A network attack where a legitimate data transmission is intercepted and delayed to mislead the receiver. There is a delay which enables the hacker to get the receiver to do what is desired.