Dark Mode

Settings

Capec-662 Detail

Adversary in the Browser (AiTB)

Standard Communications Software Likelihood: High Typical Severity: Very High

Parents: 94

Description

An adversary exploits security vulnerabilities or inherent functionalities of a web browser, in order to manipulate traffic between two endpoints.

Extended Description

This attack first requires the adversary to trick the victim into installing a Trojan Horse application on their system, such as a malicious web browser plugin, which the adversary then leverages to mount the attack. The victim interacts with a web application, such as a banking website, in a normal manner and under the assumption that the connection is secure. However, the adversary can now alter and/or reroute traffic between the client application (e.g., web browser) and the coinciding endpoint, while simultaneously displaying intended transactions and data back to the user. The adversary may also be able to glean cookies, HTTP sessions, and SSL client certificates, which can be used to pivot into an authenticated intranet. Identifying AITB is often difficult because these attacks are successful even when security mechanisms such as SSL/PKI and multifactor authentication are present, since they still function as intended during the attack.
External ID Source Link Description
CAPEC-662 capec https://capec.mitre.org/data/definitions/662.html
CWE-300 cwe http://cwe.mitre.org/data/definitions/300.html
CWE-494 cwe http://cwe.mitre.org/data/definitions/494.html
T1185 ATTACK https://attack.mitre.org/wiki/Technique/T1185 Man in the Browser
OWASP Attacks https://owasp.org/www-community/attacks/Man-in-the-browser_attack Man-in-the-browser attack
REF-629 reference_from_CAPEC https://owasp.org/www-community/attacks/Man-in-the-browser_attack Man-in-the-browser attack, Open Web Application Security Project (OWASP)
REF-630 reference_from_CAPEC https://labs.bitdefender.com/2020/04/oil-gas-spearphishing-campaigns-drop-agent-tesla-spyware-in-advance-of-historic-opec-deal/ Liviu Arsene, Oil and Gas Spearphishing Campaigns Drop Agent Tesla Spyware in Advance of Historic OPEC+ Deal, 2020--04---21, Bitdefender Labs
REF-631 reference_from_CAPEC https://securityintelligence.com/man-in-the-mobile-attacks-single-out-android/ Amit Klein, Man-in-the-Mobile Attacks Single Out Android, 2012--07---10, SecurityIntelligence
REF-632 reference_from_CAPEC https://www.darkreading.com/risk/new-boy-in-the-browser-attacks-on-the-rise/d/d-id/1135247 Kelly Jackson Higgins, New 'Boy In The Browser' Attacks On The Rise, 2011--02---14, Dark Reading, Informa PLC
Experiment
  1. The adversary tricks the victim into installing the Trojan Horse malware onto their system.

  2. Techniques
    Conduct phishing attacks, drive-by malware installations, or masquerade malicious browser extensions as being legitimate.
  3. The adversary inserts themself into the communication channel initially acting as a routing proxy between the two targeted components.

Exploit
  1. The adversary observes, filters, or alters passed data of their choosing to gain access to sensitive information or to manipulate the actions of the two target components for their own purposes.

  1. The adversary must install or convince a user to install a Trojan.
  2. There are two components communicating with each other.
  3. An attacker is able to identify the nature and mechanism of communication between the two target components.
  4. Strong mutual authentication is not used between the two target components yielding opportunity for adversarial interposition.
  5. For browser pivoting, the SeDebugPrivilege and a high-integrity process must both exist to execute this attack.

Not present

Medium
Tricking the victim into installing the Trojan is often the most difficult aspect of this attack. Afterwards, the remainder of this attack is fairly trivial.
Integrity Authorization Access Control Confidentiality
Modify Data Gain Privileges Gain Privileges Gain Privileges
Read Data
  1. An adversary conducts a phishing attack and tricks a victim into installing a malicious browser plugin. The adversary then positions themself between the victim and their banking institution. The victim begins by initiating a funds transfer from their personal savings to their personal checking account. Using injected JavaScript, the adversary captures this request and modifies it to transfer an increased amount of funds to an account that they controls, before sending it to the bank. The bank processes the transfer and sends the confirmation notice back to the victim, which is instead intercepted by the adversary. The adversary modifies the confirmation to reflect the original transaction details and sends this modified message back to the victim. Upon receiving the confirmation, the victim assumes the transfer was successful and is unaware that their money has just been transferred to the adversary.
  2. In 2020, the Agent Tesla malware was leveraged to conduct AiTB attacks against organizations within the gas, oil, and other energy sectors. The malware was delivered via a spearphishing campaign and has the capability to form-grab, keylog, copy clipboard data, extract credentials, and capture screenshots. [REF-630]
  3. Boy in the browser attacks are a subset of AiTB attacks. Similar to AiTB attacks, the adversary must first trick the victim into installing a Trojan, either via social engineering or drive-by-download attacks. The malware then modifies the victim's "hosts" file in order to reroute web traffic from an intended website to an adversary-controlled website that mimics the legitimate website. The adversary is now able to observe, intercept, and/or modify all traffic, as in a traditional Adversary in the Middle attack (CAPEC-94). BiTB attacks are low-cost, easy to execute, and more difficult to detect since the malware often removes itself once the attack has concluded. [REF-631]
  4. Man in the Mobile attacks are a subset of AiTB attacks that target mobile device users. Like AiTB attacks, an adversary convinces a victim to install a Trojan mobile application on their mobile device, often under the guise of security. Once the victim has installed the application, the adversary can capture all SMS traffic to bypass SMS-based out-of-band authentication systems. [REF-632]