I connected to the hotel Wi-Fi for three days, and my encrypted wallet was hacked, losing 5000 USD.

CN
1 day ago

Written by: The Smart Ape

Translated by: Deep Tide TechFlow

A few days ago, I went on a year-end vacation with my family to a very nice hotel. One day after leaving the hotel, my wallet was completely drained. I was baffled because I had neither clicked on any phishing links nor signed any malicious transactions.

After hours of investigation and consulting experts for help, I finally understood the truth. It all stemmed from the hotel’s Wi-Fi network, a brief phone call, and a series of foolish mistakes.

image

Like most cryptocurrency enthusiasts, I brought my laptop with me, thinking I could squeeze in some work while spending time with my family. My wife repeatedly insisted that I shouldn’t work during these three days, and I really should have listened to her.

Like other guests, I connected to the hotel’s Wi-Fi network. This network didn’t require a password; you just had to log in through a captive portal.

image

I worked in the hotel as usual, without taking any risky actions: no creating new wallets, no clicking on strange links, and no visiting suspicious decentralized applications (dApps). I just checked X (Twitter), my balance, Discord, and Telegram.

At one point, I received a call from a friend in the crypto space, and we talked about market trends, Bitcoin, and related topics. What I didn’t know was that someone nearby was eavesdropping on our conversation and realized I was involved in cryptocurrency. This was my first mistake. The person learned from our conversation that I was using a Phantom wallet and that I was a significant holder.

This made me a target.

On a public Wi-Fi network, all devices share the same network, and in reality, the visibility between devices is higher than you might think. There are almost no real protective measures between users, which provides an opportunity for a "Man-in-the-Middle Attack." The attacker acts as a middleman, quietly inserting themselves between you and the internet, just like someone reading and altering the contents of your letters before they are delivered.

image

While I was browsing the web on the hotel Wi-Fi, one website appeared to load normally, but in reality, the page was injected with additional malicious code. I didn’t notice anything unusual at the time. If I had installed some security tools, I could have detected these issues, but unfortunately, I didn’t.

Typically, a website might request your wallet to sign certain actions. The Phantom wallet would pop up a window where you could choose to approve or deny. Generally, you would feel safe signing because you trust the website and the browser. However, that day I shouldn’t have done so.

While I was performing a token swap on the @JupiterExchange platform, the malicious code triggered a wallet request, replacing my normal swap operation. I could have detected this as a malicious request by carefully checking the transaction details, but since I was already in the process of swapping on Jupiter, I had no suspicions at all.

image

That day, I didn’t sign any transactions to transfer funds; instead, I signed an authorization. This was precisely the reason my assets were stolen days later.

The malicious code didn’t directly ask me to send SOL (Solana) because that would have been too obvious. Instead, it requested me to "authorize access," "approve account," or "confirm session." In simple terms, I was actually granting permission for another address to operate on my behalf.

I approved it because I mistakenly thought it was related to my actions on Jupiter. At the time, the message that popped up from the Phantom wallet looked very technical, showing no amounts and giving no indication of an immediate transfer.

And that was all the attacker needed. He patiently waited until I left the hotel before starting to act. He transferred my SOL, withdrew my tokens, and moved my NFTs to another address.

image

I never thought such a thing would happen to me. Fortunately, this wasn’t my main wallet, but rather a hot wallet used for specific operations, not for long-term asset holding. Even so, I made many mistakes, and I believe I bear the primary responsibility for this.

First, I should never have connected to the hotel’s public Wi-Fi. I should have used my phone’s hotspot to go online.

image

My second mistake was discussing cryptocurrency in the hotel’s public areas, allowing many people to potentially overhear our conversation. My father once advised me never to let others know that I was involved in cryptocurrency. I was lucky this time; some people have even faced kidnapping or worse due to their crypto assets.

image

Another mistake was approving the wallet request without fully paying attention. Because I was confident that this request came from Jupiter, I didn’t analyze it carefully. In fact, every wallet request should be scrutinized, even on applications you trust. Requests can be intercepted and may not actually come from the application you think.

In the end, I lost about $5,000 from a secondary wallet. While this isn’t the worst-case scenario, it is still very frustrating.

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

Share To
APP

X

Telegram

Facebook

Reddit

CopyLink