One these types of method known as Adversary-in-the-Middle (AitM). This describes an attack wherever the threat actor intercepts messages in between the sender and recipient, letting them steal sensitive identification https://tiffanyawpu453119.mdkblog.com/35765746/identity-verification-service-fundamentals-explained