One Approval, Delayed Drain
-

The actual theft didn’t happen immediately. While using a legitimate DeFi interface, the victim unknowingly approved a malicious permission request. That approval gave the attacker standing access — a tactic known as “approval abuse.”
Days later, after the victim had left the hotel, the attacker drained the wallet of Solana tokens and NFTs. Security experts warn this delayed execution is increasingly common, making it harder for users to connect the loss to the original mistake.
Bitcoin security expert Jameson Lopp has long warned that crypto attacks often begin with observation, not hacking. Talking about holdings in public, using shared networks, and skipping approval reviews can quietly paint a target on your back.
Key takeaway: treat public networks as hostile, review and revoke wallet approvals regularly, and never discuss your crypto in public spaces.