Man-in-the-middle attacks on the rise

Banks and retailers increasingly targeted by fraudsters using this latest spin on a phishing scam.

Users are increasingly aware of the dangers of identity theft inherent in phishing attacks, where the user is duped into inadvertently revealing sensitive personal or financial data about themselves, which can then be used to steal the identity of the victim.

However, authentication experts at online security vendor, TriCipher are claiming that "man-in-the-middle" attacks are increasingly being used to intercept secure communications between an organisation and end user.

Advertisement - Article continues below

These phishing attacks trick the user into clicking on a link to login to an online banking or e-commerce website through a proxy site. Unlike traditional phishing techniques, the user is actually passed through to the authentic website, making it virtually impossible for even savvy users to tell that they are being scammed.

David Franklin, vice president for the Europe, Middle East and Africa told IT PRO that these sites are proliferating because they are actually easier for hackers to set up than traditional 'fake' phishing sites because they don't even have to maintain a fake website. He also said man-in-the-middle attacks defeat weak authentication methods including passwords, internet protocol (IP) geolocation, device fingerprinting, cookies and personal security images and tokens, for example.

"A lot of the attacks you hear about are just the tip of the iceberg. Banks often won't even tell an affected customer that they have been a victim of these man-in-the-middle attacks," said Franklin, adding that kits that guide cybercriminals through setting up a man-in-the-middle attack are now so popular they can be bought for as little as $500 (250) on the black market now.

Advertisement - Article continues below
Advertisement - Article continues below

He also said "man-in-the-browser" attacks are emerging to compete in popularity with middleman threat. These attacks can even defeat the most stringent two-factor authentication measures by modifying the transaction in the browser after user authentication has taken place. He said this type of attack is set to have a dramatic impact on retailers and large and medium-sized banks in future. "Even charities are being targeted now," added Franklin.

He suggested organisations take steps to strengthen their security provision to assure two-way authentication of internet browser transactions between it and the user. The TriCipher Armored Credential System prevents criminals from stealing the user's credentials, like passwords, session cookies, passcodes. He claimed an attacker attempting to proxy traffic from someone using the system would cause the user's login to fail - and the attacker would have no access to sensitive information.

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now



K2View innovates in data management with new encryption patent

28 May 2020
video conferencing

Zoom 5.0 adds 256-bit encryption to address security concerns

23 Apr 2020

WhatsApp flaw leaves users open to 'shoulder surfing' attacks

21 Apr 2020
cyber security

Microsoft AI can detect security flaws with 99% accuracy

20 Apr 2020

Most Popular

network attached storage (NAS)

Western Digital accused of sneaking inferior SMR tech into NAS drives

1 Jun 2020
data breaches

EasyJet faces class-action lawsuit over data breach

26 May 2020
Microsoft Windows

Microsoft warns users not to install Windows 10's May update

28 May 2020