Demystifying AiTM Phishing Attacks: What You Need to Know
A Security Guide for Virtual Coworker Remote Staff
We’d like to raise awareness about a more advanced and increasingly common phishing technique known as Adversary-in-the-Middle (AiTM) phishing. These attacks are more sophisticated than traditional phishing and can affect even users who have Multi-Factor Authentication (MFA) enabled.
What Is AiTM Phishing?
AiTM phishing occurs when an attacker secretly positions themselves between you and a legitimate website. By intercepting this communication, they can capture sensitive information such as usernames, passwords, and session tokens, which can sometimes allow them to access your account even with MFA enabled.
How Does It Work?
In an AiTM attack:
- The attacker creates a malicious link or a fake login page that looks legitimate
- When you sign in, your credentials and session information are passed through the attacker’s system
- The attacker hijacks your authenticated session in real time
Because the session itself is stolen, the attacker may not need to re-enter MFA, making these attacks especially dangerous.
Why This Matters
AiTM phishing can lead to:
- Unauthorized access to your email or work accounts
- Business Email Compromise (BEC), where attackers impersonate you
- Fraudulent requests for payments, credentials, or sensitive client information
This type of attack targets trust and speed, which is why awareness is critical.
How Virtual Coworker Helps Protect You
To reduce the risk of AiTM attacks, Virtual Coworker employs security controls that monitor sign-in behaviour. If something looks suspicious, such as:
- Logging in from a new or unusual location
- An IP address appears to “travel” an impossible distance in a short time.
You may be required to re-authenticate with MFA, even if you recently signed in.
This helps prevent attackers who may have stolen a session token from passing the additional MFA check from their location.
While standard MFA re-authentication occurs on a regular schedule, suspicious activity may trigger MFA sooner to protect your account.
Important Note About VPN Use
If you use a private or personal VPN while accessing work systems, you may notice more frequent MFA prompts. This happens because VPNs can make it appear that your location changes suddenly—similar to behaviour seen in AiTM attacks.
While this may feel inconvenient, it is an important security measure designed to protect your account and sensitive data.
What You Should Do
- Be cautious of unexpected login links or sign-in prompts
- Avoid clicking links that ask you to re-authenticate urgently
- Always verify unusual requests through a trusted channel
- Report suspicious emails or messages immediately through the appropriate Virtual Coworker IT or Security support channel
Final Reminder
Even advanced security tools rely on user awareness. Slowing down, verifying before clicking, and reporting anything suspicious are among the most effective ways to stop AI-TM phishing attacks.
Stay safe, stay alert, and stay secure.
