TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Inside Adversary-in-the-Middle Attacks | Huntress

2024-10-15 · Read original ↗

ATT&CK techniques detected

7 predictions
T1528Steal Application Access Token
87%
"one package. so, while tokens are generated after multiple factors are used, the token itself is single - factor authentication. exploitation of this system is simple. steal that token, and you become that user — no username, password, or mfa required. active vs. passive token th…"
T1557Adversary-in-the-Middle
83%
"##tm lurks just off camera, silently intercepting your data, redirecting traffic, and hijacking sessions without drawing much attention. it ’ s often underestimated, but when it finally strikes, the damage can be brutal. what is an aitm attack? in an aitm attack, an adversary sne…"
T1557Adversary-in-the-Middle
72%
", carry out similar attacks daily against small and medium - sized businesses ( smbs ). why are aitm attacks dangerous? let ’ s do a little experiment. take a look at figures 3 and 4. the two images are screenshots of microsoft 365 login pages. can you tell which is an aitm page …"
T1557Adversary-in-the-Middle
61%
"inside adversary - in - the - middle attacks | huntress in classic martial arts movies, there ’ s always that one scene where the hero singlehandedly takes on a gang of oversized, overconfident goons. one by one, they come at him, and one by one, they hit the ground. then, as all…"
T1557Adversary-in-the-Middle
44%
"know more about aitm tactics, how to spot them, and, most importantly, what to do when a real attack comes knocking. stay ahead of the sneaky stuff the most dangerous threats aren ’ t the loudest or biggest. they ’ re the ones you didn ’ t even see coming. aitm may not have the r…"
T1557.001Name Resolution Poisoning and SMB Relay
35%
"##tm lurks just off camera, silently intercepting your data, redirecting traffic, and hijacking sessions without drawing much attention. it ’ s often underestimated, but when it finally strikes, the damage can be brutal. what is an aitm attack? in an aitm attack, an adversary sne…"
T1557.001Name Resolution Poisoning and SMB Relay
35%
", carry out similar attacks daily against small and medium - sized businesses ( smbs ). why are aitm attacks dangerous? let ’ s do a little experiment. take a look at figures 3 and 4. the two images are screenshots of microsoft 365 login pages. can you tell which is an aitm page …"

Summary

Discover how Adversary-in-the-Middle attacks silently hijack your sessions, and learn how to spot and prevent AiTM with tips from the experts at Huntress.