Adversary-in-the-Middle (AiTM) phishing is an advanced phishing technique where attackers secretly position themselves between a user and a legitimate website to intercept credentials and session data in real time. According to Microsoft, “These attacks possess the capability to maneuver around the security measures of multifactor authentication (MFA) by leveraging reverse-proxy functionality.”
According to The Hacker News, AiTM phishing tricks a user into logging in through an attacker’s system that sits between the victim and the real website. Because the attacker’s site acts as a proxy, the login looks and feels legitimate; however, everything the victim enters on this proxy page goes through the attacker first. The steps of the attack are as follows:
Read more: Man-in-the-X attacks explained
According to The Hacker News, AiTM phishing attacks typically originate from organized cybercriminal groups that use readily available phishing toolkits and infrastructure to target cloud-based accounts at scale. These sources commonly include:
To defend against Adversary-in-the-Middle (AiTM) phishing attacks, Microsoft emphasizes the importance of advanced detection and response strategies that go beyond traditional email filtering, because these attacks can still bypass MFA by stealing session cookies and hijacking sessions. Microsoft recommends the following:
AiTM attacks often generate unusual network activity that can be detected by analyzing logs from security devices such as firewalls, secure web gateways, or network proxies. Correlating phishing alerts with this network data can help identify suspicious connections soon after a user clicks a phishing link.
By linking phishing event data with user sign-in logs and network traffic, organizations can detect when a user interacts with a malicious site and then successfully authenticates to the real service, which is a strong sign of AiTM activity.
Identifying successful sign-ins that follow suspicious network behavior or originate from unfamiliar devices or geographic locations helps catch attackers using stolen credentials or session tokens.
Once a potential AiTM compromise is detected, automated measures can be triggered to reduce risk. These measures can include disabling affected accounts, revoking active sessions, or enforcing credential resets in order to swiftly block attackers’ access.
Security teams can employ automated workflows to respond consistently to AiTM alerts. These playbooks can include actions like blocking malicious IP addresses, quarantining compromised devices, and notifying users to take corrective steps.
Together, these strategies enable organizations to detect AiTM phishing attacks earlier, reduce false alarms, and respond faster, preventing attackers from bypassing multifactor authentication and maintaining unauthorized access.
See also: HIPAA Compliant Email: The Definitive Guide (2025 Update)
AiTM phishing often targets cloud services and enterprise accounts, such as email platforms, business collaboration tools, and other online services that require secure login.
While MFA greatly improves security, AiTM phishing can bypass some MFA methods by capturing the authentication tokens. Stronger phishing-resistant MFA, like hardware security keys, provides better protection.
Users should immediately report the incident, change their passwords, review recent account activity, and follow their organization’s incident response guidance.