Attacker-in-the-Middle (AiTM) phishing

Summary

MFA-bypassing Attacker-in-the-Middle phishing kits are the standard choice for attackers today. These work by intercepting the authenticated session created when a victim enters their password and completes an MFA check. To do this, the phishing website simply passes messages between the user and the real website — hence “Attacker-in-the-Middle”.

Attackers are using both criminal platforms and commodity, publicly available kits like Evilginx.

There are a few different variations of AitM, including Browser-in-the-Middle (BitM), a technique using remote desktop technologies like VNC and RDP, where the victim is tricked into directly authenticating via the attacker’s browser.

Examples