PUBlished on
April 28, 2025
updated on
November 5, 2025

What Are Adversary-in-the-Middle (AiTM) Attacks?

Scott Young

What is AiTM Phishing?

Phishing kits now include adversary-in-the-middle (AitM) capabilities as standard features to  bypass email security.

AiTM vs. MiTM Attacks: What's the Difference?

Cybercriminals are evolving beyond traditional man-in-the-middle (MiTM) attacks. Adversary-in-the-Middle (AiTM) phishing is a new variant that intercepts cloud session tokens—bypassing multi-factor authentication (MFA) and exposing businesses to rapid account takeover.

While MiTM attacks exploit network-level vulnerabilities, AiTM attacks operate at the authentication layer—using fake login pages to capture credentials and hijack tokens.

Modern phishing kits now commonly include AiTM capabilities, making these attacks more accessible to cybercriminals and harder for security teams to detect. Obsidian Security has observed that up to 77% of phishing sites employ evasion techniques, such as turnstiles, CAPTCHAs, and IP filtering, to prevent detection.

Organizations that rely on traditional email security and MFA alone must adapt their defenses to counter this growing threat.

How AiTM Phishing Works

AiTM phishing attacks work by inserting an attacker-controlled proxy, often a fake login page, between a victim and a legitimate website. The attacker intercepts the login process through this proxy, effectively hijacking user sessions and secretly capturing sensitive information. 

The attack typically follows these steps:

1. Phishing Email Delivery

2. Proxy-Based Credential Theft

3. Session Hijacking via Token Theft

4. Bypassing Multi-Factor Authentication (MFA)

5. Post-Exploitation

Why Adversary-in-the-Middle Attacks Are So Dangerous

1. Bypass Traditional Security Measures

Many organizations rely on MFA to protect accounts from compromise. However, AiTM phishing defeats MFA by stealing session cookies after authentication, rendering one-time passwords (OTPs), push notifications, and app-based authenticators ineffective.

2. Stealthy and Hard to Detect

Since the victim interacts with the legitimate website through an attacker-controlled proxy, traditional phishing detection methods like email gateways can fail to identify malicious activity. Security logs may show a normal login from a trusted location, hiding the fact that an attacker is intercepting the session. MiTM attacks often use TLS encryption, making network traffic analysis less effective at spotting anomalies.

3. Rapid Account Takeover and Data Theft

Once an attacker gains access to a session, they can:

4. Phishing Kits with AiTM Are Widely Available

Adversary-in-the-middle attack capabilities are no longer limited to advanced cybercriminals. Ready-made phishing kits now integrate AiTM features, making it easier for less sophisticated attackers to execute these campaigns. Some popular AiTM phishing toolkits include Evilginx and Tycoon.

These toolkits allow attackers to automate session hijacking, making large-scale AiTM attacks more feasible.

How to Detect and Prevent AiTM Phishing Attacks

To defeat modern man-in-the-middle attacks, security teams must harden their defenses where identity compromise actually occurs: the browser. Obsidian Security offers an in-browser AiTM phishing prevention solution that stops 100% of popular kits like Evilginx and Tycoon.

Integrated in the browser, Obsidian Security deeply inspects web content using advanced visual analysis plus applied threat intelligence to instantly block malicious webpages as soon as they render—even for never-before-seen phishing kits or personal email attacks.

By seeing what the user sees, Obsidian can thwart AiTM evasion techniques that bypass Proofpoint, Abnormal, and other security solutions. Get started for free to begin detecting AiTM phishing threats.

Why You Need AiTM-Specific Defenses

Man-in-the-Middle attacks like AiTM phishing are a major evolution in cyber threats, capable of bypassing traditional MFA and leading to rapid account takeovers. With phishing kits integrating AiTM as a standard feature, organizations must adopt phishing-resistant authentication methods, AI-powered security monitoring, and user training to defend against these sophisticated attacks.

The future of phishing prevention lies in Zero-Trust principles, stronger authentication standards, and real-time behavioral threat detection. As AiTM phishing techniques continue to evolve, organizations must stay proactive in their cybersecurity approach to mitigate these growing risks.

Frequently Asked Questions (FAQs)

How do Adversary-in-the-Middle (AiTM) phishing attacks bypass multi-factor authentication (MFA)?

AiTM phishing attacks bypass MFA by intercepting the user's session token after successful authentication. When a victim logs in and completes MFA on a fake login page controlled by the attacker, the attacker captures the session cookie. This allows them to access the account as if they were the legitimate user, rendering MFA protections ineffective.

What makes AiTM phishing attacks more difficult to detect compared to traditional phishing?

AiTM phishing attacks are harder to detect because the victim interacts with legitimate websites through attacker-controlled proxies. The attacker relays information between the user and the real site, making the fake login appear genuine. Network security tools and email gateways may fail to identify these attacks, as security logs often show normal logins and traffic is often encrypted.

Why are phishing kits with AiTM capabilities particularly concerning for organizations?

Phishing kits with built-in AiTM capabilities, such as Evilginx and Tycoon, make it easy for even less-sophisticated attackers to conduct large-scale session hijacking attacks. These kits automate the process of capturing session tokens, drastically increasing the speed and scalability of account takeovers across organizations, and reducing the technical barriers for cybercriminals.

What steps can organizations take to prevent AiTM phishing attacks?

To prevent AiTM phishing attacks, organizations should deploy phishing-resistant authentication methods and AI-powered, in-browser security solutions. User training, real-time behavioral monitoring, and adopting Zero-Trust principles are also critical. Obsidian Security offers in-browser protection that blocks 100% of popular AiTM phishing kits, even for previously unknown threats.

You May Also Like

Get Started

Start in minutes and secure your critical SaaS applications with continuous monitoring and data-driven insights.

get a demo