FAQ
Home
Support Center
FAQ
Security
Security Tips
How to Prevent Phishing Attacks

How to Prevent Phishing Attacks

2018-12-11 00:54

1. What is a phishing attack?

Phishing is a type of social engineering attack where scammers attempt to obtain information, such as usernames, passwords, two-factor authentication (2FA) codes, etc., by disguising themselves as a person or entity you trust. Some common examples include:
  • Emails with a fake sender address, also known as email spoofing.
  • SMS messages with fake sender details, also known as SMS spoofing.
  • Fake Binance websites that steal your login information.
  • Instant messages with malicious links.
  • Social media profiles with a malicious link.
  • Scammers impersonating Binance Support.
  • Fake social media accounts impersonating people or brands you trust.
  • Fake free Wi-Fi pages asking for sensitive information.

2. Identifying a phishing attack

The most important and weakest aspect of a security system is people. Tricking you into giving away your money is significantly easier than trying to hack into your Binance account.
Spoofed messages often contain subtle mistakes such as:
  • Spelling errors;
  • Strange syntax;
  • Clunky language;
  • Misspelled domain names.
In addition, attackers may try to push you into action by creating a sense of urgency. For example, an email might threaten that your account will expire, along with its funds, unless you move all assets to a “secure wallet.” This is a scam and the “secure wallet” belongs to the attacker.

3. Tips to secure your crypto from phishing attacks

There are various (non-exhaustive) precautions you can take to protect yourself from phishing attacks.
1. Ensure your web browser is updated to the latest version. Google Chrome or Mozilla Firefox will warn users of phishing or unsafe high-risk websites.
2. Use Binance Verify to cross-check any Binance domains, usernames, and employee names that you encounter. Only use trusted domains. Don’t click or download suspicious links if something seems off.
However, please still keep in mind that it’s common for scammers to send emails with a forged sender address. In such cases, even if Binance Verify confirms an email as a “Verified Source,” there’s still a chance that the email contains malicious content (including phishing links).
If you’re unsure, you can download the email as an EML file and send it to Binance Support to help review the file to see if it contains malicious content.
3. Enable two-factor authentication (2FA), such as email, SMS, biometrics, or Binance Authenticator. In the event your username and password is stolen, 2FA acts as an extra layer of protection against a hacker trying to use your compromised credentials.
4. Enable your anti-phishing code. It’s a unique combination of numbers and letters that will appear on every genuine email from Binance. Once enabled, steer clear of emails that don’t have your anti-phishing code.
5. Consider installing Chrome Netcraft Extension or Firefox Netcraft Anti-Phishing Extension.
  • Chrome Netcraft Extension
mceclip0.png
  • Firefox Netcraft Anti-Phishing Extension
mceclip1.png
  • Make sure to download extensions only from official sources or app stores — do your own research carefully before installing any extensions.
  • Keep your systems/applications updated to avoid security bugs. Install anti-virus software and keep it up to date.
  • Do not connect to an untrusted wireless network.

4. How to report a phishing attack

If you’re unsure of an email, SMS, or website’s legitimacy, contact Binance Support with screenshots and the EML file. The Binance security team will help verify authenticity.

5. How to download an EML file?

EML files provide additional information that can help the Binance security team verify an email’s authenticity. To download the EML file, click on the three dots on your email client (Gmail, Outlook, Proton, etc.) and select [Download message]. If you’re using QQmail or 163 Mail, click [Details], followed by [Export].
Right-click on the EML file you downloaded and click [Open With] - [Other]. Select [TextEdit] if you’re using macOS or [Notepad(++)] if you’re using Windows.

6. Phishing cases