Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

Harvard graduation ceremonies photos

US academic ties with China face their biggest threats under Trump

RCB-Punjab Kings: Kohli, Bengaluru Reach Final | Cricket News

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » How browser-in-the-middle attack steals sessions in seconds
Identity

How browser-in-the-middle attack steals sessions in seconds

userBy userMay 28, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

May 28, 2025Hacker NewsBrowser Security/Certifications

Browser in-middle

Do you expect the end user to log on to Cybercriminal’s computer, open a browser and enter your username and password? Hopefully that’s not the case! But that’s basically what happens when they become victims of a mid-browser (BITM) attack.

Like the man-in-the-middle (MITM) attack, BITM outlines in a paper in the International Journal of Information Security by researchers at Salento University Franco Tommasi, Christian Catalano and Ivan Taurino, which means that offenders are trying to control the flow of data between the victim’s computer and the target service. However, there are some important differences.

Man-in-the-middle vs Browser in the Middle

MITM attacks use a proxy server that places itself between the victim’s browser and the legitimate target service in the application layer. Some kind of malware is required to be placed and run on the victim’s computer.

However, BITM attacks are different. Instead, the victim thinks he is using his browser when he is actually running a transparent remote browser. For example, we are carrying out regular online banking.

As the paper points out, it’s as if the user was “sitting in front of the attacker’s computer using the attacker’s keyboard.” This means that an attacker can capture, record and modify the exchange of data between the victim and the service he is accessing.

Anatomy of BITM Attacks

So, how does it work? A typical BITM attack occurs in three phases.

Phishing: Victims are fooled to click on a malicious hyperlink pointing to the attacker’s server and authenticate the web application. Fake Browser: The victim is connected to an attacker’s server and a transparent web browser via malicious JavaScript insertion. The attack utilizes programs such as keyloggers to enable criminals to intercept and use the victim’s data. Web Application Targeting: Victims use all their usual services online without realizing that they are using a transparent browser. Their qualifications are now exposed to criminals.

Session token

The attack works by targeting session tokens. This allows attackers to destroy it even with Multifactor Authentication (MFA). Once the user completes MFA, the session token is normally saved in the browser. As researchers at Google’s subsidiary Mandiant have pointed out, MFA is no longer important if the token itself could be stolen.

“Stepping tokens for this session is equivalent to stealing an authenticated session. This means that the enemy no longer needs to perform an MFA challenge.” This makes the token a useful target for both Red Team operators testing the defense of the system, and, more worryingly, the real enemy.

By adopting the BITM framework when targeting authenticated session tokens, attackers will benefit from the fast targeting feature. When the application is targeted, legitimate sites are provided via attacker-controlled browsers, making it extremely difficult for the victim to communicate the difference between the actual site and its fake counterparts.

Cookies or Oauth tokens are snatched just before encryption, but with quick removal, the stolen token can be relayed to the attacker server in seconds.

Mitigation Strategy

These sophisticated attacks can cause significant damage, but there are ways to avoid or mitigate the outcome. At the widest level, users must always be very careful about the links they access. You probably need to preview your site before you actually click on the link. There are a few other options.

Password for the new era

The conclusion is depressingly clear. BITM attacks can circumvent traditional security approaches, even allowing criminals to intercept usernames and passwords. So does this make the password irrelevant?

The answer is overwhelming “no”. By enacting multifactor authentication (MFA) with robust passwords, it makes life difficult for cybercriminals, especially if session tokens cannot be captured immediately.

Even if the attacker is more refined, you need to be aware of the basics. The password remains an important component of the MFA. In fact, for most organizations, they probably remained the first line of defense. No matter how you attack your password, protecting your password will irritate cybercriminals.

The SPECOPS password policy ensures that active directory passwords are always scratched. A stronger password policy will also allow you to continuously scan Active Directory with over 4 billion compromised passwords. When combined with effective MFAs such as Specops Secure Access, it protects end users with both password and logon steps. Need MFA or password security assistance? Reach out for the chat.

Did you find this article interesting? This article is a donation from one of our precious partners. Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleTarget Amazon-Hosted IPS ColdFusion, Struts, and ElasticSearch used in 251 Exploit Scan
Next Article New fuel cell technology could enable electric aviation
user
  • Website

Related Posts

Cybercriminals target AI users using malware load installers that pretend to be popular tools

May 29, 2025

New Windows Rats Avoid detection for weeks using corrupted DOS and PE headers

May 29, 2025

Dragonforce exploits SimpleHelp flaws to deploy ransomware across customer endpoints

May 29, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Harvard graduation ceremonies photos

US academic ties with China face their biggest threats under Trump

RCB-Punjab Kings: Kohli, Bengaluru Reach Final | Cricket News

Mistial declared in Argentine court regarding the death of Diego Maradona | Football News

Trending Posts

RCB-Punjab Kings: Kohli, Bengaluru Reach Final | Cricket News

May 29, 2025

Mistial declared in Argentine court regarding the death of Diego Maradona | Football News

May 29, 2025

Trump’s tariffs are ruled illegal: Will this make the United States trade in war? |Trade War News

May 29, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

The exchange raises $2.1 million to accelerate clean energy projects with AI-powered site intelligence

Donut Lab raises $7 million pre-seed round to launch its first “agent” crypto browser

Crime IP Debuts in Infosecurity Europe 2025

Bubblemaps launches V2 to bring real-time on-chain intelligence to six blockchains

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.