How Can I Secure My Exchange Account (Password, 2FA)?
If you hold crypto on an exchange, your account security is the front door to your funds. The good news: with a few concrete steps you can dramatically reduce risk from phishing, SIM swaps, malware, and credential stuffing. This guide walks you through exactly how to lock down your account—starting with strong passwords and the right kind of 2FA—plus withdrawal protections, API key safety, device hygiene, and recovery planning.
This article is written for everyday users and power traders alike. Features vary by exchange; where helpful, we note examples (Binance, Coinbase, Kraken, Gemini, Bybit) and link to their docs.

1) Start with an unbreakable password (really, a passphrase)
Aim for long, unique, and breach-resistant. Modern standards prioritize length and uniqueness over quirky composition rules. NIST’s Digital Identity Guidelines recommend allowing long passwords/passphrases, checking new passwords against known breach lists, and not forcing periodic resets unless there’s evidence of compromise. (NIST Pages, NIST Publications)
Make a memorable passphrase. A simple approach is Diceware—randomly choose 6+ words (e.g., “tablet harbor velvet …”). This gives high entropy while remaining memorable. The EFF’s wordlists and how-to make it easy. (Electronic Frontier Foundation)
Avoid reuse and check for past breaches. Reused credentials let attackers chain one site’s leak into your exchange. Before creating or changing a password, check if it appears in breached datasets (services like Have I Been Pwned implement the NIST-recommended screening). (Have I Been Pwned)
Practical setup:
- Use a reputable password manager to generate/store a unique passphrase for your exchange and a different one for your email.
- Only change your passphrase if you suspect compromise or the site notifies you—don’t rotate “because policy.” That’s NIST’s position. (NIST Pages)
2) Turn on the strongest 2FA you can: passkeys / security keys first
Not all 2FA is equal. Here’s the security ranking most experts and agencies align on:
- Passkeys / FIDO2 security keys (WebAuthn) – phishing-resistant and resistant to SIM swap, push bombing, and man-in-the-middle tricks. This is the “gold standard,” per CISA. (CISA)
- Authenticator app codes (TOTP) – strong, widely supported, but still phishable if you type codes into a fake site.
- SMS/voice codes – better than nothing, but vulnerable to SIM swaps and telecom interception risks; use only if you have no alternative. (CISA/FCC/FBI continue to warn about SIM swap and telephony risks.) (Federal Communications Commission, Internet Crime Complaint Center)
Why passkeys/security keys are best. They use public-key cryptography and verify the site you’re on, so a phishing page can’t steal a reusable code. The FIDO Alliance summarizes why passkeys stop credential stuffing and most phishing-based takeovers. (FIDO Alliance)
Where exchanges stand today (examples):
- Kraken supports passkeys/security keys for sign-in 2FA and documents the benefits of hardware keys. (Kraken Support)
- Binance encourages passkeys/authenticator over SMS and offers multiple 2FA options. (Binance)
Practical setup:
- Enroll two passkeys/security keys (e.g., one primary key + one backup; or a hardware key + a phone-based passkey) to cover loss/theft. (Kraken Support)
- If your exchange doesn’t support passkeys, use an authenticator app (TOTP). Scan the QR on two devices at setup (e.g., phone + tablet) and print/store the TOTP secret or backup codes offline.
- Avoid SMS if you can; if you must, lock down your mobile account with a carrier PIN/port-out protection (see §4). (Federal Communications Commission)
3) Lock withdrawals and critical changes behind extra safeguards
Even if someone logs in, you can still block theft by controlling where funds can go and what can change.
Address allowlists / whitelists
- Coinbase lets you enable an Address Book allowlist: withdrawals can go only to pre-approved addresses. New entries carry a hold period before they’re usable. (Coinbase Help)
- Gemini has Approved Addresses with a typical 7-day approval period—so rushing attackers hit a wall. (Gemini Support)
- Binance and Bybit support withdrawal address whitelists to restrict where funds can leave. (Binance, Bybit)
“Settings lock” & anti-phishing features
- Kraken’s Global Settings Lock (GSL) prevents sensitive changes (like changing 2FA or altering withdrawal settings) unless you unlock it—your “last line of defense.” Kraken also offers a Master Key for recovery and to control GSL. (Kraken Support)
- Binance anti-phishing code adds a custom phrase to official emails so you can spot fakes at a glance. Device Management and login history help you kick out unknown logins. (Binance, @BinanceUS, Binance.US)
Practical setup:
- Turn on address allowlisting and pre-approve your own wallet(s). Expect a cooling-off window before the new address activates (e.g., 48 hours on Coinbase, 7 days on Gemini). Plan ahead. (Coinbase Help, Gemini Support)
- If your exchange offers it, enable a settings lock (e.g., Kraken GSL) after creating a recovery method like Master Key. (Kraken Support)
- Add an anti-phishing code (Binance) and routinely review device/session lists; remove anything unfamiliar. (Binance, Binance.US)
4) Secure your email and phone first (SIM-swap & phishing defense)
Your exchange login often relies on email for alerts and resets—and many people still tie 2FA to their phone number. Attackers know this.
Email: Turn on passkeys/security keys (or at least strong 2FA) for your email. If you use Google, the Advanced Protection Program requires security keys or passkeys and is designed for high-risk users. (Google Help, blog.google)
Phone: SIM-swap/port-out fraud lets attackers hijack your number, intercepting codes and password resets. The FCC now requires stronger carrier controls and customer notifications; you should also set a carrier PIN and ask for “port-out protection” on your account. (FCC Documents, Federal Register, Federal Communications Commission)
Bottom line: Prefer passkeys/hardware keys and authenticator apps over SMS codes. If SMS is the only option, lock down your mobile account and watch for sudden loss of signal or SIM-change alerts. The FBI’s IC3 warns SIM-swaps commonly target financial and crypto accounts. (Internet Crime Complaint Center)
5) If you use trading bots, leash your API keys
API keys can be incredibly powerful—great for automation, catastrophic if mishandled.
Best practices:
- Create separate keys per app with minimum permissions (e.g., market-read only; enable trading only when needed; never enable withdrawals unless absolutely required). Major exchanges document granular permissions. (Coinbase Developer Docs)
- IP allowlisting: restrict each key to specific IPs where possible (supported at Coinbase and Kraken). (Coinbase Developer Docs, Kraken Support)
- Rotate keys periodically and delete unused ones; some exchanges auto-downgrade stale keys. (Binance.US)
- Store secrets securely (password manager/secrets vault), never in plaintext or shared docs. Binance and others publish API-security guidance worth following. (Binance, Binance Academy)
6) Keep your devices clean: stop malware and session hijacking
Infostealer malware can grab passwords, cookies, and even bypass 2FA by stealing active session tokens (which is why some attacks succeed after you’ve logged in). The FBI and identity providers have warned about cookie theft and “remember me” risks. (Federal Bureau of Investigation, sec.okta.com)
What to do:
- Keep OS, browser, and exchange apps up-to-date; install only from official stores.
- Use reputable endpoint protection; avoid pirated software and “cracked” tools that often hide stealers.
- Consider using modern protections like Device Bound Session Credentials (DBSC) as they arrive—Chrome is piloting DBSC to bind session cookies to your device, cutting off stolen-cookie reuse. (Chromium Blog, Chrome for Developers)
- Regularly review active sessions/devices in your exchange and email; sign out of everywhere when suspicious. (Binance and others expose device history and let you revoke access.) (Binance.US)
7) Recovery planning (before you need it)
Have a “lost-device” plan:
- During 2FA setup, print backup codes and store them offline; if the site reveals a TOTP secret key, store it securely.
- Register multiple passkeys/security keys (e.g., phone passkey + hardware key in a safe). (Kraken Support)
- Expect cool-off windows after changing security settings. For example, Coinbase allowlisting changes and Gemini approved-address changes apply holds (helpful roadblocks for attackers). (Coinbase Help, Gemini Support)
- If you must reset 2FA, know your exchange’s process (e.g., Binance’s reset flow) and be aware that withdrawals may be restricted during/after reset to protect funds. (Binance)
- On Kraken, consider enabling a Master Key (for secure recovery) and Global Settings Lock (GSL) to freeze critical settings unless you unlock them. (Kraken Support)
8) A 15-minute hardening checklist (works on most exchanges)
- Change to a long passphrase (unique to the exchange). Screen it against breach lists (or rely on the site’s NIST-style checks). (NIST Pages)
- Enable passkeys or a hardware security key for sign-in 2FA. If unsupported, enable authenticator app (TOTP); avoid SMS when possible. (CISA)
- Add a second factor device (backup passkey or second authenticator). (Kraken Support)
- Turn on address allowlisting and add your self-custody wallets; wait out the hold period. (Coinbase Help)
- Enable settings locks (e.g., Kraken GSL + Master Key). (Kraken Support)
- Add anti-phishing code and clean up device/session lists; remove anything unfamiliar. (Binance, Binance.US)
- Secure your email & mobile: passkeys/security keys for email; carrier port-out PIN. (Google Help, Federal Communications Commission)
- Review API keys: least-privilege, IP allowlist, no withdrawals, rotate/delete unused. (Coinbase Developer Docs, Kraken Support)
- Update apps/OS, avoid shady downloads, and consider DBSC as it rolls out. (Chromium Blog)
- Print and store backup codes offline.
9) Frequently asked questions
Is SMS 2FA ever OK?
If it’s all your exchange offers, use it—but immediately add a carrier PIN/port-out lock and consider moving to a platform that supports authenticator or passkeys. Agencies highlight SIM-swap risks that defeat SMS. (Federal Communications Commission, Internet Crime Complaint Center)
What’s the difference between a passkey and a hardware key?
“Passkey” is the modern login that uses FIDO/WebAuthn; it can live on your phone/laptop (platform passkey) or on a hardware security key (portable). Both deliver phishing-resistant authentication. (FIDO Alliance)
Are authenticator apps safe?
Yes—TOTP is strong and far better than SMS, but it can be phished. Protect the device with a screen lock, back up your TOTP secrets or backup codes, and never share the QR/secret. For high-risk users, prefer passkeys/security keys. (CISA)
How do I protect against “MFA fatigue” push attacks?
If your 2FA uses push prompts, enable number matching (where available) and switch to passkeys if possible. Microsoft enforces number matching to defeat push bombing. (Microsoft Learn, BleepingComputer)
Can malware bypass my 2FA?
Malware can steal session cookies after you log in. Keep devices clean, avoid pirated apps, and watch for browser protections like DBSC that bind cookies to your device. (Chromium Blog)
References & further reading (clickable)
- NIST SP 800-63B (Authentication & Lifecycle Management) — official guidelines on passwords and MFA:
HTML overview • Latest SP 800-63B page • PDF - FIDO Alliance — What passkeys are and why they’re phishing-resistant:
Passkeys explained - CISA — Phishing-resistant MFA & number-matching guidance:
Phishing-resistant MFA fact sheet • Number matching fact sheet - FCC / U.S. Federal Register — SIM-swap & port-out fraud protections and rules:
FCC consumer guide • SIM-swap rulemaking notice • Federal Register summary - FBI IC3 — PSA on SIM-swap schemes targeting bank/crypto accounts:
IC3 PSA - Google (Advanced Protection & DBSC) — For locking down email and fighting cookie theft:
Advanced Protection overview • Program update: passkeys • Chromium blog on DBSC • DBSC origin trial details - Have I Been Pwned — Check for breached credentials:
HIBP • Pwned Passwords - EFF — Diceware passphrase guides:
EFF Diceware - Exchange examples & docs:
- Binance: Anti-phishing code, Withdrawal whitelist, Security tips, Device management/login history (US)
- Coinbase: Address book allowlist (retail), Address whitelist (Coinbase Exchange)
- Gemini: Approved Addresses (7-day hold)
- Kraken: Global Settings Lock (GSL), Master Key, Hardware security keys, 2FA overview incl. passkeys
- Bybit: Withdrawal whitelist
The bottom line
Security is a stack—each layer covers gaps in the one below it:
- Long, unique passphrase + passkeys/security keys stop most login attacks. (NIST Pages, FIDO Alliance)
- Address allowlisting and settings locks keep funds safe even if a login slips through. (Coinbase Help, Kraken Support)
- Email/phone hardening + API discipline + clean devices minimize the rest. (Google Help, Coinbase Developer Docs, Chromium Blog)
Take 15 minutes to implement the checklist today—and you’ll make your exchange account dramatically harder to compromise.