Home Library Security Settings

How to Identify Binance Phishing Emails? Common Characteristics

Identifying whether an email from "Binance" is authentic can be judged from four dimensions: sender domain, anti-phishing code, link hover preview, and attachment type. If users feel the email content is urgent or requests credentials, they should immediately log in to the internal messages on the Binance Official Website to verify, or check the push notification source via the Binance Official APP. iOS users, when receiving the app download prompt in an email for the first time, should first confirm with the iOS Installation Tutorial before deciding whether to proceed. Direct answer in the first paragraph: You can quickly judge within 30 seconds using the four tricks: "Check domain, check anti-phishing code, hover over links, and check attachment extensions." If any one of these is incorrect, it can basically be identified as a phishing email.

1. Common Disguise Techniques for Phishing Emails

Step 1: Domain Replacement

The most common method used by attackers is to register domains similar to binance.com, such as blnance.com, binnance.com, binanse.com, blnance.cc, etc. Some domains even use internationalized characters for disguise, such as replacing 'i' with the Turkish dotted 'ı', which is almost indistinguishable to the naked eye.

Step 2: Body Imitation

The email style, LOGO, and fonts will be highly consistent with official emails, even the copyright information at the bottom remains unchanged. It is almost impossible to distinguish at the visual level, which is why you cannot rely on intuition alone to judge authenticity.

Step 3: Urgent Language

Phishing emails usually carry strong urgency: "Account will be frozen within 2 hours," "Abnormal login detected, please handle immediately," "Please complete KYC update within 15 minutes." This psychological pressure causes users to lose their ability to make calm judgments.

2. Operating Steps for the Four Identification Dimensions

The following four steps are the recommended quick screening process:

  • Step 1: Sender's Full Domain. In the email client, click on the sender's address to view the full domain after the @ symbol. Official email senders are usually [email protected], [email protected], etc. Any top-level domain other than binance.com should be considered suspicious.
  • Step 2: Verify Anti-Phishing Code. Authentic official emails will have a user-preset anti-phishing code at the top or bottom. If the email has no anti-phishing code or the string does not match the one you set, directly judge it as phishing.
  • Step 3: Link Hover Preview. Hover your mouse over all buttons and links in the email to view the actual URL displayed in the browser's bottom status bar. If it shows a domain different from binance.com, or a short link service (bit.ly, tinyurl.com, t.co, etc.), stop the operation immediately.
  • Step 4: Attachment Type. Official emails almost never use attachments; all materials are redirected through links in the body. If the email contains attachments like .zip, .exe, .html, .docm, especially those asking you to "download a form to fill out," it is 100% phishing.

For emails that cannot be confirmed, the best practice is to not reply and not click, and directly log in to your account message center via browser bookmarks or the official APP. All important official notifications will be synced to the internal messages.

3. Comparison of Key Characteristics Between Authentic and Phishing Emails

The table below summarizes typical differences between authentic official emails and phishing emails:

Dimension Authentic Email Phishing Email
Sender Domain @binance.com top-level domain Similar domains, long-tail subdomains
Anti-Phishing Code Correctly contains 8-20 character string None or garbled
Body Language Consistent with account language settings May mix multiple languages or translation styles
Link Prefix https://www.binance.com/ Unfamiliar main domain or short links
Link Certificate Valid EV certificate Self-signed or Let's Encrypt
Attachment Very rare, static text only .zip/.exe/.html
Timestamp Synced with operation, accurate to the second Often delayed or strange timestamps
Sensitive Request Will not ask for password or mnemonic Mostly request credentials
Unsubscribe Link Points to binance.com/unsubscribe Points to unfamiliar domain

Observation shows that any email requiring users to enter mnemonics, private keys, full passwords, or full 2FA seeds is 100% phishing. Binance official will never request such information via email; this is the simplest and most direct judgment standard.

4. Actual Scenarios and Response Strategies

Scenario 1: "Account about to be frozen" email. After receiving such a warning, do not click any links; instead, open your browser and enter binance.com to log in and check the real status. A real account freeze will have an obvious prompt after logging in, and you don't need to enter via an email link.

Scenario 2: "Airdrop Claim" email. Phishers use "large airdrop waiting to be claimed" as bait, with links jumping to fake login pages. Official airdrops are always announced in internal messages or official announcements and will not actively require users to log in via email to claim.

Scenario 3: "API Exception, Re-authorization Needed" email. Attackers induce users to enter fake pages to input the API Key's secret. Any experienced API user knows that the secret is only seen once when generated, and official will never ask users to "re-enter."

Scenario 4: "Customer Service Active Contact" email. The email shows "Customer service has replied to your ticket," and clicking in requires you to enter your email password to log in to the email system for viewing. Real customer service replies only appear in the Binance ticket system and will not ask you to log in directly from your email.

Scenario 5: Word file with macros in attachments. The email attachment is "KYC 2.0 Upgrade Form.docm"; opening it and enabling macros will install a remote control Trojan. All .docm, .xlsm, .xlsb formats should be considered high risk and deleted directly, never opened.

Prevention suggestions: Enable spam filtering and DKIM/SPF verification in email settings; develop a habit of checking the domain and anti-phishing code for every Binance email; report suspicious emails to the email service provider via the "Report Phishing" button at the top of the email.

5. FAQ Common Questions

Q: Will the official include PDF files in emails? A: In rare cases, simple PDF invoices or tax reports may be attached, but these can be identified as purely static PDFs without executable macros. If an attachment looks like a compressed package or script file, it is considered phishing.

Q: Can links in authentic emails be clicked safely? A: Even for authentic emails, it is recommended to develop the habit of "hover over the link to check first, then copy to browser." This way, even if the email is hijacked and modified by hackers, it can be detected in time.

Q: Is reporting phishing emails useful? A: Yes. The Binance security team will block fake domains based on user reports and submit relevant domains to the global Anti-Phishing Working Group. The more reports, the faster the response.

Q: Can I still identify it if the email is set to auto-forward? A: After auto-forwarding, the anti-phishing code and links remain, so the identification method is unchanged. However, it is recommended to regularly check email forwarding rules to prevent hackers from setting up secret forwarding.

Q: How to view the sender's full domain on mobile? A: In Gmail or Outlook mobile APPs, click on the sender's name to expand the full email; Apple Mail requires long-pressing the name to view details. Any client that does not display the full domain should be switched before inspection.