{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreiehu52ytz6w2vktibq437ekfn7fnx5ephbx7mricu7a5w25h64sr4",
    "uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mi7mynwlgzo2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreihsfzdkkn4ez2wxy4lkx7j4lrbszqzda2x5uvtvebdy5kxmya7nf4"
    },
    "mimeType": "image/webp",
    "size": 41418
  },
  "path": "/fake-screenshot-links-used-to-infect-web3-support-teams-with-multi-stage-malware/",
  "publishedAt": "2026-03-28T18:51:24.000Z",
  "site": "https://vpncentral.com",
  "tags": [
    "News",
    "Fake screenshot links used to infect Web3 support teams with multi-stage malware",
    "VPN Central"
  ],
  "textContent": "A targeted malware campaign is hitting Web3 customer support staff through fake screenshot links sent in live chat conversations. Instead of exploiting a software flaw, the attackers pose as customers, send what looks like a harmless image link, and rely on the support agent to open a disguised executable that starts a multi-stage infection chain. […]\n\nThe post Fake screenshot links used to infect Web3 support teams with multi-stage malware appeared first on VPN Central.",
  "title": "Fake screenshot links used to infect Web3 support teams with multi-stage malware"
}