The Man in the Middle: The Cyber Threat That Never Went Away

Why MITM Is Still Terrifying After All These Years

MITM is simple, elegant and devastating. When the attacker positions themselves between two systems, two devices or two people, they can intercept the entire conversation without raising suspicion.

A good MITM setup can:

  • read encrypted traffic
  • harvest credentials
  • clone sessions
  • inject rogue commands
  • rewrite packets
  • spoof both ends of the communication
  • and even modify data in real time

It is the digital equivalent of listening in on a conversation while being able to impersonate both voices. And unless you are specifically looking for it, you won’t notice anything wrong.

That is why enterprises panic about it. And why nation states treat it as a strategic weapon.


China and the High Art of MITM

Let’s be blunt. When it comes to MITM at scale, China is world class. This is not a hobby for them. It is infrastructure. Three major pillars carry the weight of China’s offensive cyber operations.

MSS, their foreign intelligence arm.
PLA Unit 61398, the engine behind some of the biggest espionage campaigns in history.
The PLA Strategic Support Force, responsible for satellite interception, backbone monitoring and advanced signal intelligence.

These organisations don’t wait for vulnerabilities to appear. They create environments where MITM becomes natural, seamless and invisible.


Why China Is So Good at It: Control of the Stack

MITM becomes a nightmare when the attacker controls the layers of communication. China does. They have state influence or outright control over:

  • telecom providers
  • undersea cable landing sites
  • national internet exchanges
  • routers and switches
  • mobile networks
  • device manufacturers
  • firmware supply chains
  • chip fabrication

When you dominate the hardware, the software, the routing, the towers and the cables, MITM shifts from “attack” to “capability”.

That’s the uncomfortable reality.


The Three Layers of MITM in the Modern World

MITM today isn’t one thing. It happens across multiple levels.

1. National Level MITM

Any traffic passing through Chinese backbone networks can be silently intercepted. This includes:

  • TLS downgrades
  • spoofed certificates
  • packet replication
  • DNS manipulation
  • protocol rewriting
  • metadata harvesting

All of this can happen without any alerts. Even encrypted traffic becomes vulnerable when the national infrastructure is the intermediary.


2. Device Level MITM

This is where things get spooky. If the device itself is compromised, the attacker no longer needs to intercept the network. They sit inside the device.

Examples include:

  • modified router firmware
  • backdoored CCTV systems
  • compromised IoT sensors
  • phone baseband exploits
  • rogue Wi-Fi modules
  • malicious certificates pre-installed

US, UK, Israeli and Australian agencies have pulled apart hardware that looked benign but was quietly acting as an intelligence forwarding node.


3. Proximity MITM

This is the one that catches the public off guard.

When a foreign delegation visits a government building, they often bring technical specialists with them. These specialists carry equipment that can:

  • clone authorised Wi-Fi networks
  • impersonate Bluetooth devices
  • scan for phone identifiers
  • inject rogue access points
  • capture encrypted traffic patterns
  • harvest authentication handshakes

This equipment can fit in a backpack or look like harmless conference gear.

And this is exactly why, when a Chinese delegation recently visited Canberra, Australian ministers were told to disconnect Bluetooth and shut down their networks on the spot. It wasn’t paranoia. It was counterintelligence hygiene.

China does the same when anyone visits Beijing.


MITM Is Still the Silent Killer in the Commercial World

We tend to think nation-state attacks don’t affect ordinary businesses. MITM proves that wrong. Companies remain vulnerable whenever they rely on:

  • untrusted hotel Wi-Fi
  • airport internet
  • public hotspots
  • poorly configured VPNs
  • misconfigured routers
  • unknown access points
  • shared conference networks
  • insecure mobile towers

Your data is only as safe as the weakest intermediary. And in commercial environments, there is always a weak intermediary.

MITM remains one of the easiest and most effective ways to breach payment systems, financial institutions, law firms, manufacturers and even governments.


Why Governments Freak Out About Chinese Tech

Whenever someone hears about bans on Huawei, ZTE or Hikvision, they think it’s political. It isn’t. It is about risk control. If the hardware layer can be manipulated, MITM becomes a built-in feature. Not a possibility. A guarantee.

This is why Western intelligence gets anxious when a sensitive site installs a cheap Chinese camera. The risk is not the camera. It is the firmware under the hood and the unknown traffic it may generate.


MITM Has Evolved Into a Strategic Weapon

MITM is not a hacker gimmick. It is a statecraft instrument.

Commercially, it steals intellectual property.
Diplomatically, it reveals negotiation strategies before the meeting begins.
Militarily, it maps communication routes.
Politically, it gives nations leverage in international crises.

This is why the technique remains relevant. It bypasses firewalls, it undermines encryption and it turns trust into a liability.


The World Pretends Not to Notice, but Everyone Knows

When nations visit each other, the dance is always the same.

One side brings equipment to sniff, watch and probe.
The other side turns off networks and isolates the building.
Both sides smile for the cameras.
No one mentions the black boxes humming quietly in diplomatic luggage.

MITM sits at the centre of that silent game.

And despite all our technological progress, it remains one of the oldest, most reliable and most dangerous tricks in the book.