Binance Square
Phishing
163,869 views
69 Posts
Hot
Latest
LIVE
LIVE
Crypto-D-Ooshen
--
🚨 Be wary of an X account impersonating API3, as it's causing community controversy and potentially hosting a phishing site for an airdrop scam. Stay vigilant, investors! 🕵️‍♂️ #API3 #Impersonation #Phishing #CryptoSecurity
🚨 Be wary of an X account impersonating API3, as it's causing community controversy and potentially hosting a phishing site for an airdrop scam. Stay vigilant, investors! 🕵️‍♂️ #API3 #Impersonation #Phishing #CryptoSecurity
LIVE
--
Bearish
via BlockSecTeam on X A contract that was labeled as a #Phishing contract has been attacked -- no sanitization on the input parameters.
via BlockSecTeam on X

A contract that was labeled as a #Phishing contract has been attacked -- no sanitization on the input parameters.
LIVE
--
Bullish
#FakeAirdrop Cryptocurrencies, with their promise of decentralized and inclusive ecosystems, have given rise to various trends, including airdrops. Airdrops involve distributing free tokens to holders of a specific cryptocurrency, often as a way to promote a new project. However, the increasing popularity of airdrops has also attracted scammers who orchestrate fake airdrops to deceive unsuspecting users. Understanding Fake Airdrops: 1. Tempting Promises: Fake airdrops typically make enticing promises, such as substantial token rewards or exclusive early access to a project. Scammers exploit the desire for quick gains to lure individuals into participating. 2.#Phishing Links: Scammers often create fraudulent websites or social media accounts that mimic legitimate airdrop campaigns. Participants are directed to provide personal information or access their cryptocurrency wallets through phishing links. Protecting Yourself from#FakeAirdrop : 1.Verify the Project: Thoroughly research the project associated with the airdrop. Verify the team's credentials, check for a transparent whitepaper, and ensure the project has a legitimate online presence. 2. Be Skeptical of Requests for Funds: Legitimate airdrops do not require participants to send cryptocurrency as a prerequisite. Any request for funds, even if small, should raise suspicions. 3. Use #OfficialChannels: Access airdrop information only through official channels, such as the project's official website or reputable cryptocurrency forums. Be cautious of unsolicited messages on social media platforms. 4. Employ #SecureWallets : Use secure and reputable cryptocurrency wallets. Avoid sharing private keys or sensitive information with unknown parties. 5. Stay Informed: Keep yourself informed about common scam tactics and stay updated on the latest security practices in the cryptocurrency community.
#FakeAirdrop
Cryptocurrencies, with their promise of decentralized and inclusive ecosystems, have given rise to various trends, including airdrops. Airdrops involve distributing free tokens to holders of a specific cryptocurrency, often as a way to promote a new project. However, the increasing popularity of airdrops has also attracted scammers who orchestrate fake airdrops to deceive unsuspecting users.
Understanding Fake Airdrops:
1. Tempting Promises:
Fake airdrops typically make enticing promises, such as substantial token rewards or exclusive early access to a project. Scammers exploit the desire for quick gains to lure individuals into participating.
2.#Phishing Links:
Scammers often create fraudulent websites or social media accounts that mimic legitimate airdrop campaigns. Participants are directed to provide personal information or access their cryptocurrency wallets through phishing links.

Protecting Yourself from#FakeAirdrop :
1.Verify the Project:
Thoroughly research the project associated with the airdrop. Verify the team's credentials, check for a transparent whitepaper, and ensure the project has a legitimate online presence.
2. Be Skeptical of Requests for Funds:
Legitimate airdrops do not require participants to send cryptocurrency as a prerequisite. Any request for funds, even if small, should raise suspicions.
3. Use #OfficialChannels:
Access airdrop information only through official channels, such as the project's official website or reputable cryptocurrency forums. Be cautious of unsolicited messages on social media platforms.
4. Employ #SecureWallets :
Use secure and reputable cryptocurrency wallets. Avoid sharing private keys or sensitive information with unknown parties.
5. Stay Informed:
Keep yourself informed about common scam tactics and stay updated on the latest security practices in the cryptocurrency community.
How Hackers Steal Crypto from MetaMask—Protect Your Funds NowMetaMask is one of the most popular cryptocurrency wallets, used by millions to store, send, and receive digital assets. However, it has also become a target for hackers due to its widespread use. Protecting your MetaMask wallet is critical to keeping your crypto secure. Below, we’ll break down the most common ways hackers can steal funds from MetaMask and how you can protect yourself. 1. Phishing Attacks Phishing is one of the most common methods hackers use to steal crypto from MetaMask users. In these attacks, hackers create fake websites or send emails that look like official MetaMask communications. When users enter their seed phrase or private keys on these fraudulent sites, hackers capture the information and can instantly access the user's funds. How to Protect Yourself: Never share your seed phrase or private keys. Legitimate services will never ask for these.Always double-check the website URL when accessing MetaMask or any crypto service.Avoid clicking on links in unsolicited emails or messages claiming to be MetaMask. 2. Malware and Keyloggers Malware and keyloggers are software programs that can secretly track your activity and capture sensitive information, such as your seed phrase or private keys. Once installed on your device, a hacker can monitor your MetaMask interactions and gain access to your wallet. How to Protect Yourself: Install a reputable antivirus program and ensure your system is regularly scanned for malware.Use a VPN to keep your internet connection secure.Avoid downloading unknown software or files from untrusted websites. 3. Fake MetaMask Browser Extensions Hackers often create fake MetaMask browser extensions designed to look exactly like the real thing. If you install one of these, it can steal your login credentials or seed phrase and give hackers full access to your wallet. How to Protect Yourself: Download extensions only from official sources. Always verify that the MetaMask extension comes from the official MetaMask website or trusted platforms like Chrome's official store.Check reviews and ratings before installing any browser extension. 4. Unauthorized Approvals of Smart Contracts Hackers exploit MetaMask users by tricking them into unknowingly granting approvals to malicious smart contracts. These contracts can withdraw funds from your wallet without your permission. How to Protect Yourself: Read contract approvals carefully before interacting with dApps (decentralized applications). Don’t blindly approve every request.Revoke permissions for smart contracts you no longer use by visiting sites that help you manage your approvals (e.g., revoke.cash). 5. Social Engineering Social engineering attacks involve tricking you into voluntarily handing over your wallet details. Hackers may impersonate support staff, ask for your seed phrase, or offer fake assistance via social media or forums. How to Protect Yourself: Do not share sensitive information on social media or messaging platforms.Be wary of anyone offering unsolicited help, even if they claim to be from MetaMask or another trusted platform. --- Share your experiences or security tips for protecting your MetaMask wallet in the comments! And don’t forget to follow me for more insights on keeping your crypto safe. #MetaMask #CryptoSecurity #Phishing #DeFi #Blockchain

How Hackers Steal Crypto from MetaMask—Protect Your Funds Now

MetaMask is one of the most popular cryptocurrency wallets, used by millions to store, send, and receive digital assets. However, it has also become a target for hackers due to its widespread use. Protecting your MetaMask wallet is critical to keeping your crypto secure. Below, we’ll break down the most common ways hackers can steal funds from MetaMask and how you can protect yourself.
1. Phishing Attacks
Phishing is one of the most common methods hackers use to steal crypto from MetaMask users. In these attacks, hackers create fake websites or send emails that look like official MetaMask communications. When users enter their seed phrase or private keys on these fraudulent sites, hackers capture the information and can instantly access the user's funds.
How to Protect Yourself:
Never share your seed phrase or private keys. Legitimate services will never ask for these.Always double-check the website URL when accessing MetaMask or any crypto service.Avoid clicking on links in unsolicited emails or messages claiming to be MetaMask.
2. Malware and Keyloggers
Malware and keyloggers are software programs that can secretly track your activity and capture sensitive information, such as your seed phrase or private keys. Once installed on your device, a hacker can monitor your MetaMask interactions and gain access to your wallet.
How to Protect Yourself:
Install a reputable antivirus program and ensure your system is regularly scanned for malware.Use a VPN to keep your internet connection secure.Avoid downloading unknown software or files from untrusted websites.
3. Fake MetaMask Browser Extensions
Hackers often create fake MetaMask browser extensions designed to look exactly like the real thing. If you install one of these, it can steal your login credentials or seed phrase and give hackers full access to your wallet.
How to Protect Yourself:
Download extensions only from official sources. Always verify that the MetaMask extension comes from the official MetaMask website or trusted platforms like Chrome's official store.Check reviews and ratings before installing any browser extension.
4. Unauthorized Approvals of Smart Contracts
Hackers exploit MetaMask users by tricking them into unknowingly granting approvals to malicious smart contracts. These contracts can withdraw funds from your wallet without your permission.
How to Protect Yourself:
Read contract approvals carefully before interacting with dApps (decentralized applications). Don’t blindly approve every request.Revoke permissions for smart contracts you no longer use by visiting sites that help you manage your approvals (e.g., revoke.cash).
5. Social Engineering
Social engineering attacks involve tricking you into voluntarily handing over your wallet details. Hackers may impersonate support staff, ask for your seed phrase, or offer fake assistance via social media or forums.
How to Protect Yourself:
Do not share sensitive information on social media or messaging platforms.Be wary of anyone offering unsolicited help, even if they claim to be from MetaMask or another trusted platform.
---
Share your experiences or security tips for protecting your MetaMask wallet in the comments! And don’t forget to follow me for more insights on keeping your crypto safe.
#MetaMask #CryptoSecurity #Phishing #DeFi #Blockchain
Zero transfer scammer steals $20M USDT, gets blacklisted by TetherZero transfer scams are becoming prominent in the crypto ecosystem, with over $40 million stolen in 2023. A scammer using zero transfer phishing attack managed to steal $20 million worth of Tether USDT on Aug. 1 before getting blacklisted by the stablecoin’s issuer Tether. According to an update from on-chain analytic firm PeckShield, A zero transfer scammer grabbed 20 million USDT from the victim address 0x4071...9Cbc. The intended address that the victim planned to send money to was 0xa7B4BAC8f0f9692e56750aEFB5f6cB5516E90570; however, it was sent to a phishing address instead: 0xa7Bf48749D2E4aA29e3209879956b9bAa9E90570. The zero transfer phishing scam. Source: Etherscan The victim’s wallet address first received $10 million from a Binance account. The victim then sent it to another address before the scammer jumped in. The scammer then sent a fake Zero USDT token transfer from the victim’s account to the phishing address. A few hours later, the victim sent 20 million USDT to the scammer, thinking they were transferring it to their desired address. The wallet was immediately frozen by USDT issuer Tether, which raised eyebrows at the speedy nature of the action. Users generally check the first or last five digits of a wallet address, not the whole address, leading them to send the assets to a phishing address. The victim is tricked into sending a transaction for zero tokens from their wallet to an address that resembles one to which they have already sent tokens before. For instance, if the victim sent 100 coins to an address for an exchange deposit, the attacker might send 0 coins from the victim’s wallet to an address that appears similar but is controlled by the attacker. Upon viewing this transaction in their transaction history, the victim might assume that the address displayed is the proper deposit address and send their coins to the phishing address. Zero transfer phishing scams have become quite prominent in the crypto ecosystem over the past year, with multiple instances coming to light. One of the first instances of a zero transfer scam occurred in December 2022, with over $40 million in losses to such attacks since. #blockchain #Cryptocurrencies #Phishing #Ethereum #Scams

Zero transfer scammer steals $20M USDT, gets blacklisted by Tether

Zero transfer scams are becoming prominent in the crypto ecosystem, with over $40 million stolen in 2023.

A scammer using zero transfer phishing attack managed to steal $20 million worth of Tether USDT on Aug. 1 before getting blacklisted by the stablecoin’s issuer Tether.

According to an update from on-chain analytic firm PeckShield, A zero transfer scammer grabbed 20 million USDT from the victim address 0x4071...9Cbc. The intended address that the victim planned to send money to was 0xa7B4BAC8f0f9692e56750aEFB5f6cB5516E90570; however, it was sent to a phishing address instead: 0xa7Bf48749D2E4aA29e3209879956b9bAa9E90570.

The zero transfer phishing scam. Source: Etherscan

The victim’s wallet address first received $10 million from a Binance account. The victim then sent it to another address before the scammer jumped in. The scammer then sent a fake Zero USDT token transfer from the victim’s account to the phishing address. A few hours later, the victim sent 20 million USDT to the scammer, thinking they were transferring it to their desired address.

The wallet was immediately frozen by USDT issuer Tether, which raised eyebrows at the speedy nature of the action.

Users generally check the first or last five digits of a wallet address, not the whole address, leading them to send the assets to a phishing address. The victim is tricked into sending a transaction for zero tokens from their wallet to an address that resembles one to which they have already sent tokens before.

For instance, if the victim sent 100 coins to an address for an exchange deposit, the attacker might send 0 coins from the victim’s wallet to an address that appears similar but is controlled by the attacker. Upon viewing this transaction in their transaction history, the victim might assume that the address displayed is the proper deposit address and send their coins to the phishing address.

Zero transfer phishing scams have become quite prominent in the crypto ecosystem over the past year, with multiple instances coming to light. One of the first instances of a zero transfer scam occurred in December 2022, with over $40 million in losses to such attacks since.

#blockchain

#Cryptocurrencies

#Phishing

#Ethereum

#Scams
What is Phishing and How to Protect Yourself Phishing is a type of online fraud where attackers try to deceive you into providing your personal information, such as passwords, credit card numbers, or other confidential details. How does phishing work? 🔵 False messages. You might receive an email or message that looks like it's from your bank, online store, or another service. The email usually contains a link or an attachment. 🔵 Fake websites. If you click on the link, you will be redirected to a fake website that looks like the real one. This site might ask you to enter your personal information. 🔵 Information theft. Once you enter your information on the fake site, it goes to the scammers, who can use it to steal money or perform other malicious actions. How to protect yourself from phishing? 🔵 Check the sender. Always carefully check the sender's email address. Scammers often use addresses that look similar to real ones. 🔵 Avoid suspicious links. Do not click on links or open attachments in suspicious emails. If in doubt, visit the site manually. 🔵 Use antivirus software. Install and regularly update antivirus software to protect yourself from phishing and other threats. Be careful with personal information. Never enter personal data on sites that seem suspicious to you.🛡 #Phishing #HackerAlert #BinanceTournament #updates
What is Phishing and How to Protect Yourself

Phishing is a type of online fraud where attackers try to deceive you into providing your personal information, such as passwords, credit card numbers, or other confidential details.

How does phishing work?

🔵 False messages. You might receive an email or message that looks like it's from your bank, online store, or another service. The email usually contains a link or an attachment.

🔵 Fake websites. If you click on the link, you will be redirected to a fake website that looks like the real one. This site might ask you to enter your personal information.

🔵 Information theft. Once you enter your information on the fake site, it goes to the scammers, who can use it to steal money or perform other malicious actions.

How to protect yourself from phishing?

🔵 Check the sender. Always carefully check the sender's email address. Scammers often use addresses that look similar to real ones.

🔵 Avoid suspicious links. Do not click on links or open attachments in suspicious emails. If in doubt, visit the site manually.

🔵 Use antivirus software. Install and regularly update antivirus software to protect yourself from phishing and other threats.

Be careful with personal information. Never enter personal data on sites that seem suspicious to you.🛡

#Phishing
#HackerAlert
#BinanceTournament
#updates
🚨 They Tried To Scam Us - Here’s How We Figured It Out! We were added to a “Binance Academy” WhatsApp group, promising prizes and crypto tips for $BTC and $ETH trading. But we quickly spotted some red flags: 🚩 WhatsApp Invite: Binance won’t use WhatsApp for official events. There's even a statement on the webpage about that! 🚩Silenced Group Members: User messaging was disabled – a common tactic scammers use to control the narrative. 🚩Unverifiable Admins: Generic names and nearly identical phone numbers from different country? Big red flag! 🚩Failed verification: Binance has a verification page for phone numbers and emails – none of the admins checked out. 🚩Google Search: A quick search revealed Reddit threads warning about this exact scam scenario. ✅ If you find yourself in a similar situation, remember this: 👉 Google & Verify: Scammers rely on victims not communicating! 👉If something feels off, it probably is. Remember: money doesn’t magically fall into your lap from anonymous online groups! Stay safe! 🌐 #ScamAlert #ScamAware #Phishing #Whatsapp
🚨 They Tried To Scam Us - Here’s How We Figured It Out!

We were added to a “Binance Academy” WhatsApp group, promising prizes and crypto tips for $BTC and $ETH trading.
But we quickly spotted some red flags:

🚩 WhatsApp Invite: Binance won’t use WhatsApp for official events. There's even a statement on the webpage about that!

🚩Silenced Group Members: User messaging was disabled – a common tactic scammers use to control the narrative.

🚩Unverifiable Admins: Generic names and nearly identical phone numbers from different country? Big red flag!

🚩Failed verification: Binance has a verification page for phone numbers and emails – none of the admins checked out.

🚩Google Search: A quick search revealed Reddit threads warning about this exact scam scenario.

✅ If you find yourself in a similar situation, remember this:

👉 Google & Verify: Scammers rely on victims not communicating!

👉If something feels off, it probably is. Remember: money doesn’t magically fall into your lap from anonymous online groups!

Stay safe! 🌐

#ScamAlert #ScamAware #Phishing #Whatsapp
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number