The both parties of communication- sender and receiver aren’t aware of attack. When all this take place, data transit followed are attacked without resistance. Using the key, attacker can also decrypt or modify other data, and furthermore, generate other secret keys and get access to other secure communication.