A Man in the Middle attack is an attack whereby an attacker has inserted themselves between two devices and is listening to, and usually copying, the traffic. The insertion method could be via software or hardware. Because the traffic is usually unaffected and still reaches its destination, meaning that attacks can be hard to spot.