{"id":389,"date":"2017-02-27T16:18:49","date_gmt":"2017-02-27T16:18:49","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/"},"modified":"2019-05-29T12:08:13","modified_gmt":"2019-05-29T12:08:13","slug":"dns-attacks-how-they-try-to-direct-you-to-fake-pages","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/27\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/","title":{"rendered":"DNS attacks: How they try to direct you to fake pages"},"content":{"rendered":"<p class=\"wls-paragraph\">DNS servers are essential to the normal functioning of the internet as we know and love it, but they tend to go&nbsp;<strong>unnoticed<\/strong>&nbsp;by most users. At least, that is, until some sort of attack or incident occurs that stops them from working normally, which results in the services we use every day starting to fail (something that happened recently when the Mirai&nbsp;botnet attacked a company called DynDNS).<\/p>\n<p class=\"wls-paragraph\">One thing for sure is that there is more than one type of attack that can affect these servers\u2014and in this article we will look at the differences between them.<\/p>\n<h2><strong>What is a DNS server?<\/strong><\/h2>\n<p class=\"wls-paragraph\">The Domain Name System (DNS for short) is what enables us&nbsp;<strong>to resolve the name of a web page through its IP address<\/strong>. This way, as users, we do not need to remember the sequence of numbers that makes up an IP address (or numbers and letters in&nbsp;IPV6) and we can access, for example, a web page like \u201cwww.facebook.com\u201d by writing it like that in our browser, rather than entering \u201c31.13.92.36\u201d.<\/p>\n<p class=\"wls-paragraph\">Resolving this user-friendly name into an IP address is the work of DNS servers, which they do by referring to a hierarchical distributed database that stores information about which IP address corresponds to which domain name, among other things. This system makes it easier to remember website addresses, and also means the IP address can be changed if needed.<\/p>\n<p class=\"wls-paragraph\">Knowing how important these servers are, it is not surprising that many attacks attempt&nbsp;<strong>to exploit vulnerabilities<\/strong>&nbsp;either in them or in the way users use them.<\/p>\n<h2><strong>DNS Spoofing vs. DNS Cache Poisoning<\/strong><\/h2>\n<p class=\"wls-paragraph\">Often interpreted as the same type of attack, in reality these two techniques are technically different from one another. Generally speaking, we could say that DNS Cache Poisoning is one of the&nbsp;<strong>many ways<\/strong>&nbsp;to achieve&nbsp;DNS Spoofing, which refers to the wide range of existing attacks aimed at supplanting the information stored on DNS servers.<\/p>\n<p class=\"wls-paragraph\">DNS Spoofing would represent the ultimate goal of the attack (to manage to&nbsp;<strong>change the registries<\/strong>&nbsp;stored on the DNS server in whatever way the attackers decide), for which different mechanisms are used. They include DNS Cache Poisoning, but also man-in-the-middle attacks, the use of fake base stations, and even compromising the security of the DNS server.<\/p>\n<p class=\"wls-paragraph\">We can also see examples of DNS spoofing in attacks aimed at users. One of these would be<strong>&nbsp;supplanting the address<\/strong>&nbsp;of the DNS servers configured on our operating system or router. The usual way is to enter the address of the DNS servers of our internet service provider, or those of another organization such as Google, as we can see below:<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-89192\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/belkin-google.jpg\" sizes=\"auto, (max-width: 610px) 100vw, 610px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/belkin-google.jpg 610w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/belkin-google-300x172.jpg 300w\" alt=\"\" width=\"610\" height=\"349\"><\/p>\n<p class=\"wls-paragraph\">DNS Cache Poisoning refers to the situation in which many end users use the same cache, where the registries that are stored correlate each IP address with a domain. In the event attackers manage to manipulate a DNS entry in this registry, the internet service providers that use this cache would accept it as authentic, even if it has been&nbsp;<strong>manipulated to point to a fake website.<\/strong><\/p>\n<p class=\"wls-paragraph\">In such a case, what we would have is a poisoned DNS cache that does not redirect traffic to the legitimate IP address when resolving a domain name. Obviously, poisoning this type of cache is not as easy as with the existing cache in a system or router, but technically it is possible and&nbsp;there are precedents.<\/p>\n<p class=\"wls-paragraph\">One of the main problems of DNS Cache Poisoning attacks is that they can be propagated among different DNS servers, and therefore over time they can affect&nbsp;<strong>domestic routers too,<\/strong>&nbsp;including the existing DNS cache in the user\u2019s system, as the router would receive this incorrect information and update its local cache with it.<\/p>\n<p class=\"wls-paragraph\">To carry out this type of attack, the attackers need a web server and a DNS server, configuring their own authoritative DNS and a trap domain. From that point, the attackers need first to get the victim to access with their own DNS the link with the trap domain, in order to then start gathering the identifiers of the transaction until they are in a position where they can&nbsp;<strong>predict<\/strong>&nbsp;what the next one will be.<\/p>\n<p class=\"wls-paragraph\">Having reached this point, the victim\u2019s DNS will be obliged to make a request to the attackers\u2019 authoritative DNS, which may be pointing to a domain supplanting a banking website. Now that the attackers have discovered what the new transaction ID will be, they can send packets to try and&nbsp;<strong>supplant the legitimate connections<\/strong>&nbsp;the user receives when trying to connect to his or her bank.<\/p>\n<p class=\"wls-paragraph\">Because the attackers can predict the correct transaction ID, the victim\u2019s DNS will store the supplanted entry in its cache and accept it as valid. From this point on, any attempt by the victim to access a bank\u2019s website will result in being&nbsp;<strong>redirected<\/strong>&nbsp;to the website controlled by the attackers.<\/p>\n<h2><strong>What about DNS hijacking?<\/strong><\/h2>\n<p class=\"wls-paragraph\">Malware can also be used to affect the resolution of domain names so the victims connect to a server controlled by the criminals. There are examples of malware like&nbsp;<em>Win32\/DNSChanger<\/em>&nbsp;, which modify the DNS established by the user or our internet service provider. We can see how they work in the following image:<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89195\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/dns-spoofing.jpg\" sizes=\"auto, (max-width: 856px) 100vw, 856px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/dns-spoofing.jpg 1126w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/dns-spoofing-300x161.jpg 300w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/dns-spoofing-768x413.jpg 768w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/02\/dns-spoofing-1024x550.jpg 1024w\" alt=\"\" width=\"856\" height=\"460\"><\/p>\n<table id=\"tablepress-297\" class=\"tablepress tablepress-id-297\">\n<thead>\n<tr class=\"row-1 odd\">\n<th class=\"column-1\">Funcionamiento normal<\/th>\n<th class=\"column-2\">Normal operation<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-hover\">\n<tr class=\"row-2 even\">\n<td class=\"column-1\">Servidor DNS<\/td>\n<td class=\"column-2\">DNS server<\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n<td class=\"column-1\">V\u00edctima<\/td>\n<td class=\"column-2\">Victim<\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n<td class=\"column-1\">Servidor web<\/td>\n<td class=\"column-2\">Web server<\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n<td class=\"column-1\">Consulta por www.ejemplo.com<\/td>\n<td class=\"column-2\">Looks up www.example.com<\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n<td class=\"column-1\">Respuesta Servidor web<\/td>\n<td class=\"column-2\">Web server responds<\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n<td class=\"column-1\">Acceso a s\u00edtio leg\u00edtimo<\/td>\n<td class=\"column-2\">Accesses legitimate website<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table id=\"tablepress-298\" class=\"tablepress tablepress-id-298\">\n<thead>\n<tr class=\"row-1 odd\">\n<th class=\"column-1\">V\u00edctima de un DNS Spoofing local<\/th>\n<th class=\"column-2\">Victim of local DNS spoofing<\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-hover\">\n<tr class=\"row-2 even\">\n<td class=\"column-1\">V\u00edctima<\/td>\n<td class=\"column-2\">Victim<\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n<td class=\"column-1\">Servidor DNS<\/td>\n<td class=\"column-2\">DNS server<\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n<td class=\"column-1\">Atacante rol de DNS malicioso<\/td>\n<td class=\"column-2\">Attacker role of malicious DNS<\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n<td class=\"column-1\">Servidor malicioso<\/td>\n<td class=\"column-2\">Malicious server<\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n<td class=\"column-1\">Acceso a s\u00edtio malicioso<\/td>\n<td class=\"column-2\">Accesses malicious website<\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n<td class=\"column-1\">Consulta por www.ejemplo.com<\/td>\n<td class=\"column-2\">Looks up www.example.com<\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n<td class=\"column-1\">Respuesta Servidor malicioso<\/td>\n<td class=\"column-2\">Malicious server responds<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"wls-paragraph\">This enables the attackers to carry out a wide variety of attacks, ranging from&nbsp;<a href=\"http:\/\/www.welivesecurity.com\/2015\/08\/18\/phishing-unravelled\/%22%20%5Ct%20%22_blank\" target=\"_blank\" rel=\"noopener noreferrer\">phishing<\/a> \u2013 in other words using&nbsp;<strong>fake websites<\/strong>&nbsp;which the victim visits thinking they are real (having accessed them by entering the correct address in their browser) \u2013 to the use of&nbsp;exploits&nbsp;to take advantage of vulnerabilities while the user is browsing what are believed to be trusted web pages but which have in fact been generated by the attackers in order to infect the user.<\/p>\n<p class=\"wls-paragraph\">The clearest example, however, is that of networks of zombie computers, otherwise known as&nbsp;<a href=\"http:\/\/www.welivesecurity.com\/2014\/10\/20\/b\" target=\"_blank\" rel=\"noopener noreferrer\">botnets<\/a>. A lot of these modify the DNS servers that their victims have configured, making them point to others controlled by the attackers. This way, as well as the malicious actions we have already described, the criminals can send commands to the bots, update the version of the malware, or even&nbsp;<strong>remove it<\/strong>&nbsp;from the system if necessary.<\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p class=\"wls-paragraph\">As we have seen, there are numerous types of attacks that can stop a domain from being resolved correctly and cause users to fall unwittingly into traps laid by criminals, thinking they are accessing a legitimate site. To avoid these types of threats, investing in a good&nbsp;<a href=\"https:\/\/www.eset.com\/us\/home\/smart-security-premium\/%22%20%5Ct%20%22_blank\" target=\"_blank\" rel=\"noopener noreferrer\">security solution<\/a> is recommended, and, if possible, one that includes a tool for monitoring the security of your router.<\/p>\n<p class=\"wls-paragraph\">And speaking of routers, it\u2019s never a bad idea&nbsp;to check whether your router\u2019s security is adequate. It\u2019s always advisable to ensure it is properly&nbsp;<strong>updated<\/strong>&nbsp;and configured, so that no one can access it unauthorized, and we should avoid using weak passwords or having services activated which allow remote connections to the router.<\/p>\n<p class=\"wls-paragraph\">Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"http:\/\/www.welivesecurity.com\/2017\/02\/27\/dns-attacks-try-direct-fake-pages\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"community-sidebar\" data-forum=\"welivesecurity\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>DNS servers are essential to the normal functioning of the internet as we know and love it, but they tend to go&nbsp;unnoticed&nbsp;by most users. At least, that is, until some sort of attack or incident occurs that stops them from working normally, which results in the services we use every day starting to fail (something<\/p>\n","protected":false},"author":5,"featured_media":1779,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[147,153,165],"tags":[],"class_list":["post-389","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","category-hacking","category-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS attacks: How they try to direct you to fake pages - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/27\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DNS attacks: How they try to direct you to fake pages\" \/>\n<meta property=\"og:description\" content=\"DNS servers are essential to the normal functioning of the internet as we know and love it, but they tend to go&nbsp;unnoticed&nbsp;by most users. At least, that is, until some sort of attack or incident occurs that stops them from working normally, which results in the services we use every day starting to fail (something\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/27\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-27T16:18:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:08:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/ataques-dns-623x403.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"403\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/27\\\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/27\\\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"DNS attacks: How they try to direct you to fake pages\",\"datePublished\":\"2017-02-27T16:18:49+00:00\",\"dateModified\":\"2019-05-29T12:08:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/27\\\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\\\/\"},\"wordCount\":1301,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/27\\\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ataques-dns-623x403.jpg\",\"articleSection\":[\"cybercrime\",\"hacking\",\"phishing\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/27\\\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/27\\\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\\\/\",\"name\":\"DNS attacks: How they try to direct you to fake pages - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/27\\\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/27\\\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ataques-dns-623x403.jpg\",\"datePublished\":\"2017-02-27T16:18:49+00:00\",\"dateModified\":\"2019-05-29T12:08:13+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/27\\\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/27\\\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/27\\\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ataques-dns-623x403.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ataques-dns-623x403.jpg\",\"width\":623,\"height\":403},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/27\\\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DNS attacks: How they try to direct you to fake pages\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/27\\\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS attacks: How they try to direct you to fake pages - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/27\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/","og_locale":"en_US","og_type":"article","og_title":"DNS attacks: How they try to direct you to fake pages","og_description":"DNS servers are essential to the normal functioning of the internet as we know and love it, but they tend to go&nbsp;unnoticed&nbsp;by most users. At least, that is, until some sort of attack or incident occurs that stops them from working normally, which results in the services we use every day starting to fail (something","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/27\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-02-27T16:18:49+00:00","article_modified_time":"2019-05-29T12:08:13+00:00","og_image":[{"width":623,"height":403,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/ataques-dns-623x403.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/27\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/27\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"DNS attacks: How they try to direct you to fake pages","datePublished":"2017-02-27T16:18:49+00:00","dateModified":"2019-05-29T12:08:13+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/27\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/"},"wordCount":1301,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/27\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/ataques-dns-623x403.jpg","articleSection":["cybercrime","hacking","phishing"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/27\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/27\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/","name":"DNS attacks: How they try to direct you to fake pages - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/27\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/27\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/ataques-dns-623x403.jpg","datePublished":"2017-02-27T16:18:49+00:00","dateModified":"2019-05-29T12:08:13+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/27\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/02\/27\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/27\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/ataques-dns-623x403.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/ataques-dns-623x403.jpg","width":623,"height":403},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/27\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"DNS attacks: How they try to direct you to fake pages"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/27\/dns-attacks-how-they-try-to-direct-you-to-fake-pages\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=389"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/389\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1779"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}