One of the latest cryptocurrency-related threats is a deceptive scam that impersonates the official BinaryX (BNX) to Four (FORM) token swap platform. This phishing scam uses a fake website to lure users into connecting their crypto wallets. Once access is granted, a drainer script is triggered to steal all available cryptocurrency assets from the victim’s wallet.
Threat Overview
Cybercriminals have taken advantage of BinaryX’s legitimate rebranding into Four by creating a fraudulent website, binaryxe[.]org, that mimics the real swap platform. This is a highly dangerous form of social engineering, where victims are convinced to initiate a wallet connection for a fake token migration, resulting in immediate asset loss.
Threat Summary
Attribute | Details |
---|---|
Threat Type | Scam, Social Engineering, Fraud |
Disguise | Legitimate platform for swapping BNX to FORM |
Related Domain | binaryxe[.]org |
Detection Names | CRDF (Malicious), G-Data (Phishing), SOCRadar (Phishing) |
Symptoms of Infection | Unofficial domain, lack of verification, suspicious prompts |
Damage | Cryptocurrency theft |
Distribution Methods | Fake social media posts, rogue ads, email phishing, shady websites |
Danger Level | High |
Removal Tool | SpyHunter |
In-Depth Analysis
How Did I Get Infected?
Victims are typically drawn into this scam through one of the following channels:
- Fake Social Media Posts: Fraudulent posts from impersonated BinaryX accounts promote the fake website.
- Deceptive Ads: Malicious ads on lesser-known crypto blogs or news sites redirect users to the scam.
- Spoofed Websites: Sites created to look like legitimate crypto services guide users to the fake swap page.
- Email Phishing: Users may receive emails announcing a token migration and urging immediate action.
What Does It Do?
Once a user connects their cryptocurrency wallet to the spoofed platform, a drainer script is silently executed. This script transfers funds from the user’s wallet to the attacker’s wallet address without any further confirmation, leaving the victim with a zero balance and no possibility of reversing the transaction.
Should You Be Worried for Your System?
Yes. While the immediate goal is crypto theft, these scams often have secondary consequences:
- Malware Payloads: Additional payloads may be dropped into your system if you interact with malicious scripts.
- Identity Theft: Wallet connection details, browser fingerprints, and IP addresses may be logged for further phishing attempts.
- System Compromise: Exploits targeting browser vulnerabilities could also be in use.
Running a full scan with a trusted anti-malware solution such as SpyHunter is strongly recommended.
Scam Message Example
The website mimics a real swap process and may prompt users with:
“To proceed with your BNX to FORM token swap, please connect your wallet.”
This seemingly innocent request is a trap—designed to activate a drainer that immediately compromises the wallet.
Dealign with Crypto Scams – Method 1: Manual Removal Guide
Follow these steps to manually remove crypto scams and protect your system.
Step 1: Identify the Crypto Scam Source
- Check if you’ve been contacted by a scammer through email, Telegram, Discord, WhatsApp, or social media.
- Identify any malicious software installed on your system, such as fake wallet apps or browser extensions.
- Scan your browser history and emails for phishing links.
Step 2: Report and Freeze Crypto Transactions (If Possible)
- Contact your crypto exchange immediately if you suspect fraud.
- Check if your transaction is pending (some blockchains allow canceling or replacing a transaction).
- Report the scam to authorities such as:
Step 3: Remove Malicious Software and Fake Wallet Apps
- Windows Users:
- Open Control Panel > Programs and Features
- Look for unknown apps related to crypto wallets or trading bots.
- Click Uninstall.
- Mac Users:
- Open Finder > Applications
- Locate suspicious apps and drag them to the Trash.
- On Mobile (Android & iOS):
- Go to Settings > Apps (Android) or General > iPhone Storage (iOS).
- Uninstall any unrecognized crypto wallet apps.
Step 4: Clear Browser Data and Remove Malicious Extensions
- Google Chrome:
- Go to chrome://extensions/
- Remove unfamiliar or suspicious extensions.
- Firefox, Edge, Safari:
- Open settings and remove unauthorized extensions.
- Clear Cache & Cookies:
- Open browser settings → Privacy → Clear browsing data
Step 5: Reset Passwords & Enable Two-Factor Authentication (2FA)
- Change passwords for your crypto exchanges, wallets, and emails.
- Use a strong, unique password for each account.
- Enable 2FA on all critical accounts (Google Authenticator or YubiKey recommended).
Step 6: Scan for Malware and Keyloggers
Even if you removed software manually, some malware can still lurk in your system. Use a security tool to perform a deep scan (see SpyHunter method below for an automatic removal process).
Step 7: Monitor Your Accounts & Funds
- Track your crypto wallet transactions using Etherscan or Blockchain Explorer.
- Keep an eye on email login alerts from suspicious locations.
- Use a hardware wallet (Ledger, Trezor) for better security.
Method 2: Automatic Removal Using SpyHunter
For a fast and reliable way to remove crypto scam-related malware, use SpyHunter.
Step 1: Download SpyHunter
Step 2: Install SpyHunter
- Run the SpyHunter setup file.
- Follow the on-screen installation steps.
- Open SpyHunter once installed.
Step 3: Perform a Full System Scan
- Click on "Start Scan Now" to analyze your system.
- Wait for the scan to detect crypto scam malware, spyware, keyloggers, and phishing trojans.
Step 4: Remove Threats Automatically
- Click "Fix Threats" after the scan completes.
- SpyHunter will eliminate malware, fake apps, and browser hijackers.
Step 5: Protect Your System from Future Crypto Scams
- Enable SpyHunter's Real-Time Protection to block phishing sites and prevent future infections.
- Regularly scan your system for new threats.
Prevention Tips: How to Avoid Crypto Scams in the Future
- Always verify website URLs before logging into exchanges or wallets.
- Avoid unsolicited investment offers on Telegram, Discord, and email.
- Never share your private keys or recovery phrases with anyone.
- Use a hardware wallet instead of online wallets.
- Regularly update your antivirus and anti-malware software.
- Be skeptical of high-return crypto investment schemes.
Conclusion
The BinaryX (BNX) to Four (FORM) token swap scam is a clever yet dangerous ploy that leverages real-world crypto events to steal funds from unsuspecting users. Always verify token swap announcements through official project channels. If you’ve interacted with binaryxe[.]org or suspect your system may have been compromised, use SpyHunter to perform a deep scan and protect your data.