In one of the most common poisoning attacks, the attacker poisons the DNS cache with the aim of leading visitors to a fake website. The attacker gains control of the DNS server and then manipulates cache data such that anyone typing the URL of an actual website is redirected to a fake one. This could be a phishing site where the attacker would have carefully laid out a trap to capture the unsuspecting victim’s personal data or secure information. For example, the visitor thinks they are logging into their bank’s website online, but are actually on the attacker’s phishing site, where they enter the login credentials.
Protecting yourself against DNS poison attacks
Here are some ways to protect yourself and your customers from becoming victims of DNS poison attacks.
Data poisoning is one of the lesser-known and hence less talked about forms of cybercrime, but it can inflict great damage--perhaps even more damage than the other obvious threats such as viruses and ransomware. Unlike a Denial of Service (DoS) attack or a Ransomware attack where you know the moment the malware has hit your system, in a data poisoning attack, the malware is incorrect data that slithers into your system quietly like a snake and changes its overall functioning before delivering the big blow.
There are layers of protection which can be added to client computers to protect them from a DNS poisoning attack when they are outside your network. We offer DNS protection and would be glad to talk to you about it.