Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy

I connected to the hotel Wi-Fi for three days, and my encrypted wallet was hacked, losing 5000 USD.

CN
Techub News
Follow
2 months ago
AI summarizes in 5 seconds.

Written by: The Smart Ape

Translated by: Deep Tide TechFlow

A few days ago, I went on a year-end vacation with my family to a very nice hotel. One day after leaving the hotel, my wallet was completely drained. I was baffled because I had neither clicked on any phishing links nor signed any malicious transactions.

After hours of investigation and consulting experts for help, I finally understood the truth. It all stemmed from the hotel’s Wi-Fi network, a brief phone call, and a series of foolish mistakes.

image

Like most cryptocurrency enthusiasts, I brought my laptop with me, thinking I could squeeze in some work while spending time with my family. My wife repeatedly insisted that I shouldn’t work during these three days, and I really should have listened to her.

Like other guests, I connected to the hotel’s Wi-Fi network. This network didn’t require a password; you just had to log in through a captive portal.

image

I worked in the hotel as usual, without taking any risky actions: no creating new wallets, no clicking on strange links, and no visiting suspicious decentralized applications (dApps). I just checked X (Twitter), my balance, Discord, and Telegram.

At one point, I received a call from a friend in the crypto space, and we talked about market trends, Bitcoin, and related topics. What I didn’t know was that someone nearby was eavesdropping on our conversation and realized I was involved in cryptocurrency. This was my first mistake. The person learned from our conversation that I was using a Phantom wallet and that I was a significant holder.

This made me a target.

On a public Wi-Fi network, all devices share the same network, and in reality, the visibility between devices is higher than you might think. There are almost no real protective measures between users, which provides an opportunity for a "Man-in-the-Middle Attack." The attacker acts as a middleman, quietly inserting themselves between you and the internet, just like someone reading and altering the contents of your letters before they are delivered.

image

While I was browsing the web on the hotel Wi-Fi, one website appeared to load normally, but in reality, the page was injected with additional malicious code. I didn’t notice anything unusual at the time. If I had installed some security tools, I could have detected these issues, but unfortunately, I didn’t.

Typically, a website might request your wallet to sign certain actions. The Phantom wallet would pop up a window where you could choose to approve or deny. Generally, you would feel safe signing because you trust the website and the browser. However, that day I shouldn’t have done so.

While I was performing a token swap on the @JupiterExchange platform, the malicious code triggered a wallet request, replacing my normal swap operation. I could have detected this as a malicious request by carefully checking the transaction details, but since I was already in the process of swapping on Jupiter, I had no suspicions at all.

image

That day, I didn’t sign any transactions to transfer funds; instead, I signed an authorization. This was precisely the reason my assets were stolen days later.

The malicious code didn’t directly ask me to send SOL (Solana) because that would have been too obvious. Instead, it requested me to "authorize access," "approve account," or "confirm session." In simple terms, I was actually granting permission for another address to operate on my behalf.

I approved it because I mistakenly thought it was related to my actions on Jupiter. At the time, the message that popped up from the Phantom wallet looked very technical, showing no amounts and giving no indication of an immediate transfer.

And that was all the attacker needed. He patiently waited until I left the hotel before starting to act. He transferred my SOL, withdrew my tokens, and moved my NFTs to another address.

image

I never thought such a thing would happen to me. Fortunately, this wasn’t my main wallet, but rather a hot wallet used for specific operations, not for long-term asset holding. Even so, I made many mistakes, and I believe I bear the primary responsibility for this.

First, I should never have connected to the hotel’s public Wi-Fi. I should have used my phone’s hotspot to go online.

image

My second mistake was discussing cryptocurrency in the hotel’s public areas, allowing many people to potentially overhear our conversation. My father once advised me never to let others know that I was involved in cryptocurrency. I was lucky this time; some people have even faced kidnapping or worse due to their crypto assets.

image

Another mistake was approving the wallet request without fully paying attention. Because I was confident that this request came from Jupiter, I didn’t analyze it carefully. In fact, every wallet request should be scrutinized, even on applications you trust. Requests can be intercepted and may not actually come from the application you think.

In the end, I lost about $5,000 from a secondary wallet. While this isn’t the worst-case scenario, it is still very frustrating.

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

返20%!Boost新规,参与平分+交易量多赚
广告
|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Selected Articles by Techub News

3 minutes ago
Exchange BTC balance hits a new low, is it gaining strength for the next cycle?
28 minutes ago
1.75 trillion dollars, SpaceX aims to have the most expensive IPO in human history.
2 hours ago
Reintegration with the Ethereum economic zone
View More

Table of Contents

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Related Articles

avatar
avatarTechub News
3 minutes ago
Exchange BTC balance hits a new low, is it gaining strength for the next cycle?
avatar
avatarTechub News
28 minutes ago
1.75 trillion dollars, SpaceX aims to have the most expensive IPO in human history.
avatar
avatar律动BlockBeats
37 minutes ago
Nearly 300 million dollars targeting the U.S. midterm elections, Tether executives at the helm of the second largest political fund in the cryptocurrency industry.
avatar
avatar律动BlockBeats
1 hour ago
How to make money using AI on Polymarket?
avatar
avatarOdaily星球日报
1 hour ago
With the additional oracle, Polymarket's ambitions are revealed.
APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink