A Security Guide to Public WiFi: How Much Does Free Wi-Fi Really Cost You?

Scroll this

After Part 1 of our public Wi-Fi guide, some people told me: “I have nothing to hide. I’m not running a business, not a celebrity. Private messages? Let them read.”

It reminds me of a horror movie: the hero in pyjamas decides to check the basement in the middle of the night. The door is slightly open. Barefoot, they take the first step down. Every fibre of your being screams: DON’T GO DOWN THERE!

But they go anyway. Because what could possibly go wrong?

Meet Jan. An ordinary guy. Wife, kids, mortgage. Solid, reliable — banks would happily give him a loan for a new fridge. Jan has nothing to hide from his wife or the tax authorities. He travels frequently for work. During layovers, he uses free Wi-Fi.

What could go wrong? It’s just Wi-Fi…

Let’s follow Jan down into that basement.

Step 1 — The Inconvenience
One hour after connection

Why it happened: Real-time interception during Wi-Fi session.
Card details skimmed; session cookies hijacked (wallets, web banking, PayPal, loyalty).


Step 2 — The Violation
One week after connection

Everything locked.
Inbox looks clean. Phone goes quiet.

Here’s what happened while Jan wasn’t looking:

Why it happened: Account Takeover (ATO)

Credentials were intercepted over public Wi-Fi. Hackers immediately changed the recovery email and phone — cutting Jan off from his accounts. Then they ran a password-reset cascade: one compromised mailbox unlocked other services via “forgot password.” To the bank, it all looked legitimate (trusted email/phone, clean credit file), so transfers and loans were approved. The silence was intentional — security alerts were filtered or forwarded away.

Jan steps deeper into the basement.


Step 3 — The Exposure
Two weeks after connection


This is what Jan sees. Meanwhile, behind the scenes:


Why it happened: Social Engineering + Context

The attackers gained full access to the inbox, contacts, and message history. They studied Jan’s writing style, his connections, and the context of each relationship. The messages looked completely natural – correct greetings, familiar topics, personal details. This isn’t ordinary spam, it’s high-trust phishing: victims saw a familiar name, recognized the style, and trusted it.
To Jan’s loved ones, it was Jan.

Step 4 — The Trap
Three weeks after connection

Jan opens his laptop to finish a work presentation. Bold text on a black screen:

Jan tries to open a file.

Every file. Years of work. Photos of his kids. Everything.


Off-screen, during these three weeks:

Why it happened: Ransomware + Identity Theft + Dark Web

When he connected to public Wi-Fi, a man-in-the-middle attack began. The attacker either set up a fake access point like “Free_Airport_WiFi” or intercepted unprotected traffic (as noted in Part 1, open public Wi-Fi traffic is unencrypted by design). When Jan opened his browser, a fake update prompt led to a drive-by download that silently installed the malware. For three weeks it stayed quiet, harvesting credentials and preparing the ground. The stolen data was then monetized — resold in bulk on the Dark Web. Now 90 different buyers own pieces of his digital identity.


Step 5 — The Ruin
Two months after connection

Jan is urgently called into the office, where the Head of HR and the company’s lawyer are waiting.

What happened inside the company while no one noticed:

Why it happened: Business Email Compromise (BEC)

At the airport, Jan “for just a minute” opened his work mailbox over public Wi-Fi – credentials were intercepted. This is a classic Business Email Compromise (BEC) attack. The attackers gained access to corporate email, set up auto-forwarding and rules for messages with “payment” and “invoice,” and became invisible participants in every financial thread. They didn’t rush and studied the context for months. And waited for a major deal.

Five minutes at the airport cost Jan his career.
In the basement, the monster waiting at the bottom devoured him.


How not to end up in this horror movie

Always carry your own internet with you. In your home country — your mobile operator. Abroad, anywhere in the world — secure private network MTX Connect .

If any work or personal data truly matters, add Enhanced Security — an extra layer of encryption and anonymity.

Business owners: provide traveling employees with secure corporate network access via MTX Connect’s flexible business solutions — office-level security from anywhere in the world.

Give every family member a SIM or eSIM from MTX Connect, so they never have to connect to public Wi-Fi. And you’ll never receive a message from your child: “Dad, I’m in trouble, I urgently need money.”

So next time you decide you have nothing to hide, ask yourself:
Do you have anything to lose?

Travel wise and MTX-connected,
Jan Verny,
MTX Connect Chronicler

MTX Connect     |     Pricing      |      Coverage      |      FAQ      |       Contact