https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • MSP 501 Rankings
    • NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Channel Futures 20: Top Tech Providers
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
    • Channel Leaders Lists
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • MSP 501 Rankings
    • NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Channel Futures 20: Top Tech Providers
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
    • Channel Leaders Lists
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

MSSP Insider


Shutterstock

Black Hat Hacker

Webroot: How to Protect Your Business from ‘Man in the Middle’ Cyberattacks

  • Written by Tyler Moffitt
  • September 9, 2019
Those spy-like eavesdropping efforts can steal your data and redirect your money.

By Tyler Moffitt

The question in this edition’s “ask a security expert” comes to us from Steve Boulton, a technical account manager at Business Computer Solutions, who asks, “What is a man-in-the-middle attack?”

At the most basic level, man-in-the-middle (MITM) attacks are just a more advanced form of eavesdropping. But, despite their often-simplistic nature, they can pose a serious threat to you, your personal data and your business. Here’s some helpful information on what you should be on the lookout for when it comes to MITM attacks.

A MITM attack is when an outside individual, most often a hacker, intercepts and/or alters communications between two systems. These types of attacks can take shape online in any number of ways. From email to social media to just simply browsing the internet, hackers can get between you and whatever system or person you’re interacting with to capture your data and information.

How MITM Attacks Work

Despite the relative simplicity behind the concept of MITM attacks, they’ve evolved throughout the years, with hackers developing a variety of ways to execute these spy-like attacks. Three of the most common types of MITM attacks include Wi-Fi interference, email hijacking and session hijacking.

  • Wi-Fi Interference: A common tactic used in MITM attacks is Wi-Fi interference, where a hacker will use a wireless connection to eavesdrop on anyone who connects to the network, then gain access to a host of personal, financial or corporate information. Hackers set up a Wi-Fi connection and wait for their victims to click. This includes waiting for unsuspecting individuals to connect to a phony hotspot intentionally named to trick them into connecting. Once a device is connected to the hacker’s network, they have access to all the information on the connected device.
  • Email Hijacking: Another frequently used MITM attack vector is email hijacking. In this type of attack, hackers can single out their victims by targeting their email accounts. While high-profile corporations, financial institutions and banks are most often targeted in this type of MITM attack, anyone can fall victim.

Once attackers have access to their desired email account, they quietly monitor the correspondence and wait for an opportune moment to make their move. Jumping into a conversation around money transfers is common. Hackers will insert themselves into the email conversation at the precise moment, faking a company email and providing their own bank details so victims believe they are sending money to the legitimate company but are actually sending it straight into the hacker’s account.

  • Session Hijacking: MITM attacks can also be conducted through session hijacking. When you log onto a website, a connection between your computer and the website is established, and hackers are able to hijack this session with the website. There are various ways they’re able to hijack the session, but one of the most common ways is by stealing browser cookies — you know, those things you “accept” every time you jump to a new website. Cookies can store all types of information, everything from online activity to login credentials to your location. Once hackers have access to these login cookies, they can very easily log into your accounts and wreak havoc.

Protecting Yourself and Your Business from MITM Attacks

MITM attacks are sneaky; it’s in their nature. However, there are a number of ways that you can protect yourself, and your business, from falling prey to their stealth.

Individual users can take simple steps, such as paying close attention to whether a website is properly secured, logging out of applications when not in use and refraining from connecting to public Wi-Fi hotspots. By implementing cyberhygiene best practices you can dramatically decrease your chances of falling victim to a MITM attack. And if you must connect to an unsecured Wi-Fi network, make sure you …

  • Page 1
  • Page 2
Tags: MSPs Business of Security MSSP Insider Network Security

Most Recent


  • Businessman reading cloud computing news
    Cloud Computing News: VMware, Celigo, Google Cloud, AWS Dominate the Week
    Find out what the vendors are up to this week and how partners are impacted.
  • OffSec Partners Get Expanded Global Partner Program
    The expanded partner program includes three new partner types.
  • zero day vulnerability
    Barracuda Networks Identifies Long-Exploited Zero-Day Vulnerability
    The earliest identified evidence of exploitation dates back to October 2022.
  • Cybersecurity, strategic partnership
    Strategic Partnership Between Pax8, CrowdStrike Advances Cybersecurity for MSPs
    CrowdStrike keeps customers ahead of an expanding threat environment by delivering AI-powered protection, officials said.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • Security Vulnerability
    Older Fortinet Vulnerabilities Lead to Attack on Local Government Office
  • Threats
    Cybersecurity and Threat Protection: MSSPs, Get Your Advice Here
  • DevSecOps
    ServiceNow, Microsoft Set to Deliver Broad SecOps Integration
  • Dunce Cap Businessman
    Tired of MSSPs ‘Failing,’ Nuspire Debuts Platform to Combat Cyberattacks

Upcoming Events

View all

Channel Partners Europe

June 13, 2023 - June 14, 2023

Channel Futures Leadership Summit

October 30, 2023 - November 2, 2023

Channel Partners Conference & Expo

March 11, 2024 - March 14, 2024

Galleries

View all

Cloud Computing News: VMware, Celigo, Google Cloud, AWS Dominate the Week

June 2, 2023

Channel People on the Move: HPE, Lumen, Sophos, TD Synnex, AireSpring, More

June 1, 2023

Faces of the Partner: 5 Tech Advisors Retiring, Transitioning

June 1, 2023

Industry Perspectives

View all

Dell Technologies World: Dell Apex Expanded Across On-Premises, Cloud and Edge

May 22, 2023

Identity Is Increasingly Valuable – and Targeted

May 18, 2023

Gaining a Competitive Advantage through AV Managed Services

May 10, 2023

Webinars

View all

From Problem to Profit: Mastering the Science of Selling Using Business Outcomes

May 9, 2023

Meet the 2023 Channel Futures Channel Influencers

April 13, 2023

DE&I Dialogue: How the Right DE&I Initiatives Can Propel Your Business

April 5, 2023

White Papers

View all

6 UCaaS Reseller Challenges and How Real World Businesses Solved Them

February 1, 2023

Frost Radar: North American UCaaS Market, 2022

February 1, 2023

The Complete Guide to White-Label UCaaS for Reseller Success

February 1, 2023

Channel Futures TV

View all

Coffee with Craig and James Episode No. 123: MartinWolf M&A Advisors, CP Expo Preview

UScellular Takes On Rivals with Partner Program Simplicity

April 21, 2023

OpenText Simplifying Deal Registration, Doubling Down on MDF

April 21, 2023

Everything-as-a-Service: CloudBlue Touts Critical Customer Transition

April 18, 2023

Twitter

ChannelFutures

Don’t miss out on this exceptional MSP news roundup including hires and promotions that affect the channel! >>… twitter.com/i/web/status/1…

June 2, 2023
ChannelFutures

Big happenings for @VMware this week. Plus, @GoogleCloud debuted something huge. And news from @CeligoInc,… twitter.com/i/web/status/1…

June 2, 2023
ChannelFutures

.@offsectraining launches expanded partner program. #cybersecuritytraining dlvr.it/Sq3VxS https://t.co/3SIoF4p18j

June 2, 2023
ChannelFutures

🏆 Trust @eatoncorp as your single source for comprehensive power management solutions that organize, protect and ma… twitter.com/i/web/status/1…

June 2, 2023
ChannelFutures

What could 1.2 million unique views do to your brand? Explore the interactive Channel Futures media kit outlining a… twitter.com/i/web/status/1…

June 2, 2023
ChannelFutures

Thinking about adding #MDR to your cybersecurity stack? @Malwarebytes outlines the questions MSPs need to conside… twitter.com/i/web/status/1…

June 2, 2023
ChannelFutures

Use #automation and #incidentresponse to help customers minimize risk, says @bigpanda. dlvr.it/Sq1zy1 https://t.co/wxxyPbGBeY

June 2, 2023
ChannelFutures

Do you want to gain additional knowledge from extraordinary marketing leaders? This list will provide expert tips a… twitter.com/i/web/status/1…

June 1, 2023

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X