Protecting Your Hardware Wallet from Evil Maid Attacks
Someone accesses your wallet while you are away. Hotel rooms, offices, shared spaces — how to detect and prevent physical tampering.
Introduction
TL;DR
- An Evil Maid attack involves physical access to your hardware wallet, where the attacker tamper with it to steal your private keys.
- The risk can be mitigated by using tamper-evident designs, passphrases, and air-gapping.
- Key wallets for protection include BitBox02, Coldcard Mk4, and Trezor Safe 7.
- Best practices: always use passphrases, ensure your wallet has anti-tampering features, and avoid leaving it unattended in risky environments.
What is an Evil Maid Attack?
An Evil Maid attack is a type of physical security vulnerability where an attacker gains unauthorized access to your hardware wallet, typically while it is left unattended. The attacker’s goal is to manipulate the wallet in a way that enables them to steal the cryptographic private keys or alter the wallet’s functionality without the owner’s knowledge. This type of attack can occur in places like hotels, airports, or other areas where you may temporarily leave your device unsupervised.
The name 'Evil Maid' comes from the scenario where a maid (or other trusted individual) could potentially access a person’s valuables during their absence. In the case of hardware wallets, it involves sophisticated tampering to bypass security measures and potentially compromise your assets.
How Evil Maid Attacks Work
The typical process for an Evil Maid attack begins with the attacker gaining physical access to the wallet. This could occur in a variety of scenarios—whether the attacker is a hotel staff member, a cleaner, or anyone with the opportunity to interact with your hardware wallet when you’re not around. Once they have access, they might alter the wallet’s firmware, install malicious software, or make other modifications that allow them to monitor your PIN entry, extract private keys, or reset the device entirely.
The danger of such an attack lies in the fact that, often, the victim may never know that their wallet has been compromised. There are no obvious signs of tampering unless specific precautions, such as tamper-evident seals or specialized logging mechanisms, are in place. Because these attacks exploit the physical presence of the wallet, digital security measures like multi-signature or cold storage provide no defense once the wallet is in the attacker’s hands.
Top-Rated Wallets for This Use Case
View all walletsWhy This Threat Matters: The Impact of an Evil Maid Attack
The risk of an Evil Maid attack is critical for individuals who store large amounts of cryptocurrency or those who frequently carry their hardware wallets across borders or in public spaces. If an attacker successfully modifies your wallet, they could bypass any security you have in place, including passphrases and PINs. This could lead to the loss of all of your stored crypto assets. Additionally, Evil Maid attacks are hard to detect without vigilant checks, leaving users unaware of their exposure until it’s too late.
Beyond financial loss, such breaches can damage your reputation or expose sensitive financial strategies if your private keys are stolen and used maliciously. As crypto assets grow in value, protecting them from advanced physical threats like this is paramount.
Key Considerations When Preventing an Evil Maid Attack
When protecting your hardware wallet against Evil Maid attacks, consider the following factors:
- Physical security: Your wallet must be kept in a secure environment where no one can tamper with it. This includes using tamper-evident seals and ensuring the wallet is not left unattended in vulnerable locations like hotel rooms or airports.
- Encryption and passphrase protection: Use strong passphrases in conjunction with your hardware wallet to add an extra layer of defense. Even if an attacker gains access to the wallet, they’ll be unable to extract your private keys without the correct passphrase.
- Air-gapping: For wallets with air-gap functionality, ensure that the wallet is never connected to a computer or network that the attacker can use to install malicious software.
- Firmware integrity checks: Look for hardware wallets that have the capability to perform firmware checks or logging mechanisms to detect any changes made while the wallet is out of your possession.
Real-World Example: The Risk of Leaving a Wallet Unattended
A traveler, who frequently crosses international borders, stores their hardware wallet in their hotel room during the night. Unbeknownst to the traveler, the hotel’s cleaning staff has access to their room during their absence. An attacker tampers with the wallet by modifying its firmware, and upon returning, the traveler finds that their crypto holdings are no longer accessible. While the wallet appears intact, the attacker has reprogrammed it to bypass any security measures.
This scenario highlights the importance of understanding that no wallet is immune to a physical attack. Security measures such as tamper-evident designs and passphrase protection become critical in such situations.
Defense Strategy Against Evil Maid Attacks
The most effective way to mitigate the risk of an Evil Maid attack is through layers of security. Use wallets that offer features like:
- Passphrase protection: This ensures that even if an attacker gains access to your wallet, they cannot steal your private keys without the correct passphrase.
- Air-gapping: Choose wallets that allow for full offline operation. By never connecting to a computer or online network, attackers cannot install software to bypass your security measures.
- Tamper-evident design: Always choose wallets with physical features that show clear signs of tampering. This way, if your wallet is altered, you’ll know immediately.
- Anti-klepto and secure signing features: Some wallets include features that protect against malicious software attempting to hijack your signing process or transaction approvals.
By combining these strategies, you can ensure that even if your wallet is accessed by an attacker, your private keys remain safe.
What to Look for in a Wallet to Prevent Evil Maid Attacks
Passphrase Support
Must HavePassphrase protection ensures that even if the attacker gains access to the wallet, they cannot steal your private keys without the correct passphrase.
Matching wallets

Coinkite Coldcard Mk4
Tamper-Evident Design
Must HaveA tamper-evident design allows you to detect any unauthorized access to your wallet, providing an immediate alert to potential compromises.
Matching wallets

Coinkite Coldcard Mk4
Air-Gapped Signing
Must HaveAir-gapping ensures that the wallet is never connected to a potentially compromised computer or network, preventing the installation of malicious software.
Matching wallets

Coinkite Coldcard Mk4
Anti-Klepto Protection
Nice to HaveAnti-klepto features prevent attackers from modifying transactions or accessing your private keys, even if they have access to the wallet.
Matching wallets
Recommended Wallets for This Threat Model
These wallets provide the best protection against Evil Maid attacks, with features like passphrase support, tamper-evident designs, and air-gapped signing.

Coinkite Coldcard Mk4
Common Mistakes to Avoid
Leaving your wallet in an insecure place
Why it's dangerous
Tempting attackers to tamper with your wallet when you’re not around.
Do this instead
Always store your wallet in a secure, private location, such as a lockbox or secure hotel safe.
Not using passphrases
Why it's dangerous
Without a passphrase, an attacker can access your wallet if they gain physical access.
Do this instead
Enable passphrase protection to add an extra layer of security to your wallet.
Neglecting firmware integrity checks
Why it's dangerous
Firmware tampering can go unnoticed if you don't check for signs of modification.
Do this instead
Choose wallets with firmware integrity features or tools that alert you to changes in firmware.
Conclusion and Next Steps
Defending against Evil Maid attacks requires a combination of physical security, strong passwords, and tamper-evident features. Always choose a wallet with the right safeguards, including passphrase support and air-gapping. Additionally, avoid risky scenarios where your wallet could be left unattended or accessed by others. Implement these strategies today to ensure that your crypto assets remain safe, even when you're not around.
Frequently Asked Questions
Common questions about hardware wallets and crypto security
Can an evil maid attack steal crypto from a hardware wallet?
Which hardware wallets are most resistant to evil maid attacks?
How do I know if my hardware wallet has been physically tampered with?
Is leaving a hardware wallet in a hotel safe secure enough?
What is the difference between an evil maid attack and a supply chain attack?
Ready to Choose Your Wallet?
Now that you have the knowledge, take the next step toward securing your crypto.









