Fact-checked by Grok 2 weeks ago

Man-in-the-middle attack

A man-in-the-middle (MITM) attack is a cyber attack in which an adversary positions themselves between two communicating parties to intercept and potentially alter data traveling between them, without the endpoints' awareness that their direct connection has been compromised. These attacks exploit weaknesses in , , or network routing protocols, enabling the attacker to eavesdrop on sensitive information such as credentials, financial details, or . By relaying modified or unmodified messages, the perpetrator can impersonate legitimate parties, facilitating further exploitation like or injection of malicious content. Common vectors include unsecured wireless networks, where attackers deploy rogue access points, or wired environments vulnerable to (ARP) that redirects traffic through the attacker's system. Mitigation strategies emphasize using protocols like (TLS) with certificate pinning and validation to detect and prevent unauthorized interception. Despite advancements in standards, MITM remains a persistent threat due to implementation flaws, user errors in trusting invalid certificates, and the proliferation of internet-connected devices with inadequate safeguards.

Core Concepts

Definition and Principles

A man-in-the-middle (MITM) attack occurs when an adversary inserts themselves between two parties engaged in communication, intercepting and potentially altering the data exchanged while relaying it to maintain the illusion of direct interaction. This positions the attacker to eavesdrop on sensitive information, such as credentials or financial details, without the legitimate endpoints detecting the . The core principle underlying MITM attacks is the exploitation of unverified trust in network paths or protocols, where parties assume secure, direct channels without authenticating the intermediary's absence. Fundamentally, MITM attacks operate through active rather than passive listening, requiring the attacker to impersonate or responses convincingly to both sides to sustain the session. This violates key cybersecurity tenets: , by exposing data; integrity, through possible tampering; and , by undermining . Success hinges on the attacker's ability to remain undetected, often by mimicking legitimate patterns and avoiding disruptions that could alert the victims. In essence, the attack demonstrates the causal vulnerability in systems lacking or , where any untrusted point enables compromise.

Historical Origins

The principles underlying man-in-the-middle (MITM) attacks trace back to pre-digital espionage tactics involving the interception and surreptitious relay of communications. One of the earliest documented instances occurred during the in 1586, when English Gilbert Gifford, acting on behalf of I, intercepted letters between and . Gifford forwarded the originals to authorities for decryption while relaying forged responses to maintain the illusion of secure correspondence, enabling the exposure and execution of the Catholic conspirators. A precursor to interception emerged in 1834 within France's optical telegraph network, where two brothers exploited insider access by bribing station operators to decode, alter, and retransmit confidential government messages for personal gain. This incident, involving the relay of falsified updates, demonstrated the vulnerability of chained communication systems to positional tampering and is regarded as an early analog form of systematic message manipulation. The advent of wireless technology introduced the first recorded electronic MITM in December 1903, when stage and inventor intercepted Guglielmo Marconi's public demonstration of transatlantic . Using a positioned between the transmitter in , , and the in Poldhu, , Maskelyne relayed interfering messages spelling vulgarities to underscore the insecurity of unencrypted radio signals, which Marconi had claimed were private. Digital MITM attacks materialized with the expansion of computer networks in the , as attackers leveraged tools to eavesdrop on and manipulate unencrypted protocols such as and early TCP/IP implementations over successors. These exploits capitalized on the lack of end-to-end , allowing intermediaries to impersonate endpoints and harvest credentials or data in transit. The formal terminology "man-in-the-middle" entered cryptographic discourse around this period to describe active in protocols, highlighting causal risks in unauthenticated channels where adversaries could forge session integrity.

Attack Mechanisms

Fundamental Techniques

Man-in-the-middle (MITM) attacks fundamentally involve techniques that position an attacker to intercept, relay, and potentially alter communications between two unsuspecting parties, such as a client and server. These methods exploit weaknesses in network protocols or trust mechanisms to reroute traffic through the attacker's system without detection. Core interception relies on manipulating address resolution or to achieve the intermediary role, enabling passive or active tampering. A primary technique in local area networks (LANs) is , also known as ARP cache poisoning. The (ARP) maps IP addresses to MAC addresses, but it lacks authentication, allowing an attacker to send unsolicited ARP replies claiming their MAC address corresponds to a legitimate IP, such as the default gateway's. Victims update their ARP caches with this false information, directing outbound traffic to the attacker, who forwards it onward while inspecting or modifying packets. This method was demonstrated in tools like Ettercap as early as 2001 and remains effective on unsecured Ethernet networks. DNS spoofing provides another foundational approach by targeting the resolution process. An attacker intercepts DNS queries—often via prior network positioning like —and responds with forged responses containing IP addresses of controlled servers instead of legitimate ones. This redirects users to sites or hosts, compromising data in transit. DNS spoofing exploits the lack of source validation in UDP-based queries, with historical vulnerabilities like the 2008 Kaminsky bug highlighting cache poisoning risks that persist in misconfigured resolvers. SSL stripping addresses encrypted traffic by downgrading connections to HTTP. The attacker acts as a , intercepting the initial request and stripping security headers or redirecting to non-secure endpoints, then relaying for analysis. Developed by in 2009, this technique undermines TLS protections on networks where enforcement is absent. These techniques often combine; for instance, enables DNS interception, amplifying reach. While effective on unsegmented or legacy networks, their success depends on the attacker's ability to maintain forwarding without introducing latency that alerts victims.

Network-Level Methods

Network-level methods in man-in-the-middle attacks exploit protocols governing address resolution, name resolution, and to insert the attacker into the communication path, often at Layer 2 or Layer 3 of the . These techniques typically target local area networks (LANs) or wide-area infrastructure, allowing interception of unencrypted traffic without endpoint compromise. Unlike application-level methods, they leverage protocol weaknesses such as lack of or , enabling passive or active tampering. , or ARP cache poisoning, involves an attacker broadcasting forged (ARP) reply packets within a to associate their media access control ( with the of a legitimate host, such as a . Victim devices update their ARP tables with this false mapping, directing outbound traffic to the attacker, who can then forward it to the intended destination after inspection or alteration. ARP's gratuitous reply mechanism and absence of authentication—defined in RFC 826 from 1982—facilitate this, as switches and hosts accept unsolicited updates without validation. Tools like Ettercap or Cain & Abel automate the process, often combined with traffic relaying to avoid detection. DNS Spoofing, including cache poisoning, occurs when an attacker intercepts or forges (DNS) responses to map legitimate domain names to malicious IP addresses under their control. In a local MitM scenario, the attacker positions themselves to respond to DNS queries faster than legitimate servers, exploiting UDP's connectionless nature and DNS's historical lack of source validation. For instance, Kaminsky's 2008 vulnerability demonstration showed how predictable transaction IDs enabled off-path poisoning of recursive resolvers, though mitigations like randomized IDs (RFC 5452, 2009) reduced but did not eliminate risks. This redirects users to fraudulent sites for credential theft or further interception. BGP Hijacking targets inter-domain routing via the (BGP), where an autonomous system announces invalid route prefixes to attract traffic from global networks. Attackers can perform man-in-the-middle interception by advertising more specific or shorter paths, rerouting packets through their infrastructure for decryption if possible or . BGP's trust-based model, lacking cryptographic verification until recent extensions like RPKI (), enables this; a notable example was the December 2013 incident where Belarusian ISP Beltelecom hijacked routes for European traffic, including to U.S. exchanges, sustaining the diversion for hours. Such attacks scale to national levels, as in Pakistan's 2008 blockade that inadvertently rerouted U.S. traffic. Other network-level variants include DHCP spoofing, where attackers impersonate servers to assign malicious gateways, but these remain less prevalent than ARP or DNS due to deployment of protections like . Detection relies on monitoring anomalies like duplicate IPs or unexpected route changes, underscoring the need for protocol hardening.

Protocol and Application-Level Methods

Protocol-level man-in-the-middle (MITM) attacks exploit vulnerabilities in the negotiation and handshake mechanisms of communication protocols, often by forcing participants to adopt weaker security parameters. In (TLS) handshakes, attackers can intercept and selectively discard packets containing proposals for strong cipher suites or protocol versions, compelling a fallback to deprecated options like SSL 3.0 or weak modes. This downgrade enables subsequent exploitation, as seen in the vulnerability (CVE-2014-3566), disclosed on October 14, 2014, where attackers manipulate padding oracles in SSL 3.0's CBC mode to decrypt data after forcing the protocol version. Such attacks require the attacker to control the network path but succeed against implementations that lack strict version enforcement or fallback protections. Application-level MITM methods operate at layer 7, targeting protocols like or SMTP by proxying and altering application data streams after initial interception. A prominent example is SSL stripping, where an attacker positions themselves between a client and , converting outgoing requests to HTTP toward the server while presenting a seemingly secure connection to the client, thereby capturing credentials or session tokens. Developed by researcher and demonstrated via the sslstrip tool in 2009, this attack thrives on mixed HTTP/ site configurations and the absence of defenses like (HSTS), which mandates . In email protocols, similar stripping of STARTTLS upgrades allows interception of unencrypted SMTP traffic, though enabling mitigates passive by requiring explicit downgrade signals. These methods often chain with lower-layer interceptions but derive potency from protocol-specific flaws, such as incomplete in tunneled protocols where inner and outer mechanisms mismatch, enabling post-establishment. NIST research highlights how attackers exploit such discrepancies in protocols like EAP-TTLS, relaying authentication while bypassing mutual . Countering them demands protocol hardening, such as disabling legacy fallbacks and enforcing certificate pinning, though dependencies persist as risks.

Notable Instances

Pre-Digital Era Cases

In 1586, English intelligence agents under Queen Elizabeth I executed an interception of correspondence between , and her co-conspirator as part of the to overthrow Elizabeth. Agents, including Gilbert Gifford, posed as trusted couriers to relay letters hidden in beer barrels, secretly copying, reading, and in some cases forging or altering content to elicit incriminating responses from Mary, thereby gathering evidence of without the parties detecting the intervention. A more structured pre-digital interception occurred in 1834 within France's optical telegraph network, a chain of semaphore towers transmitting government dispatches via mechanical arm signals. Stockbrokers and Blanc bribed an operator at the Tours station to decode and relay to them the contents of confidential messages about fluctuating Belgian government bond prices before official dissemination in Paris, enabling profitable trades while allowing unaltered onward transmission to endpoints. The brothers disguised their queries as routine official signals, profiting approximately 4,000 francs before the scheme's detection, though they faced no conviction due to legal ambiguities in charging . These cases illustrate core man-in-the-middle principles—undetected relay, eavesdropping, and selective alteration—in non-electronic systems reliant on trusted intermediaries, predating digital networks by centuries and highlighting vulnerabilities in chain-based human or mechanical communication protocols.

Modern Cyber Incidents

In 2015, Lenovo shipped consumer laptops pre-installed with Superfish adware, which acted as a man-in-the-middle proxy by intercepting HTTPS traffic and using a self-signed root certificate to decrypt and inspect encrypted connections without user notification or browser warnings. This vulnerability exposed affected devices to arbitrary certificate spoofing attacks, allowing attackers to impersonate secure sites and steal credentials or session data; estimates indicated thousands of units were impacted before Lenovo ceased inclusion in January 2015 and issued removal tools. The U.S. Federal Trade Commission later fined Lenovo $3.5 million in 2016 for failing to disclose the risks, highlighting how manufacturer-installed software can systematically undermine TLS protections. Border Gateway Protocol (BGP) hijacking has enabled large-scale man-in-the-middle attacks by falsifying route announcements to redirect through attacker-controlled networks. On April 24, 2018, threat actors announced fraudulent BGP prefixes mimicking Amazon's Route 53 DNS service, intercepting traffic to MyEtherWallet's domain and diverting users to a site that captured wallet credentials and private keys. This rerouting persisted for about two hours, resulting in the theft of approximately $150,000 in cryptocurrency across multiple victims, demonstrating BGP's vulnerability to prefix for eavesdropping and data exfiltration without endpoint detection. Similar BGP-based interceptions have targeted infrastructure repeatedly, underscoring the protocol's lack of inherent . In June 2022, attackers hijacked routes to the KLAYswap decentralized exchange on the Klaytn , redirecting traffic to a malicious interface that drained user funds, with losses exceeding $2 million over several hours. These incidents exploit BGP's trust model, where autonomous systems propagate unverified updates, enabling attackers with access to upstream providers—often in regions with lax oversight—to perform undetected traffic interception at scale.

Countermeasures and Detection

Preventive Encryption and Authentication

Encryption protocols, such as those employed in (TLS), mitigate man-in-the-middle (MITM) attacks by establishing symmetric session keys through authenticated asymmetric key exchanges, thereby ensuring confidentiality of data in transit and preventing unauthorized interception or modification. TLS version 1.3, standardized in 2018, enforces via ephemeral key exchanges like Diffie-Hellman, which derives unique session keys per connection, rendering compromised long-term keys ineffective for decrypting past sessions. Without such encryption, attackers positioned between endpoints can passively eavesdrop or actively alter communications, as demonstrated in unencrypted protocols like HTTP. Authentication mechanisms complement by verifying the legitimacy of communicating parties, thwarting impersonation central to MITM exploits. (PKI) facilitates this through digital certificates issued by trusted (CAs), which bind public keys to verified identities via cryptographic signatures, enabling endpoints to confirm they are interacting with the intended recipient rather than an interloper. In TLS handshakes, the server presents its certificate, which the client validates against a rooted in pre-installed CA certificates; revocation checks via (OCSP) or Certificate Revocation Lists (CRLs) further ensure certificates have not been compromised. Failure to validate certificates properly, as in accepting self-signed or untrusted ones, reintroduces MITM , underscoring the necessity of strict chain-of-trust enforcement. Mutual authentication extends unilateral server verification by requiring clients to present certificates, commonly used in enterprise environments or VPNs with IPsec's (IKE) protocol, which authenticates peers using pre-shared keys, certificates, or public keys to secure tunnel establishment. Protocols like (SSH) employ host key verification, where clients check server fingerprints against known values to detect key substitution attacks during initial connections. Best practices include disabling legacy algorithms vulnerable to downgrade attacks—such as those in TLS 1.0 or 1.1, deprecated by NIST in 2020—and implementing certificate pinning to restrict trust to specific public keys, reducing reliance on potentially compromised CAs. These layered measures, grounded in cryptographic primitives like or elliptic curve signatures, empirically reduce MITM success rates when fully implemented, as evidenced by the rarity of successful attacks on properly configured TLS deployments.

Network and Endpoint Protections

Network protections against man-in-the-middle (MITM) attacks emphasize segmentation, monitoring, and boundary controls to limit interception opportunities and detect anomalous behavior. Network divides infrastructure into isolated zones using firewalls and controls, confining potential attacker and preventing lateral movement across the network, as recommended in NIST 800-82 for securing control systems against unauthorized interceptions. Intrusion detection systems (IDS) and intrusion prevention systems () complement this by scanning for indicators of MITM, such as irregular cache poisoning or spoofed packets, enabling real-time alerts and automated blocking. Virtual private networks (VPNs) further secure transit over untrusted links by tunneling and encrypting traffic, mitigating risks in environments like public where is common. Endpoint protections focus on device-level defenses that verify connections and thwart local exploitation facilitating MITM. Endpoint detection and response (EDR) tools provide behavioral analytics to identify MITM tactics, including unauthorized insertions or injecting false certificates, with capabilities for rapid and forensic . Endpoint protection platforms (EPP) enforce policies like disabling weak protocols (e.g., SSLv3) and validating server identities through public key pinning, reducing vulnerability to downgrade attacks or rogue access points. Additionally, regular patching of endpoint operating systems and applications addresses known exploits that enable MITM, such as those targeting outdated TLS implementations, aligning with NIST guidelines for authenticated channels.

Forensic and Response Strategies

Forensic investigations into man-in-the-middle (MITM) attacks emphasize network traffic capture and analysis to identify interception artifacts. Packet sniffers like or enable examiners to inspect Ethernet frames for poisoning indicators, such as gratuitous replies associating a single with multiple MAC addresses, which signal spoofing attempts to redirect traffic. TLS handshake anomalies, including unexpected downgrades to HTTP or mismatched certificate chains, are scrutinized through to confirm decryption and relay activities. (IDS) logs and records are correlated for patterns like abnormal session durations or data volume spikes, with chain-of-custody protocols ensuring evidence integrity for potential . Volatile memory forensics on endpoints captures active network connections and processes potentially facilitating MITM, such as rogue proxy software or modified routing tables. Endpoint detection tools analyze for malware variants enabling techniques like DNS spoofing, evidenced by unauthorized resolver queries. These methods, integrated into broader incident handling, prioritize timestamped logging and hash verification to reconstruct attack timelines without altering originals. Response strategies adhere to phased frameworks outlined in NIST SP 800-61 Revision 2, beginning with identification via alerts from (SIEM) systems flagging interception precursors like rogue access points. Containment prioritizes isolating affected segments through reconfiguration or rules to halt data relay, while preserving traffic mirrors for ongoing forensics. Eradication targets attacker persistence by scanning for and removing spoofed caches, revoking compromised s via certificate authorities, and patching exploited protocols like outdated SSL implementations. Recovery involves validating restored communications with tests and heightened monitoring for reinfection vectors, such as unpatched clients. Post-incident activities include to refine detection rules—e.g., implementing ARP inspection on switches—and lessons-learned sessions to address gaps, with retained per organizational retention policies. In coordinated responses, notifications to stakeholders like certificate providers or occur if is confirmed, emphasizing rapid playbook execution to minimize .

Prevalence and Statistical Impact

Man-in-the-middle (MITM) attacks remain a persistent threat in cybersecurity landscapes, often embedded within broader incident vectors such as unsecured networks and (MFA) bypass attempts. According to the 2025 Verizon Investigations Report (DBIR), adversary-in-the-middle (AITM) attacks—a sophisticated MITM variant exploiting session tokens—accounted for 9% of analyzed breaches, highlighting their role in credential theft and unauthorized access. This prevalence underscores MITM's facilitation of initial access, particularly in environments with weak or reliance on protocols. Statistical data indicates MITM attacks contribute to approximately 19% of successful cyberattacks, based on analyses of incident patterns observed in recent years. Compromised emails via MITM techniques have risen by 35% since 2021, driven by lures and proxy-based on public networks. Such attacks frequently enable downstream harms like , with global data breaches exceeding 35.9 billion records by May 2024, many involving methods akin to MITM. The economic impact of MITM incidents is substantial, though often aggregated within larger breach costs due to their enabling nature. Reports estimate average financial losses from MITM-related disruptions at around $1.2 million per incident for U.S. businesses, encompassing direct , remediation, and operational . In sectors like , where MITM targets high-value transactions, these attacks amplify expenses, contributing to industry-average data costs of $5.97 million as of 2020 figures, with upward trends persisting. Detection challenges exacerbate impacts, as MITM's stealthy interception evades traditional logging, leading to prolonged exposure and compounded damages.

Role in State-Sponsored Activities

State-sponsored entities leverage man-in-the-middle (MitM) attacks to intercept sensitive communications, deliver payloads, and conduct large-scale , often positioning themselves within national network infrastructures or through global chokepoints to evade detection. These operations enable by exploiting unencrypted or poorly authenticated traffic, allowing actors to exfiltrate from targets including foreign governments, corporations, and dissidents without direct confrontation. Such tactics align with broader doctrines emphasizing persistent access and information dominance, as evidenced by declassified leaks and cybersecurity analyses attributing specific campaigns to agencies. The U.S. (NSA), through its unit, deploys MitM techniques as part of the QUANTUM program to redirect targets' connections to controlled servers for implantation. Revealed in 2013 documents, QUANTUM operations involve intercepting requests to legitimate sites—such as those using or other browsers—and substituting malicious responses, effectively upgrading passive monitoring to active exploitation. This capability, operational since at least the early , targets high-value foreign entities, including in the and via collaboration with allies like the UK's , to gather intelligence on encrypted channels that would otherwise be inaccessible. China's government employs MitM attacks domestically through the Great Firewall infrastructure to monitor and censor traffic, as seen in the October 2014 interception of connections using forged Apple certificates, which affected millions of users nationwide and enabled potential keylogging or data theft. Similar tactics targeted searches in September 2014 and accesses via the CERNET academic network, where state-controlled routers stripped encryption or injected false certificates to spy on queries amid political unrest like protests. These actions, attributed to the Ministry of Industry and Information Technology, extend espionage beyond borders by compromising expatriate communications and foreign services, prioritizing regime stability over user privacy. Russian-linked actors, such as the Iron Liberty group, have adapted MitM variants like man-on-the-side attacks to passively siphon traffic, as detailed in a 2019 Secureworks report analyzing intrusions traced to -affiliated infrastructure. While less frequently documented than U.S. or Chinese efforts, these operations support objectives, including economic disruption and intelligence on financial flows, often leveraging compromised routers or BGP manipulations for positioning. Attribution relies on tracing and tooling overlaps, though deniability remains a core feature of such tactics. Overall, MitM's role in activities underscores its utility in asymmetric conflicts, where physical proximity to backbone networks—controlled by few entities—amplifies reach, though countermeasures like certificate pinning and have prompted evolution toward supply-chain compromises. Empirical data from incident reports indicate rising sophistication, with actors investing in custom tools to bypass TLS, reflecting a causal link between geopolitical tensions and technical innovation in interception methods.

Criticisms and Evolving Threats

One limitation of traditional man-in-the-middle (MitM) attacks is their dependence on gaining proximity to the target network or exploiting specific protocol weaknesses, such as or DNS manipulation, which can be resource-intensive and detectable through traffic anomalies or certificate pinning. Attackers often forgo MitM in favor of simpler methods like direct or deployment, as evidenced by security analyses indicating MitM's relative rarity due to lower incentives when alternatives yield faster results. This has led to criticisms that MitM is overhyped in popular discourse, with some experts arguing that basic endpoint protections render it obsolete in well-secured environments, though such views overlook persistent risks in unsecured or legacy systems. Evolving threats include adversary-in-the-middle (AiTM) variants, which extend classic MitM by using proxy tools to hijack authentication sessions and bypass (MFA), as seen in rising campaigns since 2023 that capture real-time credentials without alerting users. These attacks leverage cloud-based proxies for scalability, enabling persistent access in enterprise settings, with reports documenting a surge in AiTM incidents targeting remote workers via malicious login pages. In industrial control systems (ICS) and () ecosystems, MitM techniques have adapted to exploit unencrypted protocols at the device layer, such as intercepting or traffic, amplifying disruption potential in ; a analysis highlighted how attackers manipulate updates mid-transmission, evading traditional . advancements further exacerbate vulnerabilities by threatening public-key encryption schemes like and , which underpin MitM defenses; algorithms such as Shor's could decrypt intercepted keys in time, necessitating a shift to (PQC) to maintain causal barriers against , though implementation lags expose "" risks where encrypted data is stored for future breaks. Critics of current countermeasures argue that reliance on TLS 1.3 and , while effective against passive interception, falters against active manipulation in zero-trust gaps or supply-chain compromises, as demonstrated in 2024 SSL stripping evolutions that downgrade connections undetected. Emerging AI-driven MitM frameworks automate evasion, such as dynamic chaining to mimic legitimate traffic patterns, underscoring the need for behavioral over static signatures.

References

  1. [1]
    man-in-the-middle attack (MitM) - Glossary | CSRC
    An attack in which an attacker is positioned between two communicating parties in order to intercept and/or alter data traveling between them.<|separator|>
  2. [2]
    MitM - Glossary | CSRC - NIST Computer Security Resource Center
    Definitions: An attack where the adversary positions himself in between the user and the system so that he can intercept and alter data traveling between them.
  3. [3]
    Securing End-to-End Communications | CISA
    Sep 29, 2016 · A MITM attack occurs when a third party inserts itself between the communications of a client and a server. MITM attacks as a general class are ...
  4. [4]
    Manipulator-in-the-middle attack - OWASP Foundation
    The Manipulator-in-the middle attack (MITM) intercepts a communication between two systems. For example, in an http transaction the target is the TCP connection ...
  5. [5]
    What Is a Man-in-the-Middle (MITM) Attack? | IBM
    A man-in-the-middle (MITM) attack is a cyberattack in which a hacker steals sensitive information by eavesdropping on communications between two online targets.
  6. [6]
    Man in the Middle (MITM) Attack - CrowdStrike
    Jan 17, 2025 · A man-in-the-middle attack is a type of cyberattack in which an attacker eavesdrops on a conversation between two targets.
  7. [7]
    Man-in-the-middle attack in SSH - How does it work?
    A man-in-the-middle attack (MITM) is an attack against a cryptographic protocol. As the name implies, in this attack the attacker sits in the middle.Missing: fundamentals | Show results with:fundamentals
  8. [8]
    [PDF] Chaum's Protocol for Detecting Man-in-the-Middle
    The Man-in-the-Middle (MITM) attack is a form of active eavesdropping by an ... The attack violates all three information assurance principles: confidentiality,.
  9. [9]
    What Is a Man-in-the Middle (MITM) Attack? Types & Examples
    A man-in-the-middle (MITM) attack occurs when criminals hijack web protocols to steal data. Discover how does a MITM attack works and how to protect ...Missing: NIST | Show results with:NIST
  10. [10]
    What is a Man-in-the-Middle Attack (MiTM)? - Lumifi Cyber
    Man-in-the-middle attacks are a type of cyberattack where threat actors secretly intercept communications between two parties.
  11. [11]
    Man-in-the-Middle Attacks (MITM) - Invicti
    Examples of famous MITM attacks. Man-in-the-middle attacks were known a long time before the advent of computers. One of the oldest cases was the Babington Plot ...<|separator|>
  12. [12]
  13. [13]
    Cybersecurity History: The 1st Man-in-the-Middle Attack
    Jul 30, 2020 · Wikipedia's list of security hacking incidents begins with a blurb about a 1903 hack involving Marconi (widely regarded as the inventor of radio).
  14. [14]
    Man-in-the-Middle Attack: Definition, Examples, Prevention
    Nov 9, 2023 · The Marconi Case ... The first recorded man-in-the-middle attack in history took place long before the Internet was even invented and it involves ...
  15. [15]
    Man-in-the-Middle Attacks: Origins, Evolution, and Future Threats
    Aug 27, 2024 · The first documented digital MitM attacks emerged with the rise of computer networks in the 1980s. Attackers used simple tools to intercept and ...
  16. [16]
    (PDF) Man-in-the-middle-attack: Understanding in simple words
    Jan 27, 2019 · A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the ...
  17. [17]
    What is a Man-in-the-Middle (MITM) Attack? - Rapid7
    A man-in-the-middle (MITM) attack occurs when a threat actor secretly intercepts or alters communication between two parties, often without their knowledge— ...
  18. [18]
    What is ARP Spoofing | ARP Cache Poisoning Attack Explained
    Learn about weaknesses of the ARP protocol and how attackers can use it to perform an ARP spoofing man in the middle attack.
  19. [19]
    MASTG-TECH-0123: Achieving a MITM Position via ARP Spoofing
    To execute an ARP Spoofing attack, you can use bettercap. Important: Modern operating systems implement defenses such as encrypted DNS (DoH, DoT), MAC address ...
  20. [20]
    Man in the Middle (MitM) Attacks & Security Best Practices - Vaadata
    Nov 7, 2024 · A Man in the Middle (MitM) attack occurs when an attacker infiltrates a communication between two parties without them being aware of it.What is a Man in the Middle... · What are the Main Types of... · DNS Spoofing
  21. [21]
    Man in the Middle (MITM) Attack - Veracode
    In this tutorial, we will explain the basic idea behind a man-in-the-middle (MITM) attack, providing examples and mitigation techniques.What Is A Man-In-The-Middle... · Examples Of Mitm Attacks · Scenario 1: Intercepting...Missing: fundamental | Show results with:fundamental
  22. [22]
    What is MITM (Man in the Middle) Attack | Imperva
    A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application.
  23. [23]
    Address Resolution Protocol (ARP) Spoofing: What It Is and How to ...
    May 18, 2022 · An ARP spoof attack can have several goals. Attackers can use ARP spoofing for spying, man-in-the-middle attacks or for additional cyberattacks, ...
  24. [24]
    ARP Spoofing Explained: How It Impacts Networks - Veracode
    Understand ARP spoofing and how it allows attackers to intercept data by linking their MAC address to a legitimate IP address.
  25. [25]
    What is DNS Spoofing | Cache Poisoning Attack Example | Imperva
    DNS spoofing, or DNS cache poisoning, is an attack involving manipulating DNS records to redirect users toward a fraudulent, malicious website.What is Domain Name System... · How Does DNS Spoofing Work?
  26. [26]
    What is BGP hijacking? - Cloudflare
    BGP hijacking is when attackers maliciously reroute Internet traffic. Attackers accomplish this by falsely announcing ownership of groups of IP addresses, ...
  27. [27]
    Someone's Been Siphoning Data Through a Huge Security ... - WIRED
    Dec 5, 2013 · The BGP attack, a version of the classic man-in-the-middle exploit, allows hijackers to fool other routers into re-directing data to a system ...
  28. [28]
    A Brief History of the Internet's Biggest BGP Incidents | Kentik Blog
    Jun 6, 2023 · The first documented case of a BGP-based man-in-the-middle attack like the one outlined in 2008 was discovered in 2013, originating in Belarus ...
  29. [29]
    SSL 3.0 Protocol Vulnerability and POODLE Attack - CISA
    Sep 30, 2016 · The most common way to achieve these conditions would be to act as Man-in-the-Middle (MITM), requiring a whole separate form of attack to ...
  30. [30]
    Downgrade Attacks: Types, Examples, and Prevention - SentinelOne
    Jul 18, 2025 · A downgrade attack is a type of attack that forces systems to downgrade to an older, less secure protocol or encryption standard.
  31. [31]
    [PDF] CISA Insights - Cyber: Enhance Email & Web Security
    While it does not force the use of encryption, enabling STARTTLS makes passive man-in-the-middle attacks more difficult. 2. SPF (Sender Policy Framework) ...Missing: methods | Show results with:methods
  32. [32]
    [PDF] An Inconvenient Truth About Tunneled Authentications
    Asokan et al. [3] identified a man-in-the-middle (MitM) attack on tunneled authentication protocols that exploit that tunnel protocol and inner methods are ...
  33. [33]
    NIST Special Publication 800-63B
    ... man-in-the-middle (MitM) attacks. Verifiers operated by government agencies at AAL1 SHALL be validated to meet the requirements of FIPS 140 Level 1. 4.1.3 ...
  34. [34]
  35. [35]
    1834: The First Cyberattack - Schneier on Security -
    May 31, 2018 · Tom Standage has a great story of the first cyberattack against a telegraph network. The Blanc brothers traded government bonds at the exchange in the city of ...
  36. [36]
    Lenovo Is Breaking HTTPS Security on its Recent Laptops
    Feb 19, 2015 · Lenovo has been shipping laptops with a horrifically dangerous piece of software called Superfish, which tampers with Windows' cryptographic security.
  37. [37]
    Lenovo Superfish Adware Vulnerable to HTTPS Spoofing - CISA
    Sep 30, 2016 · A machine with Superfish VisualDiscovery installed will be vulnerable to SSL spoofing attacks without a warning from the browser. Solution.
  38. [38]
    Lenovo taken to task over 'malicious' adware - BBC News
    Feb 19, 2015 · Hidden adware pre-installed on Lenovo laptops and PCs popped up adverts without permission and could have compromised user data.
  39. [39]
    A $152,000 Cryptocurrency Theft Just Exploited A Huge 'Blind Spot ...
    Apr 24, 2018 · BGP hijacking is the "blind spot" of the internet ... A $152,000 Cryptocurrency Theft Just Exploited A Huge 'Blind Spot' In Internet Security.
  40. [40]
    Suspicious event hijacks Amazon traffic for 2 hours, steals ...
    Apr 24, 2018 · The attackers managed to steal about $150,000 of currency from ... "Mounting an attack of this scale requires access to BGP routers are ...<|separator|>
  41. [41]
    What can be learned from recent BGP hijacks targeting ... - Kentik
    Sep 22, 2022 · The Attack Against Celer BridgePrior Infrastructure Attacks Against CryptoExplainer DepartmentWhat is BGP Hijacking?What Can be Done to ...The Attack Against Celer Bridge · What is BGP Hijacking?
  42. [42]
    RFC 8446 - The Transport Layer Security (TLS) Protocol Version 1.3
    This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet.
  43. [43]
    RFC 5246 - The Transport Layer Security (TLS) Protocol Version 1.2
    This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet.
  44. [44]
    [PDF] Detecting MITM Attacks Against SSL/TLS Without Third-Parties
    In short, we provide a robust and practical mechanism to enhance server authentication and protect web applications from MITM attacks against SSL/TLS. 1 ...
  45. [45]
    [PDF] Internet Security: Authentication and Encryption
    ... encrypt web traffic. • Purpose: • Authentication (prevent “man in the middle” attacks that could alter the messages being sent). • Privacy (prevent ...
  46. [46]
    SIP.edu Cookbook : Security Considerations - MIT
    The only effective defense against an MitM attack is strong encryption for both the signaling and media streams. Before accepting the cost of end-to-end ...
  47. [47]
    [PDF] SSL/TLS Vulnerabilities - HHS.gov
    Feb 25, 2021 · To mitigate these attacks when possible, using TLS. 1.3 is recommended, and using any version of TLS prior to 1.2 should be avoided. Established ...
  48. [48]
    [PDF] Network Infrastructure Security Guide - DoD
    Jun 15, 2022 · This report presents best practices for overall network security and protection of individual network devices. It will assist administrators in ...
  49. [49]
    Man-in-the-Middle Attacks (MITM): Risks, Detection & Protection
    Detecting an in progress MITM attack requires specialized tools such as Intrusion Detection Systems (IDS), Endpoint Detection and Response (EDR) solutions which ...
  50. [50]
    Certificate and Public Key Pinning | OWASP Foundation
    Certificate and Public Key Pinning is a guide to understanding the current state of PKI security and significant changes in the threat model for TLS ...
  51. [51]
    Packet analysis for network forensics: A comprehensive survey
    This paper is a comprehensive survey of the utilization of packet analysis, including deep packet inspection, in network forensics.
  52. [52]
    [PDF] Computer Security Incident Handling Guide
    Apr 3, 2025 · This publication assists organizations in establishing computer security incident response capabilities and handling incidents efficiently and ...
  53. [53]
    [PDF] Guide to Integrating Forensic Techniques into Incident Response
    This group responds to a variety of computer security incidents, such as unauthorized data access, inappropriate system usage, malicious code infections, and ...Missing: MITM | Show results with:MITM
  54. [54]
    FOR572: Advanced Network Forensics: Threat Hunting, Analysis ...
    In this capstone section, students work in groups to analyze network evidence from a real-world attack, identify the attacker's actions, and present findings.
  55. [55]
    [PDF] Cybersecurity Incident & Vulnerability Response Playbooks - CISA
    This playbook provides a standardized response process for cybersecurity incidents and describes the process and completion through the incident response phases ...
  56. [56]
    Verizon DBIR 2025: Credentials Are Still #1 Threat - Descope
    May 16, 2025 · 9% of attacks were from the man-in-middle (MITM) variant, adversary-in-the-middle (AITM). Fig: Credential theft Fig: MFA bypass techniques.
  57. [57]
    90+ 2025 Cybersecurity Statistics and Trends - JumpCloud
    Oct 31, 2024 · Man-in-the-Middle (MITM) · MITM attacks are responsible for 19% of successful cyberattacks this year. · MITM compromised emails have increased by ...<|separator|>
  58. [58]
    Cause of Rising Man-in-the-Middle Attacks in the US in 2024 - PureWL
    Jan 1, 2025 · According to a report by Securus Communications, as of May 2024, there were over 35.9 billion known data breaches globally, with sophisticated ...Missing: prevalence | Show results with:prevalence
  59. [59]
    [PDF] Assessing the impact of cybersecurity incidents on financial losses ...
    Jul 5, 2025 · As reported by (Seh, et al., 2020), the average cost of a data breach in the financial industry is approximately $5.97 million, which is second ...
  60. [60]
    Attacking Tor: how the NSA targets users' online anonymity
    Oct 4, 2013 · The NSA attacks we found individually target Tor users by exploiting vulnerabilities in their Firefox browsers, and not the Tor application directly.
  61. [61]
    NSA-GCHQ Snowden leaks: A glossary of the key terms - BBC
    Jan 28, 2014 · A "man-in-the-middle" technique used to redirect a target's computer to a fake website where it can be infected with malware. The NSA and ...
  62. [62]
    A Close Look at the NSA's Most Powerful Internet Attack Tool - WIRED
    Mar 13, 2014 · Today QUANTUM packs a suite of attack tools, including both DNS injection (upgrading the man-on-the-side to a man-in-the-middle, allowing bogus ...
  63. [63]
    How The NSA Deploys Malware: An In-Depth Look at the New ...
    Oct 8, 2013 · The NSA reportedly uses phishing attacks sometimes, but we've learned that this step usually proceeds via a so-called “man-in-the-middle” attack ...
  64. [64]
    Chinese government launches man-in-middle attack against iCloud ...
    Oct 20, 2014 · The attack, which uses a fake certificate and Domain Name Service address for the iCloud service, is affecting users nationwide in China. The ...
  65. [65]
    Great Firewall of China Is Intercepting Yahoo Searches in China
    Oct 6, 2014 · With a MITM attack, the government can manipulate communications between users and the search engine – communications which are normally secret- ...
  66. [66]
    China Launches Man in the Middle Attack Against Google
    Sep 5, 2014 · The Chinese authorities have launched a man-in-the-middle attack campaign against users of the country's research and education network CERNET who try to ...
  67. [67]
    Russian Threat Group May Have Devised a 'Man-on-the-Side' Attack
    Data from an intrusion last year suggests Iron Liberty group may have a new trick up its sleeve, Secureworks says.
  68. [68]
    From Turbine to Quantum: Implants in the Arsenal of the NSA | Infosec
    Mar 24, 2014 · The documents leaked by the whistleblower Edward Snowden demonstrate that the NSA has the technology to conduct MITM attacks impersonating ...
  69. [69]
    Man in the Middle Attacks: Analysis, Motivation and Prevention
    Sep 23, 2021 · Several schemes to mitigate, detect and prevent these attacks have been proposed, but each has its limitations. In this paper we analyze ...
  70. [70]
    Are "man in the middle" attacks extremely rare?
    Feb 22, 2012 · Therefore, I think the main reason that MitM attacks are less common is that usually there's no need/incentive to perform one.Missing: limitations criticisms
  71. [71]
    Man in the middle attacks: Meaning, Criticisms & Real-World Uses
    Oct 12, 2025 · Limitations and Criticisms. Despite the sophisticated nature of man-in-the-middle attacks, they are not without limitations for the attacker ...
  72. [72]
    What Are Adversary-in-the-Middle (AiTM) Attacks? - Obsidian Security
    Apr 28, 2025 · Man-in-the-Middle attacks like AiTM phishing are a major evolution in cyber threats, capable of bypassing traditional MFA and leading to rapid ...
  73. [73]
    Beyond MITM: The Rising Danger of Adversary-in-the-Middle Attacks
    Oct 2, 2025 · MITM attacks typically exploit unsecured or poorly secured networks, such as public Wi-Fi. They may also rely on DNS spoofing, ARP poisoning, or ...
  74. [74]
    Detect Advanced Man-in-the-Middle Attacks with RAPTOR AI - RPost
    Sep 11, 2025 · Discover how Man-in-the-Middle (MITM) attacks evolved from classic hacks to advanced email takeovers, and why RAPTOR™ AI is the only defense ...
  75. [75]
    ICS Man-in-the-Middle Attacks: Understanding the Cyber Threat
    Man-in-the-Middle attacks involve intercepting communications between two parties. In an ICS environment, this could include intercepting commands between ...4.1 Network Protocol... · 4.7 Summary Of Mitm Tactics · 6.1 How Mitm Attacks Disrupt...
  76. [76]
    IoT and Man‐in‐the‐Middle Attacks - Fereidouni - Wiley Online Library
    Mar 5, 2025 · The article analyzes MitM attacks at different layers of the IoT architecture and explores current prevention techniques and mitigation ...
  77. [77]
    8 Quantum Computing Cybersecurity Risks [+ Protection Tips]
    Quantum computing risks include broken encryption, data decryption, and identity compromise. Preparation involves migrating to PQC and more.
  78. [78]
    How Quantum Computing Threats Impact Cryptography and ...
    Quantum computing's rapid progress is creating real concerns for organizations that rely on current cryptographic systems to protect sensitive data.
  79. [79]
    Chronological Review of MITM Attacks: Challenges, Solutions and ...
    Aug 19, 2025 · This paper analyses and assesses the mechanisms of MITM attacks, highlighting vulnerabilities such as ARP spoofing and SSL stripping. It also ...
  80. [80]
    Man-in-the-Middle Attacks: Detecting & Preventing Cyber Threats
    May 19, 2025 · The Evolution of Man-in-the-Middle Attacks. While MITM attacks have been around for decades, their methods have evolved alongside advancements ...
  81. [81]
    ️‍♂️ Advanced Man-in-the-Middle (MITM) Frameworks - Medium
    Oct 10, 2025 · Advanced MITM frameworks are essential tools for network security testing and pentesting. Priorities: encrypt network traffic (HTTPS/TLS), ...Missing: techniques 2023-2025<|separator|>