What Are Man in the Middle (MITM) Attacks?

What MITM attacks are, and why they're dangerous.

What is a Man In The Middle (MITM) Attack?

Introduction

Man-in-the-middle” usually refers to a type of cyber attack. It's a broad term that describes any device between your computer and the destination.

When an attacker positions themselves between your data and its destination, you can imagine the risk: personal information, passwords/credentials, financial information, browsing history, and more. A man in the middle could steal all of this sensitive information.

Imagine you called your friend Jane. You tell Jane all about your day and recent doctor's appointment and nothing seems amiss. Unfortunately, your seemingly "secure" call has been monitored this entire time. Jim, your worst neighbor, tapped the wired connection and now knows everything about your day and some sensitive medical information. A man-in-the-middle attack literally occurs when someone places themselves in the middle of two connected devices.

How an MITM attack happens

MITM attacks tend to happen when you use an unsecured network or run outdated software. It begins with inspection: when an attacker monitors outgoing traffic to determine their next course of action. They might check for insecure traffics, steal cookies, or inject packets into the data stream.

Eventually, the attacker finds a way to slot themselves in the middle. They might use a stolen SSL certificate or exploit vulnerabilities in older SSL versions. Their goal is to enter the connection as an invisible entity between you and a destination server.

What Are Man In The Middle (MITM) Attacks

Once MITM establishes themselves, they have complete control over the data they intercept. They can modify data on-the-fly to fool a destination server into transferring money to them and steal personal information like SSN numbers, your date-of-birth, and more.

Preventing MITM attacks

When executed well, MITM attacks can cause financial loss and damage to a victim’s identity. Whether the MITM attack is targeted or not, such attacks often require the exploitation of a vulnerability in old software or physical presence to intercept traffic.

MITM attacks can be mitigated using a secure tunnel and up-to-date software, but no solution is foolproof. Here are some practices that can be taken to reduce your chances of being caught by an attacker:

  • Refraining from using public networks
  • Keeping your OS up-to-date
  • Source verification and strong encryption

Did you find this article helpful?

0 out of 0 Bunnies found this article helpful

Glossary

MITM Attacks

MITM Attacks refer to "man-in-the-middle" attacks.

Prove your Knowledge.
Earn a bunny diploma.

Test your knowledge in our Junior and Master Quizes to see where you stand. Prove your mastery by getting A+ and recieving a diploma.

Start the QuizBunny with a diploma.