Scott Young
Phishing kits now include adversary-in-the-middle (AitM) capabilities as standard features to bypass email security.
Cybercriminals are constantly evolving their tactics to bypass security measures. Man-in-the-middle (MiTM) and Adversary-in-the-Middle (AiTM) phishing attacks have become two of their most effective tools—capable of hijacking sessions and stealing tokens in real time. MiTM attacks tend to focus on network intrusion, but new AiTM tactics have now sprouted, mostly using social engineering or phishing tactics.
Unlike traditional phishing that tricks users into revealing credentials, AiTM attacks intercept the authentication process between users and legitimate applications. By capturing session cookies or authentication tokens—such as JSON Web Tokens (JWTs)—attackers can bypass even multi-factor authentication (MFA) and gain full access to cloud accounts. This opens the door to account takeover, lateral movement, and data theft.
Modern phishing kits now commonly include AiTM capabilities, making these attacks more accessible to cybercriminals and harder for security teams to detect. Obsidian Security has observed that up to 77% of phishing sites employ evasion techniques, such as turnstiles, CAPTCHAs, and IP filtering, to prevent detection.
Organizations that rely on traditional email security and MFA alone must adapt their defenses to counter this growing threat.
AiTM phishing attacks work by inserting an attacker-controlled proxy, often a fake login page, between a victim and a legitimate website. The attacker intercepts the login process through this proxy, effectively hijacking user sessions and secretly capturing sensitive information.
The attack typically follows these steps:
Many organizations rely on MFA to protect accounts from compromise. However, AiTM phishing defeats MFA by stealing session cookies after authentication, rendering one-time passwords (OTPs), push notifications, and app-based authenticators ineffective.
Since the victim interacts with the legitimate website through an attacker-controlled proxy, traditional phishing detection methods like email gateways can fail to identify malicious activity. Security logs may show a normal login from a trusted location, hiding the fact that an attacker is intercepting the session. MiTM attacks often use TLS encryption, making network traffic analysis less effective at spotting anomalies.
Once an attacker gains access to a session, they can:
Adversary-in-the-middle attack capabilities are no longer limited to advanced cybercriminals. Ready-made phishing kits now integrate AiTM features, making it easier for less sophisticated attackers to execute these campaigns. Some popular AiTM phishing toolkits include Evilginx and Tycoon.
These toolkits allow attackers to automate session hijacking, making large-scale AiTM attacks more feasible.
To defeat modern man-in-the-middle attacks, security teams must harden their defenses where identity compromise actually occurs: the browser. Obsidian Security offers an in-browser AiTM phishing prevention solution that stops 100% of popular kits like Evilginx and Tycoon.
Integrated in the browser, Obsidian Security deeply inspects web content using advanced visual analysis plus applied threat intelligence to instantly block malicious webpages as soon as they render—even for never-before-seen phishing kits or personal email attacks.
By seeing what the user sees, Obsidian can thwart AiTM evasion techniques that bypass Proofpoint, Abnormal, and other security solutions. Get started for free to begin detecting AiTM phishing threats.
Man-in-the-Middle attacks like AiTM phishing are a major evolution in cyber threats, capable of bypassing traditional MFA and leading to rapid account takeovers. With phishing kits integrating AiTM as a standard feature, organizations must adopt phishing-resistant authentication methods, AI-powered security monitoring, and user training to defend against these sophisticated attacks.
The future of phishing prevention lies in Zero-Trust principles, stronger authentication standards, and real-time behavioral threat detection. As AiTM phishing techniques continue to evolve, organizations must stay proactive in their cybersecurity approach to mitigate these growing risks.
Start in minutes and secure your critical SaaS applications with continuous monitoring and data-driven insights.