Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy

Three days after connecting to the hotel Wi-Fi, my crypto wallet was emptied.

CN
链捕手
Follow
2 months ago
AI summarizes in 5 seconds.

Original Author: The Smart Ape

Translation by: Deep Tide TechFlow

A few days ago, I went on a year-end vacation with my family to a very nice hotel. One day after leaving the hotel, my wallet was completely drained. I was baffled because I had neither clicked on any phishing links nor signed any malicious transactions.

After hours of investigation and consulting experts for help, I finally understood the truth. It all stemmed from the hotel’s Wi-Fi network, a brief phone call, and a series of foolish mistakes.

image

Like most cryptocurrency enthusiasts, I brought my laptop with me, thinking I could squeeze in some work while spending time with my family. My wife repeatedly insisted that I shouldn’t work during these three days, and I really should have listened to her.

Like other guests, I connected to the hotel’s Wi-Fi network. This network didn’t require a password; you just had to log in through a verification page (captive portal).

image

I worked in the hotel as usual, without taking any risky actions: no creating new wallets, no clicking on strange links, and no visiting suspicious decentralized applications (dApps). I just checked X (Twitter), my balance, Discord, and Telegram.

At one point, I received a call from a friend in the crypto space, and we talked about market trends, Bitcoin, and related topics. What I didn’t know was that someone nearby was eavesdropping on our conversation and realized I was involved in cryptocurrency. This was my first mistake. The person learned from our conversation that I was using a Phantom wallet and that I was a significant holder.

This made me a target.

On a public Wi-Fi network, all devices share the same network, and in reality, the visibility between devices is higher than you might think. There are almost no real protective measures between users, which provides an opportunity for a Man-in-the-Middle Attack. The attacker acts as a middleman, quietly inserting themselves between you and the internet, just like someone reading and altering the contents of your letters before they are delivered.

image

While I was browsing the web on the hotel Wi-Fi, one website appeared to load normally, but in reality, additional malicious code was injected behind the page. I didn’t notice anything unusual at the time. If I had installed some security tools, I could have detected these issues, but unfortunately, I didn’t.

Typically, a website might request your wallet to sign certain actions. The Phantom wallet would pop up a window where you could choose to approve or deny. Generally, you would feel safe signing because you trust the website and the browser. However, that day I shouldn’t have done so.

While I was performing a token swap on the @JupiterExchange platform, the malicious code triggered a wallet request, replacing my normal swap operation. I could have detected this as a malicious request by carefully checking the transaction details, but since I was already swapping on the Jupiter platform, I had no suspicions at all.

image

That day, I didn’t sign any transactions to transfer funds; instead, I signed an authorization permission. This was precisely the reason my assets were stolen days later.

The malicious code didn’t directly ask me to send SOL (Solana) because that would have been too obvious. Instead, it requested me to “authorize access,” “approve account,” or “confirm session.” In simple terms, I effectively gave another address permission to operate on my behalf.

I approved it because I mistakenly thought it was related to my actions on Jupiter. At the time, the message that popped up from the Phantom wallet looked very technical, showing no amounts and giving no indication of an immediate transfer.

And that was all the attacker needed. They patiently waited until I left the hotel before starting their actions. They transferred my SOL, withdrew my tokens, and moved my NFTs to another address.

image

I never thought such a thing would happen to me. Fortunately, this wasn’t my main wallet, but rather a hot wallet used for specific operations, not for long-term asset holding. Even so, I made many mistakes, and I believe I bear primary responsibility for this.

First, I should never have connected to the hotel’s public Wi-Fi. I should have used my phone’s hotspot to go online.

image

My second mistake was discussing cryptocurrency in a public area of the hotel, allowing many people to potentially overhear our conversation. My father once advised me never to let others know that I was involved in cryptocurrency. I was lucky this time; some people have even faced kidnapping or worse due to their crypto assets.

image

Another mistake was approving the wallet request without fully paying attention. Because I was sure this request came from Jupiter, I didn’t analyze it carefully. In fact, every wallet request should be scrutinized, even on applications you trust. Requests can be intercepted and may not actually come from the application you think.

Ultimately, I lost about $5,000 from a secondary wallet. While this isn’t the worst-case scenario, it’s still very frustrating.

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

返20%!Boost新规,参与平分+交易量多赚
广告
|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Selected Articles by 链捕手

19 hours ago
What does the DeFi that Wall Street wants look like?
20 hours ago
RootData launched the "Grade A Transparency Project Brief," directly reaching the cryptocurrency listing decision chain.
1 day ago
The DeFi lending protocol Drift was hacked for over 200 million dollars in 10 seconds, affecting more than 15 projects.
View More

Table of Contents

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Related Articles

avatar
avatarOdaily星球日报
2 minutes ago
Tiger Research:亚洲九大市场散户投资者现状分析
avatar
avatar律动BlockBeats
11 minutes ago
Anthropic's triple moment: code leak, government confrontation, and weaponization.
avatar
avatarTechub News
15 minutes ago
Web3 Tale of Two Cities: Hong Kong and Shanghai
avatar
avatarOdaily星球日报
29 minutes ago
MSX Q1 Summary and Review · Q2 Targets Outlook: Steady Grip on US Stock Main Line, Precise Stock Selection Methodology
avatar
avatarTechub News
40 minutes ago
Oracle bone script cuts 20,000 people All in AI: The AI competition has turned into a money-burning contest. Is there still a chance for small and medium players?
APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink