Binance.com Review 2020 – Scam or Not?

I o T A S uP p O R t

Support for all your IOTA (Cryptocurrency) related problems. For hatred of pending transactions, to advanced hatred of API, and volleyball.
[link]

2020 February - Tod's Workshop has been hijacked by a bitcoin scammer called "Binance English".

submitted by Spirits96 to YoutubeCompendium [link] [comments]

@cz_binance: #Bitcoin does a healthy retrace, suddenly everyone in #crypto is a scammer. 😂 What’s the yield YTD?

@cz_binance: #Bitcoin does a healthy retrace, suddenly everyone in #crypto is a scammer. 😂 What’s the yield YTD? submitted by rulesforrebels to BinanceTrading [link] [comments]

Scammer Demands 300 Bitcoin From Binance in KYC Data Ransom

submitted by Jazz_ETH_Crusader to Crypto_General [link] [comments]

Scammer Demands 300 Bitcoin From Binance in KYC Data Ransom

Scammer Demands 300 Bitcoin From Binance in KYC Data Ransom submitted by fishballdart to Only_Bitcoin [link] [comments]

Scammer Demands 300 Bitcoin From Binance in KYC Data Ransom

Scammer Demands 300 Bitcoin From Binance in KYC Data Ransom submitted by remivee to tribetica [link] [comments]

Scammer Demands 300 Bitcoin From Binance in KYC Data Ransom

Scammer Demands 300 Bitcoin From Binance in KYC Data Ransom submitted by ThrillerPodcast to thrillerpodcast [link] [comments]

Scammer Demands 300 Bitcoin From Binance in KYC Data Ransom

Scammer Demands 300 Bitcoin From Binance in KYC Data Ransom submitted by Link0000054 to Bitcoin_2019 [link] [comments]

Scammer Demands 300 Bitcoin From Binance in KYC Data Ransom

Scammer Demands 300 Bitcoin From Binance in KYC Data Ransom submitted by Hellterskelt to bitcoin_is_dead [link] [comments]

Binance hack: Scammers liquidate Bitcoin (BTC) according to Coinfirm report

Binance hack: Scammers liquidate Bitcoin (BTC) according to Coinfirm report submitted by jonnycake52 to CryptoNewsReddit [link] [comments]

📷📷@Fightbackcoin token giving u value right out the gate in July. Cruise, Airline & Resorts upcoming deals. Play our Crypto Busters game & earn travel points whilst you fight scammers & team of investigators bring fairness ,profit & safety. #Binance #bitcoin #BitcoinCash 📷📷

📷📷@Fightbackcoin token giving u value right out the gate in July. Cruise, Airline & Resorts upcoming deals. Play our Crypto Busters game & earn travel points whilst you fight scammers & team of investigators bring fairness ,profit & safety. #Binance #bitcoin #BitcoinCash 📷📷 submitted by fightbackcoin to u/fightbackcoin [link] [comments]

Binance hack: Scammers luring people into buying ‘discounted stolen Bitcoins [BTC]’

Binance hack: Scammers luring people into buying ‘discounted stolen Bitcoins [BTC]’ submitted by n4bb to CoinPath [link] [comments]

Binance Launches Billion Dollar Bet on Bitcoin and Crypto, XRP Whale Surfaces, and Alleged IOTA Scammer Arrested – Crypto Update https://goo.gl/YzHm5v - Crypto Dynamic Info - Whales's

Posted at: January 24, 2019 at 03:26AM
By:
Binance Launches Billion Dollar Bet on Bitcoin and Crypto, XRP Whale Surfaces, and Alleged IOTA Scammer Arrested – Crypto Update https://goo.gl/YzHm5v
Automate your Trading via Crypto Bot : http://bit.ly/2GynF9t
Join Telegram Channel for FREE Crypto Bot: Crypto Signal
submitted by cryptotradingbot to cryptobots [link] [comments]

Binance Launches Billion Dollar Bet on Bitcoin and Crypto, XRP Whale Surfaces, and Alleged IOTA Scammer Arrested – Crypto Update - The Daily Hodl

Binance Launches Billion Dollar Bet on Bitcoin and Crypto, XRP Whale Surfaces, and Alleged IOTA Scammer Arrested – Crypto Update - The Daily Hodl submitted by ulros to fbitcoin [link] [comments]

Binance Launches Billion Dollar Bet on Bitcoin and Crypto, XRP Whale Surfaces, and Alleged IOTA Scammer Arrested – Crypto Update

Binance Launches Billion Dollar Bet on Bitcoin and Crypto, XRP Whale Surfaces, and Alleged IOTA Scammer Arrested – Crypto Update submitted by n4bb to CoinPath [link] [comments]

Binance Launches Billion Dollar Bet on Bitcoin and Crypto, XRP Whale Surfaces, and Alleged IOTA Scammer Arrested – Crypto Update - BtcIndex

submitted by Dronmm to u/Dronmm [link] [comments]

BTC Airdrop Conflict

BTC Airdrop Conflict

https://preview.redd.it/km7kcxqeh1y51.jpg?width=700&format=pjpg&auto=webp&s=94d361d5453d7ddebe5ac6db7eb3a53e246e6218

https://preview.redd.it/9c65ftagh1y51.jpg?width=608&format=pjpg&auto=webp&s=30eab4910ca93051a9654a89da3cce0008e7e542
I joined the site binancedrop.us through a telegram channel mocking binance dex service having a fake 6.000 BTC Airdrop and asking me to send them my bitcoin funds, promising that they would return them double through the binance dex fake “airdrop”. I wouldn’t believe them but their telegram channel was full of bots with fake users reassuring me that it was true through personal messages and even in their website, they had embedded an official Binance Dex video about the launching of their service. But due to my FOMO of losing the airdrop, I decided to give them a try and i withdrew my 0.06614129 bitcoins in their shared address 1MLVs6A6YFQZkQxYt9y8994MR5sYCDANGa in order to receive their “airdrop” but as soon the bitcoins were delivered, both the channel and the site disappeared. Later Chrome browser identified the website as dangerous and deceptive before it was completely removed from the world wide web.
https://preview.redd.it/s3phj7xwxzx51.jpg?width=1033&format=pjpg&auto=webp&s=1190b6bb51b533dfbc2b67124f9bfd8d2477ca4c
https://preview.redd.it/fnhqi1lyxzx51.jpg?width=521&format=pjpg&auto=webp&s=05a2629c33aa9445330d98973bf309e68369c54b
My funds were available in their shared address according to https://blockchair.com/bitcoin/address/1MLVs6A6YFQZkQxYt9y8994MR5sYCDANGa but it appears that they forwarded them into another address bc1q4m7f7j3ypkxe6j3nkzewkqh7rgla9msrn2r2sg according to https://blockchair.com/bitcoin/address/bc1q4m7f7j3ypkxe6j3nkzewkqh7rgla9msrn2r2sg so i can’t recover them anymore.
https://preview.redd.it/emdryw60yzx51.jpg?width=1178&format=pjpg&auto=webp&s=d4d8727e902a4a7a129b10a9ddd259d0bd5bda73
Binance Customer Support isn’t even willing to respond to my submitted ticket (4545344) or provide any compensation as the scammers used illegally Binance Dex logo, trademark, launched videos and intellectual property. Their customer support service is awful.
https://preview.redd.it/r7l9p5d1yzx51.jpg?width=348&format=pjpg&auto=webp&s=9ec91a574233fc2024f7e05f4ff1cc856cd7e074
Binance TxID is b6f4ebff7d3478aed63f09ffc2882e80b0f99176324332a6a2e4e0f4be300a8aIs there anybody available who knows how to recover them and claim them back? I can provide 1/3 of my funds if they will be recovered.Is there anyone from binancedrop.us available to provide any assistance?
My BTC deposit address is 1F4gXLY5MdCkZ3MexFuyXCtPsbQLKAtXix
Please help me if possible to recover my funds.
feax21's crypto blog: https://cryptomonkey.weebly.com/
Relevant Article: https://www.coindesk.com/binance-recovers-344k-from-defi-exit-scam-that-launched-on-its-platform
submitted by feax21 to Bitcoin [link] [comments]

BTC Airdrop Conflict

BTC Airdrop Conflict

Scammers used Binance intellectual property to promote their scam
Binance Dex scammers telegram channel
I joined the site binancedrop.us through a telegram channel mocking binance dex service having a fake 6.000 BTC Airdrop and asking me to send them my bitcoin funds, promising that they would return them double through the binance dex fake “airdrop”. I wouldn’t believe them but their telegram channel was full of bots with fake users reassuring me that it was true through personal messages and even in their website, they had embedded an official Binance Dex video about the launching of their service. But due to my FOMO of losing the airdrop, I decided to give them a try and i withdrew my 0.06614129 bitcoins in their shared address 1MLVs6A6YFQZkQxYt9y8994MR5sYCDANGa in order to receive their “airdrop” but as soon the bitcoins were delivered, both the channel and the site disappeared. Later Chrome browser identified the website as dangerous and deceptive before it was completely removed from the world wide web.

Binancedrop.us website

https://preview.redd.it/rnopn5m9xzx51.jpg?width=521&format=pjpg&auto=webp&s=a3a23437a9137eee6e95d7b93eeb0e25dfd16035
My funds were initially available in their shared address according to https://blockchair.com/bitcoin/address/1MLVs6A6YFQZkQxYt9y8994MR5sYCDANGa but it appears that they forwarded them into another address bc1q4m7f7j3ypkxe6j3nkzewkqh7rgla9msrn2r2sg according to https://blockchair.com/bitcoin/address/bc1q4m7f7j3ypkxe6j3nkzewkqh7rgla9msrn2r2sg so i can’t recover them anymore.

Stolen Funds transaction in blockchair
Binance Customer Support isn’t even willing to respond to my submitted ticket (4545344) or provide any compensation as the scammers used illegally Binance Dex logo, trademark, launched videos and intellectual property. Their customer support service is awful.Binance TxID is b6f4ebff7d3478aed63f09ffc2882e80b0f99176324332a6a2e4e0f4be300a8a

Stolen Funds transaction
Is there anybody available who knows how to recover them and claim them back? I can provide 1/3 of my funds if they will be recovered.Is there anyone from binancedrop.us available to provide any assistance?My BTC deposit address is 1F4gXLY5MdCkZ3MexFuyXCtPsbQLKAtXixPlease help me if possible to recover my funds.
What i hate about hackers is that they target hard working middle class crypto users instead of hunting down the rich people. Or is it too difficult to scam rich people ?
Relevant Article:https://www.coindesk.com/binance-recovers-344k-from-defi-exit-scam-that-launched-on-its-platform
Chris K. crypto blog: https://cryptomonkey.weebly.com/
submitted by feax21 to binance [link] [comments]

What is the best way of selling a trading algorithm?

I created a trading algorithm which I want to sell. Its not scam, which usually people say when you want to sell it instead of keep it to urself. I dont really understand why except of being sceptical, correct me if im wrong. I want to know what kind of money making strategies are the best for selling my trading algorithm.

Payments for running my algorithm

These payments are usually monthly or yearly payments.

Earnings that could be invested into the payments above

These are earnings I could use to invest when im at the startup period. Since I would probably not earn enough money in this period with as good as no users at all.

This is the earning I want to use when im **not** in the **startup period**.

These are the strategies I am thinking of:

#1

Starting is free, trades made by my bot (algorithm) have trading fee's from, for example, binance. And withdraw costs are 10% where, for example, 1% goes to binance and 9% to me.

Pros:

Cons:

My opinion
I would like to use this strat mostly because of my first pros. I told some real life people what I am creating and they where all saying that if it was only 10% they would for sure do it. These where people that never traded before and some of them I even had to explain what bitcoin was... This is ofcourse not my target audience but I would totally not mind if they would invest in me. Everyone was new to trading at some point and maybe I can be the trigger for them to start getting into it (or better said, getting into me :D ).

#2

Starting is free, each trade made by my algorithm, buy or sell, will cost the user, for example, 0.5% of
the amount. Where the withdraw costs are 0, exept for the costs that binance asks.

Pros

Cons

My opinion
This is definitly a secure/safe option. Especially in the early states. Maybe I could use this in the early states and use strategy #1 after the startup period (for only new users). But this could make everything very complicated.

#3

Starting will cost, for example, $500. Trading fee's are free, exept for the one's from binance. And the same for withdrawing.

Pros

Cons

My opinion
It has more cons then pros which in my opinion means this is just a bad strategy.

What I want

I would like to know what u guys think is the best strategy and especially why. I would like it if someone has actually some tested results in what people would probably like the most and what would "sell" the best. If someone knows a 4th strategy or even more then I would like to know. But only the best strategy I would use and which one that is is what I want to know.

NOTE! These pros and cons are NOT directly some actual facts or have never been seriously TESTED by me so if one of these are actually wrong, im sorry.
submitted by allartdo to AskMarketing [link] [comments]

PSA: scammers on Tinder and possibly other dating apps

I want to warn you all of scammers on Tinder. There are profiles of Asian women looking somewhere mid tweenties on tinder that after a brief convo on tinder itself give you a (in most cases) UK phone number to continue chatting in WhatsApp. Sometime during the chatting they mention a new "investment possibility" in a new crypto coin "Huawei 5g joint Bluesky Biomedical defence" or short "HWS". If you don't bite at first, they ask you every at least once if you want to join and get more insisted every time. They lure you on to binance.com (which is a legit site) to buy bitcoin, 5000$ at first to get a "beta membership. Which you then transfer to a site hwsex.org and exchange for HWS chips. When you ask if or when you can exchange back to bitcoin and transfer back to binance, they tell you you have to" invest" at least 2 bitcoin to get a "full membership" with which you could then do that (which you can't obviously). Before anyone asks, yes I was dumb enough to fall for it (not for the full 2 btc but I burnt 0.5btc on it)
Pleas everyone be careful if someone from tinder (could also be male scammers out there) talks about crypto and some new investment. Here the link to the crypto scam subreddit https://www.reddit.com/cryptocurrencyscams/comments/huj8li/beware_of_cryptocurrency_scam_wwwblueskybtctop/?sort=new
submitted by TwoFace1987 to Tinder [link] [comments]

The events of a SIM swap attack (and defense tips)

Posted this on Coinbase and someone recommend it also be posted here. The information below on an attempted SIM swap attack was pieced together through a combination of login and security logs, recovering emails initiated by the attacker that were deleted and then deleted again from the trash folder, and learning from AT&T’s fraud representatives. The majority if this is factual, and we do our best to note where we are speculating or providing a circumstantial suspicion. TLDRs at the bottom.
The full story:
We were going about our business and received a text from AT&T that says “…Calls & texts will go to your new phone/SIM card. Call 866-563-4705 if you did not request.” We did not request this, and were suspicious that the text itself could be a phishing scam since we searched the phone number and it wasn’t overtly associated with AT&T. Thus, we tried calling AT&T’s main line at 611 but all we hear is beep beep beep. The phone number is already gone. We use another phone to call AT&T and at the same time start working on our already compromised email.
While we didn’t see everything real time, this is what the recovered emails show. In less than 2 minutes after receiving the text from AT&T, there is already an email indicating that the stolen phone number was used to sign into our email account associated with Coinbase. 2 minutes after that, there is an email from Coinbase saying:
"We have received your request for password reset from an unverified device. As a security precaution, an e-mail with a reset link will be sent to you in 24 hours. Alternatively, if you would like your password reset to be processed immediately, please submit a request using a verified device.
This 24 hour review period is designed to protect your Coinbase account."
This is where Coinbase got it right to have a 24 hour review period (actually a recovery period) before allowing the password to be reset. However, the attackers knew this and planned to steal the second email from Coinbase by setting email rules to forward all emails to a burner address and also have any emails containing “coinbase” re-routed so they don’t appear in the Inbox. 5 minutes later, they request a password reset from Gemini and the password was reset to the attacker’s password within a minute after that. The next minute they target and reset DropBox’s password followed immediately with Binance. Less than 2 minutes later, an email from Binance indicates that the password has been reset and another email arrives a minute later indicating a new device has been authorized.
It’s at this point that we begin locking the attacker out by (1) removing the phone number as 2FA (2) changing the email password, (3) and three forcing a logout of all sessions from the email. There was a bit of back and forth where they still had an active login and re-added the stolen phone number as 2FA.
They added only one more password reset to a gaming account that was not deleted. I can only suspect that was a decoy to make it look like the attack was directed at gaming rather than finances.
The Gemini and Binance accounts were empty and effectively abandoned, with no balances and inactive bank accounts (if any), and no transactions in 1-3 years. DropBox had no meaningful files (they probably look for private keys and authenticator backups) and the phone number they stole from us was suspended, so as far as the attacker is concerned, there is no meat on this bone to attack again… unless they had inside information.
This is where I suspect someone internal at Coinbase receiving wire deposits has been compromised in tipping off ripe accounts – accounts with new and somewhat large balances. We had completed a full withdrawal of funds from Coinbase earlier in the year, and had a balance of less than $20 heading into May. Deposits to Coinbase staggered in to get above six figures through mid-May then stopped. The attack occurred 7 days after the last large wire deposit was made to Coinbase.
From the perspective of an attacker that had no inside information, we were a dead end with abandoned Gemini and Binance accounts with zero balances and stale transactions, no DropBox information, and the suspended phone number access. Our Coinbase deposits were known to no one except us, Coinbase, and our bank. We were also able to stop the hacker’s email forwarding before Coinbase’s 24 hour period to send the password reset, so this one didn’t work out for the attackers and it would make sense for them to move on to the next rather than put efforts into a second attack only for Coinbase - for what would appear to be a zero-balance Coinbase account based on the other stale accounts.
Then…23 hours and 42 minutes after the first attack, another message from AT&T “…Calls & texts will go to your new phone/SIM card. Call 866-563-4705 if you did not request.” Here we go again. We had been confident in AT&T’s assurances that our account had been locked and would not be SIM swapped again, so we unwisely added the phone number back to our email account as a backup (it’s now removed permanently and we use burner emails for account recovery like we should have all along).
Upon seeing that our phone number had been stolen again I knew they were after the Coinbase reset email that was delayed by 24 hours from Coinbase as part of their security. We did 4 things within 2 minutes of that text: (1) removed the phone number again from the email account – this time for good, (2) market sell all Bitcoin on Coinbase, (3) withdraw from Coinbase, (4) have AT&T suspend service on the phone line.
In speaking with AT&T, they were floored that our SIM would be transferred again in light of all the notes about fraud on the account and the PIN being changed to random digits that had never been used by us before. Based on the response of disbelief from AT&T on the second port, I suspect that this attack also involved a compromised AT&T employee that worked with the attacker to provide timely access to the Coinbase password reset email. Apparently, this has been going on for years: https://www.flashpoint-intel.com/blog/sim-swap-fraud-account-takeove
with phone carrier employees swapping SIMs for $80s a swap.
Remember that most of this was hidden in real time, and was only known because we were able to recover emails deleted from Trash by the attacker.
Since we require any withdrawals to use Google Authenticator on Coinbase, our funds may have been secure nonetheless. However, under the circumstances with attackers that were apparently working with insiders to take our phone number twice in attempts to steal Bitcoin, and it being unknown if they had additional tools related to our Google Authenticator, we decided it was safer on the sidelines. The coins were held on the exchange for a quick exit depending on whether Bitcoin was going to break up or down from $10,000. A hardware wallet is always safest, but we were looking to time the market and not have transaction delays.
For some some security recommendations:
AT&T: If you are going to send a text saying that calls and texts are moving to a new number, provide a 10 minute window for the phone number to reply with a “NO” or “STOP” to prevent the move. This can escalate the SIM dispute to more trusted employees to determine who actually owns the line. Don’t let entry level employees swap SIMs.
Coinbase: Do not default to phone numbers as 2FA. Also, if someone logs in successfully with the password before the 24 hours are up, the password is known and there is no need to send the password reset email again for attacker to have forwarded to them. At least have an option to stop the password reset email from being sent. We did not tag our account at Coinbase with fraud because of the stories of frozen funds once an account is tagged. I’m not sure what the solution is there, but that is another problem.
Being a trader, it would be nice to think of Coinbase as any other type of security brokerage where your assets are yours (someone can’t steal your phone number and transfer your stocks to their account). We fell into that mindset of security, yet this experience has reminded us of the uniqueness of cryptocurrency and the lack of custodial assurance and insurance from exchanges because of the possession-is-everything properties of cryptocurrency.
As many have said before, 2FA with a phone number quickly becomes 1-factor authentication as soon as that phone number is associated with password recovery on your email or other accounts. Our overall recommendation is to avoid having a phone number associated with any recovery options across all your accounts.
TLDR on the process:
Scammers will steal your phone number (in our case twice in 24 hours) and use your phone number to access your email and accounts. They will use your email to reset passwords at financial accounts and file hosting such as DropBox. They will then use that combination to transfer any assets they can access from your accounts to theirs. They will do their best to hide this from you by
(1) not resetting your email password so as to raise suspicion,
(2) immediately delete any password reset emails you may receive from financial accounts to hide them from you,
(3) attempt to forward all emails sent to your address to a burner email, and
(4) set email rules to forward emails containing “coinbase” to an email folder other than your Inbox so that you don’t see the transactions and password reset emails that arrive to your inbox.
TLDR on defense tips: If your phone stops working or you receive a text of your number being ported do the following as soon as possible:
(1) log into your email account(s) associated with your financial accounts and remove your phone number as 2FA immediately
(2) change your email password,
(3) force a logout of all sessions from your email (at this point you have locked them out), then
(4) check your mail forwarding settings for forwards to burner addresses,
(5) check your mail rules for rerouting of emails from accounts such as Coinbase, and
(6) call your carrier to have them suspend service on your lost phone number and ask them to reinstate your SIM or get a new SIM. This will require a second phone because your personal phone number has been stolen.
We hope this helps some others be safe out there in protecting their coins. The more we know, the more we can protect ourselves. Wishing you all the best!
submitted by etheregg to CryptoCurrency [link] [comments]

The events of a SIM swap attack directed at Coinbase (and defense tips)

The information below on an attempted SIM swap attack was pieced together through a combination of login and security logs, recovering emails initiated by the attacker that were deleted and then deleted again from the trash folder, and learning from AT&T’s fraud representatives. The majority if this is factual, and we do our best to note where we are speculating or providing a circumstantial suspicion. TLDRs at the bottom.
The full story:
We were going about our business and received a text from AT&T that says “…Calls & texts will go to your new phone/SIM card. Call 866-563-4705 if you did not request.” We did not request this, and were suspicious that the text itself could be a phishing scam since we searched the phone number and it wasn’t overtly associated with AT&T. Thus, we tried calling AT&T’s main line at 611 but all we hear is beep beep beep. The phone number is already gone. We use another phone to call AT&T and at the same time start working on our already compromised email.
While we didn’t see everything real time, this is what the recovered emails show. In less than 2 minutes after receiving the text from AT&T, there is already an email indicating that the stolen phone number was used to sign into our email account associated with Coinbase. 2 minutes after that, there is an email from Coinbase saying:
"We have received your request for password reset from an unverified device. As a security precaution, an e-mail with a reset link will be sent to you in 24 hours. Alternatively, if you would like your password reset to be processed immediately, please submit a request using a verified device.
This 24 hour review period is designed to protect your Coinbase account."
This is where Coinbase got it right to have a 24 hour review period (actually a recovery period) before allowing the password to be reset. However, the attackers knew this and planned to steal the second email from Coinbase by setting email rules to forward all emails to a burner address and also have any emails containing “coinbase” re-routed so they don’t appear in the Inbox. 5 minutes later, they request a password reset from Gemini and the password was reset to the attacker’s password within a minute after that. The next minute they target and reset DropBox’s password followed immediately with Binance. Less than 2 minutes later, an email from Binance indicates that the password has been reset and another email arrives a minute later indicating a new device has been authorized.
It’s at this point that we begin locking the attacker out by (1) removing the phone number as 2FA (2) changing the email password, (3) and three forcing a logout of all sessions from the email. There was a bit of back and forth where they still had an active login and re-added the stolen phone number as 2FA.
They added only one more password reset to a gaming account that was not deleted. I can only suspect that was a decoy to make it look like the attack was directed at gaming rather than finances.
The Gemini and Binance accounts were empty and effectively abandoned, with no balances and inactive bank accounts (if any), and no transactions in 1-3 years. DropBox had no meaningful files (they probably look for private keys and authenticator backups) and the phone number they stole from us was suspended, so as far as the attacker is concerned, there is no meat on this bone to attack again… unless they had inside information.
This is where I suspect someone internal at Coinbase receiving wire deposits has been compromised in tipping off ripe accounts – accounts with new and somewhat large balances. We had completed a full withdrawal of funds from Coinbase earlier in the year, and had a balance of less than $20 heading into May. Deposits to Coinbase staggered in to get above six figures through mid-May then stopped. The attack occurred 7 days after the last large wire deposit was made to Coinbase.
From the perspective of an attacker that had no inside information, we were a dead end with abandoned Gemini and Binance accounts with zero balances and stale transactions, no DropBox information, and the suspended phone number access. Our Coinbase deposits were known to no one except us, Coinbase, and our bank. We were also able to stop the hacker’s email forwarding before Coinbase’s 24 hour period to send the password reset, so this one didn’t work out for the attackers and it would make sense for them to move on to the next rather than put efforts into a second attack only for Coinbase - for what would appear to be a zero-balance Coinbase account based on the other stale accounts.
Then…23 hours and 42 minutes after the first attack, another message from AT&T “…Calls & texts will go to your new phone/SIM card. Call 866-563-4705 if you did not request.” Here we go again. We had been confident in AT&T’s assurances that our account had been locked and would not be SIM swapped again, so we unwisely added the phone number back to our email account as a backup (it’s now removed permanently and we use burner emails for account recovery like we should have all along).
Upon seeing that our phone number had been stolen again I knew they were after the Coinbase reset email that was delayed by 24 hours from Coinbase as part of their security. We did 4 things within 2 minutes of that text: (1) removed the phone number again from the email account – this time for good, (2) market sell all Bitcoin on Coinbase, (3) withdraw from Coinbase, (4) have AT&T suspend service on the phone line.
In speaking with AT&T, they were floored that our SIM would be transferred again in light of all the notes about fraud on the account and the PIN being changed to random digits that had never been used by us before. Based on the response of disbelief from AT&T on the second port, I suspect that this attack also involved a compromised AT&T employee that worked with the attacker to provide timely access to the Coinbase password reset email. Apparently, this has been going on for years: https://www.flashpoint-intel.com/blog/sim-swap-fraud-account-takeove with phone carrier employees swapping SIMs for $80s a swap.
Remember that most of this was hidden in real time, and was only known because we were able to recover emails deleted from Trash by the attacker.
Since we require any withdrawals to use Google Authenticator on Coinbase, our funds may have been secure nonetheless. However, under the circumstances with attackers that were apparently working with insiders to take our phone number twice in attempts to steal Bitcoin, and it being unknown if they had additional tools related to our Google Authenticator, we decided it was safer on the sidelines. The coins were held on the exchange for a quick exit depending on whether Bitcoin was going to break up or down from $10,000. A hardware wallet is always safest, but we were looking to time the market and not have transaction delays.
For some some security recommendations:
AT&T: If you are going to send a text saying that calls and texts are moving to a new number, provide a 10 minute window for the phone number to reply with a “NO” or “STOP” to prevent the move. This can escalate the SIM dispute to more trusted employees to determine who actually owns the line. Don’t let entry level employees swap SIMs.
Coinbase: Do not default to phone numbers as 2FA. Also, if someone logs in successfully with the password before the 24 hours are up, the password is known and there is no need to send the password reset email again for attacker to have forwarded to them. At least have an option to stop the password reset email from being sent. We did not tag our account at Coinbase with fraud because of the stories of frozen funds once an account is tagged. I’m not sure what the solution is there, but that is another problem.
Being a trader, it would be nice to think of Coinbase as any other type of security brokerage where your assets are yours (someone can’t steal your phone number and transfer your stocks to their account). We fell into that mindset of security, yet this experience has reminded us of the uniqueness of cryptocurrency and the lack of custodial assurance and insurance from exchanges because of the possession-is-everything properties of cryptocurrency.
As many have said before, 2FA with a phone number quickly becomes 1-factor authentication as soon as that phone number is associated with password recovery on your email or other accounts. Our overall recommendation is to avoid having a phone number associated with any recovery options across all your accounts.
TLDR on the process:
Scammers will steal your phone number (in our case twice in 24 hours) and use your phone number to access your email and accounts. They will use your email to reset passwords at financial accounts and file hosting such as DropBox. They will then use that combination to transfer any assets they can access from your accounts to theirs. They will do their best to hide this from you by
(1) not resetting your email password so as to raise suspicion,
(2) immediately delete any password reset emails you may receive from financial accounts to hide them from you,
(3) attempt to forward all emails sent to your address to a burner email, and
(4) set email rules to forward emails containing “coinbase” to an email folder other than your Inbox so that you don’t see the transactions and password reset emails that arrive to your inbox.
TLDR on defense tips: If your phone stops working or you receive a text of your number being ported do the following as soon as possible:
(1) log into your email account(s) associated with your financial accounts and remove your phone number as 2FA immediately
(2) change your email password,
(3) force a logout of all sessions from your email (at this point you have locked them out), then
(4) check your mail forwarding settings for forwards to burner addresses,
(5) check your mail rules for rerouting of emails from accounts such as Coinbase, and
(6) call your carrier to have them suspend service on your lost phone number and ask them to reinstate your SIM or get a new SIM. This will require a second phone because your personal phone number has been stolen.
We hope this helps some others be safe out there in protecting their coins. The more we know, the more we can protect ourselves. Wishing you all the best!
submitted by etheregg to CoinBase [link] [comments]

Sweet! I figured out how to buy packs for free.

Sweet! I figured out how to buy packs for free.
Thanks, Bitpay.

I had never even heard of xsolla before.
I noticed that on my PC, after accidentally clicking a pack, that there was an option to pay with BitPay.

Sweet!
Having acquired some crypto from using the Brave browser, I decided to look into it and found out it was legit so I opened a bitpay wallet on my phone and converted the BAT that they give you for allowing ads and from Reddit and Twitter tips into XRP(Ripple) on Binance and sent it to my BitPay wallet. I used XRP because the transfer fees are minuscule compared to Bitcoin or Ethereum and I hate paying those huge miner fees. Sometimes $4-$5 a pop.
Anyhow, over the last few months I had socked away quite a bit and was able to buy the Void Pack for $69.99 CDN and it didn't cost me a cent of real money. I still have some left so I will definitely be saving up again for the next sacred 2x or some other deal.
I still don't understand why more people don't take advantage of the free crypto that's available, and I don't mean the Discord scammers that are offering a chance of a lifetime. I guess it's because it is new and unknown, and there have been some scams involving crypto but there are scams anywhere money is involved. If you want to learn more, let me know but I'll quit boring you here, I was just excited to get all this for just a little bit of time.

Ahhhhh yeah.
submitted by BirdyTheBirdman to RaidShadowLegends [link] [comments]

BITCOIN Scammers Conduct Massive Twitter Hack Including Crypto Community & $1 Million Bounty Fake Binance Bitcoin and Ethereum Airdrop Scammer nu online! Binance Futures Trading Scam Alert WARNING BITCOIN SCAMS!! DOGECOIN DUMP? STOCKS CRASH ... Warning! Binance DEX Scammer on YouTube Fund Criminals w/ BITCOIN!? Huobi & Binance EXPOSED! BINANCE PHISHING SCAM WARNING!!! Indian Bitcoin Scammer - Binance Crypto Scam Exposed ... SCAM ALERT! How secure are exchanges like Binance and Kraken?

New: If you want to buy Bitcoin or other cryptocurrencies from the United States, visit Binance.US.European users can purchase crypto with EUR and GBP on Binance Jersey.. Binance.com offers a wide range of cryptocurrencies with several payment methods, including credit card and bank wire transfers. Trade with 100+ altcoins with margin up to 125x on futures on one of the world’s most liquid ... Scammers “pump up” or promote an “altcoin” they own in bulk and then sell it off in bulk once the price peaks. Of course, they were the ones who peaked the price in the first place by artificially increasing demand. What made Pump and Dump especially viable for scammers and especially dangerous for investors was the glut in under-sold Bitcoin alternatives (there were 45 of them by the ... Scammers raked-in $24 million in bitcoin during the first six months of 2020, according to a new report from crypto monitoring service Whale Alert. Slippery scammers are targeting cryptocurrency rookies with fake landing pages for popular exchange desks – including leading platform Binance – that have been deliberately designed to appear ... Binance CEO calls out scammers posing as his employees on LinkedIn... Silicon Valley Newsroom. 1:29 AM No comments For those who may not know, exchanges typically charge cryptocurrency startups a fee to list their new coin - and of course the exchange they all want to get on is Binance, which currently has the highest daily trading volume. That's why scammers have taken to LinkedIn to contact ... They are stealing YouTubers accounts to stream fake Binance, Ripple, Ethereum or Bitcoin Cash giveaway on them. B. M. Follow. Jan 2 · 3 min read. Maybe you have noticed that there is a lot of ... Other scammers have turned their attention to creating quite sophisticated fake wallet apps that, once downloaded to a user’s smartphone, can be used to steal critical account details. These apps have even made it into official, legitimate app stores like Google Play, so it pays to do your research before downloading anything to your phone.

[index] [20171] [19689] [13693] [18106] [15552] [6498] [7556] [22222] [20883] [16895]

BITCOIN Scammers Conduct Massive Twitter Hack Including Crypto Community & $1 Million Bounty

warning bitcoin scams are getting worse! will dogecoin dump?! cz binance get cancelled!!! will stocks crash bitcoin or will bitcoin peg to gold?! altcoins ar... YouTube scammer copying Changpeng Zhao from Binance and offering a "6000 Bitcoin" giveaway goes LIVE on YouTube - DO NOT GET SCAMMED! Fake, impersonator, scamming off CZ's live AMA feed. My videos are about Bitcoin, Ethereum, Blockchain and crypto currencies in general, to avoid scam, rip-off and fraud especially in mining. I'm talking about how you can invest wisely and do it ... Bitcoin scammers conducted a huge hack on Twitter which included the following accounts: Bill Gates Barack Obama Elon Musk Uber Jeff Bezos Apple Kanye West Mike Bloomberg Mr Beast Joe Biden ... How to Copy and Paste Ads and MAKE $100 $500 DAILY! (Step by Step Training) - Duration: 20:18. Dan Froelke's Channel Recommended for you Hello trader , please be aware of binance leverage trading , binance is doing huge scam with its users , as i recorded live trade , they will never sell you in profit , i had closed my position ... Let op er is nu een fake Binance airdrop aan de gang. 194.000 abonnees en toch 100% nep! Trap er niet in! Vrienden link: Bitvavo: https://bitvavo.com/?a=7601... #bitcoin #crypto #binance #huobi #cryptocurrency #btc #altcoin #altcoins #bnb #ethereum #eth #bestcrypto #hodl #chico #blockchain The information contained herein is for informational purposes only. Please help me report this Scammer before people fall for this trick! No Exchange would ever do such a Giveaway, scammers on made thousands with this technique! If you know of any other active ... Indian Bitcoin Scammer - Binance Crypto Scam Exposed! Today i discovered a indian scammer using the binance crypto trading platform as part of their scam. Th...

#