{"id":26424,"date":"2022-04-19T15:36:00","date_gmt":"2022-04-19T13:36:00","guid":{"rendered":"https:\/\/perseus.de\/cryptojacking\/"},"modified":"2026-03-31T16:29:10","modified_gmt":"2026-03-31T14:29:10","slug":"criptojacking","status":"publish","type":"post","link":"https:\/\/perseus.de\/es\/criptojacking\/","title":{"rendered":"Cryptojacking"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26424\" class=\"elementor elementor-26424 elementor-22178\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cryptojacking<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25825\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5fc7f2ab e-flex e-con-boxed e-con e-parent\" data-id=\"5fc7f2ab\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7dcc730e e-con-full e-flex e-con e-child\" data-id=\"7dcc730e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCompuesto por dos t\u00e9rminos abreviados en ingl\u00e9s: El componente \u00abcrypto\u00bb deriva del t\u00e9rmino \u00abcriptomonedas\u00bb (en alem\u00e1n: criptomonedas). Se refiere a monedas virtuales como Bitcoin. La palabra \u00absecuestro\u00bb proviene del t\u00e9rmino \u00absecuestro\u00bb, que significa secuestrar, secuestrar alem\u00e1n. El cryptojacking es el proceso en el que un ciberdelincuente secuestra recursos de tu ordenador o de la red de tu empresa para generar criptomonedas.   \n<h4><\/h4>\n<h4>\u00bfQu\u00e9 significa cryptojacking en detalle?<\/h4>\nLas criptomonedas son monedas virtuales que no son reemplazadas por ning\u00fan valor equivalente real. por ejemplo, las reservas de oro est\u00e1n cubiertas. Las criptomonedas se basan en un principio econ\u00f3mico: pueden ganarse (\u00abminadas\u00bb) poniendo a disposici\u00f3n recursos inform\u00e1ticos. Estos recursos inform\u00e1ticos se utilizan, entre otras cosas, para las complejas operaciones de cifrado y almacenamiento de la criptomoneda.   \n\nEn esta miner\u00eda de criptomonedas, se aplica el principio de oferta y demanda:\n<ul>\n \t<li>Cuanto mayor es la oferta de recursos inform\u00e1ticos, menor ser\u00e1 su equivalente en criptomoneda.<\/li>\n \t<li>Cuanto menor es el valor equivalente de los recursos inform\u00e1ticos, m\u00e1s recursos ofrecen quienes quieren ganar criptomonedas. Como resultado, la potencia de c\u00e1lculo utilizada para las criptomonedas creci\u00f3 660 veces en menos de un a\u00f1o. <\/li>\n \t<li>Mientras tanto, es casi imposible minar criptomonedas de forma econ\u00f3mica por medios legales; incluso los costes de electricidad gastados superan el valor equivalente.<\/li>\n<\/ul>\n<br>El cryptojacking surgi\u00f3 en este contexto. Los ciberdelincuentes utilizan en secreto ordenadores extranjeros para minar criptomonedas. Los costes resultantes de electricidad, operaci\u00f3n y dispositivos los asume el propietario del ordenador, que no se lo espera. La criptomoneda minerada es obtenida por el ciberdelincuente.   \n\nEn el cryptojacking, los ordenadores se infectan con malware y luego se utilizan indebidamente para minar criptomonedas.\n\nEl objetivo de los ciberdelincuentes es asegurarse de que su cryptojacking permanezca desapercibido para poder usar los ordenadores infectados el mayor tiempo posible. Cuantos m\u00e1s los ordenadores minen criptomonedas sin ser detectados por un ciberdelincuente, mayores ser\u00e1n sus ingresos. \n<br><h4><\/h4>\n<h4>\u00bfD\u00f3nde encuentro el tema en mi trabajo diario?<\/h4>\n<br>Como mucho, lo encuentras de forma encubierta. Por ejemplo, en forma de correo electr\u00f3nico que contiene un enlace. Tras hacer clic en este enlace, el malware de cryptojacking se descarga solo en tu ordenador. Sin embargo, no notas otros ataques de cryptojacking en tu trabajo diario. Por ejemplo, si esto se hace a trav\u00e9s de tu navegador web o servidores.    \n\nSi tu ordenador o sistema ha sido comprometido por el cryptojacking, probablemente no sospeches nada. Esto se debe a que los signos t\u00edpicos tambi\u00e9n aparecen en ordenadores no infectados: \n<br><br><ul>\n \t<li>Alta carga del procesador<\/li>\n \t<li>un ordenador que funciona despacio y reacciona despacio debido a esta carga<\/li>\n \t<li>Ventilaci\u00f3n del ordenador funcionando a m\u00e1xima velocidad<\/li>\n<\/ul>\n<br>Tu smartphone tambi\u00e9n puede ser mal utilizado para cryptojacking. Las se\u00f1ales incluyen un calentamiento fuerte y descarga r\u00e1pida de la bater\u00eda. \n<h4><\/h4>\n<h4>\u00bfQu\u00e9 puedo hacer para mejorar mi seguridad?<\/h4>\nLa mayor\u00eda de las medidas para reducir tu riesgo cibern\u00e9tico tambi\u00e9n protegen contra el cryptojacking. Aspectos especialmente importantes incluyen: \n<ul>\n \t<li>Concienciar entre los empleados (gestionar correos electr\u00f3nicos, se\u00f1alar posibles se\u00f1ales de cryptojacking)<\/li>\n \t<li>Protecci\u00f3n de los navegadores de Internet<\/li>\n \t<li>Cesi\u00f3n considerada de derechos de administrador<\/li>\n \t<li>Asegurar y monitorizar los servidores<\/li>\n \t<li>Observaci\u00f3n y documentaci\u00f3n de la carga inform\u00e1tica habitual y cotidiana para poder detectar desviaciones si fuera necesario<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee2bc41 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"ee2bc41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cryptojacking Compuesto por dos t\u00e9rminos abreviados en ingl\u00e9s: El componente \u00abcrypto\u00bb deriva del t\u00e9rmino \u00abcriptomonedas\u00bb (en alem\u00e1n: criptomonedas). Se refiere a monedas virtuales como Bitcoin. La palabra \u00absecuestro\u00bb proviene del t\u00e9rmino \u00absecuestro\u00bb, que significa secuestrar, secuestrar alem\u00e1n. El cryptojacking es el proceso en el que un ciberdelincuente secuestra recursos de tu ordenador o de la [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[59],"tags":[],"class_list":["post-26424","post","type-post","status-publish","format-standard","hentry","category-ciberlexico"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cryptojacking - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/es\/criptojacking\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cryptojacking - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Cryptojacking Compuesto por dos t\u00e9rminos abreviados en ingl\u00e9s: El componente \u00abcrypto\u00bb deriva del t\u00e9rmino \u00abcriptomonedas\u00bb (en alem\u00e1n: criptomonedas). Se refiere a monedas virtuales como Bitcoin. La palabra \u00absecuestro\u00bb proviene del t\u00e9rmino \u00absecuestro\u00bb, que significa secuestrar, secuestrar alem\u00e1n. El cryptojacking es el proceso en el que un ciberdelincuente secuestra recursos de tu ordenador o de la [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/es\/criptojacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-19T13:36:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T14:29:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/criptojacking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/criptojacking\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Cryptojacking\",\"datePublished\":\"2022-04-19T13:36:00+00:00\",\"dateModified\":\"2026-03-31T14:29:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/criptojacking\\\/\"},\"wordCount\":565,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/criptojacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Ciberl\u00e9xico\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/criptojacking\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/criptojacking\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/criptojacking\\\/\",\"name\":\"Cryptojacking - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/criptojacking\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/criptojacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-19T13:36:00+00:00\",\"dateModified\":\"2026-03-31T14:29:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/criptojacking\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/criptojacking\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/criptojacking\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/criptojacking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cryptojacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cryptojacking - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/es\/criptojacking\/","og_locale":"es_ES","og_type":"article","og_title":"Cryptojacking - Perseus Technologies","og_description":"Cryptojacking Compuesto por dos t\u00e9rminos abreviados en ingl\u00e9s: El componente \u00abcrypto\u00bb deriva del t\u00e9rmino \u00abcriptomonedas\u00bb (en alem\u00e1n: criptomonedas). Se refiere a monedas virtuales como Bitcoin. La palabra \u00absecuestro\u00bb proviene del t\u00e9rmino \u00absecuestro\u00bb, que significa secuestrar, secuestrar alem\u00e1n. El cryptojacking es el proceso en el que un ciberdelincuente secuestra recursos de tu ordenador o de la [&hellip;]","og_url":"https:\/\/perseus.de\/es\/criptojacking\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-19T13:36:00+00:00","article_modified_time":"2026-03-31T14:29:10+00:00","og_image":[{"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","type":"","width":"","height":""}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Xenia Silbe","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/es\/criptojacking\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/es\/criptojacking\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Cryptojacking","datePublished":"2022-04-19T13:36:00+00:00","dateModified":"2026-03-31T14:29:10+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/es\/criptojacking\/"},"wordCount":565,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/es\/criptojacking\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Ciberl\u00e9xico"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/es\/criptojacking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/es\/criptojacking\/","url":"https:\/\/perseus.de\/es\/criptojacking\/","name":"Cryptojacking - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/es\/criptojacking\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/es\/criptojacking\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-19T13:36:00+00:00","dateModified":"2026-03-31T14:29:10+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/es\/criptojacking\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/es\/criptojacking\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/es\/criptojacking\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/es\/criptojacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Cryptojacking"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/es\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/26424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/comments?post=26424"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/26424\/revisions"}],"predecessor-version":[{"id":26425,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/26424\/revisions\/26425"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media?parent=26424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/categories?post=26424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/tags?post=26424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}