Types of Phishing - URL Spoof
Every time you want to access Binance.com or log In to your account, please pay attention to the security recommendations below:
One more recommendation should be noted:
Don’t enable API if you’re not going to use it.
Users may be attacked by phishing website via search engine referrals, browser plugins/extensions, third-party, or invalid apps that might try to steal your API access/private key.
- Risky search engine referrals. Navigate users to phishing websites.
- Risky browser plugins/extensions. Navigate users to phishing websites.
- Risky email with a phishing link
- Some users may have installed third-party applications to manage their investment portfolios, or install invalid apps from an app store.
Phishing websites attempt to trick users into exposing their confidential information such as their password and 2FA code. Therefore, hackers can steal users’ coins through API withdrawals and abnormal buy/sell orders.
The logs below illustrate a phishing attack through search engine referrals:
Server logs listed the process of coins stolen:
- Login: 126.96.36.199 2018-02-05 09:54
- Modify API: 188.8.131.52 2018-02-05 10:00
- Confirm API withdraw: 184.108.40.206 2018-02-05 10:01
- Login: 220.127.116.11 2018-02-05 10:02
- Complete API withdraw: 18.104.22.168 2018-02-05 10:02
- Delete API: 22.214.171.124 2018-02-05 10:03
One victim attacked by a phishing website described details as below:
Appendix of suspicious phishing websites.