HomeCyber BalkansNew BitM Attack Allows Hackers to Hijack User Sessions within Seconds

New BitM Attack Allows Hackers to Hijack User Sessions within Seconds

Published on

spot_img

A recent threat intelligence report has shed light on the emergence of a highly sophisticated cyberattack technique known as Browser-in-the-Middle (BitM), which has the capability to hijack user sessions across a variety of web applications in a mere matter of seconds. This method leverages the inherent functionalities of web browsers to deceive victims into believing they are engaging with a secure connection, when in reality, their actions are being executed on the attacker’s machine.

BitM attacks specifically target session tokens that are stored in a user’s browser following the completion of multi-factor authentication (MFA). These tokens play a pivotal role in maintaining an authenticated state, thereby making them a prime target for malicious actors seeking to exploit vulnerabilities. Unlike traditional methods that necessitate the use of transparent proxies like Evilginx2, BitM offers rapid targeting capabilities with minimal configuration requirements, enabling hackers to swiftly compromise any website.

In response to the escalating threat posed by these attacks, organizations are advised to adopt robust defense strategies. Mandiant recommends the implementation of client certificates and hardware-based MFA solutions, such as FIDO2-compatible security keys. These measures serve as effective deterrents against BitM attacks by imposing authentication elements that are challenging for adversaries to manipulate. For example, FIDO2 keys ensure that authentication responses are intricately linked to the request’s origin, thwarting attackers from replaying them on different sites.

Nevertheless, the efficacy of these protections is contingent upon the integrity of the device hosting the security keys or certificates remaining uncompromised, underscoring the necessity of a multi-layered security approach. The development of internal tools like Delusion by Mandiant underscores the potential scale of BitM attacks, as it empowers operators to target applications without prior knowledge of their authentication protocols, thereby simplifying session-stealing attacks.

While Mandiant has refrained from publicly releasing Delusion due to concerns surrounding its weaponization, open-source alternatives like EvilnoVNC and Cuddlephish are available for testing defenses against such threats. As BitM attacks continue to evolve and grow in complexity, organizations must place a paramount emphasis on bolstering authentication and access-control mechanisms to safeguard sensitive data and networks from malicious exploitation.

In conclusion, the proliferation of BitM attacks underscores the critical importance of staying vigilant and proactive in fortifying cybersecurity defenses to mitigate the risks posed by sophisticated cyber threats. By investing in robust security measures and adopting a proactive stance against evolving attack vectors, organizations can effectively safeguard their digital assets and networks from potential compromise and data breaches.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...