Don’t Fall for the Binance “Unknown Login Attempt” Crypto Scam

Binance is one of the largest and most popular cryptocurrency exchanges worldwide. As a result, Binance users are heavily targeted by scammers running phishing campaigns. One common scam to watch for is the “Unknown Login Attempt” phishing attack.

This article provides a comprehensive guide on how this scam works and how to avoid falling victim. Read on to learn more about identifying bogus login warnings, keeping your account secure, and protecting your crypto assets.

Binance SMS Scam

Binance Scam

An Overview of the Binance “Unknown Login” Crypto Scam

The Binance “Unknown Login Attempt” phishing scam involves emails and text messages pretending to be from Binance security. They claim that an unrecognized login attempt was detected from a new device.

You are instructed to “secure your account” by clicking a link to review the suspicious activity. The link goes to a fake Binance login page to steal your info.

Scammers take advantage of users’ fear of hacked accounts. By making victims panic, they are more likely to click without thinking. Once credentials are captured, the scammers raid crypto wallets.

This scam is commonly seen as:

  • Emails about “Failed login attempts” from odd locations
  • Texts about a “Withdrawal code” you didn’t create
  • Warnings of a “New device” trying to access your account

The messages urge users to act quickly to halt the attack on their account. But the links actually lead to phishing sites to harvest login info or malware.

In the sections below, we’ll break down exactly how this scam ensnares victims step-by-step. We’ll also cover how to avoid falling for bogus login warnings and keeping your crypto truly secure.

Step-by-Step: How the Binance “Unknown Login” Scam Works

Here is a detailed walkthrough of how the “Unknown Login Attempt” phishing attack operates at each stage:

1. Scammers Obtain Targets’ Phone Numbers and Emails

The first step is for scammers to compile a list of potential victims. This includes obtaining emails, phone numbers, and other contact info.

Sources include data breaches, public records, social media sites, forum scraping, and the dark web. Anyone with a Binance account is a target.

2. Phishing Emails or Texts are Sent About a Suspicious Login

Using the collected contact data, scammers will send fake login warnings via email or SMS text. Email subjects often state something like “Failed login attempt!”

Texts claim to be withdrawal confirmation codes the recipient didn’t create. The scammer pretends to be Binance security teams in the content.

3. Messages Warn of an Unknown Device Accessing the Account

The emails or texts alert the victim of suspicious access from an unrecognized device. Locations like Russia, China, Ukraine or Afghanistan are sometimes named to raise fear.

The message urges the recipient to act quickly to secure the account and prevent withdrawals by the “hacker”. Finding the right balance of urgency and details is key.

4. Fake Binance Links are Provided to Review the “Activity”

Links are included in the phishing emails and texts for victims to “review the unauthorized login.”

The URLs lead to convincing fakes of the Binance login portal site hosted by the scammers. Links use obfuscated redirects to hide the true destination.

5. Victim Enters Login Credentials on the Phishing Site

Victims who click the link are taken to the clone Binance login page. Alarm over the account compromise leads many to enter their username and password without checking the URL.

The fake site captures all the login details entered by the victim. Some variants also request 2FA codes or ID selfies.

6. Scammers Login and Drain the Compromised Binance Account

Now in possession of the stolen credentials, the scammers swiftly login to the real Binance account. They drain any stored cryptocurrency into wallets under their control.

If 2FA was collected, they may disable it to maintain access. The victim is usually locked out by changed passwords or withdrawal holds.

7. The Remaining Account Balance is Liquidated

Scammers seek to extract every last dollar from compromised accounts. They will exchange any other coins to stablecoins or BTC and withdraw them.

Trading and staking balances are drained, and crypto dust is consolidated before a final asset sweep.

Within minutes an account can be emptied. As crypto transactions are irreversible, recovery is difficult if not impossible without Binance’s intervention.

This is how a convincing phishing scheme can completely devastate a Binance user’s account. It only takes a moment of panic clicking a link to unleash devastating loss.

What to Do If You Entered Credentials in the Scam Text or Email

If you already submitted your Binance login details via a phishing site, take these steps immediately:

  • Step 1: Contact Binance Support – Notify them of the compromise and request they lock the account from withdrawals ASAP. Time is critical.
  • Step 2: Initiate Account Recovery – Begin their account recovery process to try regaining access. This involves providing proof of ID and other details.
  • Step 3: Change Devices – Access your email and Binance from a different, clean device when managing the recovery. Your original device may be compromised.
  • Step 4: Reset Passwords – Change passwords on your email, Binance, and any linked accounts like bank or PayPal. Enable 2FA everywhere.
  • Step 5: Monitor Accounts Closely – Watch your finances and crypto accounts to spot any signs of further unauthorized access in the coming weeks.
  • Step 6: Scan Devices for Malware – Run full malware scans in case clicking the phishing link infected your device. Reinstall the OS if needed.

If some funds remain or you regain access, immediately transfer everything to new wallet addresses the scammer doesn’t have. Be vigilant for secondary scams professing to “recover” your lost crypto.

Identifying Fake Binance Login Warnings

Here are red flags to help identify phishing emails and text scams about unknown login attempts:

  • Generic Greetings – Real Binance messages address you by name. Scams use generic terms like “Dear user”.
  • Sense of Urgency – Aggressive language tries to spur you into urgent action to stop the “hackers”. Slow down and assess carefully.
  • Request for Secrets – Binance would never ask for passwords, 2FA codes, or other account secrets via email or SMS.
  • No Links Go to Binance.com – Hover over links to see the actual URLs. They should go directly to Binance.com, not some other domain.
  • Poor Grammar/Spelling – Phishing content often contains typos, bad grammar, or other signs it wasn’t professional writing.
  • No Initiated Transactions – Verify in your actual Binance account that the described “withdrawals” or “logins” didn’t really occur.

Err heavily on the side of caution when contacted about account security outside the Binance website. Routinely check for unauthorized transactions, use unique strong passwords, and avoid entering credentials anywhere but Binance.com.

Here is an SEO optimized section on how to spot phishing text messages for the Binance “Unknown Login Attempt” scam:

How to Identify Fake Binance Text Messages

In addition to phishing emails, the “Unknown Login Attempt” scam also uses SMS text messages to target Binance users. Here’s how to analyze texts to avoid falling victim:

Texts Often Pretend to be Withdrawal Confirmation Codes

Watch for messages claiming to be a withdrawal confirmation code that you didn’t initiate. For example:

  • “Your Binance withdrawal code is 838593. Do not share this code with anyone.”
  • “Binance: Your withdrawal request for 1.25 BTC has been submitted. Confirmation code: 462910”

Binance will never send withdrawal codes via text. Any such messages are fakes.

Urgent Warnings of Account Compromise

Other text scams urgently warn your account was compromised and you must immediately secure it:

  • “ALERT: New Binance login detected. If this wasn’t you, instantly confirm here:”
  • “Unauthorized activity detected! Secure your Binance account now before the hacker steals your funds!”

Messages like this aim to spur panic. Remain calm and verify in your Binance account.

Links to “Cancel” Withdrawals or “Review Activity”

The texts will urge you to click attached links to cancel the withdrawal or review the account compromise:

  • “Suspicious Binance login – Secure your wallet now before it’s too late: [Link]”
  • “Don’t allow this withdrawal! Reclaim your funds here:”

These redirect to phishing sites to steal login credentials or install malware.

Bad Grammar, Logo Issues, Odd Sender IDs

Look for poor grammar, low-quality logos lifted from legitimate sites, and strange sender IDs.

For example:

  • “BinanceSupport287” instead of official brands
  • “Plece clik teh link two secure youre Binace account”
  • Pixelated, low-resolution logos

Scrutinize all identifying details in each text message. Limit risk by only accessing Binance directly via their website or official mobile app.

How to Spot Fake Binance Phishing Emails

In addition to text messages, scammers also distribute phishing emails pretending to be from Binance security teams. Here’s what to look for:

Subjects Warn of Failed Logins, Hacks, or New Devices

Watch for urgent subjects like:

  • “Alert: Failed login attempt from new IP address”
  • “Unauthorized activity on your Binance account!”
  • “Binance: New unrecognized device detected”

These create urgency to lure recipients into hastily clicking.

Emails Claim Account is at Risk

The body content raises alarms about account security threats:

  • “We have detected someone from a foreign IP trying to access your Binance account.”
  • “A new device has been detected accessing your Binance account. If this was not you, your funds are at risk!”
  • “Failed login attempts alert! Your Binance account may be targeted by hackers.”

Stirring fear makes users more prone to thoughtlessly click on links.

Links to “Review Activity” or “Secure Account”

Calls-to-action lead to phishing pages disguised as Binance login portals:

  • “Review this activity now and secure your account.”
  • “Click here immediately to block unauthorized access to your wallet!”
  • “Protect your account from this attack – log in to verify suspicious activity.”

The sites capture entered credentials or distribute malware.

Analyze Email Headers and Sender Details

Look for inconsistencies in the sender address, domain, headers, and branding:

  • Sender email does not end in @binance.com
  • Bad grammar, spelling, or phrasing
  • Low-quality copied logos

Scrutinize every aspect of emails related to account security threats. Access Binance only via verified official channels.

Protecting Yourself from the Binance “Unknown Login” Scam

Here are proactive measures to keep your Binance account safe and avoid phishing threats:

  • Enable account protections – Require 2FA, IP address whitelisting, withdrawal address management, and other security tools offered by Binance.
  • Create a strong unique password – Make a long, complex password just for Binance. Never reuse passwords across sites. Use a password manager.
  • Be wary of phishing techniques – Note the red flags described above. Links should always go directly to Binance.com.
  • Check sender addresses – For any security email, manually look at the sender address and domain. Don’t rely on the display name.
  • Access via trusted Wi-Fi – Only login to Binance via known secure networks. Avoid public Wi-Fi which can expose activity.
  • Use secure devices – Conduct sensitive transactions on non-compromised devices protected by security measures like VPNs and firewalls.
  • Monitor account activity routinely – Log in frequently to check for any unauthorized transactions. Spot issues early before major damage.
  • Report phishing scams – Alert Binance security if you receive any suspicious login warnings so they can investigate.

No scam prevention is 100% perfect against skilled social engineers. But making your account a hard target and verifying real Binance communications goes a long way.

Is Your Device Infected? Check for Malware

If your device is running slowly or acting suspicious, it may be infected with malware. Malwarebytes Anti-Malware Free is a great option for scanning your device and detecting potential malware or viruses. The free version can efficiently check for and remove many common infections.  

Malwarebytes can run on Windows, Mac, and Android devices. Depending on which operating system is installed on the device you’re trying to run a Malwarebytes scan, please click on the tab below and follow the displayed steps.

Malwarebytes For WindowsMalwarebytes For MacMalwarebytes For Android

Scan your computer with Malwarebytes for Windows to remove malware

Malwarebytes stands out as one of the leading and widely-used anti-malware solutions for Windows, and for good reason. It effectively eradicates various types of malware that other programs often overlook, all at no cost to you. When it comes to disinfecting an infected device, Malwarebytes has consistently been a free and indispensable tool in the battle against malware. We highly recommend it for maintaining a clean and secure system.

  1. Download Malwarebytes for Windows

    You can download Malwarebytes by clicking the link below.

    MALWAREBYTES FOR WINDOWS DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes)
  2.  

    Install Malwarebytes

    After the download is complete, locate the MBSetup file, typically found in your Downloads folder. Double-click on the MBSetup file to begin the installation of Malwarebytes on your computer. If a User Account Control pop-up appears, click “Yes” to continue the Malwarebytes installation.

    MBAM1
  3. Follow the On-Screen Prompts to Install Malwarebytes

    When the Malwarebytes installation begins, the setup wizard will guide you through the process.

    • You’ll first be prompted to choose the type of computer you’re installing the program on—select either “Personal Computer” or “Work Computer” as appropriate, then click on Next.

      MBAM3 1
    • Malwarebytes will now begin the installation process on your device.

      MBAM4
    • When the Malwarebytes installation is complete, the program will automatically open to the “Welcome to Malwarebytes” screen.

      MBAM6 1
    • On the final screen, simply click on the Open Malwarebytes option to start the program.

      MBAM5 1
  4. Enable “Rootkit scanning”.

    Malwarebytes Anti-Malware will now start, and you will see the main screen as shown below. To maximize Malwarebytes’ ability to detect malware and unwanted programs, we need to enable rootkit scanning. Click on the “Settings” gear icon located on the left of the screen to access the general settings section.

    MBAM8

    In the settings menu, enable the “Scan for rootkits” option by clicking the toggle switch until it turns blue.

    MBAM9

    Now that you have enabled rootkit scanning, click on the “Dashboard” button in the left pane to get back to the main screen.

  5. Perform a Scan with Malwarebytes.

    To start a scan, click the Scan button. Malwarebytes will automatically update its antivirus database and begin scanning your computer for malicious programs.

    MBAM10
  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now scan your computer for browser hijackers and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check the status of the scan to see when it is finished.

    MBAM11
  7. Quarantine detected malware

    Once the Malwarebytes scan is complete, it will display a list of detected malware, adware, and potentially unwanted programs. To effectively remove these threats, click the “Quarantine” button.

    MBAM12

    Malwarebytes will now delete all of the files and registry keys and add them to the program’s quarantine.

    MBAM13

  8. Restart your computer.

    When removing files, Malwarebytes may require a reboot to fully eliminate some threats. If you see a message indicating that a reboot is needed, please allow it. Once your computer has restarted and you are logged back in, you can continue with the remaining steps.

    MBAM14

Your computer should now be free of trojans, adware, browser hijackers, and other malware.

If your current antivirus allowed this malicious program on your computer, you may want to consider purchasing Malwarebytes Premium to protect against these types of threats in the future.
If you are still having problems with your computer after completing these instructions, then please follow one of the steps:

Scan your computer with Malwarebytes for Mac to remove malware

Malwarebytes for Mac is an on-demand scanner that can destroy many types of malware that other software tends to miss without costing you absolutely anything. When it comes to cleaning up an infected device, Malwarebytes has always been free, and we recommend it as an essential tool in the fight against malware.

  1. Download Malwarebytes for Mac.

    You can download Malwarebytes for Mac by clicking the link below.

    MALWAREBYTES FOR MAC DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Mac)
  2. Double-click on the Malwarebytes setup file.

    When Malwarebytes has finished downloading, double-click on the setup file to install Malwarebytes on your computer. In most cases, downloaded files are saved to the Downloads folder.

    Double-click on setup file to install Malwarebytes

  3. Follow the on-screen prompts to install Malwarebytes.

    When the Malwarebytes installation begins, you will see the Malwarebytes for Mac Installer which will guide you through the installation process. Click “Continue“, then keep following the prompts to continue with the installation process.

    Click Continue to install Malwarebytes for Mac

    Click again on Continue to install Malwarebytes for Mac for Mac

    Click Install to install Malwarebytes on Mac

    When your Malwarebytes installation completes, the program opens to the Welcome to Malwarebytes screen. Click the “Get started” button.

  4. Select “Personal Computer” or “Work Computer”.

    The Malwarebytes Welcome screen will first ask you what type of computer are you installing this program, click either Personal Computer or Work Computer.
    Select Personal Computer or Work Computer mac

  5. Click on “Scan”.

    To scan your computer with Malwarebytes, click on the “Scan” button. Malwarebytes for Mac will automatically update the antivirus database and start scanning your computer for malware.
    Click on Scan button to start a system scan Mac

  6. Wait for the Malwarebytes scan to complete.

    Malwarebytes will scan your computer for adware, browser hijackers, and other malicious programs. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Wait for Malwarebytes for Mac to scan for malware

  7. Click on “Quarantine”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes has detected. To remove the malware that Malwarebytes has found, click on the “Quarantine” button.
    Review the malicious programs and click on Quarantine to remove malware

  8. Restart computer.

    Malwarebytes will now remove all the malicious files that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your computer.
    Malwarebytes For Mac requesting to restart computer

Your Mac should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious program on your computer, you might want to consider purchasing the full-featured version of Malwarebytes Anti-Malware to protect against these types of threats in the future.
If you are still experiencing problems while trying to remove a malicious program from your computer, please ask for help in our Mac Malware Removal Help & Support forum.

Scan your phone with Malwarebytes for Android to remove malware

Malwarebytes for Android automatically detects and removes dangerous threats like malware and ransomware so you don’t have to worry about your most-used device being compromised. Aggressive detection of adware and potentially unwanted programs keeps your Android phone or tablet running smooth.

  1. Download Malwarebytes for Android.

    You can download Malwarebytes for Android by clicking the link below.

    MALWAREBYTES FOR ANDROID DOWNLOAD LINK
    (The above link will open a new page from where you can download Malwarebytes for Android)
  2. Install Malwarebytes for Android on your phone.

    In the Google Play Store, tap “Install” to install Malwarebytes for Android on your device.

    Tap Install to install Malwarebytes for Android

    When the installation process has finished, tap “Open” to begin using Malwarebytes for Android. You can also open Malwarebytes by tapping on its icon in your phone menu or home screen.
    Malwarebytes for Android - Open App

  3. Follow the on-screen prompts to complete the setup process

    When Malwarebytes will open, you will see the Malwarebytes Setup Wizard which will guide you through a series of permissions and other setup options.
    This is the first of two screens that explain the difference between the Premium and Free versions. Swipe this screen to continue.
    Malwarebytes Setup Screen 1
    Tap on “Got it” to proceed to the next step.
    Malwarebytes Setup Screen 2
    Malwarebytes for Android will now ask for a set of permissions that are required to scan your device and protect it from malware. Tap on “Give permission” to continue.
    Malwarebytes Setup Screen 3
    Tap on “Allow” to permit Malwarebytes to access the files on your phone.
    Malwarebytes Setup Screen 4

  4. Update database and run a scan with Malwarebytes for Android

    You will now be prompted to update the Malwarebytes database and run a full system scan.

    Malwarebytes fix issue

    Click on “Update database” to update the Malwarebytes for Android definitions to the latest version, then click on “Run full scan” to perform a system scan.

    Update database and run Malwarebytes scan on phone

  5. Wait for the Malwarebytes scan to complete.

    Malwarebytes will now start scanning your phone for adware and other malicious apps. This process can take a few minutes, so we suggest you do something else and periodically check on the status of the scan to see when it is finished.
    Malwarebytes scanning Android for Vmalware

  6. Click on “Remove Selected”.

    When the scan has been completed, you will be presented with a screen showing the malware infections that Malwarebytes for Android has detected. To remove the malicious apps that Malwarebytes has found, tap on the “Remove Selected” button.
    Remove malware from your phone

  7. Restart your phone.

    Malwarebytes for Android will now remove all the malicious apps that it has found. To complete the malware removal process, Malwarebytes may ask you to restart your device.


Your phone should now be free of adware, browser hijackers, and other malware.

If your current antivirus allowed a malicious app on your phone, you may want to consider purchasing the full-featured version of Malwarebytes to protect against these types of threats in the future.
If you are still having problems with your phone after completing these instructions, then please follow one of the steps:

Frequently Asked Questions

What is the Binance “Unknown Login Attempt” phishing scam?

This scam sends fake emails and texts pretending to be from Binance security teams. They warn recipients that an unrecognized device was detected accessing their account. You are provided links to urgently “secure your account” which actually lead to phishing sites designed to steal login credentials.

What are examples of the phishing emails?

Subjects state things like “Failed login attempt from new IP address”. The body warns that someone from a foreign address is trying to access your account. Links are provided to review and block the “unauthorized” activity which lead to credential harvesting sites.

What do the phishing text messages say?

Texts claim to be withdrawal confirmation codes that you didn’t initiate. Others warn of an account compromise and provide links to urgently “secure your account” against the attack. These links lead to phishing pages.

What is their goal with this scam?

By generating urgency and panic, scammers hope victims will hastily click the links without scrutiny. The phishing sites then capture entered login details to drain cryptocurrency from the compromised Binance account.

How can I avoid falling for this scam?

Carefully analyze sender details in emails and texts. Verify claims of unauthorized access directly in your Binance account. Never enter credentials anywhere but the real Binance website. Enable all account security protections offered by Binance.

What should I do if I clicked the link?

If you entered credentials, immediately contact Binance Support and initiate account recovery. Reset passwords on Binance and linked accounts. Scan devices for malware and monitor your accounts for further unauthorized access.

How can I report these phishing attempts?

Forward any scam emails to phishing@binance.com or report them from within your Binance account. You can also report phishing texts to your mobile provider and authorities. This helps get scam domains taken down.

Are phishing scams targeted at other exchanges too?

Yes, users of Coinbase, KuCoin, Crypto.com, and many other exchanges face phishing risks. Follow security best practices no matter what platforms you use to manage crypto.

How can I learn more about crypto phishing scams?

Binance Academy, CryptoCompare, and CoinDesk provide helpful guides. Stay up-to-date on the latest phishing tactics and enable all recommended account security features. Knowledge is key to avoiding scams.

The Bottom Line – Stay Vigilant Against Binance Phishing

The “Unknown Login Attempt” scam is one of countless ways cybercriminals target Binance users’ credentials through social engineering. Their techniques continue evolving, but the patterns remain similar.

Stay skeptical of urgent security threats described in unsolicited messages. Verify claims directly within your Binance account before clicking any links or sharing sensitive data.

Keep your account protected with strong passwords, 2FA, and other security tools available. Only access Binance via trusted devices on secure networks.

With vigilance, security awareness, and proper account hygiene, you can trade crypto on Binance without making yourself an easy phishing target. Stay alert and immediately report any suspicious activity.

By identifying and avoiding phishing tactics, you can keep your hard-earned crypto wealth safe from theft. Binance provides resources to combat scams, so leverage them fully as an active user.

How to Stay Safe Online

Here are 10 basic security tips to help you avoid malware and protect your device:

  1. Use a good antivirus and keep it up-to-date.

    Shield Guide

    It's essential to use a good quality antivirus and keep it up-to-date to stay ahead of the latest cyber threats. We are huge fans of Malwarebytes Premium and use it on all of our devices, including Windows and Mac computers as well as our mobile devices. Malwarebytes sits beside your traditional antivirus, filling in any gaps in its defenses, and providing extra protection against sneakier security threats.

  2. Keep software and operating systems up-to-date.

    updates-guide

    Keep your operating system and apps up to date. Whenever an update is released for your device, download and install it right away. These updates often include security fixes, vulnerability patches, and other necessary maintenance.

  3. Be careful when installing programs and apps.

    install guide

    Pay close attention to installation screens and license agreements when installing software. Custom or advanced installation options will often disclose any third-party software that is also being installed. Take great care in every stage of the process and make sure you know what it is you're agreeing to before you click "Next."

  4. Install an ad blocker.

    Ad Blocker

    Use a browser-based content blocker, like AdGuard. Content blockers help stop malicious ads, Trojans, phishing, and other undesirable content that an antivirus product alone may not stop.

  5. Be careful what you download.

    Trojan Horse

    A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather.

  6. Be alert for people trying to trick you.

    warning sign

    Whether it's your email, phone, messenger, or other applications, always be alert and on guard for someone trying to trick you into clicking on links or replying to messages. Remember that it's easy to spoof phone numbers, so a familiar name or number doesn't make messages more trustworthy.

  7. Back up your data.

    backup sign

    Back up your data frequently and check that your backup data can be restored. You can do this manually on an external HDD/USB stick, or automatically using backup software. This is also the best way to counter ransomware. Never connect the backup drive to a computer if you suspect that the computer is infected with malware.

  8. Choose strong passwords.

    lock sign

    Use strong and unique passwords for each of your accounts. Avoid using personal information or easily guessable words in your passwords. Enable two-factor authentication (2FA) on your accounts whenever possible.

  9. Be careful where you click.

    cursor sign

    Be cautious when clicking on links or downloading attachments from unknown sources. These could potentially contain malware or phishing scams.

  10. Don't use pirated software.

    Shady Guide

    Avoid using Peer-to-Peer (P2P) file-sharing programs, keygens, cracks, and other pirated software that can often compromise your data, privacy, or both.

To avoid potential dangers on the internet, it's important to follow these 10 basic safety rules. By doing so, you can protect yourself from many of the unpleasant surprises that can arise when using the web.

Leave a Comment