Home Cybersecurity The Assault From The Man-in-the-Middle
Cybersecurity

The Assault From The Man-in-the-Middle

Share
The Assault From The Man-in-the-Middle
Share

In a photograph, the man in the middle might always be important, but in this case, it is not just that, it is dangerous, too! A Man-in-the-middle (MITM) refers to a flaw in the popular Ledger hardware crypto wallet programme that researchers discovered way back in 2018.

This flaw allowed hackers to change the destination address of bitcoin transactions and divert the victims’ cash to their own wallets. Users who thought hardware wallets like Ledger were the most secure way to hold their digital assets were disappointed by this revelation. 

But as the most recent revelation showed, any system that depends on key-agreement protocols and the storing and exchange of secrets is susceptible to man-in-the-middle assaults in some form. The best defence against MITM attacks is to utilise authentication mechanisms that do not require secrets.

How are MITM attacks conducted?

Cryptocurrencies like bitcoin use the blockchain, a distributed ledger of transactions, to transmit and hold funds. Every bitcoin transaction is delivered to a blockchain address that is secured by a set of encryption keys.

Any party can send money to an address using a public key that is accessible to everyone, and the address owner can transfer money to other parties using a secret private key.

A malicious actor penetrates two parties’ communication and steals or tampers with the information they communicate in an MITM attack. In the case of the Ledger wallet, malware deployed on the target computer modifies bitcoin transaction destination addresses to include the attacker’s wallet address instead.

Users must manually match the address presented on their computer with the one that displays on the Ledger’s display in order to detect and halt the attack.

Passwords, encryption keys, code signing keys, and other sensitive information that we use to identify and authenticate ourselves online have all been stolen by hackers using MITM attacks.

Because they give hackers the ability to pass as authorised individuals and carry out extremely harmful deeds like inserting malware into the web pages, data, and programmes that we access and exchange online, MITM attacks are particularly risky. 

Role of multi-channel tech to prevent MITM attacks

Man-in-the-middle attackers are aware that we depend on secrets to protect the authenticity of our identities and the confidentiality of our conversations. They will be able to act maliciously on our behalf if they are able to mimic us and obtain access to those secrets.

Hackers would have a more difficult time setting up man-in-the-middle attacks if there were a means to verify yourself, interact, and share information without having to divulge secrets.

Different parties can validate each other’s identities using different platforms which are available in the Market. zero-knowledge authentication without exchanging keys or disclosing sensitive information.

Passwords and keys are not stored in the platforms or their apps. Hackers are unable to execute man in the middle attacks without one single point of failure.

Platforms use a multichannel secret sharing technique that authenticates users piecemeal over many channels, such as SSL, Push notification, and encrypted mobile memory, to further protect sensitive processes.

This makes it impossible for potential attackers to impersonate the user because they would need to separately compromise each channel.

Many Platforms offer a user-friendly layout that is simple to navigate. The highest level of authentication assurance is maintained without requiring users to recall passwords or go through laborious steps in order to authenticate and authorise operations.

Share
Written by
Srinivasan Chari -

Dr. Srinivasan Gopal Chari’s educational odyssey is testament to his insatiable hunger for knowledge and a multidimensional perspective. His formal education spans disciplines such as Financial Markets, Social Media, Environmental Communication and Research papers.

Latest News

BNP Paribas Adds Six Bitcoin, Ether ETNs For Retail Clients In France
News

BNP Paribas Adds Six Bitcoin, Ether ETNs For Retail Clients In France

French multinational universal bank BNP Paribas is expanding its investment offering to include six crypto-linked exchange-traded notes (ETNs), giving retail clients in...

Sam Altman’s World Foundation Sells $65M In WLD As Token Hits New Lows
News

Sam Altman’s World Foundation Sells $65M In WLD As Token Hits New Lows

Sam Altman’s World Foundation has raised $65 million through an over-the-counter (OTC) sale of its WLD token, which has hit new record...

Lido DAO Proposes $20M LDO Buyback To Reverse Historic Price Fall
News

Lido DAO Proposes $20M LDO Buyback To Reverse Historic Price Fall

Lido’s decentralized autonomous organization is considering a one-off $20 million buyback of its governance token to address so-called price dislocation, which is...

Canada Moves To Ban Crypto Donations For Election Campaigns Following UK
News

Canada Moves To Ban Crypto Donations For Election Campaigns Following UK

Canada’s Bill C-25 would ban cryptocurrency, money order and prepaid card donations across the federal political system, closing a fundraising channel that...

Latest Blogs

AI-integrated Crypto Wallet: Safe & Efficient Management?

  Are you a crypto wallet user? If yes, is it an AI-integrated crypto wallet? In case you are wondering what exactly...

AI-enabled Fraud: Real Cases, Scammer Tactics & Smart Prevention Tips

Hey, congratulations! You won the Rs 2 Crore lottery. To withdraw funds, share your bank details along with a one-time password (OTP)...

Healthcare Will Never Be The Same, Thanks To Blockchain

We have all heard this famous saying, “Health is Wealth’. Success, wealth, and accomplishments are meaningless without good health. Nothing is more...

AI-enabled Fraud Detection In Digital Finance

Do you remember the last time you used an Automated Teller Machine(ATM) to withdraw money? Well, with the advent of Unified Payments...

Related Articles

AI-enabled Fraud Detection In Digital Finance

Do you remember the last time you used an Automated Teller Machine(ATM)...

Crypto Security & Best Practices: How To Keep Your Crypto Safe: Everything You Should Know

Crypto Security and Its Importance Digital transformation has created financial opportunities through...

What is the Future of Cybersecurity Career & Jobs?

Plum Job Opportunities In Cybersecurity: Heydays Ahead Rewarding positions are waiting for...

6 Major Cybersecurity Challenges in Metaverse

Addressing Cybersecurity Challenges In Metaverse Metaverse is a virtual environment or a...