It refers to an attack where the attacker listen communication between the two ends without taking consent from either of the ends or without acknowledging them. The attacker can do wiretapping in order to track the conversation between the two ends or can launch attacks like MITM attack to do the same.