Tap to Trade in Gate Square, Win up to 50 GT & Merch!
Click the trading widget in Gate Square content, complete a transaction, and take home 50 GT, Position Experience Vouchers, or exclusive Spring Festival merchandise.
Click the registration link to join
https://www.gate.com/questionnaire/7401
Enter Gate Square daily and click any trading pair or trading card within the content to complete a transaction. The top 10 users by trading volume will win GT, Gate merchandise boxes, position experience vouchers, and more.
The top prize: 50 GT.
 to create a fake network with the same name as a legitimate WiFi. When users search for available networks, they see both real and fake options. Because the names are identical, users find it difficult to distinguish which is genuine.
Even more insidiously, hackers can boost the transmission power to make the fake network’s signal stronger than the real one. Most devices automatically connect to the strongest signal, unknowingly connecting to the fake WiFi. Once connected, the hacker becomes a man-in-the-middle, monitoring and intercepting all network traffic.
Phishing Pages and Seed Phrase Scams: A Deadly Combo
However, Walbroehl notes that simply connecting to a fraudulent WiFi network does not always mean cryptocurrency will be lost, provided users do not send their private keys, seed phrases, or sensitive information during connection. “Even if someone can’t see your private key, obtaining your exchange credentials, email, or two-factor authentication codes can allow attackers to quickly drain centralized crypto accounts.”
23pds states that such attacks often trick victims into revealing information through fake login pages, prompts to update or install auxiliary tools, or—worse—by tricking them into entering seed phrases, which directly controls their wallets. This situation “still happens far too often.”
“Remember: the key to winning against Evil Twin attacks is to trick you into making mistakes, not to crack encryption magically. Therefore, the real danger isn’t deep hacking but phishing and social engineering at the right moment.”
Three Major Pitfalls of Evil Twin WiFi Attacks
Fake Login Pages: After connecting, a seemingly official login page pops up, asking for exchange account credentials
Fake Update Prompts: Claiming to need security updates or auxiliary tools, but actually installing malware
Seed Phrase Scams: Disguised as wallet verification requests, prompting users to enter seed phrases, giving hackers full control of wallets
In January, a user known as “The Smart Ape” on X revealed that their crypto wallet was emptied after using public WiFi at a hotel and making a series of “stupid mistakes.” Although this attack did not involve an “Evil Twin” network, it clearly demonstrated how malicious actors exploit public WiFi to deceive users and employ similar tactics to steal cryptocurrencies.
The lesson from this case is profound. Even users claiming to be “Smart Ape” can make fatal errors when tired or distracted. In unfamiliar environments like airports or hotels, fatigue and urgency impair judgment—precisely what hackers rely on. They craft phishing pages that look almost identical to real websites, with only subtle differences (such as an extra letter in the URL or similar characters).
Five Protective Strategies for Securing Crypto Assets While Traveling
23pds suggests that the most practical way to stay safe is to avoid high-risk crypto operations over public WiFi, such as transferring funds, changing security settings, or connecting to new dApps. They also emphasize never entering seed phrases even if prompted, bookmarking domain names for safe access, manually typing URLs, avoiding clicking on search ads, and verifying all addresses manually instead of copy-pasting.
Walbroehl recommends using your own mobile hotspot, private networks, and disabling auto-connect features on devices to prevent falling victim to “Evil Twin” attacks. However, if no other options are available besides public WiFi, use a trusted VPN to encrypt traffic and only connect to networks verified verbally by staff as legitimate.
Five Strategies to Protect Crypto Assets While Traveling
Prioritize Mobile Hotspots: Use your own 4G/5G network to avoid public WiFi risks
Always Use VPN Encryption: If using public WiFi, encrypt all traffic with a trusted VPN
Manually Verify Network Names: Confirm the correct WiFi name verbally with staff
Disable Auto-Connect: Turn off automatic connection to known networks on your device
Adopt a Three-Layer Wallet Structure: Store main assets in cold wallets, small funds in travel wallets, and daily small amounts in hot wallets
23pds recommends adopting a simple three-layer structure for crypto security during travel. Do not use your main assets when outside. Create a dedicated travel wallet with a small amount of funds, and use a small, offline hot wallet for daily transactions, payments, small exchanges, or simple dApp interactions. “If your phone is stolen, you click the wrong link, or other accidents happen—your losses are limited.”
Nick Percoco, Kraken’s Chief Security Officer, warned in June about the lack of security awareness at crypto events (like conferences). He pointed out that many crypto users relax their guard during conferences or travel, performing high-risk operations over public WiFi, which is extremely dangerous.
The logic of the three-layer wallet structure is very clear: cold wallets hold large assets offline, travel wallets hold medium amounts for emergencies, and hot wallets contain small amounts for daily use. This isolation strategy ensures that even if one layer is compromised, losses remain manageable.