A man-in-the-middle (MITM) attack happens when a third-party positions itself between endpoints of communicating parties. The bad news is that these communicating entities will not have an idea that their communication is being tapped and under control of unknown attacker.
Through this arrangement, the attacker will be able to monitor and sniff every sensitive information that passes through the established communication channel. Moreover, the attacker may again access to a very sensitive and proprietary organizational data and even credentials.
the_cyberguy Answered question 08/07/2022