Proxy attack

Another type of system reconfiguration attack is to install a proxy through which the user’s network traffic will be passed. The attacker can glean confidential information from the traffic while retransmitting it back and forth between the victim and a remote website. This is a form of a man-in-the-middle attack.