Have you ever connected to public WiFi and logged into your account without thinking twice? What if someone was silently watching — or even controlling thaHave you ever connected to public WiFi and logged into your account without thinking twice? What if someone was silently watching — or even controlling tha

On-Path Attacks Explained: How Hackers Secretly Intercept Your Internet Traffic

2026/03/25 14:22
3분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 [email protected]으로 연락주시기 바랍니다

Have you ever connected to public WiFi and logged into your account without thinking twice?

What if someone was silently watching — or even controlling that connection?

This is exactly what happens in an On-Path Attack.

What is an On-Path Attacker?

An On-path attacker places themselves between two communicating systems usually a web browser and a web server.

Once in the middle, an attacker can :

  • Intercept sensitive data
  • Modify communication
  • Impersonate either side

This type of attack is also know as Man-in-the-Middle(MITM) attack.

Think of it like a rogue postal worker:

  • Opens your letters
  • Reads your private messages
  • Edits the content
  • Sends them forward

You never reliaze your communication was compromised.

How On-Path Attacks Works?

  1. You request a website
  2. The attacker intercepts your request
  3. They forward it to a real server
  4. The response comes back through the attacker
  5. They can read or modify everything

You believe that you’re talking directly to the website — but you’re not.

Common Types of On-Path Attacks

HTTP Interception

Unencrypted HTTP traffic is easy to intercept. Attackers can steal username & passwords and inject malicious scripts.

Session Hijacking

Websites store login sessions in cookies. If cookies are stolen, then attackers can gain access without requiring passwords, and attacker can impersonate the user.

DNS Spoofing(DNS Cache Poisoning)

DNS Spoofing tricks your system into connecting to a fake server.

In this attack, attacker interferes and gives you a fake ip address instead.
So instead of going to real website:

google.com --> real server

You get redirected to:

google.com --> fake server

How to Prevent DNS Spoofing?

  • Use HTTPS websites
  • Avoid using public wifi or vpn
  • Clear DNS cache regularly
  • Use secure DNS(like google DNS/Cloudflare DNS)

Email Hijacking

Attackers intercept email communications. In this, attackers put themselves in between an email server and the web.

Once the server is compromised, the attackers can monitor email communications for various purposes.

Once such scam involves waiting for a scenario where one person needs to transfer money to another person.

The attacker can then use a spoofed email address to request the money to be transferred to an attacker’s account. This email will seem legitimate to the recipient(“Sorry, there’s typo in my last mail, my actual account number is : XXXX-1233”) making this attack very effective and financial devastating.

Public WiFi Attacks

Public WiFi is one of the easiest attack points.

Attackers can create fake WiFI networks, monitor traffic and redirect users to the fake websites.

That “free wifi” could cost you your data.

Why On-Path attacks are dangerous?

  • Invisible to users.
  • Full access to data
  • Data leaks
  • Malware infections

Now the main point is, How you can protect yourself?
There is no single solution, but these practices help significantly:

  • Use HTTPS(SSL/TLS)
  • Avoid using public WiFi or VPN
  • Enable Multi-Factor Authentication(MFA)
  • Keep Systems updated
  • Verify Emails Carefully

For more such content related to devOps and security, you can also checkout my GitHub.


On-Path Attacks Explained: How Hackers Secretly Intercept Your Internet Traffic was originally published in Coinmonks on Medium, where people are continuing the conversation by highlighting and responding to this story.

면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, [email protected]으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.

추천 콘텐츠

South Korea Party Moves to Scrap Crypto Tax Plan

South Korea Party Moves to Scrap Crypto Tax Plan

South Korea’s People Power Party (PPP) is taking a clear stand on crypto taxes. The party has now officially adopted a plan to scrap the country’s proposed crypto
공유하기
Coinfomania2026/03/25 15:00
CME Group to launch options on XRP and SOL futures

CME Group to launch options on XRP and SOL futures

The post CME Group to launch options on XRP and SOL futures appeared on BitcoinEthereumNews.com. CME Group will offer options based on the derivative markets on Solana (SOL) and XRP. The new markets will open on October 13, after regulatory approval.  CME Group will expand its crypto products with options on the futures markets of Solana (SOL) and XRP. The futures market will start on October 13, after regulatory review and approval.  The options will allow the trading of MicroSol, XRP, and MicroXRP futures, with expiry dates available every business day, monthly, and quarterly. The new products will be added to the existing BTC and ETH options markets. ‘The launch of these options contracts builds on the significant growth and increasing liquidity we have seen across our suite of Solana and XRP futures,’ said Giovanni Vicioso, CME Group Global Head of Cryptocurrency Products. The options contracts will have two main sizes, tracking the futures contracts. The new market will be suitable for sophisticated institutional traders, as well as active individual traders. The addition of options markets singles out XRP and SOL as liquid enough to offer the potential to bet on a market direction.  The options on futures arrive a few months after the launch of SOL futures. Both SOL and XRP had peak volumes in August, though XRP activity has slowed down in September. XRP and SOL options to tap both institutions and active traders Crypto options are one of the indicators of market attitudes, with XRP and SOL receiving a new way to gauge sentiment. The contracts will be supported by the Cumberland team.  ‘As one of the biggest liquidity providers in the ecosystem, the Cumberland team is excited to support CME Group’s continued expansion of crypto offerings,’ said Roman Makarov, Head of Cumberland Options Trading at DRW. ‘The launch of options on Solana and XRP futures is the latest example of the…
공유하기
BitcoinEthereumNews2025/09/18 00:56
CME to launch Solana and XRP futures options on October 13, 2025

CME to launch Solana and XRP futures options on October 13, 2025

The post CME to launch Solana and XRP futures options on October 13, 2025 appeared on BitcoinEthereumNews.com. Key Takeaways CME Group will launch futures options for Solana (SOL) and XRP. The launch date is set for October 13, 2025. CME Group will launch futures options for Solana and XRP on October 13, 2025. The Chicago-based derivatives exchange will add the new crypto derivatives products to its existing digital asset offerings. The launch will provide institutional and retail traders with additional tools to hedge positions and speculate on price movements for both digital assets. The futures options will be based on CME’s existing Solana and XRP futures contracts. Trading will be conducted through CME Globex, the exchange’s electronic trading platform. Source: https://cryptobriefing.com/cme-solana-xrp-futures-options-launch-2025/
공유하기
BitcoinEthereumNews2025/09/18 01:07