ParaSwap DAO members were split, with some supporting the conditional return of the fees and others voting against the refund.
Related Posts

Cybercriminals are Targeting Binance Users With a New Phishing SMS Scam
Dozens of Binance users report receiving an alarming wave of phishing text messages that appear genuine. These messages even match the phone number and SMS inbox they regularly see for official Binance updates.
Almost all phishing texts reviewed by BeInCrypto have the same wording and format. This leads us to believe that a particular threat actor or criminal group is targeting Binance users with a sophisticated phishing campaign.
Targeted Phishing Campaign Against Binance Users
The messages often warn of users’ unauthorized account activities—such as a newly added two-factor authentication device.
Most commonly, the phishing messages follow up with a text about an unexpected Binance API pairing with Ledger Live. The recipients are then urged to call a provided phone number.
Some targeted users claim these texts show up in the same thread as their legitimate Binance notifications. This creates confusion and prompts them to engage. Investigations by BeInCrypto reveal a surge in consumer complaints on X (formerly Twitter).

Many users say they were caught off guard because the scam messages originated from the same sender ID used by Binance for authentic notifications.
Meanwhile, the criminals behind this campaign appear to be capitalizing on publicly reported leaks of Binance user data on dark web forums.
Last month, an estimated 230,000 combined user records from Binance and Gemini reportedly appeared for sale on the dark web. Security experts suggest these leaks came through phishing attacks rather than direct system breaches.
The suspected group of threat actors is likely using leaked information—names, phone numbers, and emails—to craft targeted messages that give the illusion of legitimacy.
Recordad que aunque os llegue un mensaje por el canal “oficial” de SMS de @binance, JAMÁS debéis hacer click en ningún enlace ni hacer caso de lo que os envíen.
Binance nunca os enviará ese tipo de mensajes.
¿Queréis saber como actuar o sencillamente lo que hice yo al ver el… pic.twitter.com/plcTc88VlT
— Ingeniero Seed Ph. (Oficial) (@IngenieroSeed) April 11, 2025
Also, the pattern seen in the phishing attempts typically involves an urgent “not you?” query. It prompts recipients to call an embedded phone line instead of simply clicking a link.
This method bypasses the more common scenario of phishing links in SMS.
Binance is Extending Anti-Phishing Code to SMS
In an exclusive email to BeInCrypto, Binance’s Chief Security Officer, Jimmy Su, responded to these findings. Su confirmed the company’s awareness of the escalating smishing incidents.
“We are aware of smishing scams on the rise where phishing scammers are impersonating us and other legitimate senders via SMS. These scams appear to be more authentic, tricking users into revealing sensitive information, clicking into phishing links, or making a transfer that result in loss of assets.” Binance’s Chief Security Officer told BeInCrypto.
Su further disclosed that Binance has extended its Anti-Phishing Code to SMS. This feature was originally offered for emails.
The code is a user-defined identifier that appears in official Binance messages, making it easier for recipients to recognize genuine notifications and avoid impostors.
“By incorporating a unique Anti-Phishing code into Binance SMS messages, we are making it significantly harder for scammers to deceive our users,” Su said.
The Anti-Phishing Code has been rolled out to all licensed jurisdictions where Binance operates.
Also, according to Binance, both registered and non-registered users have reported receiving suspicious texts.
Therefore, attackers might be leveraging databases that include phone numbers of individuals not actively using Binance.
Security alert: Beware of fake websites impersonating https://t.co/AZwoBOgsqS.
Scammers are using lookalike sites to steal your credentials.
We’ll never ask for your password or MFA code outside our site.
Always check the URL before logging in.
QR codes should always… pic.twitter.com/xX6ahKtm3t
— Binance.US
(@BinanceUS) April 11, 2025
BeInCrypto advises users to adopt additional measures, such as verifying transactions directly through Binance’s official app or website, using multifactor authentication, and never sharing credentials over the phone.
Reporting suspicious messages to Binance’s support team is strongly advised.
Individuals are encouraged to confirm official communications by checking for the Anti-Phishing Code and to carefully scrutinize any request to call phone numbers provided in unsolicited messages.
The post Cybercriminals are Targeting Binance Users With a New Phishing SMS Scam appeared first on BeInCrypto.

Over 50 Million Indian Crypto Users Anticipate Impact Of Upcoming Regulatory Framework
India is making significant strides towards establishing a clear regulatory framework for cryptocurrencies, a move that could reshape the landscape…

Microsoft Warns of New Malware Stealing Funds from Crypto Wallets
Microsoft’s incident response team has discovered a new remote access trojan (RAT) called StilachiRAT that poses a serious threat to cryptocurrency users.
StilachiRAT can collect system information, steal login credentials, and extract data from digital wallets. Although it has not yet spread widely, its potential impact worries the crypto community.
How Does StilachiRAT Threaten Crypto Investors?
StilachiRAT is more than just another malware—it represents an evolution in cyber threats targeting digital assets.
Microsoft reported on March 17 that once StilachiRAT infiltrates a system, it begins reconnaissance. It gathers details about the operating system, hardware identifiers, camera presence, and active Remote Desktop Protocol (RDP) sessions. Then, it focuses on stealing credentials stored in Chrome and data from the clipboard, where users often copy passwords or wallet keys.
This trojan specifically targets 20 cryptocurrency wallet extensions on Google Chrome. Some well-known wallets at risk include Metamask, Trust Wallet, Coinbase Wallet, TronLink, TokenPocket, BNB Chain Wallet, OKX Wallet, Sui Wallet, and Phantom.
“StilachiRAT targets a list of specific cryptocurrency wallet extensions for the Google Chrome browser. It accesses the settings in the following registry key and validates if any of the extensions are installed,” Microsoft warned.
Microsoft’s report highlights StilachiRAT’s advanced anti-forensic capabilities. It can delete event logs and assess system conditions to avoid detection.
To mitigate the threat, Microsoft advises users to download software only from official sources and avoid suspicious websites or attachments. Enabling real-time protection in Microsoft Defender and using browsers with SmartScreen can help block malicious sites.
Additionally, Microsoft recommends enabling multi-factor authentication (MFA) and regularly updating software to minimize risks.
“In some cases, remote access trojans (RATs) can masquerade as legitimate software or software updates. Always download software from the official website of the software developer or from reputable sources,” Microsoft advises.
According to Chainalysis’ 2025 Crypto Crime Trends report, illicit cryptocurrency transactions range from $40 billion to $50 billion annually. These funds are stolen through various methods, including ransomware and malware attacks.

Chainalysis estimates that the volume of illicit crypto transactions in 2024 could exceed $51 billion, with an average annual increase of 25% between reporting periods.
The post Microsoft Warns of New Malware Stealing Funds from Crypto Wallets appeared first on BeInCrypto.