Cyberangriff, bei dem sich der Angreifer unbemerkt in den Kommunikationskanal zweier Partner hängt und dadurch deren Datenaustausch mitlesen oder verändern kann.
Cyberattack in which a hacker steals sensitive information by eavesdropping on communications between two online targets such as a user and a web application.
Cyberattaque au cours de laquelle une personne intercepte les communications entre deux parties, notamment à l'aide d'une clé cryptographique obtenue frauduleusement, ce qui lui permet de se faire passer pour l'une des parties, ou les deux, ou encore de récupérer des informations sensibles.
Attacco informatico in cui un hacker ruba informazioni sensibili intercettando le comunicazioni tra due obiettivi online come un utente e un'applicazione web.
Le Grand dictionnaire terminologique, "attaque par interception" ([Internet, 2025-07-01](https://vitrinelinguistique.oqlf.gouv.qc.ca/fiche-gdt/fiche/26542694/attaque-par-interception))
Fortinet, Attaque de l’homme du milieu : Types et exemples ([Internet, 2025-07-02](https://www.fortinet.com/fr/resources/cyberglossary/man-in-the-middle-attack))
CrowdStrike, Was ist ein Man-in-the-Middle-Angriff? ([Internet, 2025-07-02](https://www.crowdstrike.com/de-de/cybersecurity-101/cyberattacks/man-in-the-middle-mitm-attack/))
Fortinet, Attacco Man-in-the-Middle: Tipi ed esempi ([Internet, 2025-07-02](https://www.fortinet.com/it/resources/cyberglossary/man-in-the-middle-attack))
EXP: the attack can be made when two parties are communicating by using public or shared keys to have a secure communication; In both cases, the man in the middle has to intercept the exchange of the keys and establish two separate connections with different keys to both users. He then can read and alter all the messages and usually forwards them to the intended user by faking the key
Universität Bern, Man in the middle (MITM) attack ([Internet, 2025-07-01](http://home.inf.unibe.ch/~rvs/teaching/cn%20applets/Man_In_The_Middle_Attack_1/Man%20in%20the%20middle%20attack.pdf))
IBM, What is a man-in-the-middle (MITM) attack? ([Internet, 2025-07-01](https://www.ibm.com/think/topics/man-in-the-middle))
nach MELANI, Informationssicherung - Lage in der Schweiz un International, Halbjahresbericht 2018/I, S. 57 ([Internet, 2025-07-01](https://www.newsd.admin.ch/newsd/message/attachments/54408.pdf))
d'après Le Grand dictionnaire terminologique, "attaque par interception" ([Internet, 2025-07-01](https://vitrinelinguistique.oqlf.gouv.qc.ca/fiche-gdt/fiche/26542694/attaque-par-interception))
secondo IBM, Che cos'è un attacco man-in-the-middle (MITM)? ([Internet, 2025-07-01](https://www.ibm.com/it-it/think/topics/man-in-the-middle))