Last update: February 19, 2023 Reflection Attack in an Authentication Protocol Simple authentication protocols are subject to reflection attacks if a malicious user can use the target machine to impersonate a trusted user.