{"id":10152,"date":"2019-02-25T09:18:40","date_gmt":"2019-02-25T09:18:40","guid":{"rendered":"http:\/\/www.esds.co.in\/blog\/?p=10152"},"modified":"2021-06-25T11:53:54","modified_gmt":"2021-06-25T11:53:54","slug":"pharming-one-of-the-deadly-sins-of-online-safety","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/pharming-one-of-the-deadly-sins-of-online-safety\/","title":{"rendered":"Pharming \u2013 One of the deadly sins of online safety"},"content":{"rendered":"\n<p style=\"text-align: justify;\">In this digital age, as technological innovations continue to transform the world, cybercrime does its best to keep up. Just as one technique of cybercriminals is exposed and catered for, they move onto the next one.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/pharming-one-of-the-deadly-sins-of-online-safety\/#Pharming_can_be_conducted_in_two_main_ways\" >Pharming can be conducted in two main ways:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-5'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/pharming-one-of-the-deadly-sins-of-online-safety\/#The_four_most_popular_ways_are\" >The four most popular ways are:<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<p style=\"text-align: justify;\">\u201cPharming\u201d is a typical example. The term \u201cpharming\u201d is based on the words \u201cfarming\u201d and&nbsp;<strong>\u201cphishing.\u201d<\/strong><\/p>\n\n\n\n<p style=\"text-align: justify;\">It\u2019s an advanced version of phishing where the victims are trapped without any particular bait for the same purpose as they are in phishing \u2013 stealing confidential information.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"930\" height=\"470\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2021\/06\/VTMSCan.gif\" alt=\"VTMScan\" class=\"wp-image-12073\"\/><\/figure><\/div>\n\n\n\n<p style=\"text-align: justify;\">Pharming is clever as well as a dangerous way of scamming people. It is clever because the people even when they are on the impostor websites have no idea about it and this means that they might fall into the trap of giving their personal information of their own free will with no idea whatsoever that they are shooting themselves in the feet. It is dangerous not only because of the damage it can inflict on individuals but also because even the most sophisticated anti-virus and anti-spyware software find it extremely difficult to detect. Pharming makes the website more vulnerable to threats and malware which can lead to other types of attacks on your website at the same time.&nbsp;<a href=\"https:\/\/esds.co.in\/security\/vtmscan\"><strong>Features of ESDS VTMScan<\/strong><\/a>&nbsp;helps in the detection of&nbsp; Malware, Threats, and Vulnerabilities so that you can prevent such suspicious activities.<\/p>\n\n\n\n<p>The most popular pharming websites are usually related to online financial services or&nbsp;<strong>e-commerce.<\/strong>&nbsp;This makes perfect sense given that the criminals are mostly doing this for monetary gain and what better way of accumulating money than by stealing it using the confidential financial information of people.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Pharming_can_be_conducted_in_two_main_ways\"><\/span><strong>Pharming can be conducted in two main ways:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h5>\n\n\n\n<ul class=\"wp-block-list\"><li>Either it can be done by exploiting any specific vulnerability in the Domain Name Server (DNS) software or<\/li><li>By changing the host\u2019s file on the computer of the victim.<\/li><\/ul>\n\n\n\n<p style=\"text-align: justify;\">In the former one, the cybercriminal might poison the DNS cache that eventually causes a number of people to visit a fake website. The website might then be used to install Trojans or viruses on the personal computer of individuals in an attempt to gather information.<\/p>\n\n\n\n<p style=\"text-align: justify;\">In the latter one, the hackers might install Trojans or viruses directly onto the computer which in turn alter the host\u2019s file, which then direct traffic towards an illegitimate website, away from the actual one.<\/p>\n\n\n\n<p style=\"text-align: justify;\">Pharming attacks deceive both the victims as well as the computer itself. It misleads internet surfers because they type in URLs that they know are correct and of authentic websites but they are redirected to illegitimate websites that look like the real ones and it deceives the computer by changing the IP address of the trustworthy websites on the computer that in turn allows users to be misdirected. Now the crucial part that you should understand here is that by merely being extra-careful of what website address you type or using bookmarks will not help you avoid becoming a victim. This is just because the misdirection takes place after the connection request is sent.<\/p>\n\n\n\n<p><strong>So, what can you do to protect yourself from pharming?<\/strong><\/p>\n\n\n\n<p style=\"text-align: justify;\">While it\u2019s the duty of your Internet Service Provider (ISP) to safeguard you from any potential pharming sites, there are some actionable tasks that you can take to prevent yourself from becoming a victim of pharming. Techniques used to combat pharming are called as Anti-pharming techniques.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The_four_most_popular_ways_are\"><\/span><strong>The four most popular ways are:<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h5>\n\n\n\n<ul class=\"wp-block-list\"><li>Checking your URL to make sure that the spellings\/characters are indeed correct and that there is nothing wrong with it especially before providing any critical information,<\/li><li>Using an ISP that\u2019s not only legitimate but also trustworthy,<\/li><li>Making sure that the \u2018HTTP\u2019 address changes to https (the \u201cs\u201d stands for secure), and<\/li><li>Keeping the domains of your trusted and most visited websites locked.<\/li><\/ul>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/mtvscan.com\/blog\/wp-content\/uploads\/2019\/02\/carlisle-insurance-1.gif\" alt=\"\" class=\"wp-image-415\"\/><\/figure><\/div>\n\n\n\nThe sooner you realize that pharming is a serious threat to you, the better. Be vigilant and cautious while surfing the internet because contrary to popular belief it\u2019s not a safe place.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this digital age, as technological innovations continue to transform the world, cybercrime does its best to keep up. Just as one technique of cybercriminals is exposed and catered for, they move onto the next one. \u201cPharming\u201d is a typical example. The term \u201cpharming\u201d is based on the words \u201cfarming\u201d and&nbsp;\u201cphishing.\u201d It\u2019s an advanced version&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/pharming-one-of-the-deadly-sins-of-online-safety\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":81,"featured_media":10160,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1271],"tags":[1957,1907,1908,1973,1974,1975,775,1914,1916,1910,1977,1945,1959,1195,1919],"class_list":["post-10152","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-2","tag-content-change-monitoring-scan","tag-cyber-attacks","tag-cyber-security","tag-cybercriminal","tag-dns","tag-domain-name-server","tag-e-commerce","tag-esds-vtmscan","tag-esds-vtmscan-virus-scanner","tag-features-of-esds-vtmscan","tag-online-safety","tag-phishing-attacks","tag-phishing-scam","tag-website-security","tag-website-security-scans"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=10152"}],"version-history":[{"count":4,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10152\/revisions"}],"predecessor-version":[{"id":12074,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10152\/revisions\/12074"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/10160"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=10152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=10152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=10152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}