Scenario 1 – A man-in-the-middle attack–storing credentials