Travel Hygiene · April 2026

Hotel WiFi: how executives get compromised on business travel.

Hotel WiFi is one of the most-attacked networks in 2026. Captive-portal MITM, evil-twin SSIDs, BLE proximity exploits, and AirDrop discovery leak constantly from your devices — even when "asleep" in the room. The seven-step travel-hygiene protocol that actually works.

Published April 30, 2026 Updated April 30, 2026 Reading time 8 min Threat vectors 6
The Short Answer

The hotel network is hostile by default. Plan accordingly.

Hotel WiFi attacks are not edge cases. Captive-portal man-in-the-middle, evil-twin SSIDs, BLE proximity exploits, and AirDrop discovery are routine on business-class hotel networks. The DarkHotel APT campaigns documented since 2018 specifically target C-suite executives at major-chain hotels in 30+ countries. The defense is not better hotel-WiFi hygiene — it's removing your devices from the attack surface entirely when not in active use. Faraday isolation when stowed plus VPN-encrypted traffic when active is the protocol that works.

This article covers the six primary attack vectors on hotel WiFi, the seven-step protocol executives actually use, and why the "leave the laptop in the hotel safe" approach handles physical theft but not wireless attack surface.

The Six Threat Vectors

What can actually happen to your devices in a hotel room.

Vector 01

Captive-portal MITM

Hotel WiFi requires login through a captive portal. Compromised portals serve modified TLS certificates that intercept everything — emails, document syncs, password-manager unlocks, MFA codes. Your device accepts the portal because the network requires it, then leaks for the duration of the session.

Vector 02

Evil-twin SSIDs

The 'Marriott_Guest' or 'Hilton_Guest' network your laptop auto-connected to in 2024 is now broadcast by an attacker in the conference-floor parking lot. Your device reconnects automatically, leaks credentials and document syncs, and never alerts you because the SSID matches a known network.

Vector 03

BLE proximity exploits

BLE-based zero-clicks against macOS and iOS have been published almost yearly since 2019. Apple patches them; new ones are found. Required attacker proximity: ~10 meters. A MacBook on the desk in a hotel room is reachable from the next room or the corridor. In a Faraday bag, the BLE radio cannot be reached.

Vector 04

AirDrop & AirPlay leaks

AirDrop in 'Everyone for 10 minutes' or 'Contacts Only' with mis-configured contact lists leaks the principal's Apple ID hash and partial device metadata to anyone within Bluetooth range. AirPlay-discovery beacons identify the device by name. Both leak when the device is awake.

Vector 05

Remote-management beaconing

Many corporate-issued MacBooks have remote-management agents (Jamf, Mosyle, Kandji) that beacon to vendor cloud services. In a compromised hotel network, those beacons are intercepted, decoded, and used to fingerprint the device for targeted follow-up attacks within the same trip.

Vector 06

USB-C accessory implants

A 'left behind' USB-C dongle in the hotel-room desk port silently mounts as a network adapter and routes all traffic through an attacker-controlled VPN. The MacBook does not warn — it just sees a faster connection. The most reliable defense: do not connect to USB-C peripherals you did not bring with you, and Faraday-store the device when not in active use.

The Protocol

Seven-step business-travel hygiene.

This is the protocol used by corporate-security teams at finance firms, M&A counsel desks, and journalism organizations. Most steps are free; the equipment investment is one Faraday briefcase plus a paid VPN subscription. The combined cost is under $200 for a year of protection.

02

Always-on VPN with auto-connect on join

Reputable VPN (1.1.1.1, Mullvad, Proton, NordVPN) configured to auto-connect when joining ANY new WiFi network. Defeats the standard MITM attacks at the local network layer. Set the VPN's kill-switch to block traffic if the VPN drops.

03

Forget previously-joined hotel networks

'Marriott_Guest', 'Hilton_Guest', conference-WiFi networks — Forget them all in System Settings → WiFi → Known Networks after each trip. Defeats the evil-twin attack vector by removing the auto-connect that makes it possible.

04

Disable AirDrop & AirPlay receiver

System Settings → AirDrop → Receiving Off (or Contacts Only at minimum). System Settings → AirPlay & Handoff → AirPlay Receiver Off. Both leak Apple ID hash and device metadata by default. Re-enable only when actively using.

05

Don't trust hotel USB-C ports or wall chargers

Carry your own USB-C cable and wall adapter. Do not plug into hotel-room USB ports, in-room desk USB hubs, or unfamiliar charging stations. The 'juice jacking' attack class is real; the 'left behind' implant attack class is more sophisticated and harder to detect.

06

Powered-off (not Sleep) for overnight storage

macOS and Windows Sleep mode keep some wireless radios active for 'wake on LAN' and similar features. Powered-off disables them. Combined with Faraday storage, this is the gold standard for overnight: the device is off AND in a Faraday environment.

07

Treat hotel-room conversations as overheard

Bluetooth-microphone exploits, in-room voice-activated devices (some chains experiment with Alexa-class assistants), and the laptop's own microphone if compromised. For sensitive calls, leave the room. Take the call from a quiet corner of the lobby or a meeting room — both are usually less surveilled than guest rooms.

For Multi-Device Business Travel

The REVIS-1 Executive Guard handles steps 1, 2, and 3 in one bag.

Three independently shielded chambers — laptop, tablet+phone, wallet+keys — let you isolate every device the moment you step into the hotel room. 76–85 dB attenuation across 30 MHz – 10 GHz. Boardroom-appropriate optics for the conference floor and lobby. Made in the United States. $129 with free U.S. shipping.

Acquire — $129 MacBook Pillar
What Doesn't Work Alone

Defenses that are necessary but not sufficient.

Hotel safe (physical-theft only)

Hotel safes prevent physical theft adequately. They do not block wireless signals. Your laptop sitting in a hotel safe is fully reachable on WiFi, Bluetooth, and (if cellular-equipped) cellular. AirDrop, AirPlay, and BLE proximity attacks all work as if the laptop were sitting on the desk. For physical-theft protection: hotel safe is fine. For wireless-attack-surface protection: Faraday bag.

VPN alone (network-layer only)

VPN encrypts traffic from your device to the VPN server. It does not stop captive-portal MITM (intercepts BEFORE the VPN connects), evil-twin SSIDs (tricks the device into the wrong network), or BLE proximity exploits (targets the radio at the device itself). VPN is necessary; it is not sufficient.

Sleep mode (radios still active)

macOS and Windows Sleep mode keep wireless radios partially active for wake-on-LAN, wake-on-Bluetooth, and similar features. The device is reachable on the network during Sleep. For overnight storage on hostile networks, Powered-off is meaningfully more secure than Sleep.

"I trust this hotel chain" assumption

The DarkHotel APT campaigns specifically target C-suite executives at premium hotel chains in 30+ countries. The chain is not the threat actor; the threat actor exploits the chain's network infrastructure. Trust is misplaced. Treat every hotel network as hostile by default and the protocol above protects you regardless.

FAQ

Common questions on hotel WiFi safety.

How dangerous is hotel WiFi for business travelers in 2026?
Significantly. Captive-portal MITM attacks, evil-twin SSIDs, and Bluetooth proximity exploits are routine on business-class hotel networks — not edge cases. Major chain incidents documented since 2018 include the DarkHotel APT campaigns targeting C-suite executives, ATPs targeting major-conference attendees, and ongoing low-level skimming by cybercrime operators monetizing on captured credentials. The hotel WiFi network is structurally hostile by default; treat it accordingly.
Does a VPN protect me on hotel WiFi?
Partially. A reputable VPN (1.1.1.1, Mullvad, Proton, NordVPN) encrypts your traffic from your device to the VPN server, defeating standard MITM attacks at the local network layer. However, VPN does not stop captive-portal MITM (which intercepts BEFORE the VPN connects), evil-twin SSIDs (which trick your device into auto-connecting to the wrong network), or BLE proximity exploits (which target the radio at the device itself). VPN is necessary but not sufficient.
What's the safest way to use my MacBook in a hotel room?
Three rules. First — when not in active use, store the MacBook in a Faraday bag. The hotel network cannot reach it; AirDrop discovery cannot leak; BLE proximity attacks cannot complete. Second — when in active use, connect through a reputable always-on VPN before doing anything else (set the VPN to auto-connect on join). Third — disable AirDrop and AirPlay receiver mode in System Settings; they leak your Apple ID hash by default. The Faraday-when-stowed pattern eliminates the largest attack surface.
What is an evil-twin SSID attack?
A WiFi access point broadcasting the same network name as a legitimate network — typically a hotel or chain ('Marriott_Guest', 'Hilton_Guest'). Your device, having auto-connected to the legitimate version on a previous stay, automatically connects to the evil twin without prompting. Once connected, all traffic flows through the attacker. Defenses: disable WiFi auto-connect for previously-seen networks ('Forget' them after each trip), or Faraday-store the device when not in active use so the auto-connect does not happen at all.
Are hotel safes secure for storing my laptop?
Hotel safes prevent physical theft adequately for the price point — but they do not block wireless signals. Your laptop sitting in a hotel safe is fully reachable on WiFi, Bluetooth, and (if cellular-equipped) cellular. AirDrop, AirPlay, and BLE proximity attacks all work as if the laptop were sitting on the desk. For physical-theft protection: hotel safe is fine. For wireless-attack-surface protection: Faraday bag.
Should I just leave the laptop powered off in the hotel room?
Powered off is more reliable than Sleep mode. macOS and Windows Sleep mode keep some wireless radios active for 'wake on LAN' and similar features. Powered off disables them entirely. However, powered off plus Faraday-stored is the gold standard — even if a state-actor were to remotely wake the device through some firmware vulnerability, the Faraday bag prevents transmission. For ordinary business travelers, Faraday-stored Sleep mode is the practical answer; for high-stakes scenarios, powered off plus Faraday.
What about iPhone in the hotel room — same threats?
Same threat surface, slightly different attack vectors. iPhone defends against captive-portal MITM better than macOS by default (iOS auto-detects suspicious portals), but BLE proximity exploits, AirDrop discovery leaks, and IMSI-catcher targeting all apply. The Faraday-when-stowed pattern works identically: drop the iPhone in the bag when leaving the room or sleeping, take it out when needed. The phone reconnects to legitimate networks automatically when removed.
Which Faraday product is right for business travel?
For multi-device executive travel, the REVIS-1 Executive Guard is the right answer. Three independent shielded chambers — one for the laptop, one for tablet+phone, one for wallet+keys+RFID credentials — let you isolate every device the moment you step into a hostile environment (hotel room, airport lounge, conference floor). 76–85 dB across 30 MHz – 10 GHz, structured executive briefcase form factor, made in the United States. $129 with free U.S. shipping.