Investigating a Curious Case of Wi-Fi Spoofing: A Digital Mystery
In the realm of digital connectivity, unexpected scenarios can arise that leave even the most seasoned tech enthusiasts scratching their heads. Recently, I found myself entangled in an unusual predicament concerning the Wi-Fi network of my in-laws, which seemingly has been compromised by neighboring tenants. With a background in Cyber Security and a recent shift away from the tech industry, I felt compelled to reach out to the community for guidance before escalating the issue through professional channels.
The Setting
Currently residing with my spouse’s parents in the UK, they subscribe to Virgin Media as their Internet Service Provider (ISP). Their setup includes a Hub 3 router, with default Wi-Fi credentials clearly displayed on a sticker affixed to the device. However, as our household has grown crowded, the aging Hub 3 struggled to manage multiple connections efficiently. To address this, I purchased a high-end router intending to configure the Hub 3 in modem mode to facilitate better connectivity.
The Discovery
As I began the setup process, I noticed my phone was still connecting to the Virgin router even though it was switched off. Curious, I employed a Wi-Fi analyser app to identify the source of this persistent signal. To my astonishment, I discovered a strong signal emanating from my in-laws’ bedroom—an area where previous inspections yielded no evidence of additional networking devices. The revelation here was concerning; it appeared that a network not controlled by my in-laws was somehow accessible within their home.
Upon further investigation, I found this rogue access point was linked to a TalkTalk router, distinct from the Virgin ISP they subscribe to. A quick WHOIS lookup confirmed that the internet connection was indeed from TalkTalk. Alarmingly, this mysterious router was using my in-laws’ SSID and WPA2 password—a combination they had been using for approximately 2.5 years.
Piecing Together the Puzzle
The neighboring house operates as a rented multiple-occupancy dwelling, which leads me to speculate about how this unauthorized access might have come to be. My theories unfolded as follows:
-
Initial Breach: At some point, an individual from the neighboring house might have acquired my in-laws’ Wi-Fi credentials—possibly through social engineering or even inadvertent observation through a window.
-
Piggybacking: Once armed with these credentials, this person could have begun using its connection and shared it among other residents who may not
Share this content: