Professional Documents
Culture Documents
Cia3 B
Cia3 B
A perpetrator can use various tools to extract information, payment or any other
kind of valuable information to be used for the perpetrator's benefit.
MitM Attacks in India
A Mumbai-based company exporting medical consumables to a company based in South
America was recently hit by a man-in-the-middle cyberattack. The Indian company was to
receive a payment of RS. 44 Lakhs, which the cyber scammer diverted to his bank
account, as he sent his own account's details disguised with the Indian Companies email.
• Kali Linux- An Operating System
addresses
site
The Modus Operandi
• Identify Victim- A hacker will first identify a victim by
• Clone Site/ Create Email Address- Hacker will create a clone site
of a site that his victim visits frequently like Banking Sites,
PayPal etc. He might create emails similar to other ones that the
business might get from a supplier or client.
The Modus Operandi
• Hijack Connection- The Hacker will then hijack the connection of
the user with the server and redirect all TCP communication
through him and then send his own site's IP address when a DNS
The Man in the Middle Attacks are cases where an individual impersonates over
individual/organization. Thus, these cases are covered under Section 66C of IT Act.
The focus of this section (Section 66C) is digital signatures, password hacking, and
other forms of identity theft. This section imposes imprisonment upto 3 years along
with one lakh rupees as a fine.
How could you Use a VPN
Use VPN's to mask your IP
protect yourself like NordVPN, ProtonVPN
against this?
Only visit HTTPS sites
Some good preventative methods are
HTTPS are encrypted sites, no
middle user can snoop.