Dark Mode
Capec-89 Detail
Pharming
Standard Social Engineering Likelihood: High Typical Severity: Very High
Parents: 151
Threats: T263 T292 T307
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-89 | capec | https://capec.mitre.org/data/definitions/89.html | |
| CWE-346 | cwe | http://cwe.mitre.org/data/definitions/346.html | |
| CWE-350 | cwe | http://cwe.mitre.org/data/definitions/350.html |
Exploit
-
Attacker sets up a system mocking the one trusted by the users. This is usually a website that requires or handles sensitive information.
-
The attacker then poisons the resolver for the targeted site. This is achieved by poisoning the DNS server, or the local hosts file, that directs the user to the original website
-
When the victim requests the URL for the site, the poisoned records direct the victim to the attackers' system rather than the original one.
-
Because of the identical nature of the original site and the attacker controlled one, and the fact that the URL is still the original one, the victim trusts the website reached and the attacker can now "farm" sensitive information such as credentials or account numbers.
- Vulnerable DNS software or improperly protected hosts file or router that can be poisoned
- A website that handles sensitive information but does not use a secure connection and a certificate that is valid is also prone to pharming
- None: No specialized resources are required to execute this type of attack. Having knowledge of the way the target site has been structured, in order to create a fake version, is required. Poisoning the resolver requires knowledge of a vulnerability that can be exploited.
| Medium |
|---|
| The attacker needs to be able to poison the resolver - DNS entries or local hosts file or router entry pointing to a trusted DNS server - in order to successfully carry out a pharming attack. Setting up a fake website, identical to the targeted one, does not require special skills. |
| Confidentiality |
|---|
| Read Data |
- An online bank website requires users to provide their customer ID and password to log on, but does not use a secure connection. An attacker can setup a similar fake site and leverage pharming to collect this information from unknowing victims.