Main topics of the post:

  • Binance's risk control team has implemented strict measures on the platform to protect users' accounts from being compromised. This includes optimizing cookie logout frequency and adding verification steps for abnormal transactions, which can help provide critical warnings and protect user funds. 

  • Additionally, our security experts recommend that users implement a set of proactive steps that can help them avoid falling victim to malicious browser plug-in attacks. Users should avoid installing third-party plugins in their browsers, immediately exit apps and extensions that have access to funds and financial accounts, and use the official Binance app and website.

  • Binance also encourages the community to participate in our Bug Bounty Program, which relies on crowdsourcing and a bounty system to help raise awareness of potential threats early.

Browser plug-ins are widely used to enhance the online experience, simplify workflows, and add functionality when accessing the web. However, not all plug-ins are benign, as some are weaponized by criminals and can therefore pose significant security risks. This article explores the potential dangers of malicious browser plug-ins and provides the community with tips to protect themselves from these attacks.

The hidden dangers of browser plug-ins

Web browser plug-ins, also known as extensions or add-ons, are programs designed to integrate with web browsers to provide additional features and functionality. While many plugins are legitimate and useful, others can be malicious. Malicious plugins can:

  1. Steal sensitive information: Some plugins can capture keystrokes, track browsing activities, and steal login credentials.

  2. Inject malicious code: Plugins can inject malicious scripts into web pages, leading to phishing attacks or malware installation.

  3. Hijacking sessions: Malicious plugins can hijack your login sessions, allowing attackers to access your accounts as if they were you.

  4. Changing your address: Malicious extensions can read and write clipboard contents, which could result in your deposit/withdrawal address on Binance or other financial platforms and services being tampered with, potentially causing the loss of funds.

Risk control as a game of cat and mouse

Risk control measures are always a balancing act that requires finding the ideal balance of safety and convenience. Insufficiently stringent measures can threaten the security of user assets, while overly stringent processes can harm the user experience. Thus, risk control is a kind of cat and mouse game between attack and defense, where security measures are rebalanced in response to evolving threats. Considering the risks posed by malicious browser attacks, the Binance risk control team takes the following measures to enhance user protection:

  • Increased cookie logout frequency and verification steps: The team adjusts the cookie logout frequency based on user scenarios, increases the verification frequency for plugin operations and cookie authorization, and adds necessary verification steps. security according to specific circumstances and user profiles.

  • Double confirmation for sudden price fluctuations: We implement double confirmations using big data-based alerts and manual verification for scenarios involving sudden price fluctuations.

  • Complementary risk control rules with 2FA verification: Transactions that appear abnormal trigger two-factor authentication before being processed.

How to protect yourself

As the cryptocurrency industry evolves, scamming and hacking methods are becoming increasingly sophisticated. Users need to constantly increase their security awareness and remain vigilant in the face of increasingly emerging security threats. To avoid falling victim to malicious plug-in attacks, users should consider the following measures:

  1. Limit plugin usage: Only install plugins that are absolutely necessary and trustworthy. The more plugins you install, the greater the risk of encountering a malicious plugin.

  2. Check Plugins: Before installing a plugin, research it thoroughly. Check reviews, developer information, and permissions it requests. Avoid granting unnecessary access permissions.

  3. Regularly review plugins: Periodically review and remove plugins that you no longer use. This reduces the potential attack surface.

  4. Keep your software up to date: Make sure your browser and any installed plug-ins are up to date. Developers frequently release updates to fix security vulnerabilities.

  5. Use security tools: Use antivirus and anti-malware tools to detect and prevent malicious activity.

  6. Isolated profile: Create a separate user profile to log into DAPPs and do not install any plugins in that profile.

  7. Immediate Logout: For any applications involving funds, remember to log out of the site immediately after use. Don't leave cookies active just because you want to avoid re-entering your password.

  8. Incognito mode: Open websites in incognito mode and disable all plugins.

  9. Extra privacy for financial apps: Use a dedicated device for financial operations.

  10. App Settings: Set financial apps to log you in immediately after a few minutes of inactivity (like many traditional banking apps do).

Binance Bug Bounty Program

In March 2019, Binance launched its Bug Bounty Program, which performs early detection of potential threats and rewards participants. The program has proven invaluable in improving the Binance platform's security systems. Root cause analysis of identified vulnerabilities helps us avoid similar risks in other existing or developing products, and any incident contributes to improving Binance's risk control and security. 

Binance remains firmly committed to user protection. Platform security measures and risk control are ongoing battles that require substantial and ongoing investment. As an industry leader, Binance will continue to build and improve security tools and defenses to protect users and their assets.

Further reading