HomeCyber BalkansNew BitM Attack Allows Hackers to Hijack User Sessions within Seconds

New BitM Attack Allows Hackers to Hijack User Sessions within Seconds

Published on

spot_img

A recent threat intelligence report has shed light on the emergence of a highly sophisticated cyberattack technique known as Browser-in-the-Middle (BitM), which has the capability to hijack user sessions across a variety of web applications in a mere matter of seconds. This method leverages the inherent functionalities of web browsers to deceive victims into believing they are engaging with a secure connection, when in reality, their actions are being executed on the attacker’s machine.

BitM attacks specifically target session tokens that are stored in a user’s browser following the completion of multi-factor authentication (MFA). These tokens play a pivotal role in maintaining an authenticated state, thereby making them a prime target for malicious actors seeking to exploit vulnerabilities. Unlike traditional methods that necessitate the use of transparent proxies like Evilginx2, BitM offers rapid targeting capabilities with minimal configuration requirements, enabling hackers to swiftly compromise any website.

In response to the escalating threat posed by these attacks, organizations are advised to adopt robust defense strategies. Mandiant recommends the implementation of client certificates and hardware-based MFA solutions, such as FIDO2-compatible security keys. These measures serve as effective deterrents against BitM attacks by imposing authentication elements that are challenging for adversaries to manipulate. For example, FIDO2 keys ensure that authentication responses are intricately linked to the request’s origin, thwarting attackers from replaying them on different sites.

Nevertheless, the efficacy of these protections is contingent upon the integrity of the device hosting the security keys or certificates remaining uncompromised, underscoring the necessity of a multi-layered security approach. The development of internal tools like Delusion by Mandiant underscores the potential scale of BitM attacks, as it empowers operators to target applications without prior knowledge of their authentication protocols, thereby simplifying session-stealing attacks.

While Mandiant has refrained from publicly releasing Delusion due to concerns surrounding its weaponization, open-source alternatives like EvilnoVNC and Cuddlephish are available for testing defenses against such threats. As BitM attacks continue to evolve and grow in complexity, organizations must place a paramount emphasis on bolstering authentication and access-control mechanisms to safeguard sensitive data and networks from malicious exploitation.

In conclusion, the proliferation of BitM attacks underscores the critical importance of staying vigilant and proactive in fortifying cybersecurity defenses to mitigate the risks posed by sophisticated cyber threats. By investing in robust security measures and adopting a proactive stance against evolving attack vectors, organizations can effectively safeguard their digital assets and networks from potential compromise and data breaches.

Source link

Latest articles

Microsoft Resolves Two Zero-Day Vulnerabilities in Defender

On Wednesday, the United States Cybersecurity and Infrastructure Security Agency (CISA) took significant action...

Web Developers Concerned About Job Displacement Due to AI, New Survey Reveals

Web Developers Express Job Security Concerns Amidst Rising AI Adoption A recent survey conducted by...

Mythos-Level AI Is Causing a Tech Debt Crisis

Advanced AI Models Highlight Security Vulnerabilities Beyond Traditional Management In a rapidly evolving technological landscape,...

More like this

Microsoft Resolves Two Zero-Day Vulnerabilities in Defender

On Wednesday, the United States Cybersecurity and Infrastructure Security Agency (CISA) took significant action...

Web Developers Concerned About Job Displacement Due to AI, New Survey Reveals

Web Developers Express Job Security Concerns Amidst Rising AI Adoption A recent survey conducted by...