And it was a Mac. … pop (comfort bubble burst)
We carry a lot of info on the laptop when we fly … time for some security measures….
Wouldn't this be a more common problem not just with identity theft?With the phone porting, you can apparently do it all online with just a few details. I reckon I could move my friend's numbers quite easily. Check it out yourself!
No malware on laptop- it was actually bought for that trip. Not sure if it was purely via the wifi but definitely the hotel.
My guess is network sharing of some sort. And it was a Mac.
Not sure if a vpn would have helped, my ongoing plan is just to tether to my portable hotspot from now on.
With regard to the fx, there was a bust last year of some local students who had been paid to set up fx accounts then look the other way.
It's very lucrative considering they got around a mil from us in about a week.
With the phone porting, you can apparently do it all online with just a few details. I reckon I could move my friend's numbers quite easily. Check it out yourself!
And it was a Mac. … pop (comfort bubble burst)
We carry a lot of info on the laptop when we fly … time for some security measures….
My ID was stolen at the Hilton via the Wifi so avoid using it if you can! Lost (temporarily) over 6 figures of cash over various family member accounts
Actually - is there anywhere to store personal / financial data safely in the cloud?
I used to store mine in google drives.. but since deleted it last night after the OP's story!
As already mentioned someone providing a fake free hotel internet access ( or was yours a hotel internet where you had to pay for the internet, and is so was it on your bill?)
AFF Supporters can remove this and all advertisements
The way this attack would work is instead of connecting to the hotel wifi, you connect to the bad actor's wifi access point. This access point then connects to the hotel's network. Now all traffic can be intercepted and decrypted on the layer 2 level. However, if using https, the layer 3 traffic is still going to be encrypted. The way around this would be with DNS spoofing. So when you go to gmail.com to access your email, instead you get redicrected to gmaill.com and probably don't notice the difference. Now the secure connection is between your computer and gmaill.com which belongs to the bad actor. they simply pass on the credentials to gmail.com and save them for another day to access your email account.
Chances are you wouldn't have noticed gmaill instead of gmail (just using this as an example).
If the OP only had their data stored locally on their computer and didn't transmit it, then this wasn't the attack vector used.
Possible laptop cloning when you were not in the room?
The WiFi vector seems a stretch to get so much info.
What about the hotel itself having their point of sale systems compromised with your info being in there.
Chilling story - now makes one think how we should deal with keeping passport/bank statement etc scans and the best way of protecting those.