Would you expect an end user to log on to a cybercriminals computer, open their browser, and type in their usernames and passwords? Hopefully not! But thats essentially what happens if they fall victim to a Browser-in-the-Middle (BitM) attack. Like Man-in-the-Middle (MitM) attacks, BiTM sees criminals look to control the data flow between the victims computer and the target service, as