Šis raksts pašlaik nav pieejams Tavā valodā. Angļu valodai iesakām izmantot automātisko tulkotāju.

Types of Phishing - URL Spoof

Binance
2018-03-08 08:25

Every time you want to access Binance.com or log In to your account, please pay attention to the security recommendations below:

One more recommendation should be noted:

Don’t enable API if you’re not going to use it. 

Users may be attacked by phishing website via search engine referrals, browser plugins/extensions, third-party, or invalid apps that might try to steal your API access/private key.

  • Risky search engine referrals. Navigate users to phishing websites. 


  • Risky browser plugins/extensions. Navigate users to phishing websites. 


  • Risky email with a phishing link

  • Some users may have installed third-party applications to manage their investment portfolios, or install invalid apps from an app store.

Phishing websites attempt to trick users into exposing their confidential information such as their password and 2FA code. Therefore, hackers can steal users’ coins through API withdrawals and abnormal buy/sell orders.

 

The logs below illustrate a phishing attack through search engine referrals:

Server logs listed the process of coins stolen:

  • Login: 188.166.62.200    2018-02-05 09:54
  • Modify API: 188.166.62.200    2018-02-05 10:00
  • Confirm API withdraw: 188.166.62.200  2018-02-05 10:01
  • Login: 86.25.38.113    2018-02-05 10:02  
  • Complete API withdraw: 5.45.65.227  2018-02-05 10:02
  • Delete API: 86.25.38.113   2018-02-05 10:03

One victim attacked by a phishing website described details as below:


Appendix of suspicious phishing websites.