The secured WeChat channel of Binance co-chief executive Yi He was illicitly accessed on December 10, 2025, according to multiple confirmations from Binance founder Changpeng Zhao. Attackers exploited the breach to post false endorsements urging users to acquire large quantities of the MUBARA token over decentralized exchanges. Social media analytics firm Lookonchain traced the operation: within seven hours of the hack, two wallets—0x6739… and 0xD0B8…—emerged, deploying 19,479 USDT to purchase 21.16 million MUBARA tokens. Retail market response was immediate, generating intense buying pressure that drove the memecoin price sharply higher.
After liquidity was injected, the malicious actor systematically sold back 11.95 million tokens into the rally, extracting approximately 43,520 USDT and leaving unsold holdings valued at roughly 31,000 USDT for potential further liquidation. The scheme’s pattern aligns with classic pump-and-dump mechanics: initial accumulation at low cost, public false promotion through a trusted figure’s channel, FOMO-driven spike, and rapid sell-off. Binance has since secured the compromised account, revoked unauthorized keys, and launched an internal inquiry to reinforce communication protocols and protect executive channels.
Yi He affirmed that she has abstained from WeChat usage for years and lost control of the registered phone number, complicating immediate recovery. Binance officials indicated that no personal funds were at risk beyond the token exploit. Law enforcement coordination efforts are underway to trace the hacker’s on-chain proceeds. Market observers note that this incident highlights persistent risks in relying on Web2 messaging infrastructure for critical crypto-related communications. Going forward, stakeholders anticipate tighter security measures, including multi-factor protections and verified-link protocols, for all executive social channels to mitigate future exploits of this nature.
Comments (0)