According to the Verizon Data Breach report from 2023, over the past 25 years one hacker threat has remained the number one attack vector – phishing. Phishing is ubiquitous and deadly. Phishing attacks today are more impactful, sophisticated, and frequent than ever before in history. Recent developments in hacker techniques have made phishing emails even more effective through the use of session token theft, aka Session Hijacking. This is a sophisticated way for attackers to take over your online accounts post authentication (i.e. after you have successfully provided your password and multi-factor authentication).
Session hijacking is being combined with advanced threats like AiTM (Adversary-in-the-Middle), BiTM (Browser-in-the-Middle) attacks making it even more dangerous. Let’s break down how these attacks work and, more importantly, what you can do to protect yourself.
When you log into a website, whether it’s your email, bank account, or social media, a “session” is created between your browser and the site. A unique token, called a session token, is issued to your browser to confirm your identity for the duration of your visit. If attackers steal this token, they can impersonate you online—gaining access to your account without knowing your password or needing access to your multi-factor authentication service.
When attackers gain access to your session, they have full control over your account without needing to guess your password and intercept your MFA code. With session hijacking hackers can:
Given the growing sophistication of these attacks, it’s crucial to be proactive about securing your accounts and protecting your sessions. Here’s what you can do:
Understand that even with strong passwords and MFA, you are still vulnerable to AiTM and BiTM attacks if attackers intercept your session token. Use a VPN when connecting to public or unsecured networks. Always keep an eye out for suspicious activity on your accounts and set up real-time alerts to notify you when fund transfers are initiated. Your bank will likely monitor for this and contact you for suspicious transactions.
While AiTM attacks can sometimes bypass MFA, it’s still a critical layer of defense. MFA can make it more difficult for attackers to gain full control over your accounts, especially if they don’t capture the session token immediately. Enable MFA requirements for all funds transfers over a single transaction threshold (such as $500).
Secure Your Browser
Keep Browsers Updated: Always use the latest version of your web browser, as updates often include fixes for known security vulnerabilities.
Remove Untrusted Extensions: Browser extensions can be exploited for BiTM attacks. Only use trusted and necessary browser add-ons.
Enable HTTPS Everywhere: Use browser extensions that enforce HTTPS on all sites you visit, ensuring your communications are encrypted.
Phishing Awareness
Many AiTM and BiTM attacks start with phishing. Be cautious of emails or links that ask you to log into your accounts. Always double-check URLs and avoid clicking on suspicious links.
Use a VPN on Public Networks
When using public Wi-Fi, a Virtual Private Network (VPN) can add an extra layer of encryption to your internet traffic, making it harder for attackers to intercept your session tokens.
Log Out Regularly
Manually log out of important websites, especially on shared or public devices. This prevents attackers from hijacking a still-active session.
Clear Cookies and Cache
Cookies store session tokens, so regularly clearing them can reduce your risk. Be sure to clear your browser’s cache and cookies periodically.
Consider Freezing Your Credit
If you suspect your personal information has been compromised through session hijacking or any other means, consider freezing your credit (instructions). This prevents attackers from opening new accounts in your name and protects you from identity theft.
Businesses are just as vulnerable to session hijacking, especially with employees accessing sensitive systems remotely. Here’s what companies should be doing to protect themselves and their users:
Mark cookies as secure so they can only be transmitted over HTTPS connections, reducing the risk of them being intercepted.
Limit how long a session remains active without re-authentication. This reduces the window of opportunity for attackers to hijack a session.
Use automated tools that detect anomalies in session activity, such as multiple logins from different locations or devices.
To high value transactions in your website or application such as adding new Payees or funds transfers.
If you have the appropriate licenses, you can prevent session token reuse by implementing either Device Compliance (via InTune) or Conditional Access restrictions. This can tie your session tokens to the specific hardware or prevent their re-use.
Session Hijacking is a growing cyber threat, combining older hijacking techniques with sophisticated new attacks like AiTM, BiTM, and infostealers. These advanced tactics allow cybercriminals to bypass traditional defenses (passwords and MFA), putting both everyone at risk.
Stay informed and taking steps to protect your sessions to reduce the risk of falling victim to session hijacking. Companies must prioritize session token security. Implement safeguards to protect your users from these increasingly common and potentially devastating attacks.
Not ready to sign up yet, but want to learn more? Attend our monthly webinar to see a demo of CyberHoot, ask questions, and learn what’s new.
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.