Binance Square

被盗小何

2,182 views
3 Discussing
不想被行情束缚
--
See original
Sun's WeChat has started to be hacked. Now, Sister One's WeChat has been hacked. Is WeChat really safe? I believe everyone has their own views on this. At that time, before Sister One could use Twitter, I noticed this "hacked Xiao He" and thought it wouldn't go up. Who knew that as soon as Sister One posted, it directly hit a new high. Of course, many were also buried. We must be cautious on the chain ⚠️⚠️⚠️ and act #加密市场观察 #被盗小何
Sun's WeChat has started to be hacked. Now, Sister One's WeChat has been hacked. Is WeChat really safe? I believe everyone has their own views on this. At that time, before Sister One could use Twitter, I noticed this "hacked Xiao He" and thought it wouldn't go up. Who knew that as soon as Sister One posted, it directly hit a new high. Of course, many were also buried. We must be cautious on the chain ⚠️⚠️⚠️ and act #加密市场观察 #被盗小何
image
BNB
Cumulative PNL
-0.23%
Britni Coder Al6V:
HUAINIANQIYUE
See original
Today, Binance co-founder He Yi's WeChat account was hacked, and the hacker posted false information in Moments and multiple groups. According to Lookonchain monitoring, the hacker's related address has earned about $55,000. Many users, especially those in the cryptocurrency circle who frequently travel between domestic and foreign countries, often have the habit of changing phone numbers. The root cause of this series of hacking incidents is the operator mechanism that many users overlook—reissuing phone numbers. What is "reissuing phone numbers"? When a user stops renewing a phone number or actively cancels that number, the operator will reissue the number to the market after a certain "frozen period" (usually 3-6 months) for resource utilization, selling it to new users. How do hackers exploit this? This creates a fatal time difference and logical loophole: 1. Forgotten bindings: The original owner may have abandoned the phone number but often forgets to unlink the corresponding WeChat account. 2. New owner's privileges: After obtaining this "old number," the hacker (or a new user who inadvertently buys the number) just needs to select "Phone Number Login" or "Retrieve Password" on the WeChat login interface. 3. SMS verification code breach: The WeChat system recognizes that the phone number is already registered and promptly sends an SMS verification code. The hacker holding the new SIM card inputs the verification code and easily resets the password. 4. Unrestricted access: Once logged in successfully, the hacker gains complete control over the account, with access to Moments, group chats, and contacts. For people in the cryptocurrency circle, the risk is magnified due to the frequent use of backup devices, overseas cards, or domestic numbers being suspended due to unpaid fees when traveling abroad. In addition to reissuing phone numbers, the following two situations are also common causes of WeChat theft: · Phishing links and Trojans: Hackers disguise themselves as project parties or customer service from trading platforms, sending links or files with Trojans (e.g., .exe disguised as .pdf). Once clicked on WeChat on a computer, the Trojan immediately steals the login credentials. · Zombie follower cleaning tools: Many people grant third-party, unsafe "cleaning software" permission to scan login QR codes to clean up friends, which is equivalent to handing over account control to strangers.#被盗小何 #资金安全
Today, Binance co-founder He Yi's WeChat account was hacked, and the hacker posted false information in Moments and multiple groups. According to Lookonchain monitoring, the hacker's related address has earned about $55,000.

Many users, especially those in the cryptocurrency circle who frequently travel between domestic and foreign countries, often have the habit of changing phone numbers. The root cause of this series of hacking incidents is the operator mechanism that many users overlook—reissuing phone numbers.

What is "reissuing phone numbers"?

When a user stops renewing a phone number or actively cancels that number, the operator will reissue the number to the market after a certain "frozen period" (usually 3-6 months) for resource utilization, selling it to new users.

How do hackers exploit this?

This creates a fatal time difference and logical loophole:

1. Forgotten bindings: The original owner may have abandoned the phone number but often forgets to unlink the corresponding WeChat account.

2. New owner's privileges: After obtaining this "old number," the hacker (or a new user who inadvertently buys the number) just needs to select "Phone Number Login" or "Retrieve Password" on the WeChat login interface.

3. SMS verification code breach: The WeChat system recognizes that the phone number is already registered and promptly sends an SMS verification code. The hacker holding the new SIM card inputs the verification code and easily resets the password.

4. Unrestricted access: Once logged in successfully, the hacker gains complete control over the account, with access to Moments, group chats, and contacts.

For people in the cryptocurrency circle, the risk is magnified due to the frequent use of backup devices, overseas cards, or domestic numbers being suspended due to unpaid fees when traveling abroad.

In addition to reissuing phone numbers, the following two situations are also common causes of WeChat theft:

· Phishing links and Trojans: Hackers disguise themselves as project parties or customer service from trading platforms, sending links or files with Trojans (e.g., .exe disguised as .pdf). Once clicked on WeChat on a computer, the Trojan immediately steals the login credentials.

· Zombie follower cleaning tools: Many people grant third-party, unsafe "cleaning software" permission to scan login QR codes to clean up friends, which is equivalent to handing over account control to strangers.#被盗小何 #资金安全
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number