Breaking
February 5, 2025

Getting to grips with Adversary-in-the-Middle threats | usagoldmines.com

In cybersecurity, defenders are often a victim of their own success. When enough organizations adopt a successful solution, threat actors adapt. For a long time, multi-factor authentication (MFA) was seen as one of the best defenses against password-based attacks. And this is still true today. However, a sharp increase in adversary-in-the-middle (AiTM) attacks means that MFA alone may no longer be enough.

Our annual State of the Threat Report highlighted a notable rise in AiTM attacks. You could see this as a positive step, resulting from wider use of MFA. But another driver for this growth is the ease and availability of access to the necessary software.

AiTM explained

AiTM attacks are a sophisticated method of intercepting and potentially altering communication between two parties, carried out without their knowledge. Increasingly we’re seeing these attacks take the form of AiTM phishing attacks. This uses email or a messaging service to create the conditions for an attacker to intercept and manipulate communications between a user and a legitimate service in order to steal credentials and authenticated access tokens.

We’re used to seeing traditional phishing attacks which trick people into visiting fraudulent websites, where entered credentials are then stolen. But AiTM attacks level up on these phishing attacks, taking them a step further. Adversaries use sophisticated but easy-to-use frameworks to set up a server to sit between the person targeted and a real service. Luring victims to authenticate through this server, threat actors can steal the resulting access token. The attacks use reverse proxy servers to intercept the communication, break SSL/TLS encryption, and spy on the data exchange.

In practice, it looks like this – an individual will receive a phishing email that looks legitimate. And in fact, the link provided will take them to the actual website they are expecting, not a fraudulent site as you might expect. However, victims are taken to this website via a malicious reverse proxy server. When the authentication process takes place, the legitimate website provides the user with an authenticated token, or authenticated session cookie, to enable ongoing persistent access. And this is where AiTM attacks really differ from traditional phishing. In the case of AiTM, the malicious proxy server sees both the token and user credentials. Taking this token enables the threat actor to have continued access, bypassing any MFA and without having to reauthenticate.

Access enables attack

There are a number of sophisticated solutions available for free on the Internet and phishing kits can be hired on underground marketplaces and Telegram. Popular kits include Evilginx3, EvilProxy and Tycoon 2FA. These kits not only facilitate attacks, but also automate some parts, making it much easier and cost effective for threat actors to execute attacks.

Credentials form a crucial part of our online identities – both for high-value personal services, like banking, and also our work. Often these are protected by MFA, so even if a threat actor has the credentials, they can’t get any further. However, AiTM enables the theft of authenticated session cookies. These can be used directly in additional fraud and extortion including business email compromise, data theft extortion and ransomware.

Preventing AiTM threats

Before anyone panics, this isn’t a reason to get rid of MFA. Several of the major cyberattacks in 2024 could have been prevented if MFA was in place and it remains a crucial part of necessary defenses against cyberattacks.

However, it’s important to have tools in place that are robust enough for changing threats. Phishing-resistant MFA is built on standards like FIDO2 and goes deeper than traditional MFA. This technology ensures tokens are only associated with the person and computer who completed the authentication process, effectively making the AiTM attack fruitless.

For individuals, it can be harder to spot these attacks due to the legitimate original service being passed through to the user. The attack infrastructure is essentially transparent. But there are strategies that can help employees remain secure. Encourage them to think about the initial interaction: Did they receive an email that prompted an urgent action? If they are being asked to follow links and authenticate, they should question whether the context is normal. If there’s any doubt, they should feel empowered to raise it with the internal team. Above all, encourage employees to always be cautious and curious.

We’ve featured the best authenticator app.

This article was produced as part of TechRadarPro’s Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

​ 

This articles is written by : Nermeen Nabil Khear Abdelmalak

All rights reserved to : USAGOLDMIES . www.usagoldmines.com

You can Enjoy surfing our website categories and read more content in many fields you may like .

Why USAGoldMines ?

USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.

Recent:

Windows 11’s app store has a solution for gigantic PC game downloads | usagoldmines.com

Researchers Just Found Photo-Scanning Malware on Apple's App Store for the First Time Jake Peterson ...

My Five Favorite Cleaning Methods to Try When You’d Rather Not Clean at All Lindsey Ellefson | usago...

Amazon Plans to Unveil Next-Generation Alexa AI Later This Month Juli Clover | usagoldmines.com

Chat, are you ready to go to space with NASA? Eric Berger | usagoldmines.com

Windows’ new modular game downloads could save your storage drive | usagoldmines.com

Best PC computer deals: Top picks from desktops to all-in-ones | usagoldmines.com

You Can Get a Pixel 8 Pro for $400 Off or a Pixel 8 for $300 Off Kellen | usagoldmines.com

Use the '20/10' Method When You Don't Have the Energy to Clean Lindsey Ellefson | usagoldmines.com

Your Temu and Shein Purchases Are About to Get More Expensive Michelle Ehrhardt | usagoldmines.com

Malware With Screen Reading Code Found in iOS Apps for the First Time Juli Clover | usagoldmines.com

Absurdly powerful PC with 7 liquid-cooled Nvidia RTX 5090 GPUs has just gone on sale — and it is in ...

AMD patches high severity security flaw affecting Zen chips | usagoldmines.com

No, iOS 18.3 doesn't install Starlink on your iPhone – here's what the latest update does, and why y...

Quantum teleportation used to distribute a calculation John Timmer | usagoldmines.com

Hugging Face clones OpenAI’s Deep Research in 24 hours Benj Edwards | usagoldmines.com

7-Zip 0-day was exploited in Russia’s ongoing invasion of Ukraine Dan Goodin | usagoldmines.com

Not Gouda-nough: Google removes AI-generated cheese error from Super Bowl ad Kyle Orland | usagoldmi...

AMD promises “mainstream” 4K gaming with next-gen GPUs as current-gen GPU sales tank Andrew Cunningh...

Best laptops 2025: Premium, budget, gaming, 2-in-1s, and more | usagoldmines.com

Best 4K monitors 2024: HDR, 144Hz, budget, and best overall | usagoldmines.com

Best video doorbells 2025: Reviews and buying advice | usagoldmines.com

This 34-inch Asus ultrawide OLED gaming monitor is just $750 | usagoldmines.com

Best free VPN of 2025: It’s important to choose wisely | usagoldmines.com

Windows will soon be jamming to MIDI 2.0’s music services | usagoldmines.com

The Cheapest Ways to Get Your Protein Right Now Beth Skwarecki | usagoldmines.com

How to Update Your Bathroom to Reduce the Risk of Mold Jeff Somers | usagoldmines.com

Google Launches New Versions of Gemini, Including 'Thinking' Model Juli Clover | usagoldmines.com

HDMI 2.2 vs. DisplayPort 2.1b: The future of display connectors, explained | usagoldmines.com

Which PC components should you upgrade first? | usagoldmines.com

Snag this 1TB Samsung microSD card for $70, its lowest-ever price | usagoldmines.com

Avast One review: Well-priced PC security with excellent protection | usagoldmines.com

This RTX-powered Acer Nitro gaming laptop is $300 off right now | usagoldmines.com

GrubHub got hacked. Go change your password! | usagoldmines.com

AMD says RX 9070 and 9070 XT will arrive ‘in early March’ | usagoldmines.com

Get peace of mind at home with a Ring Battery Doorbell, now 40% off | usagoldmines.com

Stop saving your email login info in your password manager | usagoldmines.com

Patch your Netgear router right now! | usagoldmines.com

eBay’s newest Nvidia GPU scams are even dumber than before | usagoldmines.com

My favorite mechanical gaming keyboard is just $80 right now | usagoldmines.com

Sonos is in trouble. A pricey streaming box won’t help | usagoldmines.com

Tapo D225 Video Doorbell review: High value, low fashion | usagoldmines.com

I Love This App That Lets You Rent Out Your Clothes Lindsey Ellefson | usagoldmines.com

China is quietly pushing ahead with massive 50,000Mbps broadband rollout to leapfrog rest of the wor...

This devious new macOS malware disguises itself as Chrome, Zoom installers | usagoldmines.com

What the weak yen might mean for Switch 2 pricing Kyle Orland | usagoldmines.com

Polestar CEO says the brand’s tech makes the US a “great market for us” Jonathan M. Gitlin | usagold...

Robocallers posing as FCC staff blocked after robocalling real FCC staff Jon Brodkin | usagoldmines....

Which PC components should you upgrade first? | usagoldmines.com

OpenAI Just Introduced More Ways to Use ChatGPT on WhatsApp Jake Peterson | usagoldmines.com

25 of My Favorite Dessert Recipes That Don’t Use (Increasingly Expensive) Eggs Allie Chanthorn Reinm...

An Apple TV Refresh is Coming in 2025 - Here's What You Should Know Juli Clover | usagoldmines.com

The leaked Sonos streaming box could be a huge hit for custom home theaters, if it adds 2 key missin...

Chinese hackers develop effective new hacking technique to go after business networks | usagoldmine...

Chaos and confusion as USPS halts, then resumes parcels from China Ashley Belanger | usagoldmines.co...

Let’s Encrypt is ending expiration notice emails—for some very good reasons Kevin Purdy | usagoldmin...

Stop saving your email login info in your password manager | usagoldmines.com

February Google Play Updates: Here’s What’s New This Month in Android Kellen | usagoldmines.com

Google Updates Gemini 2.0 Models, Released for All Users Tim | usagoldmines.com

Experts warn DeepSeek is 11 times more dangerous than other AI chatbots chiara.castro@futurenet.com ...

Windows 11’s Start menu search gets new, clearer labels, as Microsoft tries to avoid EU regulation t...

Nikon's first 35mm f/1.2 looks like my dream prime lens – apart from the price tag | usagoldmines.c...

Amazon just sent invites for a February 26 event, and we might finally see the debut of the next-gen...

Less than half of ransomware incidents end in payment - but you should still be on your guard | usa...

Samsung Galaxy Z Flip 7: latest news, rumors, and everything we’ve heard so far | usagoldmines.com

OpenAI is getting a makeover - new visual rebrand for ChatGPT maker even includes its own custom fon...

Sony was making a space shooter for its unreleased Nintendo PlayStation console, according to Shuhei...

Don't worry about the Nintendo Switch 2 price, Nintendo says it will follow the 'affordable prices c...

Which PC components should you upgrade first? | usagoldmines.com

You Should Enable the Shortcut Feature in the Android Google Widget Khamosh Pathak | usagoldmines.co...

You Can Now Unsend Outlook Emails on Mac Pranay Parab | usagoldmines.com

Apple's Do-It-Yourself Repair Store Now Offering Parts for M4 Macs Joe Rossignol | usagoldmines.com

Bring it on Nvidia - AMD confirms new Radeon RX 9000 series GPUs will launch in early March, rivalin...

A cracked malicious version of a Go package lay undetected online for years | usagoldmines.com

Jurassic World Rebirth roars into theaters this July Jennifer Ouellette | usagoldmines.com

These Beats Studio Buds Are at Their Lowest Price Ever Right Now Pradershika Sharma | usagoldmines.c...

Google’s Latest Android Update Patches 47 Security Flaws David Nield | usagoldmines.com

Apple's M4 iMac (8-Core/256GB) Drops to $1,149.99 on Amazon, More Models at Up to $175 Off Mitchel B...

Australian and Indian governments block DeepSeek from worker devices | usagoldmines.com

A Buffy the Vampire Slayer reboot could be headed to Hulu, and I’m both excited and nervous for the ...

Monster Hunter Wilds' PS5 Pro enhancements have been detailed and will offer three different graphic...

First trailer for Jurassic World Rebirth teases strong ties to 1993's Jurassic Park, and I can't hel...

The Switch 2 Nintendo Direct now has official times for its April 2 broadcast | usagoldmines.com

LinkedIn is releasing even more video tools as it looks to take on TikTok, Instagram | usagoldmines...

Netgear urges users to patch major router security issues now | usagoldmines.com

Sovereign Cloud: redefining the future of secure digital innovation | usagoldmines.com

Tackling the threat of deepfakes in the workplace | usagoldmines.com

$58 billion Honda-Nissan merger is in deep trouble Harry Dempsey, David Keohane, and Kana Inagaki, F...

After a wrenching decision by NASA, private lunar lander finds a new customer Eric Berger | usagoldm...

Teslas turn toxic as sales crash in Europe and the UK Jonathan M. Gitlin | usagoldmines.com

Best USB-C cables 2025: Get quality charging and data transfers | usagoldmines.com

Best antivirus software 2025: Keep your PC safe from malware, spyware, and more | usagoldmines.com

Today’s best laptop deals: Save big on work, school, home use, and gaming | usagoldmines.com

Why You Should Try Potassium Salt (and How It Tastes) Beth Skwarecki | usagoldmines.com

Where to Find All Those Deleted Government Websites Emily Long | usagoldmines.com

macOS Sequoia 15.3 Fixes SuperDuper Bootable Backups Bug Tim Hardwick | usagoldmines.com

Ferrari reveals 2025 launch date for its first fully electric car –here's everything we know | usag...

Oppo is launching the world's thinnest foldable in two weeks – and the OnePlus Open 2 should follow ...

Panasonic may leave the TV business, and that would be a crying shame | usagoldmines.com

Google Gemini update makes asking the AI for assistance feel more like phoning a friend hamish.hecto...

Leave a Reply