Dark Mode

Settings

Capec-701 Detail

Browser in the Middle (BiTM)

Standard Communications Software Likelihood: Medium Typical Severity: High

Parents: 94

Description

An adversary exploits the inherent functionalities of a web browser, in order to establish an unnoticed remote desktop connection in the victim's browser to the adversary's system. The adversary must deploy a web client with a remote desktop session that the victim can access.

Extended Description

Unlike Adversary in the Browser, the victim does not need to install a malicious application. Browser in the Middle uses the inherent functionalities of a web browser to convince the victim they are browsing normally under the assumption that the connection is secure. All the actions performed by the victim in the open window are actually performed on the machine of the adversary. These victim-authenticated sessions are available to the adversary to use. All entered data such as passwords and usernames can be logged by the adversary and the content displayed to the victim can be altered arbitrarily. Varieties of multifactor authentication which rely solely on user input and do not use a form of hardware-based secret exchange are vulnerable to browser in the middle.
External ID Source Link Description
CAPEC-701 capec https://capec.mitre.org/data/definitions/701.html
CWE-294 cwe http://cwe.mitre.org/data/definitions/294.html
CWE-345 cwe http://cwe.mitre.org/data/definitions/345.html
REF-747 reference_from_CAPEC https://link.springer.com/article/10.1007/s10207-021-00548-5#citeas Tommasi F., Catalano, C., Taurino I., Browser-in-the-Middle (BitM) attack, 2021--04---17
Explore
  1. Identify potential targets: The adversary identifies an application or service that the target is likely to use.

  2. Techniques
    The adversary stands up a server to host the transparent browser and entices victims to use it by using a domain name similar to the legitimate application. In addition to the transparent browser, the adversary could also install a web proxy, sniffer, keylogger, and other tools to assist in their goals.
Experiment
  1. Lure victims: The adversary crafts a phishing campaign to lure unsuspecting victims into using the transparent browser.

  2. Techniques
    An adversary can create a convincing email with a link to download the web client and interact with the transparent browser.
Exploit
  1. Monitor and Manipulate Data: When the victim establishes the connection to the transparent browser, the adversary can view victim activity and make alterations to what the victim sees when browsing the web.

  2. Techniques
    Once a victim has established a connection to the transparent browser, the adversary can use installed tools such as a web proxy, keylogger, or additional malicious browser extensions to gather and manipulate data or impersonate the victim.
  1. The adversary must create a convincing web client to establish the connection. The victim then needs to be lured onto the adversary's webpage. In addition, the victim's machine must not use local authentication APIs, a hardware token, or a Trusted Platform Module (TPM) to authenticate.
  1. A web application with a client is needed to enable the victim's browser to establish a remote desktop connection to the system of the adversary.
Medium
Integrity Authorization Access Control Authentication Confidentiality
Modify Data Read Data Gain Privileges Gain Privileges Gain Privileges
Read Data

Not present