The post Binance Co-CEO Yi He’s WeChat Hijack Raises BNB Security Concerns appeared on BitcoinEthereumNews.com. Binance co-CEO Yi He’s WeChat account was hijacked after an old mobile number was seized by attackers, leading to a scam promoting a fraudulent token. This incident underscores vulnerabilities in Web2 platforms for crypto leaders, with experts recommending contact pruning and password rotation to mitigate risks. Attackers exploited an inactive phone number linked to Yi He’s WeChat, gaining control after contacting frequent contacts. Blockchain analytics from Lookonchain revealed the hackers promoted the Mubarakah token, netting approximately $55,000 in profits. SlowMist founder Yu Xuan highlighted that in China, carriers reassign numbers after three months of inactivity, creating opportunities for social engineering and credential stuffing. Discover how Binance co-CEO Yi He’s WeChat hack exposes risks for crypto executives. Learn prevention tips from experts like SlowMist’s Yu Xuan to secure your accounts today. What Caused the Yi He WeChat Hack? Yi He WeChat hack occurred when attackers seized control of an old mobile number previously associated with her account, enabling them to impersonate the Binance co-CEO on the popular Chinese messaging platform. Newly appointed as Binance’s co-CEO, Yi He revealed on X that the account had been abandoned long ago, and recovery was not possible at the time. This breach highlights the intersection of traditional Web2 security flaws and the high-stakes world of cryptocurrency, where such impersonations can lead to significant financial scams. Source: Yi He How Do WeChat Account Takeovers Happen in Crypto Circles? WeChat account takeovers often stem from the reassignment of inactive mobile numbers in China, where telecom carriers recycle SIM cards after about three months of disuse. In Yi He’s case, attackers likely used this old number to initiate a recovery process, contacting two frequent contacts—possibly individuals added casually or through group interactions—to verify and seize control. SlowMist founder Yu Xuan, a leading voice in blockchain security, explained that… The post Binance Co-CEO Yi He’s WeChat Hijack Raises BNB Security Concerns appeared on BitcoinEthereumNews.com. Binance co-CEO Yi He’s WeChat account was hijacked after an old mobile number was seized by attackers, leading to a scam promoting a fraudulent token. This incident underscores vulnerabilities in Web2 platforms for crypto leaders, with experts recommending contact pruning and password rotation to mitigate risks. Attackers exploited an inactive phone number linked to Yi He’s WeChat, gaining control after contacting frequent contacts. Blockchain analytics from Lookonchain revealed the hackers promoted the Mubarakah token, netting approximately $55,000 in profits. SlowMist founder Yu Xuan highlighted that in China, carriers reassign numbers after three months of inactivity, creating opportunities for social engineering and credential stuffing. Discover how Binance co-CEO Yi He’s WeChat hack exposes risks for crypto executives. Learn prevention tips from experts like SlowMist’s Yu Xuan to secure your accounts today. What Caused the Yi He WeChat Hack? Yi He WeChat hack occurred when attackers seized control of an old mobile number previously associated with her account, enabling them to impersonate the Binance co-CEO on the popular Chinese messaging platform. Newly appointed as Binance’s co-CEO, Yi He revealed on X that the account had been abandoned long ago, and recovery was not possible at the time. This breach highlights the intersection of traditional Web2 security flaws and the high-stakes world of cryptocurrency, where such impersonations can lead to significant financial scams. Source: Yi He How Do WeChat Account Takeovers Happen in Crypto Circles? WeChat account takeovers often stem from the reassignment of inactive mobile numbers in China, where telecom carriers recycle SIM cards after about three months of disuse. In Yi He’s case, attackers likely used this old number to initiate a recovery process, contacting two frequent contacts—possibly individuals added casually or through group interactions—to verify and seize control. SlowMist founder Yu Xuan, a leading voice in blockchain security, explained that…

Binance Co-CEO Yi He’s WeChat Hijack Raises BNB Security Concerns

2025/12/10 22:48
  • Attackers exploited an inactive phone number linked to Yi He’s WeChat, gaining control after contacting frequent contacts.

  • Blockchain analytics from Lookonchain revealed the hackers promoted the Mubarakah token, netting approximately $55,000 in profits.

  • SlowMist founder Yu Xuan highlighted that in China, carriers reassign numbers after three months of inactivity, creating opportunities for social engineering and credential stuffing.

Discover how Binance co-CEO Yi He’s WeChat hack exposes risks for crypto executives. Learn prevention tips from experts like SlowMist’s Yu Xuan to secure your accounts today.

What Caused the Yi He WeChat Hack?

Yi He WeChat hack occurred when attackers seized control of an old mobile number previously associated with her account, enabling them to impersonate the Binance co-CEO on the popular Chinese messaging platform. Newly appointed as Binance’s co-CEO, Yi He revealed on X that the account had been abandoned long ago, and recovery was not possible at the time. This breach highlights the intersection of traditional Web2 security flaws and the high-stakes world of cryptocurrency, where such impersonations can lead to significant financial scams.

Source: Yi He

How Do WeChat Account Takeovers Happen in Crypto Circles?

WeChat account takeovers often stem from the reassignment of inactive mobile numbers in China, where telecom carriers recycle SIM cards after about three months of disuse. In Yi He’s case, attackers likely used this old number to initiate a recovery process, contacting two frequent contacts—possibly individuals added casually or through group interactions—to verify and seize control. SlowMist founder Yu Xuan, a leading voice in blockchain security, explained that leaked login credentials combined with social engineering lower the barrier significantly for such attacks. He conducted tests showing that even brief interactions could suffice for verification.

Yu Xuan emphasized that high-profile crypto users, who frequently discuss over-the-counter trades or wallet management on WeChat, face elevated risks. “Avoid adding unknown contacts casually,” he advised, recommending regular password rotations and immediate responses to login alerts. This incident follows a pattern; in November, Tron founder Justin Sun’s WeChat was similarly compromised, prompting him to alert followers on X about the hack and his efforts to regain access.

Source: Justin Sun

Blockchain analytics firm Lookonchain reported that post-hijack, the attackers promoted a token named Mubarakah, artificially inflating its price and pocketing around $55,000 from unsuspecting buyers. Such scams exploit the trust in executives’ communications, turning personal accounts into vectors for fraud in the crypto ecosystem.

The timing of Yi He’s appointment as co-CEO, announced by Binance CEO Richard Teng during Binance Blockchain Week in Dubai, amplified the breach’s impact. Teng described the role as a “natural progression” for the co-founder, underscoring her longstanding influence in the exchange’s operations.

Source: Changpeng Zhao

Frequently Asked Questions

What Should Crypto Users Do to Prevent WeChat Hacks?

To avoid WeChat hacks like the one targeting Yi He, users should prune contact lists regularly, rotate passwords frequently, and act swiftly on any suspicious login alerts. Security experts from SlowMist recommend avoiding casual additions of unknown contacts, especially for discussions involving OTC trades or wallets, reducing the chances of social engineering exploitation.

How Common Are Mobile Number Seizures Leading to Account Takeovers?

Mobile number seizures are a notable risk in regions like China, where inactive SIMs are reassigned after three months, opening doors to credential stuffing and recovery abuse. As demonstrated in tests by SlowMist’s Yu Xuan, attackers can leverage just two frequent contacts—even from minimal interactions—to hijack accounts, a tactic increasingly seen in crypto-related incidents.

Key Takeaways

  • Abandoned Accounts Are Vulnerable: Yi He’s long-inactive WeChat tied to an old number was easily seized, showing why crypto leaders should monitor and secure all legacy accounts.
  • Social Engineering Lowers Barriers: Contacting just two frequent connections can enable takeovers, per SlowMist analysis, emphasizing the need for vigilant contact management.
  • Act on Alerts Immediately: Quick responses to login notifications and password rotations can thwart attacks; Binance co-founder Changpeng Zhao reinforced this by warning against memecoin promotions on his dormant account.

Conclusion

The Yi He WeChat hack illustrates persistent vulnerabilities in Web2 platforms amid the rise of crypto leadership roles, with attackers exploiting mobile number reassignments and social engineering to perpetrate scams like the Mubarakah token pump. Insights from SlowMist’s Yu Xuan provide actionable steps for mitigation, urging high-profile figures to prioritize security hygiene. As the industry evolves, staying proactive against such threats will be essential for safeguarding reputations and assets—consider reviewing your own messaging accounts today to stay ahead of potential breaches.

This follows broader patterns in crypto security; for instance, months earlier, BNB Chain’s official X account was compromised on October 1, leading to phishing posts and $8,000 in user losses, though all affected parties were reimbursed. Binance co-founder Changpeng Zhao, or CZ, echoed the caution by stating on X that his WeChat remains unused and he would never promote memecoin contracts there. Such warnings from industry veterans highlight the growing sophistication of attacks on centralized platforms used by decentralized finance players.

In China, the telecom system’s practice of recycling numbers creates systemic risks, as noted by Yu Xuan. He detailed how attackers might use leaked data from past breaches to stuff credentials, then impersonate recovery requests via contacts. This low-tech vector contrasts with the high-tech allure of blockchain but proves equally damaging, especially when tied to influential figures like Yi He, whose role now amplifies Binance’s strategic direction.

Lookonchain’s on-chain analysis confirmed the financial toll, tracking the $55,000 haul from the token manipulation shortly after the hijack. While Yi He confirmed the account’s irretrievability, the episode serves as a stark reminder for the crypto community to diversify communication tools and adopt multi-factor authentication rigorously. Experts like those at SlowMist continue to advocate for these measures, drawing from real-world tests to educate users on evolving threats.

Source: https://en.coinotag.com/binance-co-ceo-yi-hes-wechat-hijack-raises-bnb-security-concerns

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge!

IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge!

The post IP Hits $11.75, HYPE Climbs to $55, BlockDAG Surpasses Both with $407M Presale Surge! appeared on BitcoinEthereumNews.com. Crypto News 17 September 2025 | 18:00 Discover why BlockDAG’s upcoming Awakening Testnet launch makes it the best crypto to buy today as Story (IP) price jumps to $11.75 and Hyperliquid hits new highs. Recent crypto market numbers show strength but also some limits. The Story (IP) price jump has been sharp, fueled by big buybacks and speculation, yet critics point out that revenue still lags far behind its valuation. The Hyperliquid (HYPE) price looks solid around the mid-$50s after a new all-time high, but questions remain about sustainability once the hype around USDH proposals cools down. So the obvious question is: why chase coins that are either stretched thin or at risk of retracing when you could back a network that’s already proving itself on the ground? That’s where BlockDAG comes in. While other chains are stuck dealing with validator congestion or outages, BlockDAG’s upcoming Awakening Testnet will be stress-testing its EVM-compatible smart chain with real miners before listing. For anyone looking for the best crypto coin to buy, the choice between waiting on fixes or joining live progress feels like an easy one. BlockDAG: Smart Chain Running Before Launch Ethereum continues to wrestle with gas congestion, and Solana is still known for network freezes, yet BlockDAG is already showing a different picture. Its upcoming Awakening Testnet, set to launch on September 25, isn’t just a demo; it’s a live rollout where the chain’s base protocols are being stress-tested with miners connected globally. EVM compatibility is active, account abstraction is built in, and tools like updated vesting contracts and Stratum integration are already functional. Instead of waiting for fixes like other networks, BlockDAG is proving its infrastructure in real time. What makes this even more important is that the technology is operational before the coin even hits exchanges. That…
Share
BitcoinEthereumNews2025/09/18 00:32