A man-in-the-middle attack occurs when “attackers interrupt an existing conversation or data transfer. After inserting themselves in the ‘middle’ of the transfer, the attackers pretend to be both legitimate participants. This enables an attacker to intercept information and data from either party while also sending malicious links or other information to both legitimate participants in a way that might not be detected until it is too late.”