On November 28, 2025, Michael Clapsis, a 44-year-old IT professional from West Australia, was sentenced to seven years and four months in prison for a series of cybercrimes centered around 'evil twin' Wi-Fi attacks. Using a Wi-Fi Pineapple device, Clapsis created malicious Wi-Fi networks mimicking legitimate free services at airports and on domestic flights. He used these networks to harvest credentials through a phishing portal, which he then used to access the private online accounts of women to steal intimate photos and videos. The investigation by the Australian Federal Police (AFP) also revealed attempts to destroy evidence and abuse of his employment position to spy on the investigation. The case highlights the tangible dangers of using public Wi-Fi and the effectiveness of man-in-the-middle attacks.
The attacker, Michael Clapsis, leveraged a portable hacking device, a Wi-Fi Pineapple, to execute his attacks. He set up rogue wireless access points with names that spoofed legitimate free Wi-Fi services at major Australian airports (Perth, Melbourne, Adelaide) and on airplanes. This is a classic man-in-the-middle (MitM) attack. When victims connected to the malicious network, they were presented with a captive portal, a phishing page disguised as a legitimate login screen, prompting them to enter their email or social media credentials.
Clapsis harvested these credentials to gain unauthorized access to his victims' cloud storage, social media, and email accounts. The primary motive was the theft of personal and intimate data, specifically photos and videos of women. The investigation, which began in April 2024, culminated in his arrest and subsequent guilty plea to 15 charges, including unauthorized data access and obstruction of justice.
The core of the attack revolves around several MITRE ATT&CK techniques:
T1557.002 - ARP Poisoning: While the articles specify an 'evil twin' setup, the Wi-Fi Pineapple can use various techniques to force clients to connect, including ARP poisoning to redirect traffic from a legitimate access point.T1557.003 - Evil Twin Access Point: This is the primary technique. Clapsis created a Wi-Fi network with an SSID identical or similar to a trusted network, tricking users' devices into connecting automatically or manually.T1566.002 - Spearphishing Link: The captive portal served to victims was essentially a phishing page, designed to trick them into volunteering their credentials.T1003 - OS Credential Dumping: By capturing credentials from the phishing portal, the attacker effectively dumped credentials for various online services.T1078 - Valid Accounts: Clapsis used the stolen credentials to log into victims' accounts.T1040 - Network Sniffing: The Wi-Fi Pineapple allows the operator to monitor all traffic from connected devices, potentially capturing unencrypted data.T1070.004 - File Deletion: Clapsis attempted to cover his tracks by deleting 1,752 items from a data storage application, an act of evidence tampering.The impact on the victims is severe, involving a profound violation of privacy and the theft of highly sensitive, personal data. This type of crime can lead to significant emotional and psychological distress. Beyond the direct victims, the incident erodes public trust in the security of free Wi-Fi services, particularly in travel hubs like airports and on airlines.
For the organizations involved (airports, airlines), there is reputational damage, even if their own networks were not breached. The incident highlights a security gap in the public environment they control. Clapsis's additional actions—spying on his employer's meetings with the AFP—demonstrate a severe insider threat risk, causing further damage to his former employer's reputation and security posture.
Detecting evil twin attacks requires specialized wireless monitoring.
| Type | Value | Description |
|---|---|---|
| network_traffic_pattern | Unencrypted login pages | Monitor for HTTP traffic to major login portals (Google, Facebook, etc.) that should be HTTPS. |
| other | Rogue APs | Use a Wireless Intrusion Prevention System (WIPS) to detect unauthorized access points broadcasting SSIDs of legitimate networks. |
| other | BSSID anomalies | Detect multiple access points with the same SSID but different BSSIDs (MAC addresses) in close proximity, especially if one has a much stronger signal. |
| certificate_subject | Self-signed certificates | Alerts on captive portals using self-signed or untrusted SSL certificates. |
For individuals, detection is difficult. Key signs include unexpected login prompts for Wi-Fi, browser warnings about invalid certificates, and slow network performance.
For organizations like airports and airlines:
Network Traffic Analysis.Encrypted Tunnels.Response: If a rogue AP is detected, the immediate response is to locate the device and the operator, as the AFP did in this case. Physical security and law enforcement are key components of the response.
For Individuals:
For Organizations:
Educating users about the risks of public Wi-Fi and how to identify suspicious networks and phishing pages is a primary defense.
Using a VPN encrypts traffic between the user's device and the VPN server, protecting it from interception on the local network.
Mapped D3FEND Techniques:
Deploying a Wireless Intrusion Prevention System (WIPS) can detect and block rogue access points.
Mapped D3FEND Techniques:
For individuals and corporate travelers, the most effective personal defense against evil twin attacks is the consistent use of a reputable VPN service. When connecting to any untrusted network, such as airport or hotel Wi-Fi, a VPN establishes an encrypted tunnel to a trusted endpoint, rendering any local network sniffing or man-in-the-middle data interception by devices like a Wi-Fi Pineapple useless. Corporate policies should mandate the use of a company-approved VPN for all employees when working remotely or traveling. This ensures that even if a user connects to a malicious access point, their sensitive data and credentials remain confidential and secure from the local adversary.
For organizations managing public spaces like airports, deploying a Wireless Intrusion Prevention System (WIPS) is critical. A WIPS actively monitors the radio frequency spectrum to detect and classify wireless threats in real-time. It can identify an evil twin access point by detecting an AP broadcasting a corporate or guest SSID from an unauthorized MAC address (BSSID). Advanced WIPS can also perform containment by sending deauthentication frames to clients connected to the rogue AP, preventing them from using the malicious network. This provides an automated, proactive defense to protect visitors and employees from such attacks within the organization's physical perimeter.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats