The Synthetic Insider: AiTM and the Art of Real-Time Deception – Part 2

Part 2 of our series on interception attacks. If you missed Part 1 on classic Man‑in‑the‑Middle (MITM), read it here: The Old School MITM Threat Vector


As organizations strengthen their defenses against traditional cybersecurity threats, attackers are adapting their methods to bypass modern security measures. Adversary-in-the-Middle (AITM) attacks represent a significant shift in cybercriminal tactics, specifically designed to bypass multi-factor authentication (MFA) systems that protect modern business applications. These attacks possess the capability to maneuver around the security measures of multifactor authentication (MFA) by leveraging reverse-proxy functionality.

Recent cybersecurity research reveals a disturbing trend: cybercriminals are successfully bypassing MFA through adversary-in-the-middle (AiTM) attacks implemented via reverse proxies, effectively rendering traditional MFA solutions vulnerable. This represents a fundamental shift in attack methodology that security teams must address with updated defensive strategies.

What Makes AITM Different from Traditional MITM

While both attack types involve positioning cybercriminals between users and legitimate services, their execution and objectives differ significantly from the traditional Man-in-the-Middle attacks we discussed previously.

The Old Way: Traditional MITM

Traditional Man-in-the-Middle attacks focus on intercepting communications through network-level exploitation. These attacks typically involve:

  • Creating rogue Wi-Fi networks to capture traffic
  • Manipulating DNS requests to redirect users to malicious sites
  • Exploiting network protocols to intercept data in transit
  • Capturing credentials through basic phishing websites

The primary goal of traditional MITM attacks is to steal credentials and sensitive information as it travels between users and applications.

The New Approach: AITM’s Advanced Methodology

Adversary-in-the-Middle attacks operate with a fundamentally different approach. An Adversary-in-the-Middle (AitM) phishing attack is an advanced form of credential theft in which attackers insert themselves between a user and a legitimate authentication service to intercept credentials and session tokens.

Key differentiators include:

  • Session Token Theft: AITM phishing attack is a type of cyberattack that involves stealing session cookies to bypass authentication layers and access sensitive data or accounts
  • Reverse Proxy Technology: One common AitM phishing approach is to use tooling that acts as a reverse web proxy
  • MFA Bypass Capabilities: They are phishing attacks that can bypass MFA security to steal user credentials and system access

Real-time Interception: Unlike traditional MITM attacks that capture static credentials, AITM attacks intercept live authentication sessions

Key Differences from MITM

Aspect

MITM

AiTM

Position

Between two network nodes (often LAN or Wi‑Fi)

Between user and cloud service via reverse proxy

MFA Bypass

Rare, unless MFA uses same channel

Designed to steal session cookie and bypass MFA

Tooling

ARP spoofing, rogue AP, SSL‑strip

Evilginx, Modlishka, phishing‑as‑a‑service

Network Control Needed

Yes

No, relies on convincing the user to click

Detection Surface

Network anomalies, rogue SSIDs

Unfamiliar domains, simultaneous sessions, token replay

 

Breaking Down How AITM Attacks Work

The complex nature of AITM attacks requires a detailed examination of their operational mechanics. These attacks leverage advanced proxy technology to create seamless interception points that are virtually undetectable to end users.

The Reverse Proxy Setup

Contrary to a traditional phishing setup, AitM phishing does not require a custom built phishing site, but rather the requests are proxied to and from the actual website. This fundamental difference allows attackers to:

  • Present users with the authentic login interface of legitimate services
  • Intercept authentication credentials in real-time
  • Capture session tokens and cookies immediately after successful authentication
  • Maintain session continuity while harvesting sensitive information

Step-by-Step Attack Process

Initial Compromise: Users receive convincing phishing emails that direct them to what appears to be a legitimate login page. However, this page is actually controlled by the attacker’s reverse proxy system.

Credential Interception: When users enter their credentials, the proxy captures this information while simultaneously forwarding the authentication request to the legitimate service.

Session Token Capture: After successful authentication (including MFA completion), the proxy intercepts the session tokens and cookies that prove the user’s identity to the service.

Account Takeover: With valid session tokens, attackers can access the user’s account without needing to authenticate again, effectively bypassing all security measures.

How They Beat Multi-Factor Authentication

The most concerning aspect of AITM attacks is their ability to avoid multi-factor authentication systems. This method allows attackers to bypass Multi-Factor Authentication (MFA), even when strong authentication mechanisms are in place.

The bypass works because:

  • Users complete MFA authentication on the legitimate service
  • The proxy intercepts the resulting session tokens that prove successful authentication
  • Attackers can replay these tokens to access accounts without repeating the MFA process
  • Session tokens typically remain valid for extended periods, providing sustained access

Part 2 of our series on interception attacks. If you missed Part 1 on classic Man‑in‑the‑Middle (MITM), read it here: The Old School MITM Threat Vector


As organizations strengthen their defenses against traditional cybersecurity threats, attackers are adapting their methods to bypass modern security measures. Adversary-in-the-Middle (AITM) attacks represent a significant shift in cybercriminal tactics, specifically designed to bypass multi-factor authentication (MFA) systems that protect modern business applications. These attacks possess the capability to maneuver around the security measures of multifactor authentication (MFA) by leveraging reverse-proxy functionality.

Recent cybersecurity research reveals a disturbing trend: cybercriminals are successfully bypassing MFA through adversary-in-the-middle (AiTM) attacks implemented via reverse proxies, effectively rendering traditional MFA solutions vulnerable. This represents a fundamental shift in attack methodology that security teams must address with updated defensive strategies.

What Makes AITM Different from Traditional MITM

While both attack types involve positioning cybercriminals between users and legitimate services, their execution and objectives differ significantly from the traditional Man-in-the-Middle attacks we discussed previously.

The Old Way: Traditional MITM

Traditional Man-in-the-Middle attacks focus on intercepting communications through network-level exploitation. These attacks typically involve:

  • Creating rogue Wi-Fi networks to capture traffic
  • Manipulating DNS requests to redirect users to malicious sites
  • Exploiting network protocols to intercept data in transit
  • Capturing credentials through basic phishing websites

The primary goal of traditional MITM attacks is to steal credentials and sensitive information as it travels between users and applications.

The New Approach: AITM’s Advanced Methodology

Adversary-in-the-Middle attacks operate with a fundamentally different approach. An Adversary-in-the-Middle (AitM) phishing attack is an advanced form of credential theft in which attackers insert themselves between a user and a legitimate authentication service to intercept credentials and session tokens.

Key differentiators include:

  • Session Token Theft: AITM phishing attack is a type of cyberattack that involves stealing session cookies to bypass authentication layers and access sensitive data or accounts
  • Reverse Proxy Technology: One common AitM phishing approach is to use tooling that acts as a reverse web proxy
  • MFA Bypass Capabilities: They are phishing attacks that can bypass MFA security to steal user credentials and system access
  • Real-time Interception: Unlike traditional MITM attacks that capture static credentials, AITM attacks intercept live authentication sessions

Key Differences from MITM

Aspect

MITM

AiTM

Position

Between two network nodes (often LAN or Wi‑Fi)

Between user and cloud service via reverse proxy

MFA Bypass

Rare, unless MFA uses same channel

Designed to steal session cookie and bypass MFA

Tooling

ARP spoofing, rogue AP, SSL‑strip

Evilginx, Modlishka, phishing‑as‑a‑service

Network Control Needed

Yes

No, relies on convincing the user to click

Detection Surface

Network anomalies, rogue SSIDs

Unfamiliar domains, simultaneous sessions, token replay


Breaking Down How AITM Attacks Actually Work

The complex nature of AITM attacks requires a detailed examination of their operational mechanics. These attacks leverage advanced proxy technology to create seamless interception points that are virtually undetectable to end users.

The Reverse Proxy Setup

Contrary to a traditional phishing setup, AitM phishing does not require a custom built phishing site, but rather the requests are proxied to and from the actual website. This fundamental difference allows attackers to:

  • Present users with the authentic login interface of legitimate services
  • Intercept authentication credentials in real-time
  • Capture session tokens and cookies immediately after successful authentication
  • Maintain session continuity while harvesting sensitive information

Step-by-Step Attack Process

Initial Compromise: Users receive convincing phishing emails that direct them to what appears to be a legitimate login page. However, this page is actually controlled by the attacker’s reverse proxy system.

Credential Interception: When users enter their credentials, the proxy captures this information while simultaneously forwarding the authentication request to the legitimate service.

Session Token Capture: After successful authentication (including MFA completion), the proxy intercepts the session tokens and cookies that prove the user’s identity to the service.

Account Takeover: With valid session tokens, attackers can access the user’s account without needing to authenticate again, effectively bypassing all security measures.

How They Beat Multi-Factor Authentication

The most concerning aspect of AITM attacks is their ability to avoid multi-factor authentication systems. This method allows attackers to bypass Multi-Factor Authentication (MFA), even when strong authentication mechanisms are in place.

The bypass works because:

  • Users complete MFA authentication on the legitimate service
  • The proxy intercepts the resulting session tokens that prove successful authentication
  • Attackers can replay these tokens to access accounts without repeating the MFA process
  • Session tokens typically remain valid for extended periods, providing sustained access

Spotting AITM Attacks: What to Watch For

AITM attacks present unique detection challenges because they leverage legitimate authentication services and present users with authentic-looking interfaces. However, organizations can implement monitoring strategies to identify these threats.

Network-Level Red Flags

Proxy Traffic Analysis: Monitor for unusual proxy traffic patterns that might indicate reverse proxy deployment. Organizations should implement comprehensive network monitoring through blue team defensive security services for continuous threat detection.

Certificate Monitoring: Track SSL certificate usage and identify suspicious certificates that might be used in AITM attacks.

DNS Monitoring: Watch for domain registrations and DNS queries that might indicate AITM infrastructure deployment.

User Behavior Red Flags

Unusual Login Patterns: Monitor for login attempts from unexpected locations or devices, particularly after successful MFA completion.

Session Anomalies: Track user sessions for unusual behavior patterns that might indicate token replay attacks.

Application Access Patterns: Monitor for access to applications and data that deviates from normal user behavior.

Defensive Countermeasures

  1. Phishing‑Resistant MFA Move beyond OTP or push approvals. FIDO2 security keys bind the session to the physical device.

  2. Conditional Access with Token Binding Azure AD’s Continuous Access Evaluation invalidates tokens reused from different IP addresses within minutes.

  3. Header Consistency Checks Compare the x‑ms‑forwarded‑client‑ip and client TLS fingerprints to spot proxy use.
  4. Domain and URL Defense Block recently registered domains and enforce Remote Rendering for risky click‑throughs.
  5. Session Telemetry and Anomaly Detection HawkEye Managed XDR correlates impossible‑travel, cookie replay, and mailbox‑rule creation in real time. See how.
  6. Zero Trust Segmentation Restrict high‑value SaaS roles with least‑privilege, device attestation, and real‑time policy checks. Explore DTS Zero Trust and Private Access.

Quick Comparison between MITM vs AiTM

Feature

MITM (Old School)

AiTM (New School)

Attack Style

Network-layer interception

Application-layer deception

SSL Requirement

Needs SSL stripping/decryption

SSL passthrough via reverse proxy

MFA Handling

Usually blocked it outright

Bypasses it via session hijack

Tools

Ettercap, Wireshark

Evilginx2, Modlishka

Defense

HTTPS, VPNs, HSTS

WebAuthn, anti-phishing MFA

How DTS Solution Tackles AITM Threats

The complex nature of AITM attacks requires equally comprehensive defense strategies. DTS Solution’s cybersecurity approach provides organizations with the advanced protection needed to counter these threats.

Advanced Threat Detection

Our blue team defensive security services provide specialized AITM detection capabilities:

  • Session Token Monitoring: Advanced systems that track session token usage and identify potential replay attacks
  • Authentication Anomaly Detection: Monitoring that identifies unusual authentication patterns
  • Proxy Traffic Analysis: Deep packet inspection capabilities that can identify reverse proxy traffic patterns
  • Real-time Threat Intelligence: Access to the latest AITM attack indicators and patterns

Proactive Security Testing

Our red team offensive security services include specialized AITM attack simulation:

  • AITM Attack Simulation: Realistic testing of your organization’s susceptibility to AITM attacks
  • MFA Bypass Testing: Evaluation of your authentication systems’ resilience to session token theft
  • Phishing Resistance Assessment: Testing of user awareness and response to phishing attempts
  • Security Control Validation: Verification that your security controls can detect and prevent AITM attacks

Conclusion
AiTM represents the next wave of credential phishing. It shifts trust exploitation from the network layer to the identity layer. Organizations that have already encrypted every link and segment still face risk if session cookies can be replayed without scrutiny.

Pair phishing‑resistant MFA with session telemetry. Then close the feedback loop through continuous policy enforcement. DTS Solution and HawkEye deliver these capabilities as an integrated service, letting your team focus on building, not firefighting.

For a deeper understanding of the original network‑centric attack surface, revisit our MITM breakdown in Part 1. Strengthening both layers ensures that session hijack attempts have nowhere to land.

Quick Comparison between MITM vs AiTM

Feature

MITM (Old School)

AiTM (New School)

Attack Style

Network-layer interception

Application-layer deception

SSL Requirement

Needs SSL stripping/decryption

SSL passthrough via reverse proxy

MFA Handling

Usually blocked it outright

Bypasses it via session hijack

Tools

Ettercap, Wireshark

Evilginx2, Modlishka

Defense

HTTPS, VPNs, HSTS

WebAuthn, anti-phishing MFA

How DTS Solution Tackles AITM Threats

The complex nature of AITM attacks requires equally comprehensive defense strategies. DTS Solution’s cybersecurity approach provides organizations with the advanced protection needed to counter these threats.

Advanced Threat Detection

Our blue team defensive security services provide specialized AITM detection capabilities:

  • Session Token Monitoring: Advanced systems that track session token usage and identify potential replay attacks
  • Authentication Anomaly Detection: Monitoring that identifies unusual authentication patterns
  • Proxy Traffic Analysis: Deep packet inspection capabilities that can identify reverse proxy traffic patterns
  • Real-time Threat Intelligence: Access to the latest AITM attack indicators and patterns

Proactive Security Testing

Our red team offensive security services include specialized AITM attack simulation:

  • AITM Attack Simulation: Realistic testing of your organization’s susceptibility to AITM attacks
  • MFA Bypass Testing: Evaluation of your authentication systems’ resilience to session token theft
  • Phishing Resistance Assessment: Testing of user awareness and response to phishing attempts
  • Security Control Validation: Verification that your security controls can detect and prevent AITM attacks

Conclusion

AiTM represents the next wave of credential phishing. It shifts trust exploitation from the network layer to the identity layer. Organizations that have already encrypted every link and segment still face risk if session cookies can be replayed without scrutiny.

Pair phishing‑resistant MFA with session telemetry. Then close the feedback loop through continuous policy enforcement. DTS Solution and HawkEye deliver these capabilities as an integrated service, letting your team focus on building, not firefighting.

For a deeper understanding of the original network‑centric attack surface, revisit our MITM breakdown in Part 1.

Strengthening both layers ensures that session hijack attempts have nowhere to land.