Hackers Physically Attaching to Cables – The Hidden Cyber Threat Beneath Office Buildings

How attackers are using power lines and building infrastructure to steal data without touching your Wi‑Fi

When most businesses think about hacking, they imagine someone miles away tapping at a keyboard. But there is a growing concern hackers are physically attaching to cables beneath office buildings to steal data.

Modern research shows attackers can abuse powerline networking, electrical wiring, and building infrastructure itself to spy on or access corporate networks.

This kind of attack often bypasses firewalls, antivirus, and cloud security altogether because it starts outside the digital perimeter.

What Is Powerline Networking and Why It is a Security Risk?

Powerline networking (also called Powerline Communication or PLC) allows data to travel over a building’s electrical wiring instead of Ethernet or Wi‑Fi. Offices often use it when:

  • Wi‑Fi is unreliable.
  • Running new network cables is not practical.
  • Temporary or older buildings need quick connectivity.

Powerline adapters plug straight into wall sockets, turning the electrical wiring into a data network. Convenient? Yes. Secure by default? Not always.

Security researchers warn that if attackers gain physical access to the electrical infrastructure, utility rooms, basement wiring, shared risers, or exterior cable runs they may be able to intercept or manipulate data travelling over those lines.

How Hackers Physically Tap into Office Buildings

Researchers and security professionals have documented several proximity‑based attacks that do not require breaking into a laptop or cloud account at all:

1. Attaching to Power or Network Cables

If cabling runs through accessible basements, car parks, or shared utility areas, attackers can attach monitoring devices or taps. In some scenarios, power cables themselves can leak information through signal patterns and electrical fluctuations.

2. Exploiting Powerline Adapters

Some powerline networking devices have been found with weak authentication, outdated firmware, or exposed management interfaces. Once compromised, they can become a silent entry point into the internal network.

3. Power Line Monitoring Attacks

Advanced attacks have shown it is possible to infer or extract data by analysing changes in electrical current on power cables, even without cutting or visibly damaging them. These techniques rely on physical proximity rather than internet access.

How Businesses Can Protect Themselves

This does not mean ripping everything out tomorrow. Practical steps include:

  1. Auditing where powerline networking is used.
  2. Locking down access to comms and electrical rooms
  3. Updating or replacing legacy powerline adapters
  4. Segmenting networks so exposed devices cannot reach sensitive systems.
  5. Treating physical access as a cybersecurity risk, not just a facilities issue

Make sure only trusted devices can connect to your network

There is a setting on business-grade switches called 802.1X that forces any device plugging into a network cable to prove it is allowed before it can access anything. Without it, anyone who reaches a cable can simply plug in. Speedster IT can check whether this is enabled on your network and set it up if not.

Block unknown devices automatically

 Network Access Control (NAC) tools go a step further by scanning any device trying to connect and blocking it instantly if it is not recognised. Think of it as a bouncer for your network ports. If you are not sure whether you have this in place, get in touch and we can take a look.

Get alerted when a new device appears on your network

 Your firewall or network management system can be configured to flag any unknown device the moment it connects. This is one of the quickest ways to spot a physical intrusion before it becomes a real problem. Speedster IT can set up this kind of monitoring for you.

Switch off any network ports that are not being used

 Every unused socket in a meeting room, corridor, basement, or comms cabinet is a potential entry point. Disabling unused ports takes minutes but closes off an easy route in. We can audit yours and lock them down.

Encrypt the data travelling across your network

 If an attacker does manage to intercept your traffic, encryption means they cannot read any of it. Many businesses assume this is already in place, but it often is not. Speedster IT can confirm whether your internal traffic is properly protected.

Keep sensitive systems separate from the rest of the network

 Using VLANs, your IT team can put your most important systems, finance, HR, servers, on their own private segment of the network. Even if someone gets into one part, they cannot reach everything else. This is something Speedster IT sets up as standard for clients in shared or multi-tenant buildings.

Regularly check what is physically plugged into your network 

A simple walkround of your office, comms room, and cable runs to check that every connected device is expected and accounted for can catch a rogue device early. If you would like Speedster IT to carry out a proper physical and digital infrastructure audit, just give us a call on 0204 511 9111 or drop us an email.

Why Firewalls and Microsoft 365 Alone Are not Enough.

Here is the bit too many businesses miss.

Cloud tools like Microsoft 365, endpoint protection, and MFA are essential, but they do not protect you, if the attack starts before the data reaches your network stack.

If someone can:

  • Plug into a powerline network.
  • Interfere with building wiring.
  • Access shared comms cabinets

…they are already inside the perimeter.

That is why cybersecurity professionals now stress that physical security is part of cybersecurity, not a separate issue.

Why This Matters for UK Offices and SMEs

Office buildings in London and across the UK often share:

  1. Basement utility rooms
  2. Cable risers between tenants
  3. External telecoms access points.

In multi‑tenant buildings especially, attackers do not need to break into your office, just the building infrastructure. That makes SMEs a softer target than large enterprises with dedicated security teams and locked facilities.

Managed IT Providers Physical to Digital Risk Checks

Managed IT providers increasingly include physical‑to‑digital risk checks as part of modern IT support, especially for offices in shared or older buildings.

At Speedster IT, we understand that modern cyber risks do not stop at firewalls or cloud platforms.

That is why our managed IT support goes beyond emails and endpoints to include physical‑to‑digital risk checks. Particularly for offices in shared, older, or multi‑tenant buildings.

Today’s attacks do not always come through phishing emails or brute‑force logins; sometimes they come through the walls, the floors, or the power sockets.

If your IT security strategy only focuses on cloud services and online threats, it can leave blind spots closer to home. Some attacks do not target Microsoft 365 or passwords at all. They start with physical access to cabling, power sockets, or shared building infrastructure.

If you are not sure whether your office setup could be exposed, Speedster IT can help.

We offer practical security reviews that look at both digital systems and on‑site infrastructure, helping London businesses spot risks early and fix them properly before they become a real problem. 0204 511 9111 or [email protected]

Source