Close Menu
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
What's Hot

A new narrative for bitcoin that will last

May 2, 2026

What does Lido’s targeted rsETH fix mean for LDO and EarnETH holders?

May 2, 2026

El Salvador Crypto Remittances Reach $17.38M

May 2, 2026
Facebook X (Twitter) Instagram
Recession Profit AlertsRecession Profit Alerts
  • Instructions
  • News
    • DeFi
    • Smart Contract
    • Markets
    • Web3
    • Adoption
    • Memecoins
    • Analysis
    • Mining
    • Scams
    • Security
  • Education
    • Learn
    • Wallets & Exchange
  • Documentaries
  • Videos
    • Alessio Rastani
    • Altcoin Buzz
    • Coin Bureau
    • Dapp University
    • DataDash
    • Digital asset News
    • EllioTrades Crypto
    • MMCrypto
    • Lark Davis
    • Ivan on Tech
    • Benjamin Cowen
  • Market
    • Crypto Market Cap
    • Heat Map
    • Converter
    • Metal Prices
    • Stock prices
  • Bonus Books
  • Tools
Recession Profit AlertsRecession Profit Alerts
Home»Scams»CEO of Binance hacked by exploit of mobile provider, which probably leaves your own crypto visible
CEO of Binance hacked by exploit of mobile provider, which probably leaves your own crypto visible
Scams

CEO of Binance hacked by exploit of mobile provider, which probably leaves your own crypto visible

February 1, 2026No Comments7 Mins Read

Binance co-CEO Yi He said her WeChat account was hijacked on December 10 after a mobile number linked to the profile was reclaimed and could not be recovered initially.

The account was later restored after Binance worked with WeChat’s security team, a spokesperson quoted the same day said.

Posts that emerged after the acquisition promoted a token called ‘Mubarakah’, and on-chain data shared by Lookonchain indicated a pump-and-dump that raised around $55,000 before the contents were removed.

Why Yi He’s WeChat Hack Is More Important Than Binance

The episode arrived days after Yi He’s appointment as co-CEO was announced during Binance Blockchain Week, with an executive’s identity at the center of a web platform incident rather than a crypto infrastructure breach.

Web accounts tied to phone numbers remain exposed to recovery flows that attackers can intercept without touching wallets, custodial systems, or exchange backends, a pattern that has shaped several market incidents over the past two years.

According to the SEC’s postmortem on the January 2024 compromise, The SEC and FBI later detailed rulings related to that hack.

According to the SEC document, this case has become a reference point for how a single spoofed message can reshape price action and trigger liquidations without any on-chain exploit.

The SlowMist founder reissued guidance last week describing how WeChat account captures can continue with leaked credentials and verification of “frequent contacts.” This method can aid recovery by messaging two contacts to pass identity checks, creating a low-friction path for attackers.

According to City News Service in Shanghai, Chinese carriers typically reissue canceled numbers after about 90 days, a secondary issuance practice that intersects with legacy SMS recovery and exposes dormant accounts when numbers are recycled.

If an old number remains associated with an abandoned profile, a new holder may receive SMS prompts or pass recovery checks that bypass or weaken the dependency on passwords, which ties in with Yi He’s account that the number associated with her profile has been “confiscated for use.”

See also  crypto investment company disappears with $1.6 million

WeChat’s role in cryptocurrencies increases conversion risk when accounts of executives or key opinion leaders are hijacked. Many OTC USDT transactions and discussions in the retail community run through the app, and a trusted handle can convey enough implicit trust to involve flows in contracts with limited liquidity.

That dynamic is different from a random spam link on X, where user overlap and transaction intent may be lower.

Binance’s own ecosystem has suffered from social account risks this year, with BNB Chain’s official

The immediate impact on the market surrounding Yi He’s WeChat case seemed limited. As of December 10, during London trading hours, BNB was roughly flat on the day near $890, with intraday highs and lows ranging between $927.32 and $884.67.

Ticker Price (USD) Δ versus previous closure Intraday high Intraday low
BNB 890.17 -9.02 (-0.01%) 927.32 884.67

The economic payout cited in this incident, approximately $55,000, fits into a lower range for single-push memecoinshills. Coordinated hijacks on multiple

A simple illustration of the range of sales helps identify incentives

If a hijacked executive account reaches 1 to 5 million contacts, if 0.05% to 0.20% click through, and if 10% of those clickers put $100 each into a shallow pool, the gross inflow would be about $5,000 – $100,000 per post, consistent with the $55,000 estimate.

While this is a model and not a factual statement, it is consistent with observed results when an identity inspires public trust and the token’s liquidity is scarce.

Rising loss totals in 2024 provide the macroeconomic backdrop. Chainalysis and TRM Labs estimate around $2.2 billion in stolen cryptocurrencies this year, with a mid-year shift toward attacks on centralized services, even as the share of illicit activity on the chain remains below 1%.

According to Chainalysis and TRM Labs, sanctioned entities are leaning more on stablecoins, keeping policy attention focused on operational and identity risks that can be exploited without cracking the cryptography. The policy response is also changing.

South Korea moved to no-fault “bank-level” liability for exchanges on Nov. 27 after the Upbit incident, creating a potential blueprint for how regulators can assign responsibility for platform-adjacent losses related to social engineering or third-party platform weaknesses.

See also  Solana trading bot Aqua reportedly raking in $4.65 million after major ecosystem recommendations

The security mechanisms in Yi He’s case highlight where controls can fail

SIM recycling plus social recovery enables takeovers when a platform accepts text messages or contact-based proofs due to hardware-related factors. Verification of “frequent contacts” accelerates capture by co-opting social ties, especially when contacts are accustomed to approving routine actions.

If an executive account is inactive, the device fingerprints and session recency may be out of date, making it easier for a recycled number to pass through the recovery gates.

According to Binance security alerts published earlier this year, attackers have repeatedly tested WeChat-targeted flows that combine leaked credentials, contact verification, and number reuse.

CryptoSlate daily briefing

Daily signals, no noise.

Market-moving headlines and context, read in one sitting every morning.

5 minute summary 100,000+ readers

Free. No spam. You can unsubscribe at any time.

Oops, looks like there’s a problem. Please try again.

You are subscribed. Welcome aboard.

For boards and compliance teams, executive identities now function as market infrastructure. A single unvetted post can mobilize nine-figure volume, lead to user churn, and force public remediation. That governance perimeter lies outside the custody of foreign exchange and traditional cybersecurity budgets.

It includes personal devices, legacy accounts, provider policies, and third-party platform settings, complicating control audits and disclosure protocols.

The SEC

Given the facts so far, the forward paths fall into three bands

A contained reputation issue would involve no further messages from impostors, a brief platform note from Binance, no user losses beyond the attacker, and limited BNB or broader market impact from Binance.

See also  Avalanche (AVAX)-based social financing platform experiences a $2,900,000 exploit: Peckshield

A policy wave with limited market stress would see APAC or European authorities issue guidance on the governance of executive branch social accounts, possibly leaning on South Korea’s leadership, with hardware key mandates and standards for no-fault compensation for verified, socially engineered incidents.

An escalation into a market-moving parody would target a listing or airdrop claim, coordinate across channels, and drive nine-figure volume before delisting, following SEC precedent and previous multi-account hijacks.

Signposts include new phishing domains or wallet clusters associated with known scam infrastructure, corporate attestations of web account audits, and WeChat statements on recycled number recovery.

Risk-reducing measures have been well identified. Disabled a kill-switch policy for executive accounts not used for business, phone, or SMS recovery; hardware keys enforced; and organizational SSO for any channel that could be construed as corporate communications would reduce exposure.

On the platform side, WeChat could require recent successful device-based logins before widely posting messages from public accounts linked to recycled numbers, and expand enterprise-level verification for handles with wide reach.

These measures would not eliminate spoofing, but they would reduce the likelihood and shorten the period in which a hijacking can generate revenue for an audience.

Outstanding items remain standing. It is not yet clear whether Binance users have suffered direct losses from links posted on WeChat and whether refunds will be offered for off-platform damages.

It is also unknown whether secondary channels amplified the “Mubarakah” messages or whether WeChat’s internal network effects limited the impact.

Confirmation of the token’s chain and contracts, and any coordination between centralized locations and DEX front ends to flag or block trading, would clarify its operational footprint.

Yi He’s account has been restored, according to Binance, and attention now shifts to whether carriers and WeChat are adjusting security measures around recycled numbers and contact-based recovery.

Mentioned in this article

Source link

Binance CEO Crypto Exploit hacked Leaves Mobile provider visible

Related Posts

El Salvador Crypto Remittances Reach $17.38M

May 2, 2026

How Mobile Apps Are Quietly Adopting Web3 Tech

May 2, 2026

Tax season fuels rise in crypto wallet scams, Kaspersky reports

May 2, 2026

Aftermath Finance reports $1.14M estimated losses in latest DeFi protocol exploit

May 2, 2026
Top Posts

Can Sandbox (SAND) Price Rally on Facebook’s Product Launch?

September 28, 2023

Alleron Expert Group Marks Six Years of 100% Client Retention, Announces Expanded Cloud Services Portfolio

April 11, 2026

Introducing Ankr Liquid Staking, The Latest in DeFi Innovation

October 3, 2023

Type above and press Enter to search. Press Esc to cancel.