Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Education Secretary says NY discriminates against schools along with Native American mascots

SpaceX’s Journey to Mars: How Spaceships Use Hohmann Orbital’s Movement from Earth to Mars (and the Physics Behind)

Gemini automatically summarises long emails unless you opt out

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » How browser-in-the-middle attack steals sessions in seconds
Identity

How browser-in-the-middle attack steals sessions in seconds

userBy userMay 28, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 28, 2025Hacker NewsBrowser Security/Certifications

Browser in-middle

Do you expect the end user to log on to Cybercriminal’s computer, open a browser and enter your username and password? Hopefully that’s not the case! But that’s basically what happens when they become victims of a mid-browser (BITM) attack.

Like the man-in-the-middle (MITM) attack, BITM outlines in a paper in the International Journal of Information Security by researchers at Salento University Franco Tommasi, Christian Catalano and Ivan Taurino, which means that offenders are trying to control the flow of data between the victim’s computer and the target service. However, there are some important differences.

Man-in-the-middle vs Browser in the Middle

MITM attacks use a proxy server that places itself between the victim’s browser and the legitimate target service in the application layer. Some kind of malware is required to be placed and run on the victim’s computer.

However, BITM attacks are different. Instead, the victim thinks he is using his browser when he is actually running a transparent remote browser. For example, we are carrying out regular online banking.

As the paper points out, it’s as if the user was “sitting in front of the attacker’s computer using the attacker’s keyboard.” This means that an attacker can capture, record and modify the exchange of data between the victim and the service he is accessing.

Anatomy of BITM Attacks

So, how does it work? A typical BITM attack occurs in three phases.

Phishing: Victims are fooled to click on a malicious hyperlink pointing to the attacker’s server and authenticate the web application. Fake Browser: The victim is connected to an attacker’s server and a transparent web browser via malicious JavaScript insertion. The attack utilizes programs such as keyloggers to enable criminals to intercept and use the victim’s data. Web Application Targeting: Victims use all their usual services online without realizing that they are using a transparent browser. Their qualifications are now exposed to criminals.

Session token

The attack works by targeting session tokens. This allows attackers to destroy it even with Multifactor Authentication (MFA). Once the user completes MFA, the session token is normally saved in the browser. As researchers at Google’s subsidiary Mandiant have pointed out, MFA is no longer important if the token itself could be stolen.

“Stepping tokens for this session is equivalent to stealing an authenticated session. This means that the enemy no longer needs to perform an MFA challenge.” This makes the token a useful target for both Red Team operators testing the defense of the system, and, more worryingly, the real enemy.

By adopting the BITM framework when targeting authenticated session tokens, attackers will benefit from the fast targeting feature. When the application is targeted, legitimate sites are provided via attacker-controlled browsers, making it extremely difficult for the victim to communicate the difference between the actual site and its fake counterparts.

Cookies or Oauth tokens are snatched just before encryption, but with quick removal, the stolen token can be relayed to the attacker server in seconds.

Mitigation Strategy

These sophisticated attacks can cause significant damage, but there are ways to avoid or mitigate the outcome. At the widest level, users must always be very careful about the links they access. You probably need to preview your site before you actually click on the link. There are a few other options.

Password for the new era

The conclusion is depressingly clear. BITM attacks can circumvent traditional security approaches, even allowing criminals to intercept usernames and passwords. So does this make the password irrelevant?

The answer is overwhelming “no”. By enacting multifactor authentication (MFA) with robust passwords, it makes life difficult for cybercriminals, especially if session tokens cannot be captured immediately.

Even if the attacker is more refined, you need to be aware of the basics. The password remains an important component of the MFA. In fact, for most organizations, they probably remained the first line of defense. No matter how you attack your password, protecting your password will irritate cybercriminals.

The SPECOPS password policy ensures that active directory passwords are always scratched. A stronger password policy will also allow you to continuously scan Active Directory with over 4 billion compromised passwords. When combined with effective MFAs such as Specops Secure Access, it protects end users with both password and logon steps. Need MFA or password security assistance? Reach out for the chat.

Did you find this article interesting? This article is a donation from one of our precious partners. Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTarget Amazon-Hosted IPS ColdFusion, Struts, and ElasticSearch used in 251 Exploit Scan
Next Article New fuel cell technology could enable electric aviation
user
  • Website

Related Posts

Rust-based Eddiestealer malware steals browser data using Clickfix Captcha Trick

May 30, 2025

China-linked hackers exploit SAP and SQL server flaws in Asian and Brazilian attacks

May 30, 2025

Healthcare CISO’s journey to enable modern care

May 30, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Education Secretary says NY discriminates against schools along with Native American mascots

SpaceX’s Journey to Mars: How Spaceships Use Hohmann Orbital’s Movement from Earth to Mars (and the Physics Behind)

Gemini automatically summarises long emails unless you opt out

Rust-based Eddiestealer malware steals browser data using Clickfix Captcha Trick

Trending Posts

From students to technology: How US-China ties slide despite tariff ceasefire | Trade War News

May 30, 2025

ISIL (ISIS) launches first attack on new Syrian government | News of armed groups

May 30, 2025

Liverpool Parade crash drivers appear in UK courts | Court News

May 30, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

SpaceX’s Journey to Mars: How Spaceships Use Hohmann Orbital’s Movement from Earth to Mars (and the Physics Behind)

zircuit allows for top-up of non-curative wallets for crypto.com visa cards

Digital Health Startup Omada Health targets IPO’s $1.1 billion valuation as a virtual care rebound

Top Startup and Tech Funding News – May 28, 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.