Published: July 11, 2024
Man-in-the-middle is a type of attack used by spy organizations and professional criminals alike to bypass passwords, steal login information, record private messages, move funds… Essentially, man-in-the-middle attacks can have an effect on any aspect of web-traffic. They are invisible and very difficult to detect.
Normal web traffic should flow from a user’s computer (Point A) to a web app or service (Point B). The response then flows back. Man-in-the-middle attacks exploit the space between those points to gather sensitive information.
Man-in-the-middle attacks cause traffic to flow from Point A, through Fraudster X to Point B.
Traditionally it is achieved by someone connected to the same network as their victim, re-routing traffic. However, there are some more advanced methods which we’ll talk about later. Firstly,
What can someone in the middle do?
Take a look at this example:
This should give you some idea of why public Wi-Fi access points are considered so dangerous.
It can be very easy. Free to download software can turn any laptop into a “man-in-the-middle” ready to attack anybody on the same network. A quick YouTube search for ‘steal login cookies’ will get you up to speed in fewer than 10 minutes. Login cookies are what remember you are logged into online banking or social networks, stealing them is a free pass to a user’s account.