
Share this post
As AiTM fraud rises, businesses must adopt multi-layered security, biometric authentication, and user education to stay ahead of evolving threats.
Fraud is evolving at lightning speed, and businesses are constantly threatened. Impersonation attacks still reign supreme, but a new danger is on the rise—adversary-in-the-middle (AiTM) attacks. According to the Veriff Identity Fraud Report 2025, these sophisticated cyber threats have surged by 46% in just one year, targeting payments platforms in particular. As fraud becomes more complex, staying ahead of these tactics is more critical than ever.
What is adversary-in-the-middle (AiTM) fraud?
AiTM fraud occurs when attackers intercept communications to manipulate data, steal information, or gain unauthorised access. Common methods include ARP poisoning, email hijacking, wi-fi eavesdropping, session hijacking, IP spoofing, and DNS spoofing. These techniques exploit system vulnerabilities, emphasising the need for strong security measures to protect sensitive data.
AiTM attacks work by intercepting communication between a user and a legitimate service through phishing techniques. In an AiTM attack, the attacker typically sends a phishing email with a link that directs the victim to a fake login page (redirector or AiTM phishing page) designed to look like a legitimate service. When the victim enters their credentials, the attacker captures these details and may steal session cookies to bypass multifactor authentication (MFA). Using stolen session cookies, the attacker can authenticate themselves into the victim’s account, gaining unauthorised access to emails or other resources. This access is often exploited for malicious campaigns, such as reading sensitive emails, altering mailbox rules, or initiating business email compromise (BEC) schemes to target external recipients in the victim’s network.
As fraud detection and prevention technologies become more advanced, attackers adapt their tactics to exploit the weakest point in the security chain: the identity holder. Instead of directly targeting secure systems, fraudsters increasingly use sophisticated techniques like AiTM attacks to manipulate legitimate users into unwittingly facilitating malicious activities. Attackers can intercept data if a user authenticates into an application using an unsecured protocol like HTTP.
Digital AiTM fraud: A rare but growing threat
Digital AiTM fraud, while relatively rare in the overall fraud picture, is gaining traction due to advances in phishing techniques and AI-driven attacks. These schemes typically involve:
- Phishing emails: Crafted to trick users into sharing login credentials.
- AI-generated messages: Mimicking legitimate communication to deceive users.
- Malware: Intercepting communications between users and businesses to steal sensitive data or access accounts.
- The goal of these attacks is often to exploit the trust between users and organisations, bypassing traditional security measures.
AiTM attacks pose a significant risk to online banking and financial institutions. Cybercriminals intercept transactions, alter payment details, and redirect funds to fraudulent accounts, leading to massive financial losses. For businesses, this results in customer trust erosion and regulatory scrutiny.
The UK picture
In the UK, AiTM fraud has seen a rise, particularly in sectors like fintech and payments, where compliance with strict regulations such as the FCA and PSD2 is mandatory. Fraudsters often exploit promotional offers and rewards, leveraging identity farming and multi-accounting. The UK’s emphasis on strong customer authentication under PSD2 provides a framework for combating such threats, but businesses must also adopt advanced measures like biometric authentication and end-to-end encryption to ensure compliance and security. Awareness campaigns and customer education remain vital, as the UK population heavily relies on digital channels for financial transactions.
How businesses can protect against AiTM fraud
AiTM attacks are stealthy and often undetectable by the targeted user, making preventive measures critical. Both users and application developers share responsibility for minimizing the risk of these attacks. Below are key strategies for safeguarding against AiTM attacks:
- Enable two-factor authentication (2FA): Use 2FA on email accounts to prevent attackers from successfully authenticating, even if they obtain your credentials. The additional authentication layer, like a PIN, remains inaccessible to the attacker.
- Monitor network traffic: Utilise traffic analytical tools to identify suspicious activity. These tools provide insights into device port and protocol usage, helping administrators detect potential threats.
- Implement certificate pinning: Developers can use certificate pinning in mobile apps to whitelist trusted certificates, blocking attacker-controlled ones. This proactive measure protects the application against tampered communications.
- Use a VPN on public wi-fi: Virtual private networks (VPNs) encrypt data, ensuring that intercepted information remains unreadable. VPNs also protect against weaker encryption protocols by employing their own algorithms.
- Phishing awareness training: Educate employees to recognise phishing attempts, often precursors to AiTM attacks. Preventing employees from clicking malicious links or sharing credentials reduces the risk of malware installation.
- Enhance email security: Employ email filters to quarantine phishing attempts and malicious attachments. This additional layer of protection helps administrators manage potential threats effectively.
- Avoid unverified wi-di hotspots: Always verify the legitimacy of public wi-di networks. Malicious hotspots are often designed to mimic official sources and can expose users to interception risks.
Staying ahead of AiTM threats

To effectively combat this emerging threat, businesses should adopt a multi-layered security strategy that combines advanced authentication technologies, user education, and adherence to region-specific regulations.
Identity verification tools, such as biometric authentication and machine learning-driven fraud detection, can help strengthen defences against AiTM tactics by enhancing security and minimising risks. By proactively addressing evolving fraud challenges, organisations can protect their operations, maintain customer trust, and improve overall resilience against future threats.