Tracking the Adversaries in the Middle

Adversary in The Middle (AiTM) attacks and token theft has grown steadily as MFA becomes more widely adopted. From our managed SOC we have observed how the right phishing email, at the right time, from a compromised sender makes it extremely difficult for the end-user to discern good from evil. Often these attacks arrive from the compromised emails of a trusted partner, supplier, or co-worker. Sometimes just mere moments after a conversation has taken place between the two victims. Phishing awareness and training can only help so much. In this talk, Lex will present how we have tackled the rise in AiTM from the Threat Intelligence perspective. It goes into the details of how we started and eventually systemised our collection of AiTM kits and from this collection created intelligence products for both our internal detection engineers and the security analysts within the SOC. Lastly, he will discuss some recommendations for hardening environments against these attacks.

    Speaker

    FURTHER SESSIONS

  • AI security lessons from the frontline

  • Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels

  • Breaking Entra: Real-World Cloud Identity Attacks You Can Recreate

  • Closing remarks

  • Join us in Amsterdam!

    November 20, 2025

    Hang out, learn something awesome and make new friends.