The attack pattern in detail
Adversary-in-the-middle (AitM) phishing inverts the traditional credential-harvest model. Instead of capturing the victim's username and password on a static fake page and replaying them later, the attacker hosts a live reverse-proxy server that sits between the victim and the real authentication endpoint. The victim visits the lure URL, enters credentials, completes the MFA challenge, and sees the real service load successfully because the attacker's proxy is forwarding every byte in real time to and from the actual destination. From the victim's perspective the login succeeds normally. From the attacker's perspective, the proxy has captured the session cookie that the real service issued on successful authentication.
The captured session cookie is the prize. The attacker can import it into a clean browser, paste it into a session storage, and immediately have authenticated access to the real service as the victim, without needing to re-authenticate. Most session cookies for major SaaS platforms have lifetimes measured in hours to weeks, giving the attacker a sustained window of authenticated access. The session cookie is independent of the victim's MFA token because the MFA challenge has already been completed; the cookie represents post-MFA authenticated state.[Microsoft Threat Intelligence AitM blog 2022-2024 + Mandiant M-Trends 2025]