This new type of attack injects false information into DNS servers, which route traffic by matching domain names with IP addresses at Web hosts, allowing hackers to redirect users to bogus Web sites. These so called pharming attacks redirect requests from legitimate financial or online transaction sites to look-alike fraud sites. In the past, phishing attacks usually consisted of official-looking emails from financial services institutions trying to link to what looks like an official site but is actually an unrelated Web site. Thousands of users unwittingly suffered identity theft by serving up their personal user and password information, which was then used to gain access to their personal banking and credit card accounts. Pharming, using DNS cache poisoning, is far more sophisticated and accomplishes the same thing by redirecting a legitimate Web site address to a scammers site. How this differs from traditional phishing is that a user attempting to directly access their online bank account may think they are on their banks Web site, but in reality have been secretly redirected to the scammers look-alike Web site and they are giving up personal information to a scammer. This is especially insidious, because the user is never required to click an email attachment or click on a link that was sent to them. In this case, the user is simply returning to a Web site they may have visited many times previously. Through its sophisticated built-in checks, the Attack Mitigator IPS 5500 is the best intrusion prevention solution for Service Providers to prevent poisoning of DNS servers. Through these powerful protection mechanisms, the IPS 5500 is able to prevent the customer from being redirected to a false site. Top Layer also provides this protection with the highest performing and most flexible deployment features available on the market today, making it the right solution for Service Providers.
Every day we send out a free e-mail with the most important headlines of the last 24 hours.
Subscribe now