Photo by Chris Yang on Unsplash

All About Man-In-the-Middle (MITM) Attacks

Don’t let anyone get between you and your network.

John Teehan
Published in
5 min readMay 16, 2020

--

Cyber threats seem to be everywhere. Viruses, malware, ransomware, and phishing all receive a lot of attention, but risk often overlooked is a Man-In-the-Middle (MITM) attack. This is despite the alarming fact that they are one of the most prevalent threats out there.

What is a Man-In-the-Middle attack?

A MITM attack is essentially an eavesdropping situation in which, as it sounds, a third party secretly inserts itself into a two-party conversation to gather or alter information. Unauthorized access can occur because of inadequate network protections, phishing, or lousy user habits. When MITM malware installs itself onto your computer or network, it gains the ability to spy on and record sensitive information.

MITM malware is also sometimes responsible for altering information between servers. For example, if an employee logs onto a network using their usual username and password, the MITM software could change that information and lock the employee out of their account. The malware can go on to further infiltrate, steal data, or in cases where the hijacked account has access to finances, assets such as money or goods.

--

--

John Teehan
The Startup

Writer specializing in tech, business, parenting, pop culture, and gaming. Visit wordsbyjohn.net for more info and rates. Twitter: @WordsByJohn2