Phishing used to be simple: create a fake website, steal credentials, hope the victim doesn’t notice. Then multi-factor authentication complicated things, so attackers developed more sophisticated proxy techniques. Now they’ve taken the next logical step – why build fake websites when you can just use real ones through your own browser?
Browser-in-the-Middle (BitM) attacks eliminate the weakest links in traditional phishing campaigns by removing almost everything that could tip off a victim that something’s wrong. There are no suspicious URLs to scrutinize, no certificate warnings to ignore, and no fake interfaces to spot. The victim sees and interacts with the legitimate website through the attacker’s browser, making it extremely difficult to detect the attack.
This approach makes traditional security awareness training less effective and forces organizations to rethink how they protect authenticated sessions. When the website is real and multi-factor authentication works exactly as designed, how do you teach users to spot the attack?
How BitM Differs from Traditional Attacks
Traditional Man-in-the-Middle (MitM) attacks position a proxy server between your browser and the target website, requiring malware installation and network traffic manipulation.
BitM attacks work differently. Instead of intercepting communications, attackers trick you into using their browser while making you believe it’s your own. Researchers at the University of Salento say that the attack is “pursued by substituting the victim’s browser with a malicious transparent browser, hosted on the attack platform, that the attacker is able to control in every way, leaving the victim totally unaware of the substitution.”
Rather than eavesdropping on your conversation, the attacker convinces you to use their phone to make the call. You still reach your intended destination, but everything you say goes through their device first.
The BitM Attack Process
BitM attacks unfold in three phases that exploit both technical vulnerabilities and human psychology:
Stage 1: The Setup (Phishing)
Every BitM attack begins with getting the victim to click a malicious link. Modern BitM campaigns use sophisticated social engineering techniques like:
- Sponsored ads that appear in legitimate search results for popular services
- Social media posts with links to “urgent” account updates
- Text messages claiming immediate action is required
- Professional-looking emails that perfectly mimic legitimate services
These phishing attempts direct victims to the attacker’s server, which then routes their connection through a load balancer to an available proxied browser.
Stage 2: The Substitution (Fake Browser Deployment)
Once the victim clicks the malicious link, they’re connected to what appears to be a normal website. Behind the scenes, however, the attacker deploys a transparent browser using tools like noVNC (a browser-based VNC client) or similar remote access technologies.
The victim sees exactly what they expect: the familiar login page of their intended service. What they don’t realize is that they’re actually looking at a legitimate website displayed through the attacker’s browser. It’s like watching a live stream of a real website while unknowingly broadcasting all your interactions to the attacker.
Stage 3: Session Hijacking
When the victim enters their credentials and completes multi-factor authentication, they’re doing so on the legitimate website through the attacker’s browser. This means credentials are captured in real-time, MFA tokens are intercepted, session tokens are stolen after successful authentication, and the victim successfully accesses their account without realizing the compromise.
Unlike traditional phishing where victims might notice they can’t access their account after entering credentials, BitM victims have a completely normal experience. They log in successfully and continue their session, never realizing their credentials and active session have been compromised.

Session Tokens Make BitM Exceptionally Dangerous
Once you complete your login process (including multi-factor authentication), web applications store a session token in your browser. This token acts like a temporary ID card that proves you’re already authenticated for future requests.
According to Mandiant researchers, “Stealing this session token is the equivalent of stealing the authenticated session, meaning an adversary would no longer need to perform the MFA challenge.” This makes MFA significantly less effective against BitM attacks, as attackers get full access to authenticated sessions without needing to replay or bypass the second factor.
Traditional phishing attacks might capture your username and password, but they’d still need to figure out how to bypass your MFA. BitM attacks sidestep this problem entirely by capturing everything after you’ve already proven your identity.
The Full-Screen Variant: From Bad to Worse
Recent research has uncovered an even more sophisticated variant of BitM attacks that exploits browser fullscreen capabilities. SquareX researchers have observed attackers using the Fullscreen API to create “fullscreen BitM attacks” where the malicious window covers the parent window’s address bar, making detection extremely difficult.
Here’s how this enhanced attack works:
- Initial deception: Victim visits a fake website (often reached through sponsored ads)
- Hidden window preparation: A BitM window is prepared but kept minimized
- Trigger activation: When the victim clicks a “login” button, the hidden BitM window activates
- Fullscreen takeover: The attacker-controlled browser opens in fullscreen mode, completely covering the fake website
- Perfect illusion: The victim now sees the legitimate website with no visible signs they’re in an attacker-controlled environment
This variant is particularly effective because it removes the one visual cue that might alert security-conscious users: the suspicious URL in the address bar. Once in fullscreen mode, there’s no address bar visible at all.
Safari’s Vulnerability Problem
While fullscreen BitM attacks work across all browsers, Safari users face additional risks. SquareX researchers note that “such attacks are particularly dangerous for Safari users, as Apple’s browser fails to properly alert users when a browser window enters fullscreen mode.”
Firefox and Chrome-based browsers display clear warnings when content enters fullscreen mode. While users might still miss these warnings, they provide at least some indication that something unusual is happening. Safari only shows a subtle “swipe” animation that’s easily overlooked.
When SquareX researchers reported this issue to Apple, they received a response indicating the company doesn’t consider this a significant enough vulnerability to warrant changes. Apple’s position is that the existing animation provides sufficient indication of the state change.
Scalability and Automation Advantages
Another thing that makes BitM attacks particularly concerning is their combination of effectiveness and scalability, allowing attackers to reach any website on the web in a matter of seconds with minimal configuration.
BitM attacks simply display the real website through the attacker’s browser, which means zero development time for fake login pages, automatic updates when target sites change their interface, perfect authenticity since victims interact with the real service, and universal applicability across any web-based service.
For cybercriminals, this dramatically reduces the time and technical expertise required to launch successful phishing campaigns against any online service.
Why Traditional Security Measures Struggle
BitM attacks pose significant challenges for conventional security measures:
Endpoint Detection and Response (EDR) Limitations
Traditional EDR solutions monitor for malicious processes and suspicious file activities on endpoints. BitM attacks cleverly sidestep these detections because:
- No malware needs to be installed on the victim’s device
- All malicious activity happens on the attacker’s infrastructure
- The victim’s browser behaves normally from an endpoint perspective
Network Security Blind Spots
Network security tools like SASE and SSE solutions struggle with BitM attacks because traffic patterns appear normal and the attack leverages standard browser APIs and protocols. Remote browser technologies (like VNC) can also be obfuscated to avoid detection
User Training Gaps
Even security-aware users can fall victim to BitM attacks. The target website looks completely authentic (because it is), and normal security indicators (HTTPS, correct domain) are present. There are no obvious red flags signal that something is wrong.

Effective Defense Strategies
While BitM attacks are sophisticated, they’re not unstoppable. Organizations can implement several defense strategies to significantly reduce their effectiveness:
Phishing-Resistant Authentication
The most effective defense against BitM attacks is implementing authentication methods that can’t be easily replayed or proxied.
FIDO2 Security Keys: Hardware security keys that implement the FIDO2 standard provide strong protection against BitM attacks. The FIDO2 protocol ensures that responses are “immutably tied to the request’s origin,” meaning an attacker’s site cannot successfully request authentication responses for a different target website.
Certificate-Based Authentication: Client certificates tied to specific devices create another barrier, as these certificates typically can’t be extracted and used from an attacker’s browser environment.
Device-Bound Authentication: Solutions that verify device identity and trustworthiness before allowing access can prevent sessions from being established through attacker-controlled browsers.
Enhanced Monitoring and Detection
While challenging, BitM attacks can leave detectable traces.
Unusual Geographic Patterns: Sessions originating from unexpected locations or showing rapid geographic changes may indicate session hijacking.
Browser Fingerprinting Anomalies: Implementing robust browser fingerprinting can help detect when sessions are being established from different browser environments.
Session Behavior Analysis: Monitoring for unusual session patterns, timing anomalies, or behavioral inconsistencies can help identify compromised sessions.
User Education and Awareness
Training users to recognize BitM attack vectors is still important, even if it is harder.
Link Verification: Teaching users to carefully examine URLs before clicking, especially in sponsored content or unsolicited communications.
Fullscreen Awareness: Helping users understand when and why legitimate sites might use fullscreen mode, and encouraging skepticism when unexpected fullscreen transitions occur.
Multi-Channel Verification: Encouraging users to verify unexpected login requests through alternative communication channels. Building a strong cybersecurity culture helps here.
Technical Controls
Organizations can implement several technical measures:
Conditional Access Policies: Implementing strict conditional access that considers device trust, location, and risk factors before allowing authentication.
Session Time Limits: Reducing session duration and requiring periodic re-authentication can limit the window of opportunity for attackers.
Zero Trust Architecture: Implementing zero trust principles that continuously verify user and device identity throughout sessions.
The Broader Security Implications
BitM attacks represent more than just another phishing technique – they signal a fundamental shift in how attackers approach authentication bypass. By focusing on session tokens rather than credentials, these attacks highlight the limitations of current multi-factor authentication implementations.
This forces security teams to reconsider their assumptions about authentication and session management. Simply implementing MFA is no longer sufficient; organizations need to consider the entire authentication and session lifecycle, including:
- How sessions are established and maintained
- What happens to session tokens after authentication
- How to detect when sessions might be compromised
- When and how to require re-authentication
Looking Forward: The Arms Race Continues
As defenders develop new countermeasures, attackers continue evolving their techniques. We’re already seeing:
- More sophisticated social engineering to drive initial victim engagement
- Enhanced evasion techniques to avoid detection by security tools
- Targeting of emerging authentication methods to find new bypass techniques
- Increased AI automation to scale attacks across larger victim populations
The cybersecurity community’s response to BitM attacks demonstrates the importance of collaborative threat research and information sharing. When academic researchers, security vendors, and threat intelligence teams work together, the entire ecosystem benefits from faster detection and mitigation of emerging threats.
Frequently Asked Questions
Q: What is a Browser-in-the-Middle attack?
A: A Browser-in-the-Middle (BitM) attack is a type of cyberattack where criminals trick victims into using the attacker’s browser instead of their own to access legitimate websites. Unlike traditional phishing that uses fake websites, BitM attacks display real websites through an attacker-controlled browser environment. When victims log in, their credentials and session tokens are captured in real-time, allowing attackers to bypass multi-factor authentication and gain full access to authenticated accounts.
Q: How can I tell if I’m a victim of a BitM attack?
A: BitM attacks are designed to be undetectable during the attack itself. However, you might notice unusual account activity after the fact, such as logins from unexpected locations, changes you didn’t make, or notifications about sessions you don’t remember starting. The best defense is prevention through secure authentication methods.
Q: Does using incognito or private browsing mode protect against BitM attacks?
A: No, private browsing modes don’t provide protection against BitM attacks. The attack occurs before your browser’s privacy settings come into play – you’re essentially using the attacker’s browser, not your own, regardless of privacy settings.
Q: Are mobile devices safer from BitM attacks than desktop computers?
A: Mobile devices face similar risks, though the attack vectors might differ slightly. Mobile browsers can still be tricked into connecting to attacker-controlled environments through malicious links in texts, social media, or emails. The same principles of phishing-resistant authentication apply to mobile devices.
Q: Can browser extensions or security plugins detect BitM attacks?
A: Traditional browser extensions have limited effectiveness against BitM attacks because the attack happens outside your actual browser environment. However, some advanced browser security solutions that implement deeper behavioral monitoring might be able to detect anomalies, though this is an evolving area.
Q: Why don’t antivirus programs catch BitM attacks?
A: Antivirus software primarily scans for malicious files and processes on your device. Since BitM attacks don’t install anything on your computer (they trick you into using the attacker’s computer instead) there’s nothing for traditional antivirus to detect. This is why behavioral analysis and authentication-based defenses are more effective.
Q: Should organizations disable fullscreen functionality in browsers to prevent these attacks?
A: Completely disabling fullscreen functionality would break many legitimate web applications and services. A better approach is implementing strong authentication controls, user education about fullscreen behavior, and monitoring for unusual session patterns. The goal should be preventing the initial compromise rather than limiting browser functionality.
Q: How long can attackers maintain access through a stolen BitM session?
A: This depends on the target application’s session timeout policies. Some sessions might last minutes, others could remain active for hours or even days. This is why implementing appropriate session duration limits and monitoring is crucial for minimizing the impact of successful BitM attacks.