Anyone who clicks on internet links without thinking or logs into online accounts without checking the au­then­ti­city of a website can quickly become the victim of crime. While internet users have become more cautious about opening links in emails, attackers have come up with new methods. Pharming is one of them.

What Is Pharming?

Pharming is a new method derived from phishing. In the case of pharming, website requests from a user are re­dir­ec­ted to fraud­u­lent websites. The attackers run huge server farms in order to host these fraud­u­lent sites. These farms give this form of cy­ber­crime its name: pharming. The spelling with “ph” has been adopted from the slang used in hacker groups.

Example: A Pharming Attack

An example of pharming would be if a user would open their browser and enter the web address of their bank in order to complete a trans­ac­tion in online banking. However, the user is re­dir­ec­ted to a fraud­u­lent site that looks like the bank’s website. For this reason, it doesn’t seem sus­pi­cious – the user doesn’t check the address line and proceeds to enter their login data. An error message appears. The user is briefly surprised by the message, but puts it down to technical problems and tries to make the bank transfer later. Non­ethe­less, the attackers were able to capture the user’s login data from their entries. They can now use this data to gain access to the user’s account and send them­selves large sums of money. The user only discovers the attack a few days later when they check their account statement and see the un­fa­mil­i­ar transfer.

How Does Pharming Work?

The user request is re­dir­ec­ted by ma­nip­u­lat­ing the DNS protocol. The protocol is re­spons­ible for con­vert­ing the text-based host name (URL address) into a numerical IP address. This con­ver­sion process offers criminals two points of attack in order to redirect the request.

1. Attacking the hosts. File

With every website request, the computer first accesses the local hosts. file to check whether the website has been visited before and if the IP address is already known.

Attackers can exploit this process. They can install malware on the computer, for instance via email at­tach­ments infected with viruses or using Trojan horses on websites. These ma­nip­u­late the record of IP addresses, thereby re­dir­ect­ing any request to the fraud­u­lent site.

2. Attacking the DNS Server

Another more elaborate approach to pharming is to directly infect the DNS server, from where the IP address is requested after a user enters a URL. This technique is par­tic­u­larly insidious: Although the user’s computer itself isn’t infected with malware, it becomes the victim of an attack.

The attack occurs via a process called DNS flooding. Here, the server is suggested an address res­ol­u­tion before it is able to find the correct as­sign­ment.

Pharming vs. Phishing – What’s the Dif­fer­ence?

In the case of phishing, attackers exploit the gull­ib­il­ity of email users. They apply methods of social en­gin­eer­ing. At first glance, the emails appear to give credible reasons for why internet users should provide certain data, for instance to verify an account or agree to new terms and con­di­tions.

With pharming, the attack occurs directly in the browser, rather than via email com­mu­nic­a­tion. No malware at all needs to be planted on the victim’s computer.

However, the result can be identical in both cases: The user shares con­fid­en­tial in­form­a­tion with fraud­sters, who then use this data to enrich them­selves fin­an­cially.

Five Tips to Protect Yourself against Pharming

In order to protect yourself against pharming, there are no specific measures you can take for this form of attack. Instead, you should follow the general security re­com­mend­a­tions that also provide pro­tec­tion against other cy­ber­at­tacks.

Antivirus and An­ti­m­al­ware Software

Use antivirus and an­ti­m­al­ware software and make sure it’s updated daily. This way, current threats can be detected in emails and on websites which could infect your host file.

Dubious Email At­tach­ments

Don’t open any email at­tach­ments from unknown senders or at­tach­ments that seem sus­pi­cious for other reasons (for example: unusual name or the sender doesn’t normally send this kind of email).

Secure Websites

Whenever you use online banking platforms or online payment providers, check that the URL is marked as secure with “https”. A lock symbol should be shown in the URL bar. By clicking on it, you can see in­form­a­tion about the website’s security cer­ti­fic­ate and its validity. There are antivirus programs that auto­mat­ic­ally check the validity of cer­ti­fic­ates and produce warning notices if cer­ti­fic­ates are invalid or sus­pi­cious. You should take these cer­ti­fic­ate warnings seriously and leave the website straight away.

Ques­tion­able Websites

Has the ap­pear­ance of a familiar website changed? Does something appear strange about the login prompt? Trust your intuition before you enter any con­fid­en­tial in­form­a­tion. In the case of un­fa­mil­i­ar websites: Check which URLs are behind links and avoid visiting any ques­tion­able sites.

Ad­min­is­trat­or Rights

To make it more difficult for attackers to make any changes to the host file of computers, you should not work with ad­min­is­trat­or rights during everyday use. Create a dedicated profile with re­stric­ted rights. This makes it im­possible for attackers to gain write access to the hosts. file.

If you take these measures to heart, you will improve your pro­tec­tion against cy­ber­at­tacks like pharming as best as possible. However – just like in the offline world – there is no absolute pro­tec­tion against criminal activ­it­ies online.

Besides all the technical pre­cau­tions, the most important and effective measure against online fraud is to be aware of the danger and act with critical awareness.

Go to Main Menu