In this article:
In this article:
Hackers use pharming attacks to steal your personal information and passwords. Here’s how to identify (and avoid) these dangerous fake websites.
In this article:
In this article:
In 2019, the Venezuelian government launched a humanitarian campaign website which requested that volunteers provide their full names and ID numbers [*]. But less than a week later, a second website appeared that was a perfect copy of the first.
With a sophisticated cyberattack called pharming, hackers then made it so that anyone in Venezuela who tried to visit the legitimate site ended up on the fraudulent duplicate. Any sensitive information that was entered on the second site went directly to a group of hackers.
Pharming attacks like this are rare. But when they happen, they can be incredibly dangerous.
In probably the most famous pharming example, hackers created 50 lookalike banking websites and used a Microsoft vulnerability to redirect traffic to the hackers — stealing victims’ banking credentials without their knowledge [*].
In this guide, we’ll explain what pharming is, how a pharming attack works, and what you can do to protect yourself from this threat.
{{show-toc}}
A pharming attack is a type of cybercrime that redirects web traffic from a legitimate website to a fake website designed to mimic the original. Any information that you enter on the fake website — like passwords, credit card numbers, etc. — goes straight to the hackers.
(The word “pharming” comes from a combination of “phishing” and “farming.”)
Pharming attacks are dangerous for two reasons:
To understand how pharming works, you need to first learn a bit about what happens in your browser when you enter a website name.
We remember website domain names (like aura.com), but the actual “location” of a website is an Internet Protocol (IP) address stored as numbers separated by periods (like 12.345.678.90).
When you enter a domain name in the address bar and hit enter, the request is sent to a Domain Name System (DNS) server. This server looks up the domain name (aura.com), finds the corresponding IP address (12.345.678.90), and sends it back to your computer.
To save time, your router, computer, and internet browser may all store previously requested IP addresses in DNS caches and local host files. Pharming attacks replace the linked addresses with malicious sites so that when you enter a familiar web address, it takes you to the fake site’s IP address instead.
There are two main types of pharming, both targeting different steps in the DNS resolution process:
Visiting a pharming site can have dire consequences. Because pharming is an advanced type of cyberattack, scammers often target high-value websites, such as your online bank accounts.
Here’s how a typical pharming attack works:
For example, in 2018 hackers redirected the address of crypto site MyEtherWallet.com to a Russian server hosting a lookalike page [*].
Scammers then emptied the accounts of internet users who entered their login information on the fraudulent site — stealing thousands of dollars worth of Ether cryptocurrency before the attack was discovered.
{{hacker-view-widget}}
While pharming and phishing are related, they aren’t quite the same thing.
Phishing attacks are designed to trick victims into handing over personal information (like credit card details or login credentials). Scammers usually do this by sending phishing emails or texts pretending to be from a trusted source, like the victim’s bank.
These phishing emails contain a hyperlink that directs the victim to a fraudulent website, allowing the criminal to steal any data that the victim inputs. The first quarter of 2022 reported over a million phishing attacks, the most ever observed in a quarter [*].
Although pharming evolved from phishing, it is much more sophisticated.
Instead of tricking victims into clicking on dangerous hyperlinks, pharming attacks trick your device or a DNS server into sending you to a fake website — while still showing you the legitimate domain name.
Here are the main differences between phishing and pharming.
Digital security is constantly evolving. But despite the growing threat of scams and malware, there’s a lot you can do to minimize the risk of a cyberattack.
Here are 10 steps you can take to protect yourself from pharming:
Anti-phishing and safe browsing software use AI (artificial intelligence) technology to identify phishing sites, emails, and content. If pharming content is identified, the software will warn you and block it.
For example, Aura will alert you if you’re entering a potentially dangerous site (such as a pharming or malware-infected website) to prevent your data from being stolen.
How safe browsing tools can help:
Pharming relies on your entering information on a scam website that looks like a legitimate one. If you avoid entering the site, you avoid having your sensitive information stolen. This is where anti-phishing software comes in.
However, fake sites can slip past anti-phishing software as they don’t always contain clear warning signs. For this reason, it’s important to use more than one protection method.
While anti-phishing software is useful as a last line of defense, being able to identify a fake website yourself can protect you in case a pharming site slips through the cracks.
How to spot suspicious websites:
📚 Related: What Can Scammers Do With Your IP Address? (10 Risks) →
Clicking on unknown links and downloading unverified files are surefire ways to infect your PC with viruses and malware. You can’t always protect yourself from DNS poisoning, but you can avoid pharming malware by steering clear of these risks.
How to avoid suspicious links and attachments:
Never click on suspicious links in emails and texts, even if they are from trusted senders. Attackers often use link shorteners and other tricks to hide the fact that the URL is suspicious. Instead, manually type the domain name into your browser so that you’re sure it’s safe.
This also holds true for attachments. Unless you’re expecting an attachment (for example, from a work colleague), you should never download one. Even in the case of a trusted sender, you should always scan the file first with quality antivirus software.
VPNs create an encrypted “tunnel” between your computer and the VPN server, hiding your online activity and IP address. Not only does this protect your privacy, but it also prevents spying attempts and can help protect against pharming attacks.
How a VPN can protect you from pharming attacks:
A VPN encrypts your traffic, routing it through its own DNS server when you load a website. This protects you from pharming attacks as long as the VPN’s servers are secure. Some VPNs also offer private DNS servers, which increase security and privacy for your internet traffic.
📚 Related: How To Protect Yourself from Account Takeover Fraud (ATO) →
Routers and wireless access points often include default administrator passwords that are used across multiple devices. This means that hackers might have access to your router password, making it possible for them to access your network devices.
How to secure your home router:
Antivirus software acts as the immune system of your device. A reputable antivirus solution will protect you from malicious files, scan your device for malware, and act as a final barrier in case you accidentally click on an infected link.
What to look for in antivirus software:
Your passwords are the main line of defense preventing criminals from accessing your accounts. This means that each individual password needs to be strong.
Here’s how to protect yourself with stronger passwords:
Even if you use the strongest passwords, they can still be leaked or phished. Using two-factor (2FA) or multi-factor authentication (MFA) adds another layer of protection when you sign in to your accounts.
Here’s how 2FA and MFA protect your accounts:
With 2FA enabled, when you sign in using your password, you will be sent a code to your second-factor device (for example, your email address). You will need to submit this code to prove that it’s you trying to sign in.
For high-risk accounts, MFA introduces multiple layers of security. For example, you may need to use biometrics (like a fingerprint or voice recognition) in addition to the 2FA code.
📚 Related: Have I Been Hacked? Warning Signs & What To Do →
If you find it hard to remember all of your passwords, a quality password manager can keep them safe.
How a password manager can protect you:
Included in every Aura plan, Aura’s password manager stores all your passwords so that you don’t have to commit them to memory. On top of this, Aura’s identity theft protection service keeps an eye out for leaked data and will alert you if any of your credentials have been compromised.
Password managers can also auto-fill your username and password fields when it recognizes a saved website. This can help protect you against pharming attacks because the manager will be much harder to fool than the human eye. If it doesn’t recognize the site, it won’t auto-fill your data.
The consequences of a hack can be serious. To avoid falling victim to a pharming scam, consider signing up for an all-in-one digital security solution like Aura. You can try Aura free for 14 days to see if it’s right for you →
With Aura, you get:
📚 Related: Is Identity Theft Protection Really Worth It? →
The quicker you respond to a cyberattack, the more you’ll be able to do to minimize the damages that a hacker can inflict.
Here’s what to look out for if you think you’ve been “pharmed”:
If you see any signs that you’re the victim of a pharming scam or hack, you need to act quickly. Don’t give the hackers an opportunity to steal from you, extort you, or take your identity.
Here’s what to do:
Editorial note: Our articles provide educational information for you to increase awareness about digital safety. Aura’s services may not provide the exact features we write about, nor may cover or protect against every type of crime, fraud, or threat discussed in our articles. Please review our Terms during enrollment or setup for more information. Remember that no one can prevent all identity theft or cybercrime.