Evil Maid Attack
Security● Common
A physical attack where an adversary with brief unsupervised access to a device (like a hotel maid) installs malware, hardware keyloggers, or modified firmware. Can compromise hardware wallets, laptops, or air-gapped signing devices without the owner's knowledge.
Technical Notes
Attack vectors: firmware replacement, bootloader modification, hardware implants, keyloggers. Mitigations: tamper-evident seals, secure boot verification, keeping devices on person, firmware attestation, using multiple devices for verification.
Metadata
Visibility: Public
Created:1/3/2026by System