Binance Square
LIVE
Binance Security
@Binance_Security
Binance Security Team and build a strong &secure web3 world
Following
Followers
Liked
Shared
All Content
LIVE
--
Our Security Team has recently detected a significant increase in the number of impersonating Twitter and Telegram accounts that are attempting to deceive and defraud our customers. These fraudulent accounts are often designed to look identical to legitimate accounts and may even use similar usernames and profile pictures to appear authentic. These malicious actors typically engage in the following activities: 1.Posting deceptive links that lead to phishing sites or malware downloads. 2.Sending direct messages with scam offers or requests for personal information. 3.Creating fake promotions or giveaways to lure unsuspecting users. What You Can Do to Stay Safe: 1.Verify Account Authenticity: Always check for the verified blue checkmark next to the account name, indicating it is a legitimate and verified Twitter account.Be cautious of accounts with unusual usernames, recent creation dates, or limited tweet history. 2.Avoid Clicking on Suspicious Links: Do not click on links from accounts you do not recognize or that seem suspicious.Hover over links to preview the URL before clicking. Ensure it leads to a legitimate website. Do Not Share Personal Information: 3.Never provide personal or financial information through direct messages or unverified websites.Be wary of requests for sensitive information, even if they appear to come from a known or trusted account. 4.Report Suspicious Activity: If you encounter an account that you believe is impersonating another user, report it to Twitter immediately.You can also report the incident to our Security Team by contacting our Customer Support Engineer. Impersonating accounts list: 1. https://twitter[.]com/heyibinance1 2. https://twitter[.]com/heyibibinance 3. https://twitter[.]com/heyibinance01 4. https://twitter[.]com/9heyibinance 5. https://twitter[.]com/heyibinance_566 6. https://t[.]me/heyibinance 7. https://t[.]me/heyibinances Stay vigilant and stay safe!
Our Security Team has recently detected a significant increase in the number of impersonating Twitter and Telegram accounts that are attempting to deceive and defraud our customers. These fraudulent accounts are often designed to look identical to legitimate accounts and may even use similar usernames and profile pictures to appear authentic.
These malicious actors typically engage in the following activities:
1.Posting deceptive links that lead to phishing sites or malware downloads.
2.Sending direct messages with scam offers or requests for personal information.
3.Creating fake promotions or giveaways to lure unsuspecting users.

What You Can Do to Stay Safe:
1.Verify Account Authenticity:
Always check for the verified blue checkmark next to the account name, indicating it is a legitimate and verified Twitter account.Be cautious of accounts with unusual usernames, recent creation dates, or limited tweet history.
2.Avoid Clicking on Suspicious Links:
Do not click on links from accounts you do not recognize or that seem suspicious.Hover over links to preview the URL before clicking. Ensure it leads to a legitimate website.
Do Not Share Personal Information:
3.Never provide personal or financial information through direct messages or unverified websites.Be wary of requests for sensitive information, even if they appear to come from a known or trusted account.
4.Report Suspicious Activity:
If you encounter an account that you believe is impersonating another user, report it to Twitter immediately.You can also report the incident to our Security Team by contacting our Customer Support Engineer.

Impersonating accounts list:
1. https://twitter[.]com/heyibinance1
2. https://twitter[.]com/heyibibinance
3. https://twitter[.]com/heyibinance01
4. https://twitter[.]com/9heyibinance
5. https://twitter[.]com/heyibinance_566
6. https://t[.]me/heyibinance
7. https://t[.]me/heyibinances

Stay vigilant and stay safe!
Update your Apple DeviceAccording to Slowmist, the Pegasus group is using iMessage accounts to send PassKit attachments containing malicious images to victims. This method is used to exploit vulnerabilities in Apple devices, particularly those used by crypto professionals.Two zero-day vulnerabilities that were being aggressively exploited by the Israeli NSO Group to install its Pegasus spyware on iPhones have been addressed by Apple. The zero-click vulnerability was discovered by internet watchdog group Citizen Lab wh

Update your Apple Device

According to Slowmist, the Pegasus group is using iMessage accounts to send PassKit attachments containing malicious images to victims. This method is used to exploit vulnerabilities in Apple devices, particularly those used by crypto professionals.Two zero-day vulnerabilities that were being aggressively exploited by the Israeli NSO Group to install its Pegasus spyware on iPhones have been addressed by Apple.

The zero-click vulnerability was discovered by internet watchdog group Citizen Lab wh
The Rise of Social Media Scams: Telegram and WhatsApp Cases in the Crypto WorldAs the popularity of cryptocurrencies continues to soar, scammers are finding innovative ways to con investors out of their hard-earned digital assets. More recently, social media platforms like Telegram and WhatsApp have become hotbeds for such fraudulent activities. Let's take a closer look at some examples. 1. Telegram: The Fake Bot Scam A user unsuspectingly engaged with a fraudulent Telegram bot, which falsely claimed to represent Binance. The bot deceitfully enticed the user by making an

The Rise of Social Media Scams: Telegram and WhatsApp Cases in the Crypto World

As the popularity of cryptocurrencies continues to soar, scammers are finding innovative ways to con investors out of their hard-earned digital assets. More recently, social media platforms like Telegram and WhatsApp have become hotbeds for such fraudulent activities. Let's take a closer look at some examples.

1. Telegram: The Fake Bot Scam

A user unsuspectingly engaged with a fraudulent Telegram bot, which falsely claimed to represent Binance. The bot deceitfully enticed the user by making an
Beware of Phishing: How Email Scammers are Targeting Crypto Exchange UsersPhishing scams, a form of cyber attack in which scammers try to trick you into sharing sensitive information, have been around for as long as the internet itself. With the rising popularity of cryptocurrency and exchanges such as Binance, these scams have evolved and become more sophisticated. Let's dive into the mechanics of these email phishing campaigns and how you can protect yourself. Real-World Case According to the phishing email samples reported by users, Binance users mainly receive t

Beware of Phishing: How Email Scammers are Targeting Crypto Exchange Users

Phishing scams, a form of cyber attack in which scammers try to trick you into sharing sensitive information, have been around for as long as the internet itself. With the rising popularity of cryptocurrency and exchanges such as Binance, these scams have evolved and become more sophisticated. Let's dive into the mechanics of these email phishing campaigns and how you can protect yourself.

Real-World Case

According to the phishing email samples reported by users, Binance users mainly receive t
DEV-0139 launches targeted attacks against the cryptocurrency industryOriginal Source: Microsoft Security Threat Intelligence Over the past several years, the cryptocurrency market has considerably expanded, gaining the interest of investors and threat actors. Cryptocurrency itself has been used by cybercriminals for their operations, notably for ransom payment in ransomware attacks, but we have also observed threat actors directly targeting organizations within the cryptocurrency industry for financial gain. Attacks targeting this market have taken many forms, i

DEV-0139 launches targeted attacks against the cryptocurrency industry

Original Source: Microsoft Security Threat Intelligence

Over the past several years, the cryptocurrency market has considerably expanded, gaining the interest of investors and threat actors. Cryptocurrency itself has been used by cybercriminals for their operations, notably for ransom payment in ransomware attacks, but we have also observed threat actors directly targeting organizations within the cryptocurrency industry for financial gain. Attacks targeting this market have taken many forms, i
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number

Latest News

--
View More

Trending Articles

View More
Sitemap
Cookie Preferences
Platform T&Cs