Monday, March 30, 2026

Hackers Offer 1.5 Million Binance Login Records; Exchange Says Malware, Not Platform Breach

Photorealistic close-up of a laptop displaying the Binance logo with a red alert shield against a soft-focused newsroom backdrop

Hackers Offer 1.5 Million Binance Login Records; Exchange Says Malware, Not Platform Breach

A fresh cybersecurity alert has raised new concerns around Binance user security after VECERT reported on March 28, 2026 that a threat actor using the alias PexRat was offering a database of roughly 1.5 million Binance account login records for sale. The alleged dataset appears broad enough to support targeted fraud campaigns rather than simple opportunistic spam.

According to the report, the records allegedly include names, email addresses, phone numbers, KYC status, last-login IP addresses, device user agents and information on whether users had two-factor authentication enabled. That combination of identity, device and security data significantly increases the risk of account-takeover attempts through phishing, SIM-swap attacks and other forms of social engineering.

Binance says the issue points to compromised user devices, not a platform breach

Binance pushed back quickly on the implication of an internal systems failure. Chief Security Officer Jimmy Su said the company found no indication that Binance’s core systems had been compromised, and instead linked the exposed credentials to InfoStealer-style malware operating on infected user devices. The exchange also said it had started notifying affected users, forcing password resets and revoking active sessions as part of its immediate containment response.

The broader reporting describes two possible collection patterns behind the leaked data. One line of analysis suggests the sale listing may be tied to scraping or credential-stuffing activity that exploited an alleged captcha-bypass in a login interface or API, while Binance’s own explanation points to malware harvesting credentials directly from end-user environments. Taken together, the reports suggest the event may reflect a layered threat environment rather than a single, easily defined source.

The leaked fields could make attacks more precise and more dangerous

The details reportedly included in the dataset would give attackers a much clearer playbook for deciding whom to target and how. Phone numbers and KYC status can help prioritize higher-value accounts, while last-login IP addresses and device user agents can be used to create more convincing fake security alerts or mimic familiar-device behavior. The inclusion of two-factor authentication flags is especially sensitive because it tells an attacker whether to focus on SMS interception, email compromise or other bypass methods.

This is not the first time Binance-linked credentials have appeared in a larger cybercrime context. In January 2026, around 420,000 Binance-related credentials were identified within a much larger dataset of roughly 149 million records tied to InfoStealer malware. That earlier disclosure, combined with the latest sale listing, reinforces a pattern in which user-side infections appear to be a recurring source of sensitive account exposure.

The immediate risk is targeted fraud, not just data leakage

What makes this event particularly serious is the operational value of the alleged records. Attackers with access to real names, login metadata and security-method information can run more credible phishing campaigns, target SMS-protected users for SIM swaps and test reused passwords across other services. They can also use KYC indicators to manipulate support teams or design more tailored identity-fraud attempts.

This kind of user-side credential exposure can still create platform-wide fraud pressure even without any breach of the exchange’s internal systems. Binance’s forced resets and session revocations are logical first steps, but the repeated appearance of Binance-linked records in malware-related leaks suggests that stronger endpoint hygiene, tighter session-anomaly controls and heavier nudges toward non-SMS two-factor authentication will remain necessary.

Shatoshi Pick
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.