Pharming is when a bad actor (or “the pharmer”) re-directs you to a fake website instead of the legitimate one you intended to open. “Spoofed” sites capture your confidential information, including usernames, passwords, credit card data, or install malware on to your device. Pharmers usually focus on websites in the financial sector, including banks, online payment platforms, or other e-commerce destinations, often with identity theft as the ultimate goal.
Pharming attacks have become effective because they fool you and your devices into thinking the spoof sites are legitimate. The pharmer tricks your device into sending you to the pharmer’s spoof website rather than the legitimate one.
Here’s the general theme on how pharming works. When you navigate to a website, you will enter a website’s URL (e.g., www.abc123.com). This name is associated with an IP address – it is like your
To convert your URL name to its IP address, your web browser looks up the address using something called a DNS (domain name server). This of DNS as the yellow pages or the
Pharming comes in when the bad actors edit the
Don’t confuse Pharming for Phishing?
Often users think pharming and phishing are the same things? They are similar, but not the same. Phishing, as the name implies, uses bait to lure victims. Bad actors use official-looking or inviting emails or SMS messages to lure victims to visit spoofed websites and enter their personal information.
Pharming skips the bait step and sends victims directly to the fake website without your knowledge or consent. Because victims are typing the URLs themselves, they may be less likely to recognize the fraud rather than clicking links in a sketchy email. It’s a sneaker type of scam compared to more direct phishing techniques.
How to protect yourself against being Pharmed?
There are strategies you can use to protect yourself against pharming attacks.
- Use a trustworthy internet service provider (ISP) – Quality ISPs automatically filter out a pharmer’s bogus redirects, preventing you from ever reaching the pharming website.
- Watch URLs for typos – When going to a website, let it load completely, then examine the SITE closely. Pharmers often disguise their sites with minor spelling tricks, including swapped letters or letter replacements: “gooogle.com” instead of “google.com,” for example.
- Avoid websites that don’t use HTTPS – Sites using HTTPS have their websites encrypted. HTTPS sites encrypt communications so third parties can not intercept them. Websites with this enhanced
securitylevel will automatically change their URL from HTTP to HTTPS, letting you know that your data is safe.
- Avoid questionable websites – Use common sense and good judgment when browsing the web. Stick to websites you know you can trust. Avoid anything that looks suspicious.
- Don’t click links or download files from unknown sources – Verify files and links before clinking. It hard for Pharmers to get you if they can’t install their malware onto your device.
- Avoid “to-good-to-be true” e-commerce deals – Many Pharmers will lure you in with significant price discounts compared to legitimate stores. Price-check on competing sites before making a purchase.
- Trust your
antivirussoftware – Pay attention when your browser or antivirus software warns you against navigating to a particular website. A warning may be an indication that it’s been infected since your last visit.
- Get quality
antivirus/antimalware software – quality tools can make the difference between a good day and a bad day. Investing in a quality antivirus/antimalware toolset will be one of the best digital investments you can make.
“Check twice, click once – advice to live by”
By entering your email address you agree to receive emails from EveryDayCyber. We'll respect your privacy and you can unsubscribe at any time.
What is a Trojan Horse?
Trojan horse computer viruses are malware disguised as or hidden in legitimate software. Hidden from view and ready to attack.
The #1 Cyber Threat Small Businesses are Facing
Phishing attacks are the most widespread and most damaging threat to small businesses, accounting for 90% of all cyber security breaches.
5 Powerful Ways to Protect Your Business from Vishing
Vishing is a cybercrime that’s threatening people all over the world. And it’s not expected to go away anytime soon.
What is a DDoS (Distributed Denial of Service) Attack?
DDoS attack or Distributed Denial of Service, is a coordinated attack intended to crash and make unavailable targeted websites and online systems by overwhelming them with data.
A 10 Step Plan for Small Business Cyber Security
An effective cyber security plan outlines in simple language the best cybersecurity practices your organization needs to stay safe. It doesn't have to be complicated, but it should be pragmatic.
7 ways to secure your home office
People working from home perform most of their tasks online. They are now more exposed to cyber attacks than ever before. Cyber criminals see a great opportunity in the massive growth in working from home and the vulnerabilities of home office security.