How to Report Scams on Binance? If you have been scammed, we strongly recommend that you click on this link Scam self report to report the scam on Binance. Alternatively, there are 3 main ways you can report a scam on Binance. For more details, please refer to this FAQ.
Beware of the Fake TikTok Account Impersonating Binance South Africa – Do Not Trust to Avoid Scams Please be aware that the TikTok account @thirdnetwork02 has cloned all original content from Binance South Africa and falsely reported our official account as an impersonator. Do not trust this fake account to avoid falling victim to potential scams. Our only official TikTok account is: https://www.tiktok.com/@binancesouthafrica.
🔍 Help Us Build a Safer Crypto Future Thanks to our vigilant community, we’ve strengthened Binance Alpha’s behavior validation system — Empowering users to foster a fairer and more transparent ecosystem. To show our appreciation, we’ve rewarded the first 3 contributors with 100 USDT vouchers for their valuable reports that enhanced our platform’s integrity. 🙌
🟨 User IDs: 5*******5 8*******8 1*******6
🚨 Got something suspicious to report? Submit it through our Customer Support Center — every report matters. Together, we protect what matters most: trust.
Beware of Small Unexpected Transfers on Binance Pay – Protect Your Funds! Recently, some users have reported receiving small unexpected transfers on Binance Pay with notes recommending unfamiliar websites. This is a common scam tactic designed to lure you into clicking malicious links, potentially compromising your account and funds. Please stay vigilant and never trust transfer notes or links from unknown senders. Scammers often use small transfers as bait to trick users into visiting phishing sites or downloading harmful software, leading to financial loss. To safeguard your assets, we recommend the following precautions: Do not click on any unfamiliar links, especially those included in transfer notes. Verify the source of any unexpected transfers and remain cautious. Enable security features such as Two-Factor Authentication (2FA) and transaction passwords. Report any suspicious transactions promptly through official Binance channels. Regularly update your passwords and avoid using simple or repeated passwords. Binance is committed to providing a secure and trustworthy trading environment. We encourage all users to stay alert, protect their digital assets, and help maintain a safe community. If you have any questions or need assistance, please contact Binance customer support. Security is no small matter—protecting your assets starts with vigilance!
Dear Binancian, This post is intended for those who have not set up a Binance Anti-Phishing Code. If you haven't set up your own Anti-Phishing Code in the Security Center, we will use your Binance User ID (UID) number by default and attach it to the SMS messages that Binance sends to you. This helps differentiate legitimate messages from phishing SMS messages sent by scammers. Your UID can be found at the top left hand icon in your app. We highly recommend setting up your own Anti-Phishing Code, as it is easier for you to memorize and recognize, providing you better protection. Always check the Anti-Phishing Code or UID number in SMS messages to avoid falling victim to phishing attacks.
Please be aware that this feature is being rolled out gradually. It will be available in more countries soon. The Binance Risk Team
⚠️Scammers are faking Binance support to trick you into sending face videos or scanning QR codes. If you fall into this trap, you will grant the scammers precious access to your accounts.
💪Our teams are on constant alert, but it is down to users to say no to suspicious requests and report red flags immediately. Only use official channels for any Binance-related communications: anything else is likely a scam.
Binance Blog
--
Scanned and Scammed: Understanding The Face and QR Cons
Main TakeawaysScammers are faking Binance support to trick you into sending face videos or scanning QR codes.If you fall into this trap, you will grant the scammers precious access to your accounts. Our teams are on constant alert, but it is down to users to say no to suspicious requests and report red flags immediately. Only use official channels for any Binance-related communications: anything else is likely a scam.Crypto scams are evolving, and scammers are now targeting Binance users with a crafty double play: fake face verification and QR code traps. Often scammers post as Binance’s official support team in order to lure you into submitting your credentials. Binance teams are tracking these threats 24/7, but your quick action is still crucial. In this post, we’ll unpack how these face and QR tricks work, share a cautionary tale, and give you the tools to outsmart the criminals.The Nature of Face and QR ScamsThese scams are all about impersonation and deception. Scammers often use a combination of two tactics to bypass your security.Face Verification Deception: Scammers pretend to be “Binance support” and ask for a face video to “verify” your account. Their ultimate goal is to access your funds, bypassing Binance’s real verification systems using stolen data.QR Login Deception: Criminals send QR codes via WhatsApp, Telegram, or Facebook, claiming they’re for “rewards” or “updates.” Scanning these codes logs them into your Binance account instantly.Both hinge on you trusting the wrong source. One misstep, like sending a video or scanning a code, can lead to a full account takeover.How Face and QR Scams WorkHere’s how these attacks play out. Face Video TrapsA scammer contacts you on Telegram or email, posing as “Binance support,” asking for a face video to “resolve an issue.”They use the video to mimic you with AI or pair it with stolen data to pass verification.Your account’s unlocked, and your funds are gone.QR Code ConsYou get a message on WhatsApp or Facebook with a QR code for “rewards” or “login help.”As per the function of our QR login feature, scanning this code will automatically sign the scammer into your Binance account.They will transfer your crypto to their wallets before you notice the breach.A stolen phone with Binance access makes it even worse as scammers can combine these tricks for a swift heist.Here’s a real example. A user named Lisa got a WhatsApp message with a QR code promising “Binance rewards.” She scanned it, thinking it was legit. Minutes later, her account was compromised, and her crypto was at risk. She froze it just in time, but it was a close call.These cons thrive on social media and messaging apps, where scammers impersonate us with pushy “support” messages or enticing offers. Whether it’s a video request or a QR code, their goal is the same: to sneak past your defenses and drain your wallet.A “reward” QR code could be a scammer’s key to your account.Targets: Crypto Users WorldwideAnyone can fall for these scams, but users on social media platforms like WhatsApp, Telegram, and Facebook are prime targets. Regions with high device theft rates, like busy cities or travel hubs, face extra risk, especially for phones that aren't locked down. If you’re quick to trust “support” or scan codes, scammers are going to exploit this trust mercilessly.Secure your device to block these tricks.Binance Risk Team’s Ongoing EffortsWe’re fighting these threats around the clock with a range of measures:Threat Monitoring: Our team tracks fake support accounts and malicious QR code distributors, shutting them down fast.Official Channels: We only ask for videos or provide QR codes through verified sources – our app or the binance.com website.Rapid Response: Lost a device? Our 24/7 support is here to freeze your account and block potential losses.We’re staying ahead, but your caution is still your best ally.How to Protect YourselfFight back and stay safe with this 3-step safety checklist:Say No to Videos: “Support” asking for a face video on social media? It’s a scam – ignore it and report to us.Don’t Scan QR Codes: Random codes for Binance “rewards” or “help”? Don’t touch them, verify with binance.com/en/official-verification and let our Support team know ASAP.Secure Your Device: Use strong passwords and 2FA. Phone stolen with Binance access? Contact us right away to stop the crooks.Pro Tip: Only trust QR codes from our official site or app, anything else is suspect.Final ThoughtsFace and QR scams are criminals’ latest moves to snatch your Binance account, and they’re counting on you to be vulnerable to attacks. These attacks can be slick, but you’re smarter. Stick to official channels, reject suspicious offers, and lock down your devices. Binance’s support teams are here for you 24/7, but you are always the first line of defense. Be the hero of your own crypto journey. Outsmart the bad guys and keep your crypto safe by following our recommendations. Further ReadingDon’t Let AI Steal Your Face or Crypto: A Close-Up on the Face Attack ThreatGone Phishing: Don’t Let Scammers Hook Your Binance AccountWeb3 Security: Avoiding the Sticky Trap of Honeypot Scams
Effective tip to help keep your applications safe and secure - For iPhone users
1️⃣ 𝗣𝗿𝗲𝘀𝘀 𝗮𝗻𝗱 𝗵𝗼𝗹𝗱 𝘁𝗵𝗲 𝗮𝗽𝗽 𝗶𝗰𝗼𝗻 for about 1 second. 2️⃣ Select 𝗥𝗲𝗾𝘂𝗶𝗿𝗲 𝗙𝗮𝗰𝗲 𝗜𝗗 👤 (or similar security option). Once enabled, anyone trying to access the app—even if they have physical access to your phone—will need to 𝐚𝐮𝐭𝐡𝐞𝐧𝐭𝐢𝐜𝐚𝐭𝐞 𝐮𝐬𝐢𝐧𝐠 𝐅𝐚𝐜𝐞 𝐈𝐃. If the Face ID does not match, the app will remain 𝐥𝐨𝐜𝐤𝐞𝐝 𝐚𝐧𝐝 𝐢𝐧𝐚𝐜𝐜𝐞𝐬𝐬𝐢𝐛𝐥𝐞. 🚫
We highly recommend enabling this feature for: 🔶 Binance Apps 🌎 Google Chrome/Safari ✉️ Email apps 🏦 Banking apps 📱Social media accounts, messaging apps 💬 📸 Photos, Google Drive, Icloud ☁️ and any other apps containing sensitive information. This extra layer of security helps protect your personal data and digital assets. 🛡️
🚨 Job Scams Alert: SafePal Wallet Spreading in Europe! 🚨 A new wave of job scams is targeting people across Europe, with projects like SafePal Wallet promising quick and easy wealth. These scams often change names but use the same tactics to lure victims.
Beware of: ❌Promises of high returns with little effort ❌Pressure to invest or share personal info fast ❌Unverified platforms and changing project names
Protect yourself by: ✅Researching thoroughly before engaging ✅Verifying legitimacy through official sources ✅Never sharing private keys or sensitive data
At Binance, your security matters. Stay alert and avoid falling for scams that sound too good to be true. Report suspicious projects immediately.
Beware of Fake Proof of Payment Scams in P2P Crypto Trading.
When trading P2P, always wait for official confirmation before releasing crypto. Ensure that the buyer's account details match those on the platform, and examine the proof of payment for inconsistencies.
For more details: https://www.binance.com/en/blog/p2p/fake-proof-of-payment-scams-in-p2p-crypto-trading--spotting-and-avoiding-them-in-2025-5655467775226114828
🚨 Scam Alert: I3q.com Is a Fraudulent Trading Platform
I3q.com claims to use “AI-powered trading” to help users earn profits — but it’s a scam.
💬 Users were lured in through YouTube and other social media ads, promising fake returns like: “Daily 2% gains” or “Guaranteed 1.5% profits”. 🎯 The reality? Once users deposit funds, they are unable to withdraw, and the platform eventually disappears.
🔒 Protect Yourself: ✅Be wary of “too good to be true” returns ✅Do not trust platforms promoted by unverified YouTube influencers ✅Always verify licenses and withdrawal transparency ✅Use only trusted and regulated trading platforms
📢 Share this post to help others avoid falling for fake AI trading schemes.
Enhanced Anti-Phishing Code Feature: Safeguard Against SMS Phishing
Dear Binancian, This post is intended for those who have not set up a Binance Anti-Phishing Code. If you haven't set up your own Anti-Phishing Code in the Security Center, we will use your Binance User ID (UID) number by default and attach it to the SMS messages that Binance sends to you. This helps differentiate legitimate messages from phishing SMS messages sent by scammers. Your UID can be found at the top left hand icon in your app.
We highly recommend setting up your own Anti-Phishing Code, as it is easier for you to memorize and recognize, providing you better protection. Always check the Anti-Phishing Code or UID number in SMS messages to avoid falling victim to phishing attacks. Please be aware that this feature is being rolled out gradually. It will be available in more countries soon. The Binance Risk Team
🎁 “Scan to Get $10!” 🧠 Translation: “Scan to Give $10…” 🚨 Scam alert! Scammers are putting fake “Reward QR codes” out there, saying you’ll receive $10… but when you scan it, you’re actually sending $10 instead. 💸 That’s not a reward — that’s a withdrawal from your dignity AND your wallet. 🔍 Remember: On Binance, scanning a QR code is used to make a payment, not to receive one. If someone says otherwise — 🚩 it's a scam. 📢 Stay sharp, not sorry.
Crypto holders must adopt proactive security practices, including reducing online exposure, enhancing social media privacy, and practicing situational awareness to protect themselves and their assets.
For more details: Binance Physical Security Team on How to Avoid the Threat of Real-Life Attacks.
🎉 Beware of Fake “Binance 8th Anniversary” Promotions!
Scammers are impersonating Binance, using fake anniversary giveaways to lure users into phishing sites or wallet-draining scams.
✅ Only trust announcements from Binance’s official website or app. ❌ Never click suspicious links. ❌ Never share your seed phrase or verification codes. 🎯 Don’t let a “celebration” become a scam.
Protect yourself by never importing seed phrases provided by others, never sharing your seed phrase, always reviewing transactions before signing, verifying websites carefully, and regularly checking your wallet permissions.
Web3 Security – Staying Safe From MultiSig Scams on TRON and Beyond
Main TakeawaysScammers exploit multi-signature wallets by tricking victims into granting co-signer access or full ownership, turning a security feature into a weakness.Common tactics include seed phrase traps that bait victims into funding scammer-controlled wallets, and permission takeovers that lock victims out by adding scammers as co-owners or owners.Protect yourself by never importing seed phrases provided by others, never sharing your seed phrase, always reviewing transactions before signing, verifying websites carefully, and regularly checking your wallet permissions.“More signatures mean more security.” But what if one of them now belongs to a scammer?The multi-signature (MultiSig) feature was designed to enhance crypto security by requiring multiple private key signatures to approve a transaction. Instead of a single point of failure, control is distributed – so that even if one key is compromised, a hacker shouldn’t be able to move funds without the others.However, this extra layer of protection has recently became a double-edged sword on TRON. Scammers are exploiting the network’s flexible permission system that allows users to finely control who can access and manage their accounts. In this blog, we’ll break down how MultiSig is being twisted from a shield into a weapon – and what TRON users need to watch out for.TRON Permission StructureTRON accounts use a permission system that allows fine-grained control over what actions different keys can perform. For our purposes, two key permission types are most relevant:Owner Permission: Controls high-level actions like modifying account permissions or transferring ownership.Active Permission: Governs regular operations such as transferring funds or interacting with smart contracts.To execute, any transaction on the TRON network must be signed by a private key or a combination of keys in a multi-signature setup that has the appropriate permission and meets the required threshold for that specific action.How MultiSig is ExploitedIn a typical MultiSig scam, the attacker finds a way to become one of the required signers – either by tricking the victim into granting them access or by exploiting smart contract flaws or platform-specific permissions. On the TRON network, this tactic takes on two forms.1. Seed Phrase and Private Keys TrapsThese scams drop seed phrases or private keys across multiple platforms like YouTube and X, hoping to lure unsuspecting users into interacting with them.The Setup: Scammers claim they aren’t sure how to transfer funds out of a wallet. They share the seed phrase publicly, asking others to import it and help move the funds – sometimes even promising a reward.The Bait: The wallet appears loaded with a large amount of tokens or USDT, tempting victims to transfer funds out quickly.The Trap: While the wallet holds plenty of tokens, it doesn’t have enough TRX – the native coin required to pay transaction fees. Victims, eager to move the funds, often send their own TRX to cover these fees.The Realization: After funding the wallet with TRX, victims discover they can’t complete any transactions because the wallet is actually controlled by the scammer. The scammer then transfers out the TRX the victim sent – resulting in a loss for the user.Because the wallet’s MultiSig setup requires multiple signatures – signatures the victims don’t have – users who send small amounts of TRX to cover transaction fees end up unable to move any funds. Scammers plant these seeded wallets publicly across social media, hoping many people will take the bait and send TRX without any direct contact. Over time, scammers passively collect significant amounts of TRX while keeping full control locked away.2. Account Permissions TakeoverNot all MultiSig scams are simple bait-and-wait traps. Some are far more sophisticated and sinister – designed to trick you into adding the scammer as a co-owner or co-signer of your wallet. Once they gain this foothold, they can either lock up your funds or, in some cases, take full control of your wallet and drain them entirely.The Setup: Scammers direct users to malicious websites by either posing as exchange support staff or promoting fake airdrop opportunities through social media.The Bait: You’re told to claim an airdrop or connect your wallet to participate in a promotion. The goal? Getting you to sign a seemingly harmless transaction.The Trap: The transaction isn’t what it seems. Instead of claiming a reward, you’re unknowingly approving an account permission update. The details are buried in confusing jargon – or hidden behind a vague “Approve” button.The Realization: Once the transaction is signed, your wallet permissions are altered. In some cases, full owner rights are transferred to the scammer. In others, the scammer adds themselves as a co-signer, locking themselves in as a required participant for all future transactions.With the wallet now requiring multiple signatures to move any funds – signatures you no longer control – you’re effectively locked out.Note: Similar tactics have been observed on Solana as well. There, scammers trick users into signing transactions that transfer authority over token accounts or grant broad execution rights, leading to the same result: loss of control.How to Protect Yourself From MultiSig ScamsProtect Your Seed Phrase: Your seed phrase is the master key to your wallet. Never share it with anyone, and never import private keys or seed phrases provided by others – no matter the reason.Pause and Think Before Signing: Always double-check what you’re about to approve. Whether it’s a transaction or a message, take a moment to understand what you’re signing.Verify website URLs: Watch for subtle red flags like spelling errors, odd fonts, or strange layouts. These can indicate phishing sites designed to mimic real platforms.Check your wallet’s permissions: Use a chain explorer such as tronscan.org to inspect any wallet’s permission settings: Paste the wallet address into the search bar.On the wallet’s account page, look for any permission highlights that indicate changes.Click on the [View Account Permission] button or the [Account Permission] section on the page to see full details of who controls the wallet and what level of access they have.Stay Alert and Informed: In Web3, your best defense isn’t just a strong password – it’s staying informed. From seed phrase traps to account permissions take over, scammers are getting creative with how they exploit features like MultiSig on TRON. Don’t let them catch you sleeping. Keep up with evolving scam tactics by following trusted resources like Binance Academy, our Know Your Scams series, and security blogs. The more you learn, the harder you are to fool. Knowledge isn't optional. It's armor.Final ThoughtsMulti-signature wallets are built for security – but in the wrong hands, they can become weapons against you. The good news is that you don’t need to be a tech expert to stay safe: just stay sharp and question everything. Never share your seed phrase, import keys from strangers, or blindly sign transactions. Make it a habit to review your wallet permissions, and most importantly, keep learning – because in Web3, knowledge isn’t just power, it’s your strongest layer of protection!Further ReadingStay Safe From Smishing – Activate your Anti-Phishing Code Today Avoiding the Sticky Trap of Honeypot Scams Halting Trojan Horses at the Gates of Your Crypto Fortress
🚫 Never Allow Remote Control of Your Binance Account
Remote control access = account compromise. Scammers often pose as “Binance support” and trick users into installing screen-sharing apps or granting remote access. Once they’re in, your assets are at risk.
🔐 Your security is your responsibility. ✅ Never share your screen ✅ Never install remote apps like AnyDesk or TeamViewer ✅ Always verify through official Binance channels
If someone asks to remotely access your account — it’s a scam. Stay alert. Stay secure. 💡