How is a WeChat Account Stolen and How to Prevent It?
How Was WeChat Account Hacked? (This Article is Mainly AI-generated)

Today, Binance co-founder He Yi's WeChat account was hacked, and the hacker posted fake news in his Moments and various communities.
Many users, especially those in the cryptocurrency circle who frequently travel between China and abroad, often have the habit of changing their phone numbers. The culprit behind the recent series of hacked accounts is the overlooked practice by many users—the phone number reassignment by telecom operators.
What is "Phone Number Reassignment"?
When a user stops paying for a particular phone number or voluntarily cancels the number, the telecom operator, in order to utilize resources, will, after a "cooling-off period" (usually 3-6 months), reassign the number to the market and sell it to a new user.
How do hackers exploit this?
This creates a critical time gap and a logical loophole:
· Forgotten Bindings: Although the original owner has abandoned the phone number, they often forget to unbind the WeChat account associated with that number.
· New Owner's Privilege: After obtaining this "old number," the hacker (or the new user who unintentionally purchased the number) only needs to select "Log in via Mobile Number" or "Forgot Password" on the WeChat login page.
· SMS Verification Code Breakthrough: The WeChat system recognizes that the phone number is already registered and immediately sends a verification code. The hacker with the new SIM card enters the code and easily resets the password.
· Full Access: Once successfully logged in, the hacker gains full control of the account, including Moments, group chats, and contacts.
For cryptocurrency enthusiasts, this risk is significantly heightened due to their frequent use of backup phones, foreign SIM cards, or suspension of domestic numbers due to overseas travels.
In addition to phone number reassignment, the following two scenarios are also common causes of WeChat account hacks:
· Phishing Links and Trojans: Hackers disguise themselves as project teams or exchange customer service representatives, sending links or files (such as .exe disguised as .pdf) containing trojans. Once clicked on WeChat on a computer, the trojan immediately steals login credentials.
· Zombie Followers Cleanup Tools: Many people, in order to clean up their friends list, casually authorize insecure third-party "follower cleanup software" to scan the QR code, essentially handing over control of their account to strangers.
How to Prevent WeChat Account Hacking?
Now that you understand the principles, prevention is actually not difficult. Please immediately check your WeChat settings against the following checklist:
1. Core Rule: If you change your number, you must rebind
This is the most important point. If you no longer use your phone number (whether it is deactivated or not renewed), be sure to rebind your WeChat account before deactivating your number.
· Operation Path: WeChat > Me > Settings > Account Security > Phone Number > Change Phone Number.
· Note: It is not enough to just unbind within WeChat; you also need to check the binding status of key apps such as bank cards and trading platforms.
2. Enable "Account Protection" and "Voiceprint Lock"
Preventing login from unfamiliar devices is the second line of defense.
· Account Protection: After enabling this feature, when logging in to WeChat on an unfamiliar device, you will need to verify a verification code sent by a friend, greatly increasing the difficulty for hackers to infiltrate.
· Voiceprint Lock: Set up a Voiceprint Lock (WeChat Voiceprint), which requires you to read out a random number during login. Biometric features are difficult for hackers to replicate.
3. Set Up an "Emergency Contact"
In the extreme event of your account being compromised, an emergency contact can help you quickly appeal to recover your account, reducing the window of time for malicious activity by hackers.
· Operation Path: WeChat > Me > Settings > Account Security > Emergency Contact.
4. Isolate Sensitive Operations
· Do not directly transmit private keys or mnemonic phrases over WeChat.
· For messages such as "need help with a transfer," "lending money," or "sudden great news," even if they are from acquaintances, always perform a second confirmation via phone or video call.
You may also like

HashKey Secures $250M for New Crypto Fund Amid Strong Institutional Interest
Key Takeaways HashKey Capital successfully secured $250 million for the initial close of its fourth crypto fund, showcasing…

Philippines Cracks Down on Unlicensed Crypto Exchanges: Coinbase and Gemini Blocked
Key Takeaways The Philippine government is increasing regulatory oversight on cryptocurrency exchanges, requiring local licenses for operations. Internet…

Palmer Luckey’s Erebor Reaches $4.3B Valuation as Bank Charter Progresses
Key Takeaways: Erebor, a digital bank co-founded by Palmer Luckey, has raised $350 million, bringing its valuation to…

Kalshi First Research Report: When Predicting CPI, Crowd Wisdom Beats Wall Street Analysts

Venture Capital Post-Mortem 2025: Hashrate is King, Narrative is Dead

Are Those High-Raised 2021 Projects Still Alive?

High Fees, Can't Beat the Market Even After Paying 10x More, What Exactly Are Top Hedge Funds Selling?

Key Market Information Discrepancy on December 24th - A Must-See! | Alpha Morning Report

Polymarket Announces In-House L2, Is Polygon's Ace Up?

IOSG: From Compute to Intelligence, a Reinforcement Learning-Driven Decentralized AI Investment Map
AI Trading Risks in Crypto Markets: Who Takes Responsibility When It Fails?
AI trading is already core market infrastructure, but regulators still treat it as a tool — responsibility always stays with the humans and platforms behind it. The biggest risk in 2025 is not rogue algorithms, but mass-adopted AI strategies that move markets in sync and blur the line between tools and unlicensed advice. The next phase of AI trading is defined by accountability and transparency, not performance — compliance is now a survival requirement, not a constraint.

Ether pumps to outsiders, dumps in-house. Can Tom Lee's team still be trusted?

Twitter 上的「虚假流量」是指通过操纵关注者数量、喜欢和转发等指标来人为增加一条推文的影响力和可信度。下面是一些常见的制造虚假流量的方法: 1. <b>购买关注者:</b> 一些用户会通过购买关注者来迅速增加他们的关注者数量,从而让他们的账号看起来更受欢迎。 2. <b>使用机器人账号:</b> 制造虚假流量的另一种常见方法是使用机器人账号自动执行喜欢、转发和评论等互动操作,从而提高一条推文的互动量。 3. <b>推文交换:</b> 一些用户之间会进行推文交换,即互相喜欢、转发对方的推文...

Facing Losses: A Trader’s Journey to Redemption
Key Takeaways Emotional reactions to trading losses, such as increasing risks or exiting the market entirely, often reflect…

Beacon Guiding Directions, Torches Contending Sovereignty: A Covert AI Allocation War
Key Takeaways The AI that rules today’s landscape exists in two forms—a centralized “lighthouse” model by major tech…

Decoding the Next Generation AI Agent Economy: Identity, Recourse, and Attribution
Key Takeaways AI agents require the development of robust identity, recourse, and attribution systems to operate autonomously and…

Nofx’s Two-Month Journey from Stardom to Scandal: The Open Source Dilemma
Key Takeaways Nofx’s rise and fall in two months highlights inherent challenges in open source projects. A transition…

MiniMax Knocks on the Door of Hong Kong Stock Exchange with Billion-Dollar Valuation
Key Takeaways MiniMax, a prominent AI startup, is rapidly progressing towards an IPO on the Hong Kong Stock…
HashKey Secures $250M for New Crypto Fund Amid Strong Institutional Interest
Key Takeaways HashKey Capital successfully secured $250 million for the initial close of its fourth crypto fund, showcasing…
Philippines Cracks Down on Unlicensed Crypto Exchanges: Coinbase and Gemini Blocked
Key Takeaways The Philippine government is increasing regulatory oversight on cryptocurrency exchanges, requiring local licenses for operations. Internet…
Palmer Luckey’s Erebor Reaches $4.3B Valuation as Bank Charter Progresses
Key Takeaways: Erebor, a digital bank co-founded by Palmer Luckey, has raised $350 million, bringing its valuation to…
Kalshi First Research Report: When Predicting CPI, Crowd Wisdom Beats Wall Street Analysts
Venture Capital Post-Mortem 2025: Hashrate is King, Narrative is Dead
Are Those High-Raised 2021 Projects Still Alive?
Popular coins
Latest Crypto News
Customer Support:@weikecs
Business Cooperation:@weikecs
Quant Trading & MM:bd@weex.com
VIP Services:support@weex.com