During a DNS poisoning attack, malicious actors modify DNS records to redirect users to fraudulent destinations without their knowledge. The attack typically works like this:
- Interception: The attacker intercepts a DNS query between a user's device and the DNS resolver, or between DNS resolvers
- Forgery: The attacker sends a forged DNS response with a malicious IP address before the legitimate response arrives
- Caching: The DNS resolver caches the forged response, treating it as legitimate
- Propagation: All subsequent users querying for that domain are redirected to the attacker's server until the cache expires
Once traffic diverts to illegitimate servers, attackers can execute man-in-the-middle attacks to steal login credentials, install malware on visitor devices, or deploy worms to spread damage across connected networks.