New Browser-in-the-Middle Attack Bypasses MFA, Steals User Sessions in Seconds

Browser In The Middle Attack

March 23, 2025 A sophisticated cyberattack technique known as Browser-in-the-Middle (BitM) has emerged, enabling hackers to bypass multi-factor authentication (MFA) and hijack user sessions within seconds. This method exploits web browser functionalities to intercept authenticated sessions, posing a significant threat to organizations relying on traditional security measures. citeturn0search0

In a BitM attack, victims are directed through an attacker-controlled browser that mirrors legitimate websites. When a user visits a malicious site or clicks on a phishing link, their interactions are funneled through this proxy, tricking them into entering credentials and completing MFA challenges. Once authenticated, the attacker captures the session token stored in the browser, effectively stealing the user’s authenticated state.

Key Components of BitM:

  • Transparent Proxies:Tools like Evilginx2 or Delusion act as intermediaries between the victim and the target service, modifying HTTP responses to replace legitimate domains with phishing domains, enabling session token extraction.
  • Rapid Deployment: BitM frameworks allow operators to target any website quickly. Features such as Firefox profile storage and automatic load balancing simplify large-scale phishing campaigns.
  • Real-Time Monitoring: Attackers can observe victim interactions in real-time, enabling immediate session theft upon successful authentication.

BitM attacks are particularly dangerous because they bypass MFA, which many organizations consider their last line of defence. By capturing session tokens, attackers gain persistent access to accounts without needing the victim’s credentials again.

Mitigation Strategies:

1. Hardware-Based MFA (FIDO2): Security keys like YubiKey enforce cryptographic challenges tied to specific domains, preventing attackers from replaying responses across different websites.

2. Client Certificates: Binding authentication to device-specific certificates prevents session reuse on unauthorized devices.

3. Behavioral Monitoring: Detecting unusual login patterns or browser fingerprint discrepancies can flag potential BitM compromises.

4. Security Awareness Training: Educating users to recognize phishing attempts, such as suspicious URLs or unsolicited authentication requests, remains critical.

The emergence of BitM attacks signifies a major shift in cyber threats, utilizing browser functionalities to evade traditional security measures. Security teams globally must urgently address this evolving threat landscape.

Top Stories

Related Articles

December 23, 2025 South Korea will require facial recognition scans to open new mobile phone accounts. The new rule is more...

December 22, 2025 Apple is requiring iPhone users who have not upgraded to iOS 26 to update now after confirming more...

December 12, 2025 The United States has extradited a Ukrainian national accused of working with Russian-backed hacktivist groups that targeted more...

November 24, 2025 Google is rolling out its Gemini artificial intelligence assistant to vehicles equipped with Android Auto, promising a more...

Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com
Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn