What are man-in-the-middle attacks?
So, what is a man-in-the-middle attack? Also known as an adversary-in-the-middle attack (AiTM), it’s when cybercriminals position themselves between you and your intended destination to intercept sensitive data. A man-in-the-middle cyber attack mixes social engineering deception with real-time technical interception, making it far more dangerous than traditional phishing.
Phishing attempts try to get your password. A man-in-the-middle attack captures credentials while you’re entering a webpage. The attacker sets up a proxy (an imitation of a legitimate login page) between you and the page accepting your credentials. You log in normally, and they capture your username and password in the process. Often, attackers can use the session token to log in, even if you have two-factor or multi-factor authentication (MFA) enabled.