Because users do not take the necessary precautions, their devices can turn into agents through viruses. Cyber Security Researcher Jeremiah Fowler found that hundreds of thousands of login information captured from infected devices were leaked by attackers. responsible here Binance or GmailIt is not meta, users must be cautious.
Binance Login Information Stolen
A database containing 149 million usernames and passwords, including logins linked to approximately 48 million Gmail accounts, was recently disclosed. Millions of Binance users continue to log in and out of their exchange accounts without being aware of viruses infecting their devices.
Experts emphasize that this is not a security breach in the Binance system, but a virus infection on the user side.
So what will Binance do? Binancewill monitor the dark web, notify affected users, reset passwords, and recommend hardware MFA, antivirus software, and enhanced account security measures.
You Have to Be Careful
The huge database discovered by cybersecurity researcher Jeremiah Fowler is 96 gigabytes in size. According to Fowler, the total volume of disclosed accounts is as follows;
- Gmail – 48 million
- Facebook – 17 million
- Instagram – 6.5 million
- Yahoo – 4 million
- Netflix – 3.4 million
- Outlook – 1.5 million
- .edu – 1.4 million
- iCloud – 900 thousand
- TikTok – 780 thousand
- Binance – 419 thousand
- OnlyFans – 100 thousand
There are also exchanges and payment platforms with smaller volumes.
“These records covered almost every type of account imaginable. Because the data includes emails, usernames, passwords, and full login URLs, it can be used to automate large-scale account takeovers.”
So what will you do? If a virus infects your computer or phone, all your saved passwords will be in the hands of the attacker within seconds. Apart from this, passwords that are not registered and that you enter manually are also monitored by the virus and reported to the attacker. Moreover, many viruses are encrypted in a way that cannot be detected by antivirus software in the first month. More advanced versions carry out unauthorized authorization violations that would prevent alarms from going off in systems, and are more difficult to detect.

Although antivirus can be useful to protect you from common viruses, the first thing you need to pay attention to is the source of the files you download. Warez software, installation files you download from platforms whose sources you do not know, or even files that appear to be jpg at first glance in the rar files you receive via e-mail or message can hijack your device. To protect your device and accounts, you should never download files from platforms whose sources you do not trust and use up-to-date paid services. antivirus You must use the software.
