Adversary-in-the-Middle (AiTM) appears across Initial Access, Positioning, and Execution tactics in the MITRE F3 Framework. It describes fraud actors positioning themselves between a victim and a legitimate service to intercept or manipulate communications.
How does Adversary-in-the-Middle work?
Fraud actors exploit common network protocols (ARP, DNS, LLMNR) to force a device to route traffic through an attacker-controlled system. Once positioned, they can:
- Collect credentials entered by the victim in real time
- Capture session cookies and replay them to authenticate without the victim's password
- Manipulate transmitted data, altering transaction amounts or account details
- Bypass MFA by relaying the OTP or approval before the victim's session expires
Tools like Evilginx2 and Muraena are openly available frameworks that implement AiTM as reverse proxies, specifically designed for use in phishing campaigns.
What is the link between AiTM and phishing simulation?
A phishing link that routes the victim through an AiTM proxy can harvest both the password and the MFA token in a single interaction. This is why simulating only password-theft scenarios is insufficient: employees need to recognise that clicking a link is dangerous even when MFA is active.
Key takeaways
- AiTM appears under Initial Access, Positioning, and Execution in MITRE F3.
- Attackers intercept credentials, session cookies, and live traffic between victim and service.
- AiTM can bypass MFA by relaying OTPs in real time.
- Open-source tools (Evilginx2, Muraena) make AiTM accessible to low-sophistication attackers.
- Phishing is the primary delivery mechanism to lure victims into AiTM proxies.
What is MITRE Fight Fraud Framework™ (F3)?
The MITRE Fight Fraud Framework (F3) is a curated knowledge base of tactics, techniques, and sub-techniques used by fraud actors in cyber-based financial fraud incidents. Developed by MITRE's Center for Threat-Informed Defense in collaboration with FS-ISAC, JPMorganChase, and Lloyds Banking Group, it provides a common language for fraud-fusion teams to describe, detect, and prevent financial fraud. F3 is modeled after MITRE ATT&CK® and focuses on banking institutions as its initial scope.