What is a man in a browser attack?
A man in a browser attack is an application that is able to steal login data, account numbers and various other types of financial information. The attack combines the use of Trojan horses with a unique phishing approach to defining the window that overlaps the browser on the computer. The presence of a Trojan horse is transparent for users because it does not interfere with the common use of the browser to visit the website and connect to transactions on this site. As part of the function, a man starts in the browser by setting up a Trojan on a hard disk. Trojan inserts into the file and is often difficult to insulate. Once the Trojan is in place, the virus introduces transparent overlap in the browser that is unlikely to be detected.
Unlike traditional phishing methods that use connections in accordance with e -Maly, direct users to fake websites and invite them to enter secure data, the man simply captures data in the browser when he enters the user. The user does not fully realize that the data isu kidnapped because it interacts with a legitimate website. At this point, the attack does not interfere with the transaction.
As soon as the data is captured, the entity that has created and distributes the attack will receive a collection of security codes, credit card numbers, or bank accounting data, and can start using them for a wide range of purposes. The victim may not be aware of the problem until several credit cards are used or the balance on the current account does not decline unexpectedly.
Part of frustration with a man when attacking a browser is that the error is very difficult to detect and even harder to remove them from the system. Unlike any other form on disturbing viruses, the invaders operate between the browser security protocols and the user input. This means that standard safety measures usually even reveal the presence of the virus.