Man-in-the-Middle (MitM) attack is a technique where an attacker secretly intercepts and potentially alters communication between two parties who believe they are communicating directly with each other. It exploits weaknesses in network trust, encryption, or authentication rather than breaking systems outright.
Attackers position themselves between the user and the target service by abusing unsecured Wi-Fi networks, DNS spoofing, ARP poisoning, or compromised certificates. Once in the middle, the attacker captures credentials, session cookies, or sensitive data in transit, and can inject or modify traffic without either party being aware.
Man-in-the Middle attack undermines the confidentiality and integrity of trusted communications. A single successful interception can lead to credential theft, session hijacking, data manipulation, or downstream account compromise across enterprise and SaaS environments, often without leaving obvious forensic traces.
In 2024—2025, a state-linked threat group called Salt Typhoon executed a man-in-the-middle attack by compromising core network infrastructure within AT&T and Verizon. The attackers intercepted and monitored communications traffic and metadata in transit, positioning themselves directly between communicating parties. Operating inside trusted telecom networks allowed them to bypass traditional security controls, exposing communications at national and enterprise scale.
SourceGet our entire attack repository in a single, offline-ready PDF guide, featuring 25+ real-world attacks.
See how organizations gained 442% ROI and major efficiency improvements with Endpoint Central.
Read moreDiscover how Endpoint Central’s antivirus earned recognition through rigorous, real-world security validation in just eight months.
Read moreGet a clear, practical guide to understanding threats and strengthening your organization’s security.
Read more