Additional information (ea)

Eavesdropping attack

Eavesdropping attacks use a piece of software that can sit somewhere in the network path between the endpoint and the system and capture all the relevant network traffic for later analysis. The attacker does not need to have any connection to the victims' device at all. An attacker can insert the software onto a compromised device by direct insertion or by a virus or other malware and retrieve the data at another determined time.
We know several types of eavesdropping attacks:


Social (and other) things: