An attack in which an attacker listens passively to the authentication protocol to capture information that can be used in a subsequent active attack to masquerade as the claimant.
Sources:
NIST SP 800-63-3
under Eavesdropping Attack