Binance is one of the largest and most popular cryptocurrency exchanges worldwide. As a result, Binance users are heavily targeted by scammers running phishing campaigns. One common scam to watch for is the “Unknown Login Attempt” phishing attack.
This article provides a comprehensive guide on how this scam works and how to avoid falling victim. Read on to learn more about identifying bogus login warnings, keeping your account secure, and protecting your crypto assets.
An Overview of the Binance “Unknown Login” Crypto Scam
The Binance “Unknown Login Attempt” phishing scam involves emails and text messages pretending to be from Binance security. They claim that an unrecognized login attempt was detected from a new device.
You are instructed to “secure your account” by clicking a link to review the suspicious activity. The link goes to a fake Binance login page to steal your info.
Scammers take advantage of users’ fear of hacked accounts. By making victims panic, they are more likely to click without thinking. Once credentials are captured, the scammers raid crypto wallets.
This scam is commonly seen as:
- Emails about “Failed login attempts” from odd locations
- Texts about a “Withdrawal code” you didn’t create
- Warnings of a “New device” trying to access your account
The messages urge users to act quickly to halt the attack on their account. But the links actually lead to phishing sites to harvest login info or malware.
In the sections below, we’ll break down exactly how this scam ensnares victims step-by-step. We’ll also cover how to avoid falling for bogus login warnings and keeping your crypto truly secure.
Step-by-Step: How the Binance “Unknown Login” Scam Works
Here is a detailed walkthrough of how the “Unknown Login Attempt” phishing attack operates at each stage:
1. Scammers Obtain Targets’ Phone Numbers and Emails
The first step is for scammers to compile a list of potential victims. This includes obtaining emails, phone numbers, and other contact info.
Sources include data breaches, public records, social media sites, forum scraping, and the dark web. Anyone with a Binance account is a target.
2. Phishing Emails or Texts are Sent About a Suspicious Login
Using the collected contact data, scammers will send fake login warnings via email or SMS text. Email subjects often state something like “Failed login attempt!”
Texts claim to be withdrawal confirmation codes the recipient didn’t create. The scammer pretends to be Binance security teams in the content.
3. Messages Warn of an Unknown Device Accessing the Account
The emails or texts alert the victim of suspicious access from an unrecognized device. Locations like Russia, China, Ukraine or Afghanistan are sometimes named to raise fear.
The message urges the recipient to act quickly to secure the account and prevent withdrawals by the “hacker”. Finding the right balance of urgency and details is key.
4. Fake Binance Links are Provided to Review the “Activity”
Links are included in the phishing emails and texts for victims to “review the unauthorized login.”
The URLs lead to convincing fakes of the Binance login portal site hosted by the scammers. Links use obfuscated redirects to hide the true destination.
5. Victim Enters Login Credentials on the Phishing Site
Victims who click the link are taken to the clone Binance login page. Alarm over the account compromise leads many to enter their username and password without checking the URL.
The fake site captures all the login details entered by the victim. Some variants also request 2FA codes or ID selfies.
6. Scammers Login and Drain the Compromised Binance Account
Now in possession of the stolen credentials, the scammers swiftly login to the real Binance account. They drain any stored cryptocurrency into wallets under their control.
If 2FA was collected, they may disable it to maintain access. The victim is usually locked out by changed passwords or withdrawal holds.
7. The Remaining Account Balance is Liquidated
Scammers seek to extract every last dollar from compromised accounts. They will exchange any other coins to stablecoins or BTC and withdraw them.
Trading and staking balances are drained, and crypto dust is consolidated before a final asset sweep.
Within minutes an account can be emptied. As crypto transactions are irreversible, recovery is difficult if not impossible without Binance’s intervention.
This is how a convincing phishing scheme can completely devastate a Binance user’s account. It only takes a moment of panic clicking a link to unleash devastating loss.
What to Do If You Entered Credentials in the Scam Text or Email
If you already submitted your Binance login details via a phishing site, take these steps immediately:
- Step 1: Contact Binance Support – Notify them of the compromise and request they lock the account from withdrawals ASAP. Time is critical.
- Step 2: Initiate Account Recovery – Begin their account recovery process to try regaining access. This involves providing proof of ID and other details.
- Step 3: Change Devices – Access your email and Binance from a different, clean device when managing the recovery. Your original device may be compromised.
- Step 4: Reset Passwords – Change passwords on your email, Binance, and any linked accounts like bank or PayPal. Enable 2FA everywhere.
- Step 5: Monitor Accounts Closely – Watch your finances and crypto accounts to spot any signs of further unauthorized access in the coming weeks.
- Step 6: Scan Devices for Malware – Run full malware scans in case clicking the phishing link infected your device. Reinstall the OS if needed.
If some funds remain or you regain access, immediately transfer everything to new wallet addresses the scammer doesn’t have. Be vigilant for secondary scams professing to “recover” your lost crypto.
Identifying Fake Binance Login Warnings
Here are red flags to help identify phishing emails and text scams about unknown login attempts:
- Generic Greetings – Real Binance messages address you by name. Scams use generic terms like “Dear user”.
- Sense of Urgency – Aggressive language tries to spur you into urgent action to stop the “hackers”. Slow down and assess carefully.
- Request for Secrets – Binance would never ask for passwords, 2FA codes, or other account secrets via email or SMS.
- No Links Go to Binance.com – Hover over links to see the actual URLs. They should go directly to Binance.com, not some other domain.
- Poor Grammar/Spelling – Phishing content often contains typos, bad grammar, or other signs it wasn’t professional writing.
- No Initiated Transactions – Verify in your actual Binance account that the described “withdrawals” or “logins” didn’t really occur.
Err heavily on the side of caution when contacted about account security outside the Binance website. Routinely check for unauthorized transactions, use unique strong passwords, and avoid entering credentials anywhere but Binance.com.
Here is an SEO optimized section on how to spot phishing text messages for the Binance “Unknown Login Attempt” scam:
How to Identify Fake Binance Text Messages
In addition to phishing emails, the “Unknown Login Attempt” scam also uses SMS text messages to target Binance users. Here’s how to analyze texts to avoid falling victim:
Texts Often Pretend to be Withdrawal Confirmation Codes
Watch for messages claiming to be a withdrawal confirmation code that you didn’t initiate. For example:
- “Your Binance withdrawal code is 838593. Do not share this code with anyone.”
- “Binance: Your withdrawal request for 1.25 BTC has been submitted. Confirmation code: 462910”
Binance will never send withdrawal codes via text. Any such messages are fakes.
Urgent Warnings of Account Compromise
Other text scams urgently warn your account was compromised and you must immediately secure it:
- “ALERT: New Binance login detected. If this wasn’t you, instantly confirm here:”
- “Unauthorized activity detected! Secure your Binance account now before the hacker steals your funds!”
Messages like this aim to spur panic. Remain calm and verify in your Binance account.
Links to “Cancel” Withdrawals or “Review Activity”
The texts will urge you to click attached links to cancel the withdrawal or review the account compromise:
- “Suspicious Binance login – Secure your wallet now before it’s too late: [Link]”
- “Don’t allow this withdrawal! Reclaim your funds here:”
These redirect to phishing sites to steal login credentials or install malware.
Bad Grammar, Logo Issues, Odd Sender IDs
Look for poor grammar, low-quality logos lifted from legitimate sites, and strange sender IDs.
For example:
- “BinanceSupport287” instead of official brands
- “Plece clik teh link two secure youre Binace account”
- Pixelated, low-resolution logos
Scrutinize all identifying details in each text message. Limit risk by only accessing Binance directly via their website or official mobile app.
How to Spot Fake Binance Phishing Emails
In addition to text messages, scammers also distribute phishing emails pretending to be from Binance security teams. Here’s what to look for:
Subjects Warn of Failed Logins, Hacks, or New Devices
Watch for urgent subjects like:
- “Alert: Failed login attempt from new IP address”
- “Unauthorized activity on your Binance account!”
- “Binance: New unrecognized device detected”
These create urgency to lure recipients into hastily clicking.
Emails Claim Account is at Risk
The body content raises alarms about account security threats:
- “We have detected someone from a foreign IP trying to access your Binance account.”
- “A new device has been detected accessing your Binance account. If this was not you, your funds are at risk!”
- “Failed login attempts alert! Your Binance account may be targeted by hackers.”
Stirring fear makes users more prone to thoughtlessly click on links.
Links to “Review Activity” or “Secure Account”
Calls-to-action lead to phishing pages disguised as Binance login portals:
- “Review this activity now and secure your account.”
- “Click here immediately to block unauthorized access to your wallet!”
- “Protect your account from this attack – log in to verify suspicious activity.”
The sites capture entered credentials or distribute malware.
Analyze Email Headers and Sender Details
Look for inconsistencies in the sender address, domain, headers, and branding:
- Sender email does not end in @binance.com
- Bad grammar, spelling, or phrasing
- Low-quality copied logos
Scrutinize every aspect of emails related to account security threats. Access Binance only via verified official channels.
Protecting Yourself from the Binance “Unknown Login” Scam
Here are proactive measures to keep your Binance account safe and avoid phishing threats:
- Enable account protections – Require 2FA, IP address whitelisting, withdrawal address management, and other security tools offered by Binance.
- Create a strong unique password – Make a long, complex password just for Binance. Never reuse passwords across sites. Use a password manager.
- Be wary of phishing techniques – Note the red flags described above. Links should always go directly to Binance.com.
- Check sender addresses – For any security email, manually look at the sender address and domain. Don’t rely on the display name.
- Access via trusted Wi-Fi – Only login to Binance via known secure networks. Avoid public Wi-Fi which can expose activity.
- Use secure devices – Conduct sensitive transactions on non-compromised devices protected by security measures like VPNs and firewalls.
- Monitor account activity routinely – Log in frequently to check for any unauthorized transactions. Spot issues early before major damage.
- Report phishing scams – Alert Binance security if you receive any suspicious login warnings so they can investigate.
No scam prevention is 100% perfect against skilled social engineers. But making your account a hard target and verifying real Binance communications goes a long way.
Is Your Device Infected? Check for Malware
If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.
Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.
Scan your computer with Malwarebytes for Windows to remove malware
Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.
Download Malwarebytes for Windows
You can download Malwarebytes by clicking the link below.
MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes)-
Install Malwarebytes
After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.
Follow the On-Screen Prompts to Install Malwarebytes
When the Malwarebytes installation begins, the setup wizard will guide you through the process.
-
You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.
-
Malwarebytes will now begin the installation process on your device.
-
When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.
-
On the final screen, simply click on the Open Malwarebytes option to start the program.
-
Enable “Rootkit scanning”.
Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.
In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.
Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.
Perform a Scan with Malwarebytes.
To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.
-
Quarantine detected malware
Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.
Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.
-
Restart your computer.
When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.
Your computer should now be free of trojans, adware, browser hijackers, and other malware.
If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:
- Run a computer scan with ESET Online Scanner
- Ask for help in our Windows Malware Removal Help & Support forum.
Scan your computer with Malwarebytes for Mac to remove malware
Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.
-
Download Malwarebytes for Mac.
You can download Malwarebytes for Mac by clicking the link below.
MALWAREBYTES FOR MAC DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes for Mac) -
Double-click on the Malwarebytes setup file.
When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.
-
Follow the on-screen prompts to install Malwarebytes.
When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.
When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.
-
Select “Personal Computer” or “Work Computer”.
The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
-
Click on “Scan”.
To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
-
Click on “Quarantine”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
-
Restart computer.
Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
Your Mac should now be free of adware, browser hijackers, and other malware.
If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.
Scan your phone with Malwarebytes for Android to remove malware
Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.
-
Download Malwarebytes for Android.
You can download Malwarebytes for Android by clicking the link below.
MALWAREBYTES FOR ANDROID DOWNLOAD LINK
(The above link will open a new page from where you can download Malwarebytes for Android) -
Install Malwarebytes for Android on your phone.
In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.
When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
-
Follow the on-screen prompts to complete the setup process
When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
Tap on “Got it” to proceed to the next step.
Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
Tap on “Allow” to permit Malwarebytes to access the files on your phone. -
Update database and run a scan with Malwarebytes for Android
You will now be prompted to update the Malwarebytes database and run a full system scan.
Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.
-
Wait for the Malwarebytes scan to complete.
Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
-
Click on “Remove Selected”.
When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
-
Restart your phone.
Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.
Your phone should now be free of adware, browser hijackers, and other malware.
If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:
- Restore your phone to factory settings by going to Settings > General management > Reset > Factory data reset.
- Ask for help in our Mobile Malware Removal Help & Support forum.
Frequently Asked Questions
What is the Binance “Unknown Login Attempt” phishing scam?
This scam sends fake emails and texts pretending to be from Binance security teams. They warn recipients that an unrecognized device was detected accessing their account. You are provided links to urgently “secure your account” which actually lead to phishing sites designed to steal login credentials.
What are examples of the phishing emails?
Subjects state things like “Failed login attempt from new IP address”. The body warns that someone from a foreign address is trying to access your account. Links are provided to review and block the “unauthorized” activity which lead to credential harvesting sites.
What do the phishing text messages say?
Texts claim to be withdrawal confirmation codes that you didn’t initiate. Others warn of an account compromise and provide links to urgently “secure your account” against the attack. These links lead to phishing pages.
What is their goal with this scam?
By generating urgency and panic, scammers hope victims will hastily click the links without scrutiny. The phishing sites then capture entered login details to drain cryptocurrency from the compromised Binance account.
How can I avoid falling for this scam?
Carefully analyze sender details in emails and texts. Verify claims of unauthorized access directly in your Binance account. Never enter credentials anywhere but the real Binance website. Enable all account security protections offered by Binance.
What should I do if I clicked the link?
If you entered credentials, immediately contact Binance Support and initiate account recovery. Reset passwords on Binance and linked accounts. Scan devices for malware and monitor your accounts for further unauthorized access.
How can I report these phishing attempts?
Forward any scam emails to phishing@binance.com or report them from within your Binance account. You can also report phishing texts to your mobile provider and authorities. This helps get scam domains taken down.
Are phishing scams targeted at other exchanges too?
Yes, users of Coinbase, KuCoin, Crypto.com, and many other exchanges face phishing risks. Follow security best practices no matter what platforms you use to manage crypto.
How can I learn more about crypto phishing scams?
Binance Academy, CryptoCompare, and CoinDesk provide helpful guides. Stay up-to-date on the latest phishing tactics and enable all recommended account security features. Knowledge is key to avoiding scams.
The Bottom Line – Stay Vigilant Against Binance Phishing
The “Unknown Login Attempt” scam is one of countless ways cybercriminals target Binance users’ credentials through social engineering. Their techniques continue evolving, but the patterns remain similar.
Stay skeptical of urgent security threats described in unsolicited messages. Verify claims directly within your Binance account before clicking any links or sharing sensitive data.
Keep your account protected with strong passwords, 2FA, and other security tools available. Only access Binance via trusted devices on secure networks.
With vigilance, security awareness, and proper account hygiene, you can trade crypto on Binance without making yourself an easy phishing target. Stay alert and immediately report any suspicious activity.
By identifying and avoiding phishing tactics, you can keep your hard-earned crypto wealth safe from theft. Binance provides resources to combat scams, so leverage them fully as an active user.