Evil Maid Attack
Security● Common

A physical attack where an adversary with brief unsupervised access to a device (like a hotel maid) installs malware, hardware keyloggers, or modified firmware. Can compromise hardware wallets, laptops, or air-gapped signing devices without the owner's knowledge.

Technical Notes

Attack vectors: firmware replacement, bootloader modification, hardware implants, keyloggers. Mitigations: tamper-evident seals, secure boot verification, keeping devices on person, firmware attestation, using multiple devices for verification.

Metadata

Visibility: Public
Created:1/3/2026by System

Actions