Man-in-the-middle attacks
Overview
What are man in the middle attacks?
A man-in-the-middle attack is a cyberattack where the bad actor sits in between two parties, e.g., a user and an app, intercepting their communications and stealing sensitive data.
Additional Resources:
Coalition's Guide to Cyber Insurance Unseen threats: Creative malware that may be compromising your network
How Coalition’s incident response helps reduce risks during a cyber attack 3 reasons why cybersecurity demands Active Protection
Is Business Software the Cause of Your Cyber Attack?
3 methods of cyber deception: Bait the attacker to turn the tables on ransomware
Coalition 2023 Cyber Claims Report
What are man-in-the-middle attacks?
A man-in-the-middle attack is a cyberattack where a bad actor positions themselves between two parties — typically a user and an application — and steals their sensitive data. Learn more about how these attacks work and what your organization can do to detect, prevent, and protect against them.
Interested in learning more about how you can protect against man-in-the-middle attacks? Read this.
Why man-in-the-middle attacks matter
When a man-in-the-middle (MITM) attack occurs, hackers can intercept sensitive data: personally identifiable information (PII), payment details, credit card numbers, and account credentials. Once hackers have access to data, they can pivot to funds transfer fraud, identity theft, or even ransomware attacks.
Should your organization be the victim of a MITM attack, you can incur significant financial losses and have your most sensitive data and intellectual property stolen — all while damaging your reputation.
How do man in the middle attacks work?
MITM attacks have two distinct phases:
Interception, where the hacker intercepts online activities before they reach the app or user they’re intended for, and
Decryption, where the hacker decrypts the intercepted data without the unsuspecting user having any idea.
In most cases, MITM attacks are launched across insecure public WiFi networks or malicious WiFi hotspots set up by the hacker. Once a network is compromised, attackers can eavesdrop on the user without them being aware.
Imagine an employee joins a malicious WiFi network. After that happens, the hacker begins spying on their online activity. None the wiser, the employee may then begin communicating with their boss over email or chat platforms without either party being aware a hacker is observing. Depending on the attacker’s goal — stealing money or data — they might send malicious links or illegitimate requests to the party on either side. Or, they can sit back and wait, seeing what the two parties are sending to each other and recording any sensitive information.
Since hackers who carry out MITM attacks control the WiFi network the compromised device is using for connectivity, they can also pose as other parties, such as e-commerce platforms and financial services providers. When that happens, threat actors deceive employees into unwittingly sharing account credentials or even transferring funds.
What are the types of man in the middle attacks?
Though the objective of MITM attacks is the same — stealing sensitive data and/or money — threat actors use several different methods to carry them out. 1. HTTPS spoofing Hypertext Transfer Protocol Secure (HTTPS) is a version of the HTTP that enables users to securely send encrypted data between servers and web browsers. When you connect to a website and see a lock symbol in the address bar, it indicates your connection is secure. Bad actors can exploit this by creating spoofed domains that closely resemble legitimate websites but use non-ASCII characters (e.g., äpple.com). In this scenario, users think they’re interacting with legitimate websites because they see the lock, but the bad actor is sitting between them and the server and can intercept any data.
2. SSL hijacking Most websites that use HTTPS use Secure Sockets Layer (SSL) as an encryption security protocol that ensures data passing between a client and a server stays protected. When threat actors launch SSL hijacking attacks, they exploit legitimate sessions by creating fake SSL certificates that enable them to gain unauthorized access to the session between the user and the server. Since the user sees the lock in their address bar, they think their connection is secure. In reality, all information passing between the user and the application is going through the attacker’s server.
3. SSL stripping In SSL stripping attacks, hackers downgrade secure HTTPS connections to unencrypted HTTP connections, which makes it easy for them to intercept and manipulate data. Unless the user is aware of how such attacks work, chances are they won’t have any idea their connection is no longer secure.
4. IP spoofing Every device that connects to the internet — computers, smartphones, and servers — has its own internet protocol (IP) address. When threat actors carry out IP spoofing attacks, they spoof the IP headers on packets to make it appear that the traffic is coming from a different source than its actual origin and then redirect traffic to their desired location.
5. ARP spoofing ARP spoofing is a MITM attack where bad actors manipulate the address resolution protocol (ARP) within a local area network (LAN) to deceive network devices into confusing an attacker’s media access control (MAC) address with the IP address of a trusted device. After that happens, attackers can intercept, modify, and redirect network traffic intended for the targeted device.
6. DNS spoofing The Domain Name System (DNS) is a database that contains public IP addresses for computers, services, and internet-connected resources. DNS spoofing attacks occur when hackers swap a legitimate IP address in a DNS record with one of their own, sending users to fake websites they control. Once that happens, users typically use their real login credentials, thinking they’re connecting to a real website; threat actors then use those credentials to access the account and all its information.
7. WiFi eavesdropping WiFi eavesdropping attacks, or evil twin attacks, occur when threat actors set up fake WiFi hotspots to dupe unsuspecting users into connecting to a malicious network they control. For example, a hacker might head to a busy Starbucks and create a network that sounds legitimate (e.g., Starbucks 5G). When as the unsuspecting individual connects to that network, the bad actor can see everything the user does and launch several other MITM attacks from there.
Man in the middle attacks examples?
MITM attacks can wreak havoc on businesses of all sizes and industries. Here are some real-world examples of how hackers have used MITM to exploit unsuspecting users to steal money and data:
In 2015, Lenovo users found out that their devices came pre-installed with software that included a universal self-signed certificate authority. This, in turn, enabled the software to launch SSL hijacking attacks on users worldwide.
That same year, Europol arrested a group of 49 suspected cybercriminals for launching MITM attacks against companies across Europe to gain access to employee email accounts. Once they had access, they searched for payment requests and then asked customers to send the funds to bank accounts they controlled.
Chances are you heard of the Equifax breach, which impacted nearly every U.S. adult with a credit history in 2017. In this attack, hackers exploited a known vulnerability that wasn’t patched to gain access to Equifax’s internal servers. While users were authenticated via HTTPS, some pages on the company’s website used HTTP. Hackers found those pages and launched MITM attacks accordingly.
In 2019, hackers made off with $1 million after they spoofed two domain names — one of an Israeli startup and the other of a Chinese venture capital firm — by adding an s to the end of each. The hackers then used those spoofed domains to send emails with the same subject line as an existing email thread to cancel in-person meetings and, ultimately, convince the VC firm to wire the money to a fraudulent bank account.