A cyberattack where the attacker secretly intercepts and potentially alters communications between two parties who believe they are communicating directly with each other.
A man-in-the-middle (MitM) attack occurs when an attacker secretly positions themselves between two communicating parties, intercepting and potentially modifying the data exchanged. The victims believe they are communicating directly with each other, unaware that an attacker is relaying and possibly altering their messages.
Types of MitM attacks:
Attack scenarios:
Prevention measures:
MitM attacks are particularly dangerous for businesses with remote workers using public Wi-Fi, organisations handling financial transactions via email, and companies that have not fully implemented encryption across their communications.
Clever Ops protects Australian businesses from MitM attacks by implementing VPN solutions for remote workers, enforcing HTTPS across all web properties, deploying email encryption for sensitive communications, and configuring network monitoring to detect interception attempts.
"A remote employee connects to a café Wi-Fi network that is actually a rogue access point. The company VPN encrypts all traffic, preventing the attacker from intercepting any data, and the employee is alerted that certificate validation failed for one site."