There is no 1 size fits all solution - it is certainly not possible for a device to get round properly set up traffic limits. Its very difficult to comment meaningfully unless more is known about the network.
If the network is set up by idiots its possible that traffic is limited based on MAC address and that this software is cycling through MAC addresses. Its less likely (but not impossible) that the device is setting up a tunnel to an endpoint which is not byte-counted by your network administrator.
Yet another explanation is a mis configured port or bribed system administrator.