This is a term used to describe a cyber attack where a hacker acts as middleman, during data transfer between user and an application. The app can be a financial or an E commerce website, Software as a Service (SaaS) etc. The hacker can intercept data passed via the browser to the website, and collect sensitive information such as account and credit card details, user login etc.
To put it into context, it is like a postman who reads all the letters addressed to you, then reseals the same, on delivery. This way no one suspects a foul play.
Interception
This is the first phase of the attack. Here the hacker establishes a connection with the target device whether a PC, Laptop or Smart phone. This is done through various methods like
- Free WiFi : Here a WiFi hot spot is set up which is not password protected. When a user logs in to the network, they are in essence connecting to the hacker's system. Now any data transfer occurs via this compromised system, resulting in loss of sensitive information.
- ARP Spoofing : Stands for Address Resolution Protocol, it resolves IP address into MAC address in an Local Area Network (LAN). This system gets compromised. Now all traffic of the LAN network gets re routed to the hacker's computer.
DNS : stands for Domain Name Server. It converts the name of a specific website into its corresponding IP address. Here the server gets hijacked and all the legitimate IP addresses gets changed. Now the user is automatically directed to a malicious website.
Decryption
Once the connection is set, the hacker sends a phony digital thumbprint to the browser. This is to make it believe a secure connection has been established. Also protected HTTPS website are downgraded to HTTP, known as SSL Stripping. This way all information that passes from the user can be intercepted and compromised.
Prevention
- Avoid using free WiFi specially in public places like cafe or restaurants.
- Always check browser address whether it is HTTP or HTTPS.
- Log out of all financial or Ecommerce website immediately after use.

Comments
Post a Comment