A cyberattack where a malicious actor positions themselves between two parties to disrupt and view data transfers.