Have a personal or library account? Click to login
Advanced Phishing Techniques: Analyzing Adversary-in-the-Middle and Browser-in-the-Browser Attacks in Modern Cybersecurity Cover

Advanced Phishing Techniques: Analyzing Adversary-in-the-Middle and Browser-in-the-Browser Attacks in Modern Cybersecurity

Open Access
|Mar 2025

Abstract

Phishing attacks remain among the most common techniques malicious actors use to steal sensitive information. This paper examines two emerging phishing techniques: Adversary-in-The-Middle (AiTM) and Browser-in-the-Browser (BitB) attacks. AiTM attacks intercept communicating devices, allowing attackers to hijack accounts and access sensitive data. BitB attacks use a deceptive pop-up login window that mimics a legitimate authentication portal, forcing users to input private credentials. These methods have been developed to bypass traditional security measures, especially Multi-Factor Authentication (MFA), posing an ever-growing threat to real-life sectors such as finance, healthcare, and public services. These attacks are becoming more prevalent across various sectors, calling for businesses to implement stronger security measures. Effective countermeasures include detection and prevention, mitigation to limit attack impact, and AI-based attack identification and termination tools. Organizations can reduce the risk of these sophisticated cyber threats through a combination of prevention, mitigation, and AI-based tools.

DOI: https://doi.org/10.2478/cait-2025-0004 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 55 - 77
Submitted on: Dec 12, 2024
Accepted on: Feb 24, 2025
Published on: Mar 21, 2025
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 times per year

© 2025 Eric B. Blancaflor, Jacob O. Duldulao, John Vincent E. Espeño, Geoff Stephen M. Patag, Ma. Theresa Menor, Grace Lorraine Intal, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.