HomeCyber BalkansNew BitM Attack Allows Hackers to Hijack User Sessions within Seconds

New BitM Attack Allows Hackers to Hijack User Sessions within Seconds

Published on

spot_img

A recent threat intelligence report has shed light on the emergence of a highly sophisticated cyberattack technique known as Browser-in-the-Middle (BitM), which has the capability to hijack user sessions across a variety of web applications in a mere matter of seconds. This method leverages the inherent functionalities of web browsers to deceive victims into believing they are engaging with a secure connection, when in reality, their actions are being executed on the attacker’s machine.

BitM attacks specifically target session tokens that are stored in a user’s browser following the completion of multi-factor authentication (MFA). These tokens play a pivotal role in maintaining an authenticated state, thereby making them a prime target for malicious actors seeking to exploit vulnerabilities. Unlike traditional methods that necessitate the use of transparent proxies like Evilginx2, BitM offers rapid targeting capabilities with minimal configuration requirements, enabling hackers to swiftly compromise any website.

In response to the escalating threat posed by these attacks, organizations are advised to adopt robust defense strategies. Mandiant recommends the implementation of client certificates and hardware-based MFA solutions, such as FIDO2-compatible security keys. These measures serve as effective deterrents against BitM attacks by imposing authentication elements that are challenging for adversaries to manipulate. For example, FIDO2 keys ensure that authentication responses are intricately linked to the request’s origin, thwarting attackers from replaying them on different sites.

Nevertheless, the efficacy of these protections is contingent upon the integrity of the device hosting the security keys or certificates remaining uncompromised, underscoring the necessity of a multi-layered security approach. The development of internal tools like Delusion by Mandiant underscores the potential scale of BitM attacks, as it empowers operators to target applications without prior knowledge of their authentication protocols, thereby simplifying session-stealing attacks.

While Mandiant has refrained from publicly releasing Delusion due to concerns surrounding its weaponization, open-source alternatives like EvilnoVNC and Cuddlephish are available for testing defenses against such threats. As BitM attacks continue to evolve and grow in complexity, organizations must place a paramount emphasis on bolstering authentication and access-control mechanisms to safeguard sensitive data and networks from malicious exploitation.

In conclusion, the proliferation of BitM attacks underscores the critical importance of staying vigilant and proactive in fortifying cybersecurity defenses to mitigate the risks posed by sophisticated cyber threats. By investing in robust security measures and adopting a proactive stance against evolving attack vectors, organizations can effectively safeguard their digital assets and networks from potential compromise and data breaches.

Source link

Latest articles

Knocknoc Secures Seed Funding to Expand its Just-In-Time Network Access Control Technology

Sydney-based cybersecurity software company, Knocknoc, recently announced that it has secured a seed funding...

Duke University and GCF collaborate to uncover avenues for enhancing women’s careers in cybersecurity

Duke University has recently partnered with the Global Cybersecurity Fund (GCF) to explore ways...

New Report Highlights Common Passwords Used in RDP Attacks

A recent study conducted by cybersecurity experts at Specops has shed light on the...

Fraudulent Messages Pretending to be Coinbase Migration Emails Aim to Steal Wallet Credentials

A phishing campaign targeting cryptocurrency investors has recently gained traction, with fraudulent emails masquerading...

More like this

Knocknoc Secures Seed Funding to Expand its Just-In-Time Network Access Control Technology

Sydney-based cybersecurity software company, Knocknoc, recently announced that it has secured a seed funding...

Duke University and GCF collaborate to uncover avenues for enhancing women’s careers in cybersecurity

Duke University has recently partnered with the Global Cybersecurity Fund (GCF) to explore ways...

New Report Highlights Common Passwords Used in RDP Attacks

A recent study conducted by cybersecurity experts at Specops has shed light on the...