{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreiehu52ytz6w2vktibq437ekfn7fnx5ephbx7mricu7a5w25h64sr4",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mi7mynwlgzo2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreihsfzdkkn4ez2wxy4lkx7j4lrbszqzda2x5uvtvebdy5kxmya7nf4"
},
"mimeType": "image/webp",
"size": 41418
},
"path": "/fake-screenshot-links-used-to-infect-web3-support-teams-with-multi-stage-malware/",
"publishedAt": "2026-03-28T18:51:24.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"Fake screenshot links used to infect Web3 support teams with multi-stage malware",
"VPN Central"
],
"textContent": "A targeted malware campaign is hitting Web3 customer support staff through fake screenshot links sent in live chat conversations. Instead of exploiting a software flaw, the attackers pose as customers, send what looks like a harmless image link, and rely on the support agent to open a disguised executable that starts a multi-stage infection chain. […]\n\nThe post Fake screenshot links used to infect Web3 support teams with multi-stage malware appeared first on VPN Central.",
"title": "Fake screenshot links used to infect Web3 support teams with multi-stage malware"
}