Binance Square

cryptosafety

7.5M visninger
3,250 debatterer
Osiris-Square-Creator
--
🛡️ Guía Definitiva contra el Address Poisoning: No dejes que envenenen tu historialEste ataque es particularmente insidioso porque no explota una vulnerabilidad en el código, sino un sesgo cognitivo humano: la confianza en la familiaridad visual y la comodidad del "copiar y pegar". En el ecosistema cripto, la seguridad no solo depende de tu frase semilla; también depende de tus hábitos al transaccionar. Recientemente, una técnica conocida como Address Poisoning ha cobrado fuerza, afectando incluso a usuarios experimentados de $ETH , $BNB y stablecoins como $USDT . ¿Qué es el Address Poisoning? El ataque consiste en "envenenar" tu historial de transacciones. El atacante utiliza un software para generar una dirección vanidosa (vanity address) que tiene los mismos primeros y últimos caracteres que una dirección con la que interactúas frecuentemente (o incluso tu propia dirección). El proceso es simple pero letal: El estafador detecta una transacción legítima en la blockchain.Crea una dirección casi idéntica: por ejemplo, si tu dirección termina en ...A1b2, la del atacante también terminará en ...A1b2.Te envía una cantidad insignificante de $USDT o en tokens para que su dirección aparezca en tu historial de transacciones recientes.La trampa: La próxima vez que vayas a enviar fondos, podrías copiar accidentalmente la dirección del estafador desde tu historial en lugar de la verdadera. Observaciones y Razonamiento del Especialista Al analizar estos ataques en redes como #Ethereum o #BNB_Chain , observo que el éxito del atacante se basa en la abreviación de direcciones que hacen muchas interfaces de usuario. Si solo ves 0x12...A1b2, es imposible distinguir la real de la falsa. Además, el uso de $USDT y otras stablecoins es el objetivo principal debido al alto volumen de transferencias diarias, lo que facilita que el "polvo" (dust) del atacante pase desapercibido entre tus movimientos habituales. Cómo defenderte: Reglas de Oro 🚫 Nunca copies desde el historial: Trata tu historial de transacciones como una zona contaminada. Nunca copies una dirección de allí para una nueva transferencia. 📚 Usa la Agenda de Contactos: Plataformas como #Binance y billeteras como #MetaMask o #TrustWallet permiten guardar "Direcciones de Confianza". Úsalas siempre. 🔍 Verificación de caracteres centrales: Los atacantes igualan el inicio y el fin. Si vas a verificar manualmente, revisa los caracteres del medio de la dirección; ahí es donde fallará la similitud. 0️⃣ Ignora las transacciones de valor cero: Si ves que recibiste una cantidad ínfima de un token que no esperabas, no interactúes con esa dirección. Es el cebo. 🛡️ Hardware Wallets: Dispositivos como Ledger o Trezor te obligan a verificar la dirección completa en una pantalla física independiente. Es una capa de seguridad vital. La evolución del ataque en 2026 A medida que avanzamos, los atacantes usan IA para predecir patrones de envío. Sin embargo, la solución técnica más robusta sigue siendo el uso de servicios de nombres como ENS (.eth) o Space ID (.bnb). Al enviar a tunombre.eth, eliminas el riesgo de confundir una cadena alfanumérica compleja. 🚀 ¡Protege tus activos hoy! El Address Poisoning solo funciona si tienes prisa. La seguridad en Web3 es una maratón, no una carrera de velocidad. Comparte este artículo con tus amigos para que nadie más caiga en esta trampa visual. ¡La educación es tu mejor firewall! #Security #AddressPoisonin #Web3Security #CryptoSafety #BinanceSquare

🛡️ Guía Definitiva contra el Address Poisoning: No dejes que envenenen tu historial

Este ataque es particularmente insidioso porque no explota una vulnerabilidad en el código, sino un sesgo cognitivo humano: la confianza en la familiaridad visual y la comodidad del "copiar y pegar".
En el ecosistema cripto, la seguridad no solo depende de tu frase semilla; también depende de tus hábitos al transaccionar. Recientemente, una técnica conocida como Address Poisoning ha cobrado fuerza, afectando incluso a usuarios experimentados de $ETH , $BNB y stablecoins como $USDT .

¿Qué es el Address Poisoning?
El ataque consiste en "envenenar" tu historial de transacciones. El atacante utiliza un software para generar una dirección vanidosa (vanity address) que tiene los mismos primeros y últimos caracteres que una dirección con la que interactúas frecuentemente (o incluso tu propia dirección).
El proceso es simple pero letal:
El estafador detecta una transacción legítima en la blockchain.Crea una dirección casi idéntica: por ejemplo, si tu dirección termina en ...A1b2, la del atacante también terminará en ...A1b2.Te envía una cantidad insignificante de $USDT o en tokens para que su dirección aparezca en tu historial de transacciones recientes.La trampa: La próxima vez que vayas a enviar fondos, podrías copiar accidentalmente la dirección del estafador desde tu historial en lugar de la verdadera.
Observaciones y Razonamiento del Especialista
Al analizar estos ataques en redes como #Ethereum o #BNB_Chain , observo que el éxito del atacante se basa en la abreviación de direcciones que hacen muchas interfaces de usuario. Si solo ves 0x12...A1b2, es imposible distinguir la real de la falsa.
Además, el uso de $USDT y otras stablecoins es el objetivo principal debido al alto volumen de transferencias diarias, lo que facilita que el "polvo" (dust) del atacante pase desapercibido entre tus movimientos habituales.
Cómo defenderte: Reglas de Oro
🚫 Nunca copies desde el historial: Trata tu historial de transacciones como una zona contaminada. Nunca copies una dirección de allí para una nueva transferencia.
📚 Usa la Agenda de Contactos: Plataformas como #Binance y billeteras como #MetaMask o #TrustWallet permiten guardar "Direcciones de Confianza". Úsalas siempre.
🔍 Verificación de caracteres centrales: Los atacantes igualan el inicio y el fin. Si vas a verificar manualmente, revisa los caracteres del medio de la dirección; ahí es donde fallará la similitud.
0️⃣ Ignora las transacciones de valor cero: Si ves que recibiste una cantidad ínfima de un token que no esperabas, no interactúes con esa dirección. Es el cebo.
🛡️ Hardware Wallets: Dispositivos como Ledger o Trezor te obligan a verificar la dirección completa en una pantalla física independiente. Es una capa de seguridad vital.

La evolución del ataque en 2026
A medida que avanzamos, los atacantes usan IA para predecir patrones de envío. Sin embargo, la solución técnica más robusta sigue siendo el uso de servicios de nombres como ENS (.eth) o Space ID (.bnb). Al enviar a tunombre.eth, eliminas el riesgo de confundir una cadena alfanumérica compleja.
🚀 ¡Protege tus activos hoy!
El Address Poisoning solo funciona si tienes prisa. La seguridad en Web3 es una maratón, no una carrera de velocidad.
Comparte este artículo con tus amigos para que nadie más caiga en esta trampa visual.
¡La educación es tu mejor firewall!
#Security #AddressPoisonin #Web3Security #CryptoSafety #BinanceSquare
🚨 BNB Community Safety Alert Recently, some posts on social feeds claim that funds were “hacked by a stranger” and show withdrawal screenshots to gain sympathy. Soon after, these posts often start mentioning or tagging tokens to attract attention. For the BNB ecosystem, it’s important to stay alert. Real security incidents usually include official exchange alerts, device or IP logs, and direct contact with platform support — not just social media posts. ⚠️ Warning signs to watch for: Repeated small withdrawals instead of one clear breach No proof of security notifications Token promotion after emotional claims 🔐 BNB Community Reminder: Do not DM unknown accounts Do not click shared links Do not trade tokens promoted alongside “hack” stories Staying cautious helps keep the BNB ecosystem safe and trusted. #bnb #cryptosafety
🚨 BNB Community Safety Alert

Recently, some posts on social feeds claim that funds were “hacked by a stranger” and show withdrawal screenshots to gain sympathy. Soon after, these posts often start mentioning or tagging tokens to attract attention.

For the BNB ecosystem, it’s important to stay alert. Real security incidents usually include official exchange alerts, device or IP logs, and direct contact with platform support — not just social media posts.

⚠️ Warning signs to watch for:

Repeated small withdrawals instead of one clear breach
No proof of security notifications
Token promotion after emotional claims

🔐 BNB Community Reminder:

Do not DM unknown accounts
Do not click shared links
Do not trade tokens promoted alongside “hack” stories

Staying cautious helps keep the BNB ecosystem safe and trusted.

#bnb #cryptosafety
Engineering Fairness: How the Bonding Curve Kills the "Rug Pull" The biggest barrier to DeFi adoption has been trust. SunPump’s Bonding Curve Mechanism is the technical answer to that problem. How it enforces equity: 🔸No Presales: Every participant enters at a price determined by a mathematical curve. 🔸No Team Allocations: 100% of the supply is distributed to the community through the curve. 🔸Zero Manual Intervention: Migration to DEXs happens via audited smart contracts, eliminating the "developer dump" risk. In this new chapter, code is the ultimate law of fairness. #Security #SmartContracts @JustinSun #CryptoSafety #SunPump #TronEcoStars
Engineering Fairness: How the Bonding Curve Kills the "Rug Pull"

The biggest barrier to DeFi adoption has been trust. SunPump’s Bonding Curve Mechanism is the technical answer to that problem.

How it enforces equity:
🔸No Presales: Every participant enters at a price determined by a mathematical curve.
🔸No Team Allocations: 100% of the supply is distributed to the community through the curve.
🔸Zero Manual Intervention: Migration to DEXs happens via audited smart contracts, eliminating the "developer dump" risk.

In this new chapter, code is the ultimate law of fairness.

#Security #SmartContracts @Justin Sun孙宇晨 #CryptoSafety #SunPump #TronEcoStars
The "Identity Verification" Phishing Wave. It's the beginning of the year, and scammers are exploiting the "New Year, New Regulations" narrative. We are seeing a massive surge in fake emails and SMS claiming your account will be "frozen" unless you complete a mandatory KYC update. How the Social Engineering works: Fear & Urgency: The message uses scary language ("Immediate suspension," "Account restricted") to stop you from thinking clearly. The Mirror Site: The link leads to a perfect replica of an exchange login page. Once you enter your credentials and 2FA, the hacker has full access. Data Harvesting: They might even ask for a photo of your ID, which they will later use to bypass security on other platforms or for identity theft. Your Defense Strategy: Check the Sender: Real exchanges use specific domains. Look for small typos (e.g., binance-support.net instead of generallink.top). The "App-Only" Rule: Never click links in emails. If you get a notification, close the email, open your official app manually, and check for alerts there. Protect your 2FA: No real support agent will ever ask for your 6-digit 2FA code via chat or phone. Stay calm, stay safe, and verify everything! #phishing #KYC #SocialEngineering #Security2026 #CryptoSafety @Binance_Angels @Ramadone @Gedcrypto
The "Identity Verification" Phishing Wave.

It's the beginning of the year, and scammers are exploiting the "New Year, New Regulations" narrative. We are seeing a massive surge in fake emails and SMS claiming your account will be "frozen" unless you complete a mandatory KYC update.

How the Social Engineering works:
Fear & Urgency: The message uses scary language ("Immediate suspension," "Account restricted") to stop you from thinking clearly.

The Mirror Site: The link leads to a perfect replica of an exchange login page. Once you enter your credentials and 2FA, the hacker has full access.

Data Harvesting: They might even ask for a photo of your ID, which they will later use to bypass security on other platforms or for identity theft.

Your Defense Strategy:
Check the Sender: Real exchanges use specific domains. Look for small typos (e.g., binance-support.net instead of generallink.top).

The "App-Only" Rule: Never click links in emails. If you get a notification, close the email, open your official app manually, and check for alerts there.

Protect your 2FA: No real support agent will ever ask for your 6-digit 2FA code via chat or phone.
Stay calm, stay safe, and verify everything!
#phishing #KYC #SocialEngineering #Security2026 #CryptoSafety @Binance Angels @_Ram @GED
_Ram:
👏🏾👏🏾👏🏾
Why $USDD is Dominating the 2026 Stablecoin Race Transparency is the new gold. With JustLend DAO Supply Mining Phase XIII, $USDD is proving why it's the most resilient decentralized stablecoin. 🔹 Statutory Status: Recognized in Dominica. 🔹 Fully Backed: Over-collateralized by BTC and TRX. 🔹 Real Yield: No "ponzi-nomics", just protocol revenue-driven rewards. Current Phase XIII rewards are paid weekly in USDD + TRX, giving you instant liquidity and exposure to the TRON ecosystem's growth. Is $USDD the safest play in DeFi right now? I think so. #USDD #JustLendDAO #CryptoSafety #DeFi @JustinSun #TRONEcoStar
Why $USDD is Dominating the 2026 Stablecoin Race

Transparency is the new gold.
With JustLend DAO Supply Mining Phase XIII, $USDD is proving why it's the most resilient decentralized stablecoin.

🔹 Statutory Status: Recognized in Dominica.
🔹 Fully Backed: Over-collateralized by BTC and TRX.
🔹 Real Yield: No "ponzi-nomics", just protocol revenue-driven rewards.

Current Phase XIII rewards are paid weekly in USDD + TRX, giving you instant liquidity and exposure to the TRON ecosystem's growth.

Is $USDD the safest play in DeFi right now?
I think so.

#USDD #JustLendDAO #CryptoSafety #DeFi @Justin Sun孙宇晨 #TRONEcoStar
📘 Is Binance Safe? Security is a top priority at Binance 🔐 🔹 Two-Factor Authentication (2FA) 🔹 Advanced encryption 🔹 Cold wallet storage 🔹 Anti-fraud protection ⚠️ Remember: Never share your password or verification codes. #CryptoSafety #Binancesecurity #safetrading
📘 Is Binance Safe?

Security is a top priority at Binance 🔐

🔹 Two-Factor Authentication (2FA)
🔹 Advanced encryption
🔹 Cold wallet storage
🔹 Anti-fraud protection

⚠️ Remember: Never share your password or verification codes.

#CryptoSafety #Binancesecurity #safetrading
What Are Airdrop Scams & How to Avoid Them 🚨 Airdrops are used by crypto projects to give free tokens and attract users. While many are real, scammers also use fake airdrops to steal crypto from wallets. What Is an Airdrop Scam? An airdrop scam is when scammers promise free tokens or NFTs but trick users into: Connecting their wallet to a fake site Approving harmful transactions Losing their funds ❌ You never receive real tokens — only losses. Common Airdrop Scam Tricks 🕵️‍♂️ Fake websites that look like real projects Impersonation of famous projects, exchanges, or influencers Random tokens/NFTs sent to your wallet with links inside Messages saying “Claim now” or “Limited time” ⏰ Many scams appeared after big real airdrops (like on Solana) to exploit hype. How to Spot an Airdrop Scam 🚩 Promises of huge rewards for free Asking for private keys or recovery phrases (always a scam) No official website or verified announcements Links sent via DMs or unknown sources How to Stay Safe 🔐 Use a burner wallet for risky or new airdrops Verify airdrops only through official channels Never interact with unsolicited tokens or NFTs Always check wallet permissions before approving anything If You Find a Scam ⚠️ Report it to the community or platform Move funds to a safe wallet immediately Revoke permissions and improve wallet security Final Thoughts 💡 Airdrops can be useful — but scammers love free-token hype. If it feels rushed, unclear, or too good to be true… ignore it. In crypto, security comes before free tokens 🛡️ #CryptoSafety #Binance 🚀 $BNB {future}(BNBUSDT) $BTC {future}(BTCUSDT) $ETH {future}(ETHUSDT)
What Are Airdrop Scams & How to Avoid Them 🚨
Airdrops are used by crypto projects to give free tokens and attract users. While many are real, scammers also use fake airdrops to steal crypto from wallets.
What Is an Airdrop Scam?
An airdrop scam is when scammers promise free tokens or NFTs but trick users into:
Connecting their wallet to a fake site
Approving harmful transactions
Losing their funds ❌
You never receive real tokens — only losses.
Common Airdrop Scam Tricks 🕵️‍♂️
Fake websites that look like real projects
Impersonation of famous projects, exchanges, or influencers
Random tokens/NFTs sent to your wallet with links inside
Messages saying “Claim now” or “Limited time” ⏰
Many scams appeared after big real airdrops (like on Solana) to exploit hype.
How to Spot an Airdrop Scam 🚩
Promises of huge rewards for free
Asking for private keys or recovery phrases (always a scam)
No official website or verified announcements
Links sent via DMs or unknown sources
How to Stay Safe 🔐
Use a burner wallet for risky or new airdrops
Verify airdrops only through official channels
Never interact with unsolicited tokens or NFTs
Always check wallet permissions before approving anything
If You Find a Scam ⚠️
Report it to the community or platform
Move funds to a safe wallet immediately
Revoke permissions and improve wallet security
Final Thoughts 💡
Airdrops can be useful — but scammers love free-token hype.
If it feels rushed, unclear, or too good to be true… ignore it.
In crypto, security comes before free tokens 🛡️
#CryptoSafety #Binance
🚀
$BNB
$BTC

$ETH
⚠️ P2P SCAM ALERT: MY BANK ACCOUNT GOT FROZEN ⚠️ This is something every P2P trader needs to read carefully. I tried to make a simple UPI payment. Failed. Tried again. Failed. After calling the bank, I got the shock of my life: “Your account has been frozen due to suspicious funds.” What actually happened? A P2P buyer who sent me money was later found to be involved in fraud. Because of that, every bank account linked to their transactions—including mine—was immediately blocked. Overnight, I lost access to my own funds. The account is still frozen. How to protect yourself in P2P trading • Trade only with experienced users (50+ trades, 95%+ completion rate). • Always match the sender’s bank account name with their Binance profile. • Avoid large amounts with new or unfamiliar users. • Never rush—verify the payment before releasing crypto. P2P trading works, but one careless trade can freeze your entire bank account. Stay alert, manage risk, and prioritize security over speed. Have you ever faced a P2P issue? Share your experience and help others stay safe. #P2PScam #CryptoSafety #BinanceP2P #StaySecure #CryptoAwareness
⚠️ P2P SCAM ALERT: MY BANK ACCOUNT GOT FROZEN ⚠️

This is something every P2P trader needs to read carefully.

I tried to make a simple UPI payment.
Failed.
Tried again.
Failed.

After calling the bank, I got the shock of my life:

“Your account has been frozen due to suspicious funds.”

What actually happened?
A P2P buyer who sent me money was later found to be involved in fraud. Because of that, every bank account linked to their transactions—including mine—was immediately blocked. Overnight, I lost access to my own funds. The account is still frozen.

How to protect yourself in P2P trading

• Trade only with experienced users (50+ trades, 95%+ completion rate).
• Always match the sender’s bank account name with their Binance profile.
• Avoid large amounts with new or unfamiliar users.
• Never rush—verify the payment before releasing crypto.

P2P trading works, but one careless trade can freeze your entire bank account. Stay alert, manage risk, and prioritize security over speed.

Have you ever faced a P2P issue? Share your experience and help others stay safe.

#P2PScam #CryptoSafety #BinanceP2P #StaySecure #CryptoAwareness
#walrus $WAL Reminder: Reusing old or high-engagement posts may lead to disqualification in the Walrus Campaign. Always submit fresh and original content to stay eligible for rewards. #BinanceTips #CreatorPad #CryptoSafety $BTC $ETH #BinanceHODLerBREV
#walrus $WAL
Reminder:
Reusing old or high-engagement posts may lead to disqualification in the Walrus Campaign.
Always submit fresh and original content to stay eligible for rewards.
#BinanceTips #CreatorPad #CryptoSafety
$BTC
$ETH
#BinanceHODLerBREV
$USDT & $USDC help reduce volatility, but they are not risk-free. Never keep all funds in one stablecoin. Risk management matters. #USDT #USDC #CryptoSafety
$USDT & $USDC help reduce volatility,
but they are not risk-free.
Never keep all funds in one stablecoin.
Risk management matters.
#USDT #USDC #CryptoSafety
Crypto is power, but security is priority 🔐 Never share your private keys. Always enable 2FA on Binance. HODL knowledge, not panic. Stay safe in the crypto world. #CryptoSafety #BinanceTips $BNB {spot}(BNBUSDT) $ETH {spot}(ETHUSDT)
Crypto is power, but security is priority 🔐
Never share your private keys.
Always enable 2FA on Binance.
HODL knowledge, not panic.
Stay safe in the crypto world.
#CryptoSafety #BinanceTips
$BNB
$ETH
🚨 Crypto Alert – Stay Cautious! If anyone in crypto messages you saying: "I’m a girl, I can recover your losses" ❌ ⚠️ Beware – this is a common scam. They use charm to gain your trust, but in the end, your wallet could be wiped out. 💡 Remember: No one can recover your crypto losses for you. Protect your funds, stay vigilant, and always do your own research. #CryptoSafety #ScamAlert #DYOR #ProtectYourCrypto $BTC
🚨 Crypto Alert – Stay Cautious!
If anyone in crypto messages you saying:
"I’m a girl, I can recover your losses" ❌
⚠️ Beware – this is a common scam.
They use charm to gain your trust, but in the end, your wallet could be wiped out.
💡 Remember:
No one can recover your crypto losses for you. Protect your funds, stay vigilant, and always do your own research.
#CryptoSafety #ScamAlert #DYOR #ProtectYourCrypto
$BTC
BTC Price Floor Just Hit $71K?! 🤯 This is the ultimate safety net you need to see right now. Bitcoin has historically never traded below its estimated global electrical production cost. That floor is currently sitting at a staggering $71,000. Think about what that implies for downside risk. $BTC is fundamentally protected by the energy required to mine it. This isn't just technical analysis; it's physics meeting finance. #BitcoinFundamentals #CryptoSafety #EnergyCost 💎
BTC Price Floor Just Hit $71K?! 🤯

This is the ultimate safety net you need to see right now. Bitcoin has historically never traded below its estimated global electrical production cost. That floor is currently sitting at a staggering $71,000. Think about what that implies for downside risk. $BTC is fundamentally protected by the energy required to mine it. This isn't just technical analysis; it's physics meeting finance.

#BitcoinFundamentals #CryptoSafety #EnergyCost

💎
--
Bullish
𝗜𝗻𝘀𝘁𝗮𝗴𝗿𝗮𝗺 𝗕𝗿𝗲𝗮𝗰𝗵: 𝟭𝟳.𝟱𝗠 𝗨𝘀𝗲𝗿𝘀 𝗘𝘅𝗽𝗼𝘀𝗲𝗱 — 𝗦𝗲𝗰𝘂𝗿𝗲 𝗬𝗼𝘂𝗿 𝗔𝗰𝗰𝗼𝘂𝗻𝘁 𝗡𝗼𝘄 🔐 Heads‑up: According to BlockBeats, a data breach may have exposed about 17.5M Instagram users’ details (usernames, emails, phone numbers, even physical addresses). Reports say the data is circulating on the dark web, raising risks of phishing and account takeovers. Malwarebytes suggests it could tie back to a 2024 API exposure. Some users are seeing frequent password‑reset emails. As of now, Meta hasn’t issued an official response. ⚠️ What you should do right now: Enable 2FA (use an authenticator app over SMS) 🔒 Change your Instagram password and don’t reuse it elsewhere 🔑 Check Login Activity and log out of unknown devices 👀 Revoke suspicious third‑party app access 🔌 Be phishing‑smart: don’t click reset links from random emails; go to the app/site directly 📵 Consider adding a SIM PIN and carrier lock to reduce SIM‑swap risk 📱 Stay vigilant and share this with anyone who might be affected. 🛡️ #Security #OpSec #Phishing #CryptoSafety
𝗜𝗻𝘀𝘁𝗮𝗴𝗿𝗮𝗺 𝗕𝗿𝗲𝗮𝗰𝗵: 𝟭𝟳.𝟱𝗠 𝗨𝘀𝗲𝗿𝘀 𝗘𝘅𝗽𝗼𝘀𝗲𝗱 — 𝗦𝗲𝗰𝘂𝗿𝗲 𝗬𝗼𝘂𝗿 𝗔𝗰𝗰𝗼𝘂𝗻𝘁 𝗡𝗼𝘄 🔐

Heads‑up: According to BlockBeats, a data breach may have exposed about 17.5M Instagram users’ details (usernames, emails, phone numbers, even physical addresses). Reports say the data is circulating on the dark web, raising risks of phishing and account takeovers. Malwarebytes suggests it could tie back to a 2024 API exposure. Some users are seeing frequent password‑reset emails. As of now, Meta hasn’t issued an official response. ⚠️

What you should do right now:

Enable 2FA (use an authenticator app over SMS) 🔒

Change your Instagram password and don’t reuse it elsewhere 🔑

Check Login Activity and log out of unknown devices 👀

Revoke suspicious third‑party app access 🔌

Be phishing‑smart: don’t click reset links from random emails; go to the app/site directly 📵

Consider adding a SIM PIN and carrier lock to reduce SIM‑swap risk 📱

Stay vigilant and share this with anyone who might be affected. 🛡️

#Security #OpSec #Phishing #CryptoSafety
🚨 عاجل | Binance News $SEI خطأ فردي فادح يؤدي إلى خسارة 240 ألف دولار أفادت تقارير أمنية صادرة عن BlockSec Phalcon ونشرتها منصة Binance News، عن وقوع هجوم باستخدام "قرض فوري" (Flash Loan) استهدف بروتوكول Synnax على شبكة SEI (من قطاع الأصول الرقمية عالية المخاطر)، مما أسفر عن خسارة تجاوزت الربع مليون دولار. 📍 تفاصيل الحادثة: بدأ الهجوم نتيجة "خطأ تشغيلي" بشري فادح وقع قبل صدور ثلاث كتل (Blocks) فقط من العملية؛ حيث قام عنوان محفظة (0x9748…a714) بنقل 1.96 مليون قطعة WSEI (ما يعادل 240,000 دولار) إلى العقد الذكي بشكل خاطئ، مما وفر "سيولة غير مقصودة" استغلها المهاجم فوراً. ⚙️ آلية الاستغلال: المهاجم رصد الثغرة الناتجة عن الخطأ البشري ونفذ معاملتين سريعتين (TX1 و TX2) لسحب الأموال دون إعادتها. تؤكد الحادثة أن الأخطاء التشغيلية على "السلسلة" (On-chain) لا تزال تمثل واحدة من أكبر نقاط الخطر في قطاع التمويل اللامركزي (DeFi). ⚠️ تنبيه للمستثمرين: هذا الحادث يثبت أن أمن الأصول لا يعتمد فقط على قوة البرمجة، بل على دقة التنفيذ البشري. تذكر دائماً أن التعامل مع الأصول الرقمية عالية المخاطر يتطلب يقظة تامة. المصدر: Binance News / BlockSec Phalcon 🔔 لمتابعة آخر التطورات الاقتصادية وتحركات الحيتان لحظة بلحظة، تأكد من متابعة حسابي لتصلك الأخبار قبل الجميع. #Sei #BinanceNews #DeFi #CryptoSafety #breakingnews
🚨 عاجل | Binance News
$SEI
خطأ فردي فادح يؤدي إلى خسارة 240 ألف دولار

أفادت تقارير أمنية صادرة عن BlockSec Phalcon ونشرتها منصة Binance News، عن وقوع هجوم باستخدام "قرض فوري" (Flash Loan) استهدف بروتوكول Synnax على شبكة SEI (من قطاع الأصول الرقمية عالية المخاطر)، مما أسفر عن خسارة تجاوزت الربع مليون دولار.

📍 تفاصيل الحادثة: بدأ الهجوم نتيجة "خطأ تشغيلي" بشري فادح وقع قبل صدور ثلاث كتل (Blocks) فقط من العملية؛ حيث قام عنوان محفظة (0x9748…a714) بنقل 1.96 مليون قطعة WSEI (ما يعادل 240,000 دولار) إلى العقد الذكي بشكل خاطئ، مما وفر "سيولة غير مقصودة" استغلها المهاجم فوراً.

⚙️ آلية الاستغلال: المهاجم رصد الثغرة الناتجة عن الخطأ البشري ونفذ معاملتين سريعتين (TX1 و TX2) لسحب الأموال دون إعادتها. تؤكد الحادثة أن الأخطاء التشغيلية على "السلسلة" (On-chain) لا تزال تمثل واحدة من أكبر نقاط الخطر في قطاع التمويل اللامركزي (DeFi).

⚠️ تنبيه للمستثمرين: هذا الحادث يثبت أن أمن الأصول لا يعتمد فقط على قوة البرمجة، بل على دقة التنفيذ البشري. تذكر دائماً أن التعامل مع الأصول الرقمية عالية المخاطر يتطلب يقظة تامة.

المصدر: Binance News / BlockSec Phalcon

🔔 لمتابعة آخر التطورات الاقتصادية وتحركات الحيتان لحظة بلحظة، تأكد من متابعة حسابي لتصلك الأخبار قبل الجميع.
#Sei
#BinanceNews #DeFi #CryptoSafety #breakingnews
$SEI 🚨 BREAKING | Binance News Fatal Individual Error Leads to $240,000 Loss Security reports from BlockSec Phalcon, published via Binance News, have revealed a flash loan attack targeting the Synnax protocol on the SEI network (a high-risk digital asset network). The incident resulted in a loss exceeding a quarter of a million dollars. 📍 Incident Details: The attack was triggered by a fatal human operational error occurring just three blocks before the exploit. A wallet address (0x9748…a714) mistakenly transferred 1.96 million units of a high-risk digital asset (WSEI - Wrapped SEI) to the smart contract, providing unintended liquidity that the attacker immediately exploited. ⚙️ Exploit Mechanism: The attacker identified the vulnerability caused by the human error and executed two rapid transactions (TX1 and TX2) to drain the funds without repayment. This incident highlights that on-chain operational mistakes remain one of the most significant risk factors in the Decentralized Finance (DeFi) sector. ⚠️ Investor Alert: This event proves that asset security depends not only on code integrity but also on human precision. Always remember that dealing with high-risk digital assets requires maximum vigilance. Source: Binance News / BlockSec Phalcon 🔔 To track the latest economic developments and whale movements in real-time, make sure to follow my account for early updates. #BinanceNews #defi #CryptoSafety #breakingnews #BinanceSquareFamily {spot}(SEIUSDT)
$SEI
🚨 BREAKING | Binance News

Fatal Individual Error Leads to $240,000 Loss

Security reports from BlockSec Phalcon, published via Binance News, have revealed a flash loan attack targeting the Synnax protocol on the SEI network (a high-risk digital asset network). The incident resulted in a loss exceeding a quarter of a million dollars.

📍 Incident Details: The attack was triggered by a fatal human operational error occurring just three blocks before the exploit. A wallet address (0x9748…a714) mistakenly transferred 1.96 million units of a high-risk digital asset (WSEI - Wrapped SEI) to the smart contract, providing unintended liquidity that the attacker immediately exploited.

⚙️ Exploit Mechanism: The attacker identified the vulnerability caused by the human error and executed two rapid transactions (TX1 and TX2) to drain the funds without repayment. This incident highlights that on-chain operational mistakes remain one of the most significant risk factors in the Decentralized Finance (DeFi) sector.

⚠️ Investor Alert: This event proves that asset security depends not only on code integrity but also on human precision. Always remember that dealing with high-risk digital assets requires maximum vigilance.

Source: Binance News / BlockSec Phalcon

🔔 To track the latest economic developments and whale movements in real-time, make sure to follow my account for early updates.

#BinanceNews #defi #CryptoSafety #breakingnews #BinanceSquareFamily
--
Bullish
🚨 ALERTA DE SEGURANÇA ⚠️ COMO UM CAFÉ NO AEROPORTO PODE ZERAR SUA CARTEIRA DE CRYPTO ❗ ☕😱 Você está tomando um café ou uma cervejinha em um bar, aeroporto ou hotel e decide dar aquela olhadinha rápida no saldo da sua carteira usando o Wi-Fi grátis do local. Parece Inofensivo 👉 CERTO ❓ ERRADO❗ 🛑 Em um recente estudo ➡️ Que acende um alerta vermelho ⥱ o Wi-Fi público é o "inimigo silencioso" que está limpando contas de investidores de criptomoedas desavisados. {spot}(BNBUSDT) Saiba como os hackers agem e como NÃO ser a próxima vítima. 🧵👇 👺 O Ataque "Man-in-the-Middle" (MITM) Imagine que o hacker se coloca literalmente no meio da sua conexão. Tudo o que você digita » senhas, chaves privadas ou frases de recuperação » passa pelo dispositivo dele antes de chegar à rede. Ele vê tudo em tempo real! 👯 Redes "Gêmeas Malignas" (Evil Twins) Criminosos criam redes com nomes idênticos aos do local (ex: "Aeroporto_Free_WiFi"). Ao se conectar, você entrega o controle total do seu tráfego de dados para o invasor. Uma vez logado na sua exchange ou wallet, seus fundos podem desaparecer em segundos. 💸💨 🛠️ 3 REGRAS DE OURO PARA PROTEGER SEU PATRIMÔNIO FUJA DO WI-FI PÚBLICO ⥱ Para transações cripto, use sempre seus dados móveis (4G/5G). É infinitamente mais seguro. USE UMA VPN SEMPRE ⥱ Se não tiver opção, use uma VPN de confiança. Ela cria um "túnel" criptografado que protege seus dados, mesmo em redes abertas. 🛡️ AUTENTICAÇÃO 2FA (NÃO SMS) ⥱ Use apps como Google Authenticator ou chaves físicas (Yubikey). O 2FA via SMS também pode ser interceptado em redes comprometidas! {spot}(SOLUSDT) 📢 EU QUERO SABER DE VOCÊ 💡 @Fumao 📣 Você já teve o hábito de acessar sua carteira em redes públicas ou sempre usa o 4G por precaução ? 🏛️ vs 🔓 👇 Você é daqueles que vivem "caçando" Wi-Fi grátis ? 💡Segurança em primeiro lugar! #BinanceSquare #CyberSecurity #CryptoSafety #WalletProtection #SCAMalerts
🚨 ALERTA DE SEGURANÇA ⚠️ COMO UM CAFÉ NO AEROPORTO PODE ZERAR SUA CARTEIRA DE CRYPTO ❗ ☕😱

Você está tomando um café ou uma cervejinha em um bar, aeroporto ou hotel e decide dar aquela olhadinha rápida no saldo da sua carteira usando o Wi-Fi grátis do local.

Parece Inofensivo 👉 CERTO ❓ ERRADO❗ 🛑

Em um recente estudo ➡️ Que acende um alerta vermelho ⥱ o Wi-Fi público é o "inimigo silencioso" que está limpando contas de investidores de criptomoedas desavisados.
Saiba como os hackers agem e como NÃO ser a próxima vítima. 🧵👇

👺 O Ataque "Man-in-the-Middle" (MITM)

Imagine que o hacker se coloca literalmente no meio da sua conexão. Tudo o que você digita » senhas, chaves privadas ou frases de recuperação » passa pelo dispositivo dele antes de chegar à rede. Ele vê tudo em tempo real!

👯 Redes "Gêmeas Malignas" (Evil Twins)

Criminosos criam redes com nomes idênticos aos do local (ex: "Aeroporto_Free_WiFi"). Ao se conectar, você entrega o controle total do seu tráfego de dados para o invasor. Uma vez logado na sua exchange ou wallet, seus fundos podem desaparecer em segundos. 💸💨

🛠️ 3 REGRAS DE OURO PARA PROTEGER SEU PATRIMÔNIO

FUJA DO WI-FI PÚBLICO ⥱ Para transações cripto, use sempre seus dados móveis (4G/5G). É infinitamente mais seguro.

USE UMA VPN SEMPRE ⥱ Se não tiver opção, use uma VPN de confiança. Ela cria um "túnel" criptografado que protege seus dados, mesmo em redes abertas. 🛡️

AUTENTICAÇÃO 2FA (NÃO SMS) ⥱ Use apps como Google Authenticator ou chaves físicas (Yubikey). O 2FA via SMS também pode ser interceptado em redes comprometidas!
📢 EU QUERO SABER DE VOCÊ

💡 @Leandro-Fumao 📣 Você já teve o hábito de acessar sua carteira em redes públicas ou sempre usa o 4G por precaução ? 🏛️ vs 🔓

👇 Você é daqueles que vivem "caçando" Wi-Fi grátis ?
💡Segurança em primeiro lugar!

#BinanceSquare #CyberSecurity #CryptoSafety #WalletProtection #SCAMalerts
Log ind for at udforske mere indhold
Udforsk de seneste kryptonyheder
⚡️ Vær en del af de seneste debatter inden for krypto
💬 Interager med dine yndlingsskabere
👍 Nyd indhold, der interesserer dig
E-mail/telefonnummer