IT Professional Jailed for 7 Years in Australia for 'Evil Twin' Wi-Fi Attacks on Flights

Australian IT Guru Michael Clapsis Sentenced to Over 7 Years for Using Wi-Fi Pineapple to Steal Credentials and Intimate Images

HIGH
November 28, 2025
5m read
CyberattackPhishingThreat Intelligence

Related Entities

Products & Tech

Wi-Fi Pineapple

Other

AustraliaMichael Clapsis

Full Report

Executive Summary

On November 28, 2025, Michael Clapsis, a 44-year-old IT professional from West Australia, was sentenced to seven years and four months in prison for a series of cybercrimes centered around 'evil twin' Wi-Fi attacks. Using a Wi-Fi Pineapple device, Clapsis created malicious Wi-Fi networks mimicking legitimate free services at airports and on domestic flights. He used these networks to harvest credentials through a phishing portal, which he then used to access the private online accounts of women to steal intimate photos and videos. The investigation by the Australian Federal Police (AFP) also revealed attempts to destroy evidence and abuse of his employment position to spy on the investigation. The case highlights the tangible dangers of using public Wi-Fi and the effectiveness of man-in-the-middle attacks.


Threat Overview

The attacker, Michael Clapsis, leveraged a portable hacking device, a Wi-Fi Pineapple, to execute his attacks. He set up rogue wireless access points with names that spoofed legitimate free Wi-Fi services at major Australian airports (Perth, Melbourne, Adelaide) and on airplanes. This is a classic man-in-the-middle (MitM) attack. When victims connected to the malicious network, they were presented with a captive portal, a phishing page disguised as a legitimate login screen, prompting them to enter their email or social media credentials.

Clapsis harvested these credentials to gain unauthorized access to his victims' cloud storage, social media, and email accounts. The primary motive was the theft of personal and intimate data, specifically photos and videos of women. The investigation, which began in April 2024, culminated in his arrest and subsequent guilty plea to 15 charges, including unauthorized data access and obstruction of justice.


Technical Analysis

The core of the attack revolves around several MITRE ATT&CK techniques:

  • T1557.002 - ARP Poisoning: While the articles specify an 'evil twin' setup, the Wi-Fi Pineapple can use various techniques to force clients to connect, including ARP poisoning to redirect traffic from a legitimate access point.
  • T1557.003 - Evil Twin Access Point: This is the primary technique. Clapsis created a Wi-Fi network with an SSID identical or similar to a trusted network, tricking users' devices into connecting automatically or manually.
  • T1566.002 - Spearphishing Link: The captive portal served to victims was essentially a phishing page, designed to trick them into volunteering their credentials.
  • T1003 - OS Credential Dumping: By capturing credentials from the phishing portal, the attacker effectively dumped credentials for various online services.
  • T1078 - Valid Accounts: Clapsis used the stolen credentials to log into victims' accounts.
  • T1040 - Network Sniffing: The Wi-Fi Pineapple allows the operator to monitor all traffic from connected devices, potentially capturing unencrypted data.
  • T1070.004 - File Deletion: Clapsis attempted to cover his tracks by deleting 1,752 items from a data storage application, an act of evidence tampering.

Impact Assessment

The impact on the victims is severe, involving a profound violation of privacy and the theft of highly sensitive, personal data. This type of crime can lead to significant emotional and psychological distress. Beyond the direct victims, the incident erodes public trust in the security of free Wi-Fi services, particularly in travel hubs like airports and on airlines.

For the organizations involved (airports, airlines), there is reputational damage, even if their own networks were not breached. The incident highlights a security gap in the public environment they control. Clapsis's additional actions—spying on his employer's meetings with the AFP—demonstrate a severe insider threat risk, causing further damage to his former employer's reputation and security posture.


Cyber Observables for Detection

Detecting evil twin attacks requires specialized wireless monitoring.

Type Value Description
network_traffic_pattern Unencrypted login pages Monitor for HTTP traffic to major login portals (Google, Facebook, etc.) that should be HTTPS.
other Rogue APs Use a Wireless Intrusion Prevention System (WIPS) to detect unauthorized access points broadcasting SSIDs of legitimate networks.
other BSSID anomalies Detect multiple access points with the same SSID but different BSSIDs (MAC addresses) in close proximity, especially if one has a much stronger signal.
certificate_subject Self-signed certificates Alerts on captive portals using self-signed or untrusted SSL certificates.

Detection & Response

For individuals, detection is difficult. Key signs include unexpected login prompts for Wi-Fi, browser warnings about invalid certificates, and slow network performance.

For organizations like airports and airlines:

  1. Deploy a Wireless Intrusion Prevention System (WIPS): A WIPS can automatically detect and sometimes neutralize rogue access points. It can identify evil twins by analyzing signal strength, MAC addresses, and other wireless characteristics. This is a form of D3FEND's Network Traffic Analysis.
  2. User Education: Clearly communicate the exact name (SSID) of the official Wi-Fi network. Advise users to be suspicious of similarly named networks and to ensure their devices do not auto-connect to open networks.
  3. Encourage VPN Use: Contrary to CISA's recent advice for personal use, for connecting to untrusted public networks, a reputable VPN is a crucial defense. It creates an encrypted tunnel, making traffic sniffing ineffective. This aligns with D3FEND's Encrypted Tunnels.

Response: If a rogue AP is detected, the immediate response is to locate the device and the operator, as the AFP did in this case. Physical security and law enforcement are key components of the response.


Mitigation

For Individuals:

  1. Be Skeptical of Public Wi-Fi: Avoid connecting to open, unsecured Wi-Fi networks. If you must connect, use a trusted VPN service to encrypt your traffic.
  2. Disable Auto-Connect: Turn off the setting on your devices that automatically connects to known or open Wi-Fi networks.
  3. Verify Captive Portals: If presented with a login page, check the URL carefully. Look for the HTTPS lock icon. If in doubt, do not enter your credentials.
  4. Use Cellular Data: When possible, use your mobile data plan instead of public Wi-Fi, as it is significantly more secure.

For Organizations:

  1. Secure Guest Networks: If providing public Wi-Fi, use security protocols like WPA3 and a secure, clearly branded captive portal with a valid SSL certificate.
  2. Regular Wireless Sweeps: Conduct regular physical and virtual sweeps of the premises to detect unauthorized wireless devices.

Timeline of Events

1
April 1, 2024
The Australian Federal Police (AFP) began their investigation, seizing devices from Michael Clapsis at Perth Airport.
2
November 28, 2025
Michael Clapsis was sentenced in Perth District Court to seven years and four months in prison.
3
November 28, 2025
This article was published

MITRE ATT&CK Mitigations

Educating users about the risks of public Wi-Fi and how to identify suspicious networks and phishing pages is a primary defense.

Using a VPN encrypts traffic between the user's device and the VPN server, protecting it from interception on the local network.

Mapped D3FEND Techniques:

Deploying a Wireless Intrusion Prevention System (WIPS) can detect and block rogue access points.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

For individuals and corporate travelers, the most effective personal defense against evil twin attacks is the consistent use of a reputable VPN service. When connecting to any untrusted network, such as airport or hotel Wi-Fi, a VPN establishes an encrypted tunnel to a trusted endpoint, rendering any local network sniffing or man-in-the-middle data interception by devices like a Wi-Fi Pineapple useless. Corporate policies should mandate the use of a company-approved VPN for all employees when working remotely or traveling. This ensures that even if a user connects to a malicious access point, their sensitive data and credentials remain confidential and secure from the local adversary.

For organizations managing public spaces like airports, deploying a Wireless Intrusion Prevention System (WIPS) is critical. A WIPS actively monitors the radio frequency spectrum to detect and classify wireless threats in real-time. It can identify an evil twin access point by detecting an AP broadcasting a corporate or guest SSID from an unauthorized MAC address (BSSID). Advanced WIPS can also perform containment by sending deauthentication frames to clients connected to the rogue AP, preventing them from using the malicious network. This provides an automated, proactive defense to protect visitors and employees from such attacks within the organization's physical perimeter.

Sources & References

Australian Man Gets Seven Years for Running “Evil Twin” Wi-Fi
Infosecurity Magazine (infosecurity-magazine.com) December 1, 2025

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Evil TwinWi-Fi PineappleMan-in-the-MiddlePhishingCybercrimeAustralia

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading