What is Man-in-the-Browser (MITB) Attack?
In today's world, everyone uses the Internet, and in order to access the Internet, they must use a browser. However, cybercriminals may take advantage of the Web's benefits by exploiting its vulnerabilities. One of these methods is the "Man in the browser attack".
Man-in-the-browser (MITB, MitB, MIB, MiB) is a type of cyber attack similar to man-in-the-middle (MITM) attack and utilizes a proxy Trojan horse capable of altering the web transactions of the targeted user. Man-in-the-browser attacks are designed to accomplish eavesdropping, data hijacking, or session tampering. In instances of financial deception, wherein attackers manipulate internet banking services and alter transaction verifications to illicitly obtain funds from the victims, this attack method is employed.
A man-in-the-browser (MitB) attack allows a malicious application to alter the configuration and content of web pages, manipulate data in HTTP connections, or steal sensitive data entered into the browser without the user or online service noticing anything unusual. This malicious application can be named Trojan. A Trojan can be configured to activate when a user views specified internet sites, such as online banking sites, by embedding itself in the user's browser. A man-in-the-browser trojan may capture and modify any information a user enters online in real-time once it is triggered.
The phrase "the Middle" has a fairly broad definition in network security. In this context, it refers to the domain of Man in the Middle (MitM) attacks, in which an unauthorized person intrudes in the flow of communication between two or more parties without their knowledge. The Man in the Browser (MitB) attack is a sub-type of MitM. A MitB attack is similar to a MitM attack, only it just affects your web browser rather than the entire system.
In 2005, Augusto Paes de Barros first introduced the attack at a discussion regarding emerging backdoor approaches. Philipp Guhring later coined the phrase "man-in-the-browser attack," as well as a more detailed description of the attack and potential solutions. Malware with man-in-the-browser capabilities is still a serious threat to many internet businesses today. For example, online financial and banking web services are among the most frequent targets for man-in-the-browser cyberattacks.
How Man in the Browser Attack Works?
To carry out a MitB attack, the target computer must first be infected with malware. The most common use is with Trojan Horse. A trojan can infect a victim's system in certain ways, such as visiting a malicious site, downloading and running malicious software, downloading malicious email file attachments, and plugging a USB external drive containing malware into their computer.
After being infected with the trojan, a common MitB attack usually proceeds as follows:
-
The infection is installed as a malicious browser extension and lives in the browser.
-
The malware keeps a list of matched URLs, and when the user visits one of them, the man-in-the-browser feature starts in.
-
The malicious application waits until the user signs in and performs a transaction, such as transferring funds from a bank account.
-
The malware interferes with the query and edits the data before sending it to the server, for example, by changing the receiver's bank account number using the browser's DOM (Document Object Model) interface.
-
The man-in-the-browser infection then allows the browser to continue transferring the data to the server after the user enters values have been updated.
-
The deceptive HTTP request is subsequently delivered to the server by the browser. However, the server has no way of detecting between a fake and a genuine request. As a result, it approves the request since it believes this is the user's true intent.
-
The MitB malware modifies any data on the presented page to match the user's intended transaction. Everything appears to be in right, and the user confirms the transaction. At this point, even if two-factor authentication (2FA) is enabled, the user has nothing to suspect in the confirming receipt.
Figure 1. How Man in the Browser Attack Works
The general capabilities of the Man-in-the-Browser(MitB) attack may be divided into four groups.
-
Stealing data: MitB's browser control allows it to capture information both passively through keylogging and aggressively through phishing. Any information typed into the infected browser is potentially exposed to the attacker, who can choose which data to steal.
-
Modifying HTML: This is known as HTML injection because it allows an attacker to change the content of a webpage before it is delivered to the browser to be interpreted. Typically, this would be used in one of two ways: first, to add extra data entry fields that ask the user to provide sensitive information beyond what a website would ordinarily request, and second, to change server responses. This is known as HTML injection because it allows an attacker to change the content of a webpage before it is delivered to the browser to be interpreted. Typically, this would be used in one of two ways: first, to add extra data entry fields that ask the user to provide sensitive information beyond what a website would ordinarily request, and second, to change server responses.
-
Modifying Outgoing Data: MitB's range of access allows it to interfere with outgoing form data that the user submits to a server, just as it can tamper with the HTML that is displayed to the user. This allows for a variety of fraudulent acts (typically in the context of online banking) with the added benefit of the request coming from a genuine user of web service and being mostly written by them.
-
Specificity of Target: All of this is only beneficial if the MitB Trojan can figure out what data it needs to tamper with or steal in the first place. The browser monitoring services in each version of MitB have access to a list of objects of interest. Attacks are chosen based on their significance, and this targeting allows the fraud to be adapted to the needs of each domain. For instance, doing HTML injection attacks without knowing what to inject and where to inject is useless.
Where MitB Attacks Are Most Commonly Used?
Man-in-the-browser attacks, in general, target websites where users do any type of transaction. Financial-oriented websites such as banks, insurance, credit card, mortgage companies are among the most attacked targets. The other most commonly used areas are; websites that charge a fee for membership or subscriptions, websites that allow people to pay bills on their platforms such as gas, electric, internet, social media websites, eCommerce websites.
These attacks are not only used to manipulate money transactions. Man-in-the-browser attacks are also used to steal information. In this case, the attacker takes information from the legitimate website's form or login pages. Inquiry forms and contact forms are both examples of forms. It is unnecessary to state that attackers quickly have all of the information entered by the user in such forms.
What are the Consequences of Man in the Browser Attack?
You should know that when the trojan infected by the attacker starts working properly on your browser, every action you do on your computer, the information on every web page you visit, all the data you have can be shared with the attacker simultaneously. MITB attacks are a worldwide threat, not limited to a single location or territory. The banking and financial industries, as well as national institutes, are primarily targeted. The top antivirus companies studied the browser attacks and found that the great majority of them were malware infections targeted at stealing money through online bank account access.
And another consequence of the MitB attack is social engineering originated. After the MitB virus has examined a user's data including much private information for a long time, cybercriminals are likely to have gathered the information they need to impersonate the victim. An attacker can use this extremely sensitive information to get credit -a process known as identity theft- or sell the identity on the black market for monetary benefit.