Man-in-the-middle attacks are just what they sound like, an attacker places themselves between a sender and receiver intercepting information, changing the information along the way or using it to access confidential data. Man-in-the-middle attacks can take place without a user ever knowing, malware can be utilized to gain access to the device and eventually stolen information is used to access more sensitive data such as bank records.