{"id":14885,"date":"2019-10-29T09:09:10","date_gmt":"2019-10-29T14:09:10","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=14885"},"modified":"2025-10-23T10:06:13","modified_gmt":"2025-10-23T15:06:13","slug":"man-in-the-middle-attack","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/","title":{"rendered":"What is a Man in the Middle Attack? How to Keep Your Online Footsteps Hidden"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"14885\" class=\"elementor elementor-14885\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-217b03bb e-flex e-con-boxed e-con e-parent\" data-id=\"217b03bb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-193f788b elementor-widget elementor-widget-text-editor\" data-id=\"193f788b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Today we\u2019re going to talk about a ghost in the machine. But don\u2019t get all <a href=\"https:\/\/en.wikipedia.org\/wiki\/Ghost_in_the_machine#Ryle.27s_estimation_of_the_official_doctrine\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">Gilbert Ryle\u2019d <\/a>up. We\u2019re not waxing philosophic or discussing Scar Jo movies. No, we&#8217;re going to demask that phony bogeyman playing trapeze among your unsecured wires: the Man in the Middle. For those unfamiliar with the term, a Man in the Middle (MITM) breach is a cyber-attack in which the bad guys park themselves between you and the web. Man in the Middle is one of the many common attacks discussed in our Spooky Cyber Threats episode of Ping: A Firewalls.com Podcast, and today we&#8217;ll give a more in-depth picture of what the threat looks like.<\/p><h3><strong>What is the goal of a Man in the Middle attack?<\/strong><\/h3><p>The objective is simple: gather as much personal data about the victim as possible. If an opening presents itself, cyber criminals will pursue it. This means that if attackers can trick you into revealing or changing your login credentials, they will. If they can swipe your financial data, they will. The Man in the Middle attack is primarily a recon job with an opportunistic slant.<\/p><h3><strong>How does a Man in the Middle attack work?<\/strong><\/h3><p>Let\u2019s simplify your web surfing to an easily digested scenario: your computer, Point A, wants to fetch data from a web server, Point B. Point A requests data, the request travels over the web, and the web server receives the request. The web server gathers the data and ships it back to Point A. Man in the Middle attacks occur when a cyber attacker plants a toolkit between Point A and Point B and acts as a steppingstone between the two.<\/p><p>From this position, the Man in the Middle employs <a href=\"https:\/\/www.firewalls.com\/blog\/security-terms\/keylogger\/\" target=\"_blank\" rel=\"noopener noreferrer\">keyloggers<\/a>, <a href=\"https:\/\/www.firewalls.com\/blog\/security-terms\/social-engineering\/\" target=\"_blank\" rel=\"noopener noreferrer\">social engineering<\/a>, and monitoring tools to either abscond with personal data or attempt to manipulate the user at Point A into further jeopardy. This can mean anything from serving fake versions of requested websites, tricking users with bogus password change requests, or tricking your contacts into providing sensitive information through <a href=\"https:\/\/www.firewalls.com\/blog\/security-terms\/phishing\/\" target=\"_blank\" rel=\"noopener noreferrer\">phishing<\/a>.<\/p><p>While old-school Man in the Middle attacks required attackers to literally plug into your network via close physical proximity, savvy cyber criminals have perfected the technique to take place completely through your browser. No longer do criminals need to crawl through the ventilation system to smuggle a bug onto your mainframe. Now they can do it all from the comfort of home.<\/p><h3><strong>How do you prevent Man in the Middle attacks?<\/strong><\/h3><p style=\"padding-left: 30px;\"><strong>1 &#8211; Firewalls &amp; Configuration<\/strong><\/p><p style=\"padding-left: 30px;\">The <a href=\"https:\/\/www.firewalls.com\/brands\/sonicwall\/firewalls.html\" target=\"_blank\" rel=\"noopener noreferrer\">most powerful tool you have in the war for cyber security is the firewall<\/a>. However, an appliance alone is rarely sufficient. It is important to also <a href=\"https:\/\/www.firewalls.com\/professional-services.html\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">ensure that your firewall hardware is configured correctly<\/a>. Think about it, if you buy a fancy home security system, you\u2019re not just going to plug it into an outlet and call it a day. Instead, your security devices should be fine-tuned to fit the needs of your network.<\/p><p style=\"padding-left: 30px;\">Take your blind spots and unique vulnerabilities into account. No two networks are built the same and so no two firewalls should be configured the same. Ensuring that you have a suitable setup from the start will save a lot of pain down the road.<\/p><p style=\"padding-left: 30px;\"><strong>2 &#8211; Comprehensive Endpoint Protection<\/strong><\/p><p style=\"padding-left: 30px;\">Even the most expensive hardware will fail once an unsuspecting employee opens a malicious file. Building a tall fence is great and all, but without strong security at the gates, you\u2019re just redirecting network raiders to specific doorways. Sandboxing, ransomware damage rollback, antivirus clients, and browser protection are all fantastic options to add on to your security infrastructure.<\/p><p style=\"padding-left: 30px;\"><a href=\"https:\/\/www.firewalls.com\/blog\/sophos-intercept-x\/\" target=\"_blank\" rel=\"noopener noreferrer\">Sophos Intercept X<\/a> is a powerful security suite built to run alongside your current applications. Give it a <a href=\"https:\/\/secure2.sophos.com\/en-us\/products\/intercept-x\/free-trial.aspx?id=00130000019KGZ4\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">two week trial for free<\/a> to see if it works with your network.<\/p><p style=\"padding-left: 30px;\"><strong>3 &#8211; Exercise Safe Web Practices<\/strong><\/p><p style=\"padding-left: 30px;\">This is the part of the article that preaches about strong passwords and email attachments. So, here goes:<\/p><p style=\"padding-left: 30px;\">&#8211;\u00a0Use strong, complicated passwords. Never use default credentials like \u201cadmin\u201d or \u201c1234\u201d<\/p><p style=\"padding-left: 30px;\">&#8211;\u00a0If you&#8217;re asked to follow a link in an email, always type the URL into your browser. Don\u2019t click! Spoofed domains, <a href=\"https:\/\/nakedsecurity.sophos.com\/typosquatting\/\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">typo-squatting<\/a>, and crucial differences between HTTP and HTTPS mean that every href you click is a potential malware minefield<\/p><p style=\"padding-left: 30px;\">&#8211;\u00a0Don\u2019t open suspicious attachments from unknown senders<\/p><p style=\"padding-left: 30px;\">&#8211;\u00a0Avoid public Wi-Fi if possible. If you must connect to a public router, do so indirectly through Virtual Private Networks. Public networks are a <a href=\"https:\/\/www.firewalls.com\/blog\/security-terms\/watering-hole\/\" target=\"_blank\" rel=\"noopener noreferrer\">watering hole<\/a> where hungry cyber crocodiles are just waiting for their prey to exhibit vulnerability<\/p><p>Following cyber security best practices and deploying next-generation firewalls with an endpoint solution mean instead of dealing with a Man in the Middle, you\u2019ll more likely be playing monkey in the middle with desperate cyber criminals trying, and failing, to get their hands on your data.<\/p><h3>Learn about more cyber threats<\/h3><p>Now that you&#8217;ve mastered the Man in the Middle, maybe it&#8217;s time to conquer keyloggers, trounce trojans, or make persistent threats perish. <a href=\"https:\/\/www.firewalls.com\/blog\/threat-dictionary\/\" target=\"_blank\" rel=\"noopener noreferrer\">Check out the Firewalls.com Threat Dictionary<\/a> to learn about all of the latest network security threats.<\/p><hr \/><p><span style=\"color: #808080;\"><em><span style=\"font-size: 12px;\">Originally published by Andrew Harmon on LinkedIn Pulse, October 2017<\/span><\/em><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>A Man in the Middle breach is a cyber-attack in which the bad guys parks themselves between you and the web, spying on your every move until an opportunity to strike presents itself. Learn why MITM is popular, how the attack works, &#038; how to keep your network safe.<\/p>\n","protected":false},"author":5,"featured_media":14889,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[286],"tags":[],"class_list":["post-14885","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is a Man in the Middle Attack? Keeping Online Footsteps Hidden<\/title>\n<meta name=\"description\" content=\"A Man in the Middle breach is a cyber-attack in which the bad guys parks themselves between you and the web, spying on your every move until an opportunity to strike presents itself. Learn why MITM is popular, how the attack works, &amp; how to keep your network safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a Man in the Middle Attack? Keeping Online Footsteps Hidden\" \/>\n<meta property=\"og:description\" content=\"A Man in the Middle breach is a cyber-attack in which the bad guys parks themselves between you and the web, spying on your every move until an opportunity to strike presents itself. Learn why MITM is popular, how the attack works, &amp; how to keep your network safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-29T14:09:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-23T15:06:13+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/10\/shutterstock_510172012-1024x576.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/man-in-the-middle-attack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/man-in-the-middle-attack\\\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"What is a Man in the Middle Attack? How to Keep Your Online Footsteps Hidden\",\"datePublished\":\"2019-10-29T14:09:10+00:00\",\"dateModified\":\"2025-10-23T15:06:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/man-in-the-middle-attack\\\/\"},\"wordCount\":880,\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/man-in-the-middle-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/shutterstock_510172012.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/man-in-the-middle-attack\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/man-in-the-middle-attack\\\/\",\"name\":\"What is a Man in the Middle Attack? Keeping Online Footsteps Hidden\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/man-in-the-middle-attack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/man-in-the-middle-attack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/shutterstock_510172012.jpg\",\"datePublished\":\"2019-10-29T14:09:10+00:00\",\"dateModified\":\"2025-10-23T15:06:13+00:00\",\"description\":\"A Man in the Middle breach is a cyber-attack in which the bad guys parks themselves between you and the web, spying on your every move until an opportunity to strike presents itself. Learn why MITM is popular, how the attack works, & how to keep your network safe.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/man-in-the-middle-attack\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/man-in-the-middle-attack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/man-in-the-middle-attack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/shutterstock_510172012.jpg\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/shutterstock_510172012.jpg\",\"width\":6000,\"height\":3375},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/man-in-the-middle-attack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a Man in the Middle Attack? How to Keep Your Online Footsteps Hidden\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/www.facebook.com\\\/firewallscom\",\"https:\\\/\\\/x.com\\\/firewallscom\",\"https:\\\/\\\/www.linkedin.com\\\/company-beta\\\/1439857\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\\\/\\\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/author\\\/aharmon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is a Man in the Middle Attack? Keeping Online Footsteps Hidden","description":"A Man in the Middle breach is a cyber-attack in which the bad guys parks themselves between you and the web, spying on your every move until an opportunity to strike presents itself. Learn why MITM is popular, how the attack works, & how to keep your network safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/","og_locale":"en_US","og_type":"article","og_title":"What is a Man in the Middle Attack? Keeping Online Footsteps Hidden","og_description":"A Man in the Middle breach is a cyber-attack in which the bad guys parks themselves between you and the web, spying on your every move until an opportunity to strike presents itself. Learn why MITM is popular, how the attack works, & how to keep your network safe.","og_url":"https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2019-10-29T14:09:10+00:00","article_modified_time":"2025-10-23T15:06:13+00:00","og_image":[{"width":1024,"height":576,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/10\/shutterstock_510172012-1024x576.jpg","type":"image\/jpeg"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"What is a Man in the Middle Attack? How to Keep Your Online Footsteps Hidden","datePublished":"2019-10-29T14:09:10+00:00","dateModified":"2025-10-23T15:06:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/"},"wordCount":880,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/10\/shutterstock_510172012.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/","url":"https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/","name":"What is a Man in the Middle Attack? Keeping Online Footsteps Hidden","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/10\/shutterstock_510172012.jpg","datePublished":"2019-10-29T14:09:10+00:00","dateModified":"2025-10-23T15:06:13+00:00","description":"A Man in the Middle breach is a cyber-attack in which the bad guys parks themselves between you and the web, spying on your every move until an opportunity to strike presents itself. Learn why MITM is popular, how the attack works, & how to keep your network safe.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/10\/shutterstock_510172012.jpg","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2019\/10\/shutterstock_510172012.jpg","width":6000,"height":3375},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/man-in-the-middle-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is a Man in the Middle Attack? How to Keep Your Online Footsteps Hidden"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/14885","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=14885"}],"version-history":[{"count":19,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/14885\/revisions"}],"predecessor-version":[{"id":26089,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/14885\/revisions\/26089"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/14889"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=14885"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=14885"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=14885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}