What is a man-in-the-middle malware attack?
Malware attacks use malicious software to infiltrate payment systems to steal data, manipulate transactions and commit fraud. In a man-in-the-middle (MITM) malware attack, malware embedded in a payment network component – such as a transaction switch – intercepts and alters transaction messages to reroute or authorize fraudulent activity. When the compromised switch enters stand-in mode, cloned card transactions are approved, enabling coordinated ATM cash-out attacks that bypass the bank’s authorization host and fraud systems, going unseen until it’s too late.
