Adversary in the Middle Attacks steal authenticated sessions

AiTM phishing proxies sit between users and real login pages, capturing session tokens after MFA completes. The attack happens entirely in the browser.

Button

How Adversary in the Middle Attacks work.

AiTM is the dominant phishing technique in the wild today. Instead of sending victims to a fake login page, attackers use a reverse proxy to relay the login to the real site in real time.

1. The victim clicks a link and lands on what appears to be a legitimate login page.
2. A reverse proxy relays everything they enter directly to the real site.
3. Credentials pass through. MFA passes through. Authentication succeeds.
4. The session token is issued and captured by the attacker before it reaches the victim.
5. The victim lands on the page they were expecting. The attacker now has an active session to exploit.

These attacks are typically delivered through Phishing-as-a-Service kits and no longer rely on email alone. Lures appear in LinkedIn messages, paid search results, and compromised websites. In 2025, one in three payloads Push detected originated outside the inbox.

Why most security tools miss AiTM

AiTM kits are designed to avoid detection. Many only activate when triggered by the attacker, so sandbox analysis often has nothing to inspect. Domains rotate constantly, and each campaign uses fresh infrastructure that hasn’t been seen before. In 2025, 95% of in-browser attacks detected by Push used bot protection services to actively block web scanning tools.

Even when the attack succeeds, most systems still don’t see it. The session token is issued inside the browser during a legitimate login flow. EDR sees a process. The network sees traffic. Neither sees what's happening inside the page.

Detect and stop AitM attacks with Push

Push operates inside the browser, where AiTM attacks actually play out. It detects and blocks malicious pages in real time, regardless of how they are delivered. Whether the lure comes through email, messaging platforms, or search results, the detection point remains the same.

Push also tracks the integrity of authenticated sessions. Every session created in a protected browser is tagged. If that session is reused from a different browser or environment, Push detects the mismatch and alerts immediately. This is the exact behavior AiTM attacks depend on, surfaced at the moment it occurs.