<s>
Man-in-the-browser	B-Protocol
(	O
MITB	O
,	O
MitB	O
,	O
MIB	O
,	O
MiB	O
)	O
,	O
a	O
form	O
of	O
Internet	O
threat	O
related	O
to	O
man-in-the-middle	O
(	O
MITM	O
)	O
,	O
is	O
a	O
proxy	B-Application
Trojan	O
horse	O
that	O
infects	O
a	O
web	B-Application
browser	I-Application
by	O
taking	O
advantage	O
of	O
vulnerabilities	O
in	O
browser	B-Protocol
security	I-Protocol
to	O
modify	O
web	O
pages	O
,	O
modify	O
transaction	O
content	O
or	O
insert	O
additional	O
transactions	O
,	O
all	O
in	O
a	O
covert	O
fashion	O
invisible	O
to	O
both	O
the	O
user	O
and	O
host	O
web	B-Application
application	I-Application
.	O
</s>
<s>
A	O
MitB	O
attack	O
will	O
be	O
successful	O
irrespective	O
of	O
whether	O
security	O
mechanisms	O
such	O
as	O
SSL/PKI	O
and/or	O
two	O
-	O
or	O
three-factor	O
authentication	O
solutions	O
are	O
in	O
place	O
.	O
</s>
<s>
A	O
MitB	O
attack	O
may	O
be	O
countered	O
by	O
using	O
out-of-band	B-Protocol
transaction	O
verification	O
,	O
although	O
SMS	B-Device
verification	O
can	O
be	O
defeated	O
by	O
man-in-the-mobile	O
(	O
MitMo	O
)	O
malware	B-Application
infection	O
on	O
the	O
mobile	O
phone	O
.	O
</s>
<s>
Trojans	O
may	O
be	O
detected	O
and	O
removed	O
by	O
antivirus	B-Application
software	I-Application
;	O
,	O
but	O
a	O
2011	O
report	O
concluded	O
that	O
additional	O
measures	O
on	O
top	O
of	O
antivirus	B-Application
software	I-Application
were	O
needed	O
.	O
</s>
<s>
A	O
related	O
,	O
simpler	O
attack	O
is	O
the	O
boy-in-the-browser	O
(	O
BitB	O
,	O
BITB	O
)	O
.	O
</s>
<s>
The	O
majority	O
of	O
financial	O
service	O
professionals	O
in	O
a	O
2014	O
survey	O
considered	O
MitB	O
to	O
be	O
the	O
greatest	O
threat	O
to	O
online	B-Application
banking	I-Application
.	O
</s>
<s>
The	O
name	O
"	O
man-in-the-browser	B-Protocol
"	O
was	O
coined	O
by	O
Philipp	O
Gühring	O
on	O
27	O
January	O
2007	O
.	O
</s>
<s>
A	O
MitB	O
Trojan	O
works	O
by	O
using	O
common	O
facilities	O
provided	O
to	O
enhance	O
browser	B-Application
capabilities	O
such	O
as	O
Browser	B-Application
Helper	I-Application
Objects	I-Application
(	O
a	O
feature	O
limited	O
to	O
Internet	B-Application
Explorer	I-Application
)	O
,	O
browser	B-Protocol
extensions	I-Protocol
and	O
user	B-Protocol
scripts	I-Protocol
(	O
for	O
example	O
in	O
JavaScript	B-Language
)	O
.	O
</s>
<s>
Antivirus	B-Application
software	I-Application
can	O
detect	O
some	O
of	O
these	O
methods	O
.	O
</s>
<s>
In	O
a	O
nutshell	O
example	O
exchange	O
between	O
user	O
and	O
host	O
,	O
such	O
as	O
an	O
Internet	B-Application
banking	I-Application
funds	O
transfer	O
,	O
the	O
customer	O
will	O
always	O
be	O
shown	O
,	O
via	O
confirmation	O
screens	O
,	O
the	O
exact	O
payment	O
information	O
as	O
keyed	O
into	O
the	O
browser	B-Application
.	O
</s>
<s>
Examples	O
of	O
MitB	O
threats	O
on	O
different	O
operating	B-General_Concept
systems	I-General_Concept
and	O
web	B-Application
browsers	I-Application
:	O
</s>
<s>
Key	O
Windows	B-Application
:	O
IE	B-Application
Windows	B-Application
:	O
IE	B-Application
&	O
Firefox	B-Application
or	O
Firefox	B-Application
Windows	B-Application
:	O
other	O
Mac	B-Operating_System
OS	I-Operating_System
X	I-Operating_System
:	O
any*ChromeInject	O
a.k.a.	O
</s>
<s>
Known	O
Trojans	O
may	O
be	O
detected	O
,	O
blocked	O
,	O
and	O
removed	O
by	O
antivirus	B-Application
software	I-Application
.	O
</s>
<s>
In	O
a	O
2009	O
study	O
,	O
the	O
effectiveness	O
of	O
antivirus	B-Application
against	O
Zeus	O
was	O
23%	O
,	O
and	O
again	O
low	O
success	O
rates	O
were	O
reported	O
in	O
a	O
separate	O
test	O
in	O
2011	O
.	O
</s>
<s>
The	O
2011	O
report	O
concluded	O
that	O
additional	O
measures	O
on	O
top	O
of	O
antivirus	B-Application
were	O
needed	O
.	O
</s>
<s>
Browser	B-Protocol
security	I-Protocol
software	O
:	O
MitB	O
attacks	O
may	O
be	O
blocked	O
by	O
in-browser	O
security	O
software	O
such	O
as	O
Cymatic.io,	O
Trusteer	O
Rapport	O
for	O
Microsoft	B-Application
Windows	I-Application
and	O
Mac	B-Operating_System
OS	I-Operating_System
X	I-Operating_System
,	O
which	O
blocks	O
the	O
APIs	O
from	O
browser	B-Protocol
extensions	I-Protocol
and	O
controls	O
communication	O
.	O
</s>
<s>
Alternative	O
software	O
:	O
Reducing	O
or	O
eliminating	O
the	O
risk	O
of	O
malware	B-Application
infection	O
by	O
using	O
portable	B-Application
applications	I-Application
or	O
using	O
alternatives	O
to	O
Microsoft	B-Application
Windows	I-Application
like	O
Mac	B-Operating_System
OS	I-Operating_System
X	I-Operating_System
,	O
Linux	B-Application
,	O
or	O
mobile	O
OSes	O
Android	B-Application
,	O
iOS	B-Application
,	O
ChromeOS	B-Operating_System
,	O
Windows	B-Operating_System
Mobile	I-Operating_System
,	O
Symbian	B-Operating_System
,	O
etc.	O
,	O
and/or	O
browsers	B-Application
Chrome	B-Application
or	O
Opera	B-Application
.	O
</s>
<s>
Further	O
protection	O
can	O
be	O
achieved	O
by	O
running	O
this	O
alternative	O
OS	O
,	O
like	O
Linux	B-Application
,	O
from	O
a	O
non-installed	O
live	O
CD	O
,	O
or	O
Live	O
USB	O
.	O
</s>
<s>
Secure	O
Web	B-Application
Browser	I-Application
:	O
Several	O
vendors	O
can	O
now	O
provide	O
a	O
two-factor	O
security	O
solution	O
where	O
a	O
Secure	O
Web	B-Application
Browser	I-Application
is	O
part	O
of	O
the	O
solution	O
.	O
</s>
<s>
In	O
this	O
case	O
,	O
MitB	O
attacks	O
are	O
avoided	O
,	O
as	O
the	O
user	O
executes	O
a	O
hardened	O
browser	B-Application
from	O
their	O
two-factor	O
security	O
device	O
rather	O
than	O
executing	O
the	O
"	O
infected	O
"	O
browser	B-Application
from	O
their	O
own	O
machine	O
.	O
</s>
<s>
A	O
theoretically	O
effective	O
method	O
of	O
combating	O
any	O
MitB	O
attack	O
is	O
through	O
an	O
out-of-band	B-Protocol
(	O
OOB	O
)	O
transaction	O
verification	O
process	O
.	O
</s>
<s>
This	O
overcomes	O
the	O
MitB	O
trojan	O
by	O
verifying	O
the	O
transaction	O
details	O
,	O
as	O
received	O
by	O
the	O
host	O
(	O
bank	O
)	O
,	O
to	O
the	O
user	O
(	O
customer	O
)	O
over	O
a	O
channel	O
other	O
than	O
the	O
browser	B-Application
;	O
for	O
example	O
,	O
an	O
automated	O
telephone	O
call	O
,	O
SMS	B-Device
,	O
or	O
a	O
dedicated	O
mobile	B-Application
app	I-Application
with	O
graphical	O
cryptogram	O
.	O
</s>
<s>
landline	B-Application
,	O
mobile	O
phone	O
,	O
etc	O
.	O
)	O
</s>
<s>
Mobile	O
phone	O
mobile	B-Application
Trojan	I-Application
spyware	O
man-in-the-mobile	O
(	O
MitMo	O
)	O
can	O
defeat	O
OOB	O
SMS	B-Device
transaction	O
verification	O
.	O
</s>
<s>
ZitMo	O
(	O
Zeus-In-The-Mobile	O
)	O
is	O
not	O
a	O
MitB	O
Trojan	O
itself	O
(	O
although	O
it	O
performs	O
a	O
similar	O
proxy	B-Application
function	O
on	O
the	O
incoming	O
SMSes	O
)	O
,	O
but	O
is	O
mobile	B-Application
malware	I-Application
suggested	O
for	O
installation	O
on	O
a	O
mobile	O
phone	O
by	O
a	O
Zeus-infected	O
computer	O
.	O
</s>
<s>
By	O
intercepting	O
all	O
incoming	O
SMSes	O
,	O
it	O
defeats	O
SMS-based	O
banking	O
OOB	O
two-factor	O
authentication	O
on	O
Windows	B-Operating_System
Mobile	I-Operating_System
,	O
Android	B-Application
,	O
Symbian	B-Operating_System
,	O
and	O
BlackBerry	B-Operating_System
.	O
</s>
<s>
ZitMo	O
may	O
be	O
detected	O
by	O
Antivirus	B-Application
running	O
on	O
the	O
mobile	O
device	O
.	O
</s>
<s>
SpitMo	O
(	O
SpyEye-In-The-Mobile	O
,	O
SPITMO	O
)	O
is	O
similar	O
to	O
ZitMo	O
.	O
</s>
<s>
Keyloggers	O
are	O
the	O
most	O
primitive	O
form	O
of	O
proxy	B-Application
trojans	O
,	O
followed	O
by	O
browser-session	O
recorders	O
that	O
capture	O
more	O
data	O
,	O
and	O
lastly	O
MitBs	O
are	O
the	O
most	O
sophisticated	O
type	O
.	O
</s>
<s>
SSL/PKI	O
etc	O
.	O
</s>
<s>
may	O
offer	O
protection	O
in	O
a	O
man-in-the-middle	O
attack	O
,	O
but	O
offers	O
no	O
protection	O
in	O
a	O
man-in-the-browser	B-Protocol
attack	O
.	O
</s>
<s>
A	O
related	O
attack	O
that	O
is	O
simpler	O
and	O
quicker	O
for	O
malware	B-Application
authors	O
to	O
set	O
up	O
is	O
termed	O
boy-in-the-browser	O
(	O
BitB	O
or	O
BITB	O
)	O
.	O
</s>
<s>
Malware	B-Application
is	O
used	O
to	O
change	O
the	O
client	O
's	O
computer	O
network	O
routing	O
to	O
perform	O
a	O
classic	O
man-in-the-middle	O
attack	O
.	O
</s>
<s>
Once	O
the	O
routing	O
has	O
been	O
changed	O
,	O
the	O
malware	B-Application
may	O
completely	O
remove	O
itself	O
,	O
making	O
detection	O
more	O
difficult	O
.	O
</s>
<s>
Clickjacking	O
tricks	O
a	O
web	B-Application
browser	I-Application
user	O
into	O
clicking	O
on	O
something	O
different	O
from	O
what	O
the	O
user	O
perceives	O
,	O
by	O
means	O
of	O
malicious	O
code	O
in	O
the	O
webpage	O
.	O
</s>
