Binance Square
#securityalert

securityalert

484,727 views
893 Discussing
shreerk
·
--
Deepfake Musk Streams Draining Millions! 🛑 Scammers are using AI deepfakes to create realistic YouTube/X livestreams of Elon Musk and Vitalik Buterin promising "1 BTC for 2 BTC" giveaways. One recent stream collected over $5M in 20 minutes before being taken down. If you send crypto to "verify" your wallet, you lose it instantly. There is NO matching giveaway. #DeepfakeScam #SecurityAlert #ElonMusk
Deepfake Musk Streams Draining Millions! 🛑

Scammers are using AI deepfakes to create realistic YouTube/X livestreams of Elon Musk and Vitalik Buterin promising "1 BTC for 2 BTC" giveaways.

One recent stream collected over $5M in 20 minutes before being taken down.

If you send crypto to "verify" your wallet, you lose it instantly. There is NO matching giveaway.

#DeepfakeScam #SecurityAlert #ElonMusk
🚨 Security Alert: AethirOFTAdapter Exploited 🚨 A major security breach has shaken the crypto space as AethirOFTAdapter suffered an exploit resulting in losses exceeding $400,000. 🔍 What Happened? Attackers identified a vulnerability in the adapter contract and executed a targeted exploit, siphoning funds quickly before detection. 💸 Fund Movement The stolen assets were swiftly bridged to the TRON network, making tracking and recovery more challenging. ⚠️ Market Impact Raises concerns over cross-chain bridge security Highlights ongoing risks in DeFi infrastructure Investors urged to stay cautious with new protocols 🛡️ Key Takeaway Always verify smart contract audits and security measures before investing. In DeFi, security is everything. 📊 Stay alert. Stay informed. #CryptoNews #DeFi #SecurityAlert #TRON #Blockchain #CryptoSafety #Binance #Web3 🚀
🚨 Security Alert: AethirOFTAdapter Exploited 🚨
A major security breach has shaken the crypto space as AethirOFTAdapter suffered an exploit resulting in losses exceeding $400,000.
🔍 What Happened?
Attackers identified a vulnerability in the adapter contract and executed a targeted exploit, siphoning funds quickly before detection.
💸 Fund Movement
The stolen assets were swiftly bridged to the TRON network, making tracking and recovery more challenging.
⚠️ Market Impact
Raises concerns over cross-chain bridge security
Highlights ongoing risks in DeFi infrastructure
Investors urged to stay cautious with new protocols
🛡️ Key Takeaway
Always verify smart contract audits and security measures before investing. In DeFi, security is everything.
📊 Stay alert. Stay informed.
#CryptoNews #DeFi #SecurityAlert #TRON #Blockchain #CryptoSafety #Binance #Web3 🚀
STOP SCAMS: Beware of Fake Support! 🛡️ ATTENTION COMMUNITY! ⚠️ Scammers are using fake Binance profiles to deceive in P2P. As your Crypto Teacher, I bring you these Quick Safety Tips to protect your funds: OFFICIAL CHAT ONLY: Real support only operates within the official App. Binance will never message you on WhatsApp or Telegram! 🚫 NEVER SHARE CODES: Never give your 2FA codes or passwords. Binance never asks for your password. 🔑 DON'T RELEASE UNDER PRESSURE: If they threaten to block your account for not releasing, it’s a SCAM! Stay calm and appeal. BE SMART, STAY SAFE. 🚀 Educating yourself is protecting yourself. Have you ever been contacted privately? I’m reading your comments! 👇 $POL $TLM $BTC #P2P #SecurityAlert #BinanceSquare #venezuela
STOP SCAMS: Beware of Fake Support! 🛡️

ATTENTION COMMUNITY! ⚠️ Scammers are using fake Binance profiles to deceive in P2P. As your Crypto Teacher, I bring you these Quick Safety Tips to protect your funds:

OFFICIAL CHAT ONLY: Real support only operates within the official App. Binance will never message you on WhatsApp or Telegram! 🚫
NEVER SHARE CODES: Never give your 2FA codes or passwords. Binance never asks for your password. 🔑
DON'T RELEASE UNDER PRESSURE: If they threaten to block your account for not releasing, it’s a SCAM! Stay calm and appeal.

BE SMART, STAY SAFE. 🚀 Educating yourself is protecting yourself. Have you ever been contacted privately? I’m reading your comments! 👇
$POL $TLM $BTC
#P2P #SecurityAlert #BinanceSquare #venezuela
🚨 Is Binance banning without reason? What they DON’T tell you to protect your account. ​ ​I have seen many complaints about blocked accounts and sudden bans. It's not bad luck, it's the new security algorithm. 🛡️ ​3 Reasons why your account is at risk today: ​Irresponsible P2P: Receiving payments from third parties or accounts that do not match the account holder. If the name doesn't match, CANCEL! ​Comment Abuse: The Square algorithm now detects "spam" from bots. If you just comment the same thing everywhere, you will be marked as a ghost account. ​Expired Verification: Many ignore updates to their identification documents. ​My advice: Do not trade with fear, trade with information. I prefer that you lose a trade than lose your Binance account. ​💬 Has anyone here had their account blocked or experienced problems with P2P recently? Tell us your case to help you. 👇 #BinanceSquare #P2P #SecurityAlert #CryptoSafety #BinanceSupport
🚨 Is Binance banning without reason? What they DON’T tell you to protect your account.

​I have seen many complaints about blocked accounts and sudden bans. It's not bad luck, it's the new security algorithm. 🛡️
​3 Reasons why your account is at risk today:
​Irresponsible P2P: Receiving payments from third parties or accounts that do not match the account holder. If the name doesn't match, CANCEL!
​Comment Abuse: The Square algorithm now detects "spam" from bots. If you just comment the same thing everywhere, you will be marked as a ghost account.
​Expired Verification: Many ignore updates to their identification documents.
​My advice: Do not trade with fear, trade with information. I prefer that you lose a trade than lose your Binance account.

​💬 Has anyone here had their account blocked or experienced problems with P2P recently? Tell us your case to help you. 👇
#BinanceSquare #P2P #SecurityAlert #CryptoSafety #BinanceSupport
Pancho 53:
dónde se ve la verificación al día ??
STOP SCAMS: Beware of Fake Support! 🛡️ ATTENTION COMMUNITY! ⚠️ Scammers are using fake Binance profiles to deceive in P2P. As your Crypto Teacher, I bring you these Quick Safety Tips to protect your funds: OFFICIAL CHAT ONLY: Real support only operates within the official App. Binance will never contact you via WhatsApp or Telegram! 🚫 NEVER SHARE CODES: Never give your 2FA codes or passwords. Binance never asks for your password. 🔑 DON'T RELEASE UNDER PRESSURE: If they threaten to lock your account for not releasing, it’s a SCAM! Stay calm and appeal. BE SMART, STAY SAFE. 🚀 Educating yourself is protecting yourself. Have you ever been contacted privately? I await your comments! 👇 #P2P #SecurityAlert #CandelariaWilham #BinanceSquare #venezuela
STOP SCAMS: Beware of Fake Support! 🛡️

ATTENTION COMMUNITY! ⚠️ Scammers are using fake Binance profiles to deceive in P2P. As your Crypto Teacher, I bring you these Quick Safety Tips to protect your funds:

OFFICIAL CHAT ONLY: Real support only operates within the official App. Binance will never contact you via WhatsApp or Telegram! 🚫
NEVER SHARE CODES: Never give your 2FA codes or passwords. Binance never asks for your password. 🔑
DON'T RELEASE UNDER PRESSURE: If they threaten to lock your account for not releasing, it’s a SCAM! Stay calm and appeal.

BE SMART, STAY SAFE. 🚀 Educating yourself is protecting yourself. Have you ever been contacted privately? I await your comments! 👇

#P2P #SecurityAlert #CandelariaWilham #BinanceSquare #venezuela
·
--
Bullish
⚠️ $ETH {future}(ETHUSDT) Short Setup — Watch Closely! ⚠️ Trade Plan — SHORT: Entry: 2138 – 2190 Stop Loss: 2219 Targets: 🎯 TP1: 2107 🎯 TP2: 2089 🎯 TP3: 2064 Security Note: Reports indicate a nation-state hacking group may be profiting from ETH swing trading and using funds to infiltrate other protocols, raising broader ecosystem security concerns. 💡 Trade smart, manage risk, and stay aware of potential market manipulations. #ETH #CryptoTrading #ShortSetup #SecurityAlert
⚠️ $ETH
Short Setup — Watch Closely! ⚠️
Trade Plan — SHORT:
Entry: 2138 – 2190
Stop Loss: 2219
Targets:
🎯 TP1: 2107
🎯 TP2: 2089
🎯 TP3: 2064
Security Note:
Reports indicate a nation-state hacking group may be profiting from ETH swing trading and using funds to infiltrate other protocols, raising broader ecosystem security concerns.
💡 Trade smart, manage risk, and stay aware of potential market manipulations.
#ETH #CryptoTrading #ShortSetup #SecurityAlert
Article
EXCLUSIVE: One Computer Key. $285 Million. That's All It Took.The Exploit That Changes Everything Just 72 hours ago, Solana's largest lending protocol, Drift, was gutted. $285 million gone. Not by complex code. Not by a flash loan genius. By a single compromised admin key. Here's what Binance users need to know right now — because the same vulnerability exists in dozens of protocols you might be using. How One Key Broke DeFi's Back The attacker didn't hack smart contracts. They hacked permissions. Step-by-step breakdown: 1. Attacker obtained Drift's admin key (method still unknown — internal leak? phishing? malware?) 2. Listed a fake token called "CarbonVote Token" (CVT) on Drift 3. Manipulated CVT's price on Raydium from $0.0001 to $1 4. Deposited worthless CVT as collateral 5. Raised withdrawal limits using the same admin key 6. Drained $285M in USDC, SOL, and other real assets No exploit code. No smart contract bug. Just one key with too much power. The Part Nobody Is Talking About Circle refused to freeze the stolen USDC during U.S. business hours. The exploit happened Thursday evening (Asia time). By Friday morning in New York, funds were already mixed through bridges. Circle's official response: "We follow lawful process, not market panic." Translation: $285M is gone forever. Binance's Internal Alert — Leaked to Us A Binance security memo (shared with our team on condition of anonymity) now warns all listing reviewers to: "Flag any protocol using single-admin key architecture or lacking timelocks. Add to high-risk watchlist immediately." This is the first time Binance has publicly acknowledged admin key risk as a listing criterion. Expect faster delistings for protocols without multi-sig or timelock protections. The Human Cost — One Trader's Story "I lost my entire position. $40,000. Not even a warning from Drift." — @SOLwhale_4, a Binance user since 2022 Drift had passed an audit by ClawSecure just six weeks ago. The audit reviewed smart contracts — not admin permissions. A distinction that cost real people their savings. Your 3-Step Protection Plan (Right Now) Before you trade or lend on any DeFi protocol connected to Binance: 1. Check admin keys — Look for "multi-sig" or "timelock" in docs. Single key = single point of failure. 2. Verify recent audit scope — Did they audit permissions or just code? Ask before depositing. 3. Set withdrawal limits manually — If protocol allows, cap daily withdrawals. It won't stop a hack, but it slows the bleed. What Happens Next · DRIFT token — Down 67% from pre-hack levels. Liquidity is vanishing. · Solana TVL — Dropped $900M in three days. Fear is spreading. · Binance action — Expect an official statement within 48 hours. Some Solana projects may face accelerated delisting reviews. Finally: The Drift hack wasn't a failure of code. It was a failure of trust. Until protocols prove they can't be drained by a single compromised laptop, treat every deposit like it could vanish overnight. Stay sharp. Stay paranoid. And never assume "audited" means "safe." #DriftProtocol #Solana #DeFiHack #SecurityAlert #BinanceAlert

EXCLUSIVE: One Computer Key. $285 Million. That's All It Took.

The Exploit That Changes Everything
Just 72 hours ago, Solana's largest lending protocol, Drift, was gutted. $285 million gone.
Not by complex code.
Not by a flash loan genius.
By a single compromised admin key.
Here's what Binance users need to know right now — because the same vulnerability exists in dozens of protocols you might be using.
How One Key Broke DeFi's Back
The attacker didn't hack smart contracts. They hacked permissions.
Step-by-step breakdown:
1. Attacker obtained Drift's admin key (method still unknown — internal leak? phishing? malware?)
2. Listed a fake token called "CarbonVote Token" (CVT) on Drift
3. Manipulated CVT's price on Raydium from $0.0001 to $1
4. Deposited worthless CVT as collateral
5. Raised withdrawal limits using the same admin key
6. Drained $285M in USDC, SOL, and other real assets
No exploit code. No smart contract bug. Just one key with too much power.
The Part Nobody Is Talking About
Circle refused to freeze the stolen USDC during U.S. business hours.
The exploit happened Thursday evening (Asia time). By Friday morning in New York, funds were already mixed through bridges. Circle's official response: "We follow lawful process, not market panic."
Translation: $285M is gone forever.
Binance's Internal Alert — Leaked to Us
A Binance security memo (shared with our team on condition of anonymity) now warns all listing reviewers to:
"Flag any protocol using single-admin key architecture or lacking timelocks. Add to high-risk watchlist immediately."
This is the first time Binance has publicly acknowledged admin key risk as a listing criterion. Expect faster delistings for protocols without multi-sig or timelock protections.
The Human Cost — One Trader's Story
"I lost my entire position. $40,000. Not even a warning from Drift."
— @SOLwhale_4, a Binance user since 2022
Drift had passed an audit by ClawSecure just six weeks ago. The audit reviewed smart contracts — not admin permissions. A distinction that cost real people their savings.
Your 3-Step Protection Plan (Right Now)
Before you trade or lend on any DeFi protocol connected to Binance:
1. Check admin keys — Look for "multi-sig" or "timelock" in docs. Single key = single point of failure.
2. Verify recent audit scope — Did they audit permissions or just code? Ask before depositing.
3. Set withdrawal limits manually — If protocol allows, cap daily withdrawals. It won't stop a hack, but it slows the bleed.
What Happens Next
· DRIFT token — Down 67% from pre-hack levels. Liquidity is vanishing.
· Solana TVL — Dropped $900M in three days. Fear is spreading.
· Binance action — Expect an official statement within 48 hours. Some Solana projects may face accelerated delisting reviews.
Finally:
The Drift hack wasn't a failure of code.
It was a failure of trust.
Until protocols prove they can't be drained by a single compromised laptop, treat every deposit like it could vanish overnight.
Stay sharp. Stay paranoid. And never assume "audited" means "safe."
#DriftProtocol #Solana #DeFiHack #SecurityAlert #BinanceAlert
Article
🚨Solana Tests Quantum Resistant security🚨 SOLANA TESTS QUANTUM-RESISTANT SECURITY 🚨 🔐 Solana ($SOL ) teams up with Project Eleven ⚡ WHAT’S HAPPENING? • Testing next-gen quantum-safe signatures • Aim: protect against future quantum computer threats 📊 EARLY RESULTS: • 📈 Signatures up to 40× larger • 🐢 Network becomes ~90% slower 🧠 WHAT IT MEANS: • 🟢 Strong future security upgrade • 🔴 Major performance trade-offs for now 🚀 BOTTOM LINE: • Long-term = BULLISH (future-proof tech) • Short-term = challenging (speed & efficiency issues) #quantumcomputers #SecurityAlert #bullish

🚨Solana Tests Quantum Resistant security

🚨 SOLANA TESTS QUANTUM-RESISTANT SECURITY 🚨
🔐 Solana ($SOL ) teams up with Project Eleven
⚡ WHAT’S HAPPENING?
• Testing next-gen quantum-safe signatures
• Aim: protect against future quantum computer threats
📊 EARLY RESULTS:
• 📈 Signatures up to 40× larger
• 🐢 Network becomes ~90% slower
🧠 WHAT IT MEANS:
• 🟢 Strong future security upgrade
• 🔴 Major performance trade-offs for now
🚀 BOTTOM LINE:
• Long-term = BULLISH (future-proof tech)
• Short-term = challenging (speed & efficiency issues) #quantumcomputers #SecurityAlert #bullish
·
--
Security at the top: BlockSec and Cobo join forces! 🛡️ Global payment security has just gained a significant boost. BlockSec (a reference in auditing) and Cobo announced a strategic partnership to integrate KYT (Know Your Transaction) technology directly into on-chain payment APIs. What does this change in practice? Less risk of fraud, complete compliance against money laundering, and much faster processes for companies operating globally. BlockSec's CEO, Zhou Yajin, was straightforward: the goal is to create a new security standard for the ecosystem. In a market where trust is everything, seeing infrastructure giants coming together to safeguard our transactions is a huge sign of maturation! But I want to hear from you here at Square: 1️⃣ Do you feel safe making international transactions via blockchain today? 2️⃣ Or do you think excessive compliance can take away the freedom of cryptos? Comment your view below! 👇 #SecurityAlert #Blockchain #BlockSec #Cobo #Web3 {spot}(BTCUSDT)
Security at the top: BlockSec and Cobo join forces! 🛡️

Global payment security has just gained a significant boost. BlockSec (a reference in auditing) and Cobo announced a strategic partnership to integrate KYT (Know Your Transaction) technology directly into on-chain payment APIs.

What does this change in practice?

Less risk of fraud, complete compliance against money laundering, and much faster processes for companies operating globally. BlockSec's CEO, Zhou Yajin, was straightforward: the goal is to create a new security standard for the ecosystem.
In a market where trust is everything, seeing infrastructure giants coming together to safeguard our transactions is a huge sign of maturation!

But I want to hear from you here at Square:
1️⃣ Do you feel safe making international transactions via blockchain today?
2️⃣ Or do you think excessive compliance can take away the freedom of cryptos?

Comment your view below! 👇
#SecurityAlert #Blockchain #BlockSec #Cobo #Web3
$DRIFT HACK JUST BLEW A $285M HOLE 🚨 A coordinated exploit appears to have hit Drift Protocol after a fake collateral asset, manipulated oracle pricing, and compromised admin keys were used to disable withdrawal safeguards. Onchain analysis suggests the attack was prepared for weeks, with the attacker inflating bogus collateral and then draining multiple vaults in roughly 12 minutes. This is a serious trust shock for DeFi risk engines and admin-control assumptions. Expect institutional attention to center on oracle integrity, privilege management, and whether other protocols share the same attack surface. The market will punish weak security narratives fast. If this spreads across DeFi confidence, I’d expect risk-off behavior toward protocols with thin liquidity and centralized control points. Not financial advice. Manage your risk. #DeFi #CryptoNews #Onchain #SecurityAlert #Drift 🛡️ {alpha}(CT_501DriFtupJYLTosbwoN8koMbEYSx54aFAVLddWsbksjwg7)
$DRIFT HACK JUST BLEW A $285M HOLE 🚨

A coordinated exploit appears to have hit Drift Protocol after a fake collateral asset, manipulated oracle pricing, and compromised admin keys were used to disable withdrawal safeguards. Onchain analysis suggests the attack was prepared for weeks, with the attacker inflating bogus collateral and then draining multiple vaults in roughly 12 minutes.

This is a serious trust shock for DeFi risk engines and admin-control assumptions. Expect institutional attention to center on oracle integrity, privilege management, and whether other protocols share the same attack surface.

The market will punish weak security narratives fast. If this spreads across DeFi confidence, I’d expect risk-off behavior toward protocols with thin liquidity and centralized control points.

Not financial advice. Manage your risk.

#DeFi #CryptoNews #Onchain #SecurityAlert #Drift

🛡️
ATTENTION! LET'S TAKE CARE OF EACH OTHER! Chinese printer manufacturer may be spreading malware that steals bitcoins The Chinese printer manufacturer Procolored may be spreading clipboard hijacking malware through its official drivers in a supply chain attack that resulted in over $950,000 in stolen funds. The Chinese printer manufacturer Procolored distributed malware that steals Bitcoin along with its official drivers, according to local media reports. #BinancePizza #SecurityAlert #SecureYourTokens #BinanceSquareFamily #BitcoinSecurity
ATTENTION!
LET'S TAKE CARE OF EACH OTHER!

Chinese printer manufacturer may be spreading malware that steals bitcoins

The Chinese printer manufacturer Procolored may be spreading clipboard hijacking malware through its official drivers in a supply chain attack that resulted in over $950,000 in stolen funds.

The Chinese printer manufacturer Procolored distributed malware that steals Bitcoin along with its official drivers, according to local media reports.

#BinancePizza
#SecurityAlert
#SecureYourTokens
#BinanceSquareFamily
#BitcoinSecurity
The future of money is here and it is decentralized, secure, and global! 🌍 Dive into the universe of Bitcoin, the financial revolution that is changing the way we interact with value. With each digital coin, a world of possibilities opens up: borderless transactions, unbreakable security, and a system empowered by the people, not by institutions. Don't get left behind. Discover how Bitcoin connects you to a fairer and more efficient global economy. #bitcoin #FutureTarding #Descentralización #SecurityAlert #Global
The future of money is here and it is decentralized, secure, and global! 🌍
Dive into the universe of Bitcoin, the financial revolution that is changing the way we interact with value. With each digital coin, a world of possibilities opens up: borderless transactions, unbreakable security, and a system empowered by the people, not by institutions.
Don't get left behind. Discover how Bitcoin connects you to a fairer and more efficient global economy.
#bitcoin #FutureTarding #Descentralización #SecurityAlert #Global
🚨 Security Alert: x402 Cross-Chain Protocol Breach According to PANews, the GoPlus Chinese community has issued a security alert regarding a potential theft involving the x402 cross-chain protocol (@402bridge). The contract owner transferred control to another address, which then used contract functions to withdraw 17,693 USDC from over 200 user wallets. The stolen funds were later converted to ETH and moved to Arbitrum through cross-chain transactions. 🔒 User Advisory: Immediately revoke related authorizations. Always verify official contract addresses. Avoid unlimited authorizations and review permissions regularly to protect your assets.#SecurityAlert #x402
🚨 Security Alert: x402 Cross-Chain Protocol Breach

According to PANews, the GoPlus Chinese community has issued a security alert regarding a potential theft involving the x402 cross-chain protocol (@402bridge).

The contract owner transferred control to another address, which then used contract functions to withdraw 17,693 USDC from over 200 user wallets. The stolen funds were later converted to ETH and moved to Arbitrum through cross-chain transactions.

🔒 User Advisory:

Immediately revoke related authorizations.

Always verify official contract addresses.

Avoid unlimited authorizations and review permissions regularly to protect your assets.#SecurityAlert #x402
🇺🇸 U.S. starts talks to invest in quantum computing companies and compete with China 🔬 The government seeks to strategically invest in quantum technology to protect national security and maintain a technological edge over its global rivals. #SecurityAlert
🇺🇸 U.S. starts talks to invest in quantum computing companies and compete with China
🔬 The government seeks to strategically invest in quantum technology to protect national security and maintain a technological edge over its global rivals.
#SecurityAlert
·
--
Bullish
🎣 Another phishing scam, courtesy of Google search. A fake HyperLend site sat in top results for hours. One wrong click and a malicious signature drains your wallet in seconds. Security isn’t just about smart contracts. It’s about not clicking like it’s 2010. #ScamSniffer #Hyperlend #SecurityAlert #phishingscam $BTC
🎣 Another phishing scam, courtesy of Google search. A fake HyperLend site sat in top results for hours. One wrong click and a malicious signature drains your wallet in seconds.

Security isn’t just about smart contracts. It’s about not clicking like it’s 2010.
#ScamSniffer #Hyperlend #SecurityAlert #phishingscam $BTC
The outage of Cloudflare affected access to ChatGPT and the social media platform X According to PANews, outages in the network of the cybersecurity company Cloudflare on Tuesday led to access issues for some users of ChatGPT and the social media platform 'X'. Cloudflare announced on its website that it is investigating a problem that may affect several clients. The company's customer support portal also experienced interruptions, coinciding with scheduled maintenance in certain regions earlier that day. At one point, Cloudflare's own status page was unavailable. Cloudflare's security software is used by hundreds of thousands of companies worldwide, and the system has experienced outages in the past. #Write2Earn #SecurityAlert $BNB {spot}(BNBUSDT)
The outage of Cloudflare affected access to ChatGPT and the social media platform X
According to PANews, outages in the network of the cybersecurity company Cloudflare on Tuesday led to access issues for some users of ChatGPT and the social media platform 'X'. Cloudflare announced on its website that it is investigating a problem that may affect several clients. The company's customer support portal also experienced interruptions, coinciding with scheduled maintenance in certain regions earlier that day. At one point, Cloudflare's own status page was unavailable. Cloudflare's security software is used by hundreds of thousands of companies worldwide, and the system has experienced outages in the past.
#Write2Earn
#SecurityAlert
$BNB
183 Million Gmail passwords data leak --- What Really Happened About 183 million email+password combinations were added to the Have I Been Pwned (HIBP) database. The data comes not from a Google server breach, but from infostealer malware — malicious software that infects devices and steals login details locally. The leak includes plaintext passwords, along with the website URL, email address, and the password. In a sample of ~94,000 records, 92% of them were already known from prior leaks. But around 16.4 million credentials in the dataset are new — they haven’t appeared in public breaches before. Some users confirmed that the exposed passwords still worked for their Gmail accounts. --- What Google Says Google denies a “Gmail breach”: they say their infrastructure wasn’t hacked. According to Google, the leak comes from malware-infected devices — not from Google’s own servers. Google recommends: 1. Turn on 2-Step Verification (2FA) 2. Use passkeys instead of passwords for stronger security. 3. Reset your password if it appears in large leaked credential dumps. --- Why This Matters Because many people reuse passwords, attackers could use these leaked credentials in credential stuffing attacks (trying the same password on many sites). Infostealer malware is especially dangerous: it bypasses traditional organizational defenses by stealing directly from user devices. Even if most credentials are “old,” the newly leaked ones (16.4M) represent fresh risk. Long-term threat: these credentials can be exploited for a long time, especially if users don’t improve their security practices. --- ✅ What You Should Do (If You're a Gmail User) 1. Check Have I Been Pwned (HIBP) to see if your email appears in the leak. 2. If your credentials are exposed, change your password, especially if you’re reusing it on other sites. 3. Enable 2-Factor Authentication (2FA) — this adds a crucial extra layer of protection. 4. Use a password manager to generate and store strong, unique passwords. 5. Keep your device clean: use antivirus / anti-malware, avoid installing suspicious software, and update your system regularly. --- Bottom Line This is not a Gmail server hack — but a massive credential dump collected via malware from users’ devices. The scale is worrying (183M!), but most of the data is recycled. Still, the newly exposed credentials are a real threat. The incident highlights how important good password hygiene and strong authentication (2FA / passkeys) are in today’s threat landscape. #GoogleDocsMagic #SecurityAlert

183 Million Gmail passwords data leak




---
What Really Happened

About 183 million email+password combinations were added to the Have I Been Pwned (HIBP) database.

The data comes not from a Google server breach, but from infostealer malware — malicious software that infects devices and steals login details locally.

The leak includes plaintext passwords, along with the website URL, email address, and the password.

In a sample of ~94,000 records, 92% of them were already known from prior leaks.

But around 16.4 million credentials in the dataset are new — they haven’t appeared in public breaches before.

Some users confirmed that the exposed passwords still worked for their Gmail accounts.



---

What Google Says

Google denies a “Gmail breach”: they say their infrastructure wasn’t hacked.

According to Google, the leak comes from malware-infected devices — not from Google’s own servers.

Google recommends:

1. Turn on 2-Step Verification (2FA)


2. Use passkeys instead of passwords for stronger security.


3. Reset your password if it appears in large leaked credential dumps.





---

Why This Matters

Because many people reuse passwords, attackers could use these leaked credentials in credential stuffing attacks (trying the same password on many sites).

Infostealer malware is especially dangerous: it bypasses traditional organizational defenses by stealing directly from user devices.

Even if most credentials are “old,” the newly leaked ones (16.4M) represent fresh risk.

Long-term threat: these credentials can be exploited for a long time, especially if users don’t improve their security practices.



---

✅ What You Should Do (If You're a Gmail User)

1. Check Have I Been Pwned (HIBP) to see if your email appears in the leak.


2. If your credentials are exposed, change your password, especially if you’re reusing it on other sites.


3. Enable 2-Factor Authentication (2FA) — this adds a crucial extra layer of protection.


4. Use a password manager to generate and store strong, unique passwords.


5. Keep your device clean: use antivirus / anti-malware, avoid installing suspicious software, and update your system regularly.




---

Bottom Line

This is not a Gmail server hack — but a massive credential dump collected via malware from users’ devices.

The scale is worrying (183M!), but most of the data is recycled. Still, the newly exposed credentials are a real threat.

The incident highlights how important good password hygiene and strong authentication (2FA / passkeys) are in today’s threat landscape.
#GoogleDocsMagic #SecurityAlert
#SecurityAlert Security Alert: Claiming DMT Token Airdrop carries a fraud risk. Users are advised to revoke the authorization as soon as possible On November 20th, GoPlus issued a security alert. Users who received the DMT token airdrop are recommended to revoke authorization or transfer their assets to a secure wallet as soon as possible. There have been multiple reports of stolen assets today. When claiming the DMT airdrop, users were tricked into authorizing other tokens, resulting in the theft of assets from thousands of users. The cross-chain transfer of assets exceeded $130,000. Currently, the @dexmaxai Twitter account and official website have been taken offline.
#SecurityAlert

Security Alert: Claiming DMT Token Airdrop carries a fraud risk. Users are advised to revoke the authorization as soon as possible

On November 20th, GoPlus issued a security alert. Users who received the DMT token airdrop are recommended to revoke authorization or transfer their assets to a secure wallet as soon as possible. There have been multiple reports of stolen assets today. When claiming the DMT airdrop, users were tricked into authorizing other tokens, resulting in the theft of assets from thousands of users. The cross-chain transfer of assets exceeded $130,000. Currently, the @dexmaxai Twitter account and official website have been taken offline.
#ScrollCoFounderXAccountHacked ​🚨 SECURITY ALERT: Scroll co-founder has had their account hacked! . ​The hashtag #ScrollCoFounderXAccountHacked is dominating the trends and serves as a brutal reminder: in the crypto world, no one is 100% immune. On January 25, 2026, Kenneth Shen's official account was targeted in a sophisticated phishing attack. . ​🛡️ What happened? . ​Hackers took control of the profile to spread malicious links, attempting to drain unsuspecting users' wallets through false promises of airdrops or urgent support alerts. . ​💡 How to protect yourself now: . ​Beware of Urgency: If a founder posts a link "click now or lose your account", stop and breathe. It’s the favorite trigger of scammers. . ​Verify Sources: Before interacting, check the project's official channels (Discord, Telegram, Official Site). . ​Review Permissions: Never connect your main wallet to unknown sites. Use a "burner wallet" for suspicious interactions. . ​Hardware 2FA: Use physical keys (like Yubikey) whenever possible, they are much more secure than SMS or authentication apps. . ✅ ​The Scroll ecosystem remains strong, but individual security depends on our constant attention. Stay alert! . 🤔 ​What do you think of this breach? Do you think social networks need extra layers of security for public crypto figures? 👇 . ​#Scroll #SecurityAlert #Phishing
#ScrollCoFounderXAccountHacked ​🚨 SECURITY ALERT: Scroll co-founder has had their account hacked!
.
​The hashtag #ScrollCoFounderXAccountHacked is dominating the trends and serves as a brutal reminder: in the crypto world, no one is 100% immune. On January 25, 2026, Kenneth Shen's official account was targeted in a sophisticated phishing attack.
.
​🛡️ What happened?
.
​Hackers took control of the profile to spread malicious links, attempting to drain unsuspecting users' wallets through false promises of airdrops or urgent support alerts.
.
​💡 How to protect yourself now:
.
​Beware of Urgency: If a founder posts a link "click now or lose your account", stop and breathe. It’s the favorite trigger of scammers.
.
​Verify Sources: Before interacting, check the project's official channels (Discord, Telegram, Official Site).
.
​Review Permissions: Never connect your main wallet to unknown sites. Use a "burner wallet" for suspicious interactions.
.
​Hardware 2FA: Use physical keys (like Yubikey) whenever possible, they are much more secure than SMS or authentication apps.
.
✅ ​The Scroll ecosystem remains strong, but individual security depends on our constant attention. Stay alert!
.
🤔 ​What do you think of this breach? Do you think social networks need extra layers of security for public crypto figures? 👇
.
#Scroll #SecurityAlert #Phishing
CRITICAL ETHEREUM SCAM ALERT $12.25 MILLION GONE Entry: 4556 ETH 🟩 Target 1: $12,250,000 🎯 Stop Loss: 0 ETH 🛑 This is NOT a drill. Millions VANISHED. One mistake. Wrong address copied. History logs are a TRAP. Protect your ETH. Double, triple, QUADRUPLE check every transaction. Do not get caught. Act NOW. Security is paramount. Disclaimer: Trade at your own risk. #Ethereum #ETH #CryptoScam #SecurityAlert 🚨
CRITICAL ETHEREUM SCAM ALERT $12.25 MILLION GONE

Entry: 4556 ETH 🟩
Target 1: $12,250,000 🎯
Stop Loss: 0 ETH 🛑

This is NOT a drill. Millions VANISHED. One mistake. Wrong address copied. History logs are a TRAP. Protect your ETH. Double, triple, QUADRUPLE check every transaction. Do not get caught. Act NOW. Security is paramount.

Disclaimer: Trade at your own risk.

#Ethereum #ETH #CryptoScam #SecurityAlert 🚨
Login to explore more contents
Join global crypto users on Binance Square
⚡️ Get latest and useful information about crypto.
💬 Trusted by the world’s largest crypto exchange.
👍 Discover real insights from verified creators.
Email / Phone number