentralization.","sameAs":["https:\/\/www.linkedin.com\/in\/isabel-prez-6b3786137\/"],"url":"https:\/\/alfacash.blog\/ro\/author\/isabel\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/alfacash.blog\/ro\/wp-json\/wp\/v2\/posts\/4225","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/alfacash.blog\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/alfacash.blog\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/ro\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/ro\/wp-json\/wp\/v2\/comments?post=4225"}],"version-history":[{"count":4,"href":"https:\/\/alfacash.blog\/ro\/wp-json\/wp\/v2\/posts\/4225\/revisions"}],"predecessor-version":[{"id":8756,"href":"https:\/\/alfacash.blog\/ro\/wp-json\/wp\/v2\/posts\/4225\/revisions\/8756"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/alfacash.blog\/ro\/wp-json\/wp\/v2\/media\/4228"}],"wp:attachment":[{"href":"https:\/\/alfacash.blog\/ro\/wp-json\/wp\/v2\/media?parent=4225"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/alfacash.blog\/ro\/wp-json\/wp\/v2\/categories?post=4225"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/alfacash.blog\/ro\/wp-json\/wp\/v2\/tags?post=4225"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}