Skip to content
geeksforgeeks
  • Tutorials
    • Python
    • Java
    • Data Structures & Algorithms
    • ML & Data Science
    • Interview Corner
    • Programming Languages
    • Web Development
    • CS Subjects
    • DevOps And Linux
    • School Learning
    • Practice Coding Problems
  • Courses
    • DSA to Development
    • Get IBM Certification
    • Newly Launched!
      • Master Django Framework
      • Become AWS Certified
    • For Working Professionals
      • Interview 101: DSA & System Design
      • Data Science Training Program
      • JAVA Backend Development (Live)
      • DevOps Engineering (LIVE)
      • Data Structures & Algorithms in Python
    • For Students
      • Placement Preparation Course
      • Data Science (Live)
      • Data Structure & Algorithm-Self Paced (C++/JAVA)
      • Master Competitive Programming (Live)
      • Full Stack Development with React & Node JS (Live)
    • Full Stack Development
    • Data Science Program
    • All Courses
  • Aptitude
  • Engineering Mathematics
  • Discrete Mathematics
  • Operating System
  • DBMS
  • Computer Networks
  • Digital Logic and Design
  • C Programming
  • Data Structures
  • Algorithms
  • Theory of Computation
  • Compiler Design
  • Computer Org and Architecture
Open In App
Next Article:
Pharming Attack Prevention and Examples
Next article icon

Pharming Attack Prevention and Examples

Last Updated : 19 Oct, 2021
Comments
Improve
Suggest changes
Like Article
Like
Report

The term “Pharming” is a combinative word formed using farming and phishing. Pharming is a way of online fraud by cybercriminals that install some malicious code on your computer or server with fraudulent websites. The code is sent to the user through a bogus website, where the user may trick to provide personal information. Through this, the fraudster also gets immediate access to the personal information of the user such as Username and Password.

Pharming Attack :
A Pharming attack is a form of cyberattack in which a cybercriminal sends a fake website instead of the real one and that fake website looks similar (almost the same) to the real website. Cybercriminals exploit the vulnerabilities of a DNS server. A DNS server is responsible for converting a domain name to an IP address. Pharming could take place in two ways either by exploitation of a vulnerability in DNS server software or by changing the host's file on a victim's computer. Cybercriminals intentionally redirect users to a fake version of the website to access and steal usernames and passwords. 

Working Of Pharming Attack :

Working of Pharming Attack
PHARMING ATTACK
  • Whenever a user visits some fraudulent websites, the malware gets installed on the computer and it corrupts the information which turns out to be a pharming attack.
  • Whenever a user visits any URL via any browser such as Chrome, Mozilla Firefox, Opera, etc. the browser contacts the DNS server and requests the IP address for the desired domain. This will change the DNS server itself and turns into a pharming attack.

If Pharming Attack occur on :

1. Client-Side- If a pharming attack occurs on the client-side then it is a

  • Attack on the local host file.
  • Attack on the home router.
  • Attack on Browser Proxy Configuration.

2. Server-Side- If a pharming attack occurs on the server's side, then it causes

  • Poisoning of the cache DNS server to put fraud entries.
  • Transparencies on the proxy server between a user and the internet.
  • Exploiting the intruder manipulates resolution entries for any selected websites.

Protection from Pharming Attack :

  1. Using a trusted Internet Service Provider (ISP) to reduce the attack.
  2. A VPN service that has reputable DNS servers can also be used.
  3. Always enables two-factor authentication on sites that offer it.
  4. Avoid suspicious websites, because they can steal the data.
  5. Changing the default password on your consumer-grade routers and wireless access points.
  6. Be cautious while opening links or attachments that are from an unknown source.
  7. Always use a verified internet service provider, whenever it is possible.
  8. Security Software is mandatory to reduce pharming attacks.
  9. Ensure you are using secure web connections (eg:- HTTPS in the web address).

Pharming Attack Examples :

  • Many financial companies are affected in the U.S and Asia due to pharming attacks.
  • A Mexican bank got affected when the DNS of a customer's home routers were changed and they don't even know their all data got hacked. Symantec reports that it was a pharming attack.

Next Article
Pharming Attack Prevention and Examples

S

swarnkamal96
Improve
Article Tags :
  • Computer Networks
  • TrueGeek
  • TrueGeek-2021
  • Cyber-security

Similar Reads

    Approaches to Intrusion Detection and Prevention
    Prerequisites - Intrusion Detection System (IDS)Intrusion Prevention System (IPS) IDS stands for Intrusion Detection System (IDS). It is device or software application that monitors network or systems for malicious activity or policy violations. There are six basic approaches to Intrusion Detection
    6 min read
    How To Prevent Brute Force Attacks?
    The Brute Force Attacks have been one of the most common and remain a very present problem for information security. These are the specific types of attacks where the opponent of the password or encryption key uses a trial-and-error method until the right guess arrives. This is specifically so as th
    9 min read
    Difference between Threat and Attack
    Threats and attacks are two important aspects from a security point of view. A threat is malicious act that has the potential to damage the system or asset while an attack is an intentional act that causes damage to a system or asset. Here, we will understand threats and attacks and the differences
    4 min read
    Difference between Phishing and Pharming
    Phishing and Pharming are the terms that are used in cyber security but both are dangerous for the users and the computer system but they are different. In Phishing, hackers spam the targeted users by sending instant emails they attach any malicious attachments to emails when users open those attach
    4 min read
    How to Mitigate a DDoS Attack?
    DDoS Attack :Distributed Denial of Service Attack is a sophisticated cyber attack, which is performed on digital assets, such as servers and computer systems. Primary aim of an attacker to executed this is to permanently shut down the target system or crash it for a long period of time, so that oper
    5 min read
geeksforgeeks-footer-logo
Corporate & Communications Address:
A-143, 7th Floor, Sovereign Corporate Tower, Sector- 136, Noida, Uttar Pradesh (201305)
Registered Address:
K 061, Tower K, Gulshan Vivante Apartment, Sector 137, Noida, Gautam Buddh Nagar, Uttar Pradesh, 201305
GFG App on Play Store GFG App on App Store
Advertise with us
  • Company
  • About Us
  • Legal
  • Privacy Policy
  • In Media
  • Contact Us
  • Advertise with us
  • GFG Corporate Solution
  • Placement Training Program
  • Languages
  • Python
  • Java
  • C++
  • PHP
  • GoLang
  • SQL
  • R Language
  • Android Tutorial
  • Tutorials Archive
  • DSA
  • Data Structures
  • Algorithms
  • DSA for Beginners
  • Basic DSA Problems
  • DSA Roadmap
  • Top 100 DSA Interview Problems
  • DSA Roadmap by Sandeep Jain
  • All Cheat Sheets
  • Data Science & ML
  • Data Science With Python
  • Data Science For Beginner
  • Machine Learning
  • ML Maths
  • Data Visualisation
  • Pandas
  • NumPy
  • NLP
  • Deep Learning
  • Web Technologies
  • HTML
  • CSS
  • JavaScript
  • TypeScript
  • ReactJS
  • NextJS
  • Bootstrap
  • Web Design
  • Python Tutorial
  • Python Programming Examples
  • Python Projects
  • Python Tkinter
  • Python Web Scraping
  • OpenCV Tutorial
  • Python Interview Question
  • Django
  • Computer Science
  • Operating Systems
  • Computer Network
  • Database Management System
  • Software Engineering
  • Digital Logic Design
  • Engineering Maths
  • Software Development
  • Software Testing
  • DevOps
  • Git
  • Linux
  • AWS
  • Docker
  • Kubernetes
  • Azure
  • GCP
  • DevOps Roadmap
  • System Design
  • High Level Design
  • Low Level Design
  • UML Diagrams
  • Interview Guide
  • Design Patterns
  • OOAD
  • System Design Bootcamp
  • Interview Questions
  • Inteview Preparation
  • Competitive Programming
  • Top DS or Algo for CP
  • Company-Wise Recruitment Process
  • Company-Wise Preparation
  • Aptitude Preparation
  • Puzzles
  • School Subjects
  • Mathematics
  • Physics
  • Chemistry
  • Biology
  • Social Science
  • English Grammar
  • Commerce
  • World GK
  • GeeksforGeeks Videos
  • DSA
  • Python
  • Java
  • C++
  • Web Development
  • Data Science
  • CS Subjects
@GeeksforGeeks, Sanchhaya Education Private Limited, All rights reserved
We use cookies to ensure you have the best browsing experience on our website. By using our site, you acknowledge that you have read and understood our Cookie Policy & Privacy Policy
Lightbox
Improvement
Suggest Changes
Help us improve. Share your suggestions to enhance the article. Contribute your expertise and make a difference in the GeeksforGeeks portal.
geeksforgeeks-suggest-icon
Create Improvement
Enhance the article with your expertise. Contribute to the GeeksforGeeks community and help create better learning resources for all.
geeksforgeeks-improvement-icon
Suggest Changes
min 4 words, max Words Limit:1000

Thank You!

Your suggestions are valuable to us.

What kind of Experience do you want to share?

Interview Experiences
Admission Experiences
Career Journeys
Work Experiences
Campus Experiences
Competitive Exam Experiences