IsThisAScam
HomeBlogPrijzenOver OnsHistoryAPIExtension
Upgrade
NL
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
Product
  • Home
  • Blog
  • Pricing
  • Over Ons
  • History
  • Chrome Extension
Resources
  • Developers
  • API-documentatie
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
Juridisch
  • Privacybeleid
  • Servicevoorwaarden
  • product@zeplik.com

© 2026 Zeplik, Inc. Alle rechten voorbehouden.

Built for the calm, the cautious, and the careful.

Home/Glossary/Man-in-the-Middle Attack
Glossary · Attack Vector

What Is a Man-in-the-Middle Attack?

A cyberattack where the attacker secretly intercepts and potentially alters communications between two parties who believe they are communicating directly with each other.

Quick Definition

A cyberattack where the attacker secretly intercepts and potentially alters communications between two parties who believe they are communicating directly with each other.

Think you've been targeted?

Paste the suspicious content here for an instant analysis.

No signup · 6 detection layers · Results in seconds · Cmd+Enter

01Man-in-the-Middle Attack explained.

In a man-in-the-middle (MITM) attack, the attacker positions themselves between the victim and the service they're communicating with — like a postal worker reading letters before delivering them. The victim and the server both believe they're communicating directly.

MITM attacks are commonly executed on unsecured Wi-Fi networks. The attacker may set up a fake hotspot or compromise an existing network, then intercept all traffic passing through it. This can capture login credentials, financial data, and personal information.

HTTPS encryption was designed to prevent MITM attacks on the web, but sophisticated attackers can use techniques like SSL stripping (downgrading connections to unencrypted HTTP) or fake certificates to circumvent this protection.

02How it works.

01The attacker positions themselves between the victim and the intended service (often via compromised Wi-Fi)
02Communications are intercepted as they pass through the attacker's system
03The attacker can read, modify, or inject content into the communication
04The victim and server both believe they're communicating normally
05Credentials, financial data, and personal information are captured or manipulated

03Real-world example.

In 2019, a banking MITM attack in Europe intercepted online banking sessions on public Wi-Fi. The attacker modified the destination bank account number in real-time during wire transfers, redirecting payments to their own accounts while showing the victim the original details on screen.

04How to protect yourself.

01Avoid using public Wi-Fi for sensitive activities like banking or shopping
02Use a VPN when connecting to public networks
03Ensure websites use HTTPS (look for the lock icon) before entering any information
04Don't ignore browser certificate warnings — they may indicate a MITM attack
05Use your mobile data connection instead of public Wi-Fi for sensitive transactions
Related Terms
PhishingSpoofingPharming
Explore Scam Types
phishingromancecryptoinvestmenttech supportdelivery
Suspect Something?

Run a scan on the message you received.

Run a scan →