Attack where criminals secretly intercept and potentially alter communications between two parties.
A Man-in-the-Middle (MitM) attack positions the attacker between two communicating parties, enabling them to intercept, read, and potentially modify traffic. Victims believe they're communicating directly, unaware of the interception. MitM attacks can capture credentials, session tokens, and sensitive data, or inject malicious content. Common MitM scenarios include compromised Wi-Fi networks, ARP spoofing on local networks, and SSL stripping to downgrade HTTPS connections. Encryption, certificate validation, and secure protocols defend against MitM.
Why It Matters
The DSC Perspective:
MitM attacks highlight why encryption and HTTPS matter. On untrusted networks (public Wi-Fi, hotels), VPN or zero trust access protects against interception. Warn users about the risks of unencrypted connections.
