CAPEC-89: Pharming

Standard Draft 严重程度: Very High 攻击可能性: High

CAPEC版本: 3.9

更新日期: 2023-01-24

攻击模式描述

A pharming attack occurs when the victim is fooled into entering sensitive data into supposedly trusted locations, such as an online bank site or a trading platform. An attacker can impersonate these supposedly trusted sites and have the victim be directed to their site rather than the originally intended one. Pharming does not require script injection or clicking on malicious links for the attack to succeed.

执行流程

步骤 1 Exploit

Attacker sets up a system mocking the one trusted by the users. This is usually a website that requires or handles sensitive information.

步骤 2 Exploit

The attacker then poisons the resolver for the targeted site. This is achieved by poisoning the DNS server, or the local hosts file, that directs the user to the original website

步骤 3 Exploit

When the victim requests the URL for the site, the poisoned records direct the victim to the attackers' system rather than the original one.

步骤 4 Exploit

Because of the identical nature of the original site and the attacker controlled one, and the fact that the URL is still the original one, the victim trusts the website reached and the attacker can now "farm" sensitive information such as credentials or account numbers.

前提条件

  • Vulnerable DNS software or improperly protected hosts file or router that can be poisoned
  • A website that handles sensitive information but does not use a secure connection and a certificate that is valid is also prone to pharming

所需技能

Medium The attacker needs to be able to poison the resolver - DNS entries or local hosts file or router entry pointing to a trusted DNS server - in order to successfully carry out a pharming attack. Setting up a fake website, identical to the targeted one, does not require special skills.

所需资源

  • None: No specialized resources are required to execute this type of attack. Having knowledge of the way the target site has been structured, in order to create a fake version, is required. Poisoning the resolver requires knowledge of a vulnerability that can be exploited.

后果影响

影响范围: Confidentiality

技术影响: Read Data

缓解措施

All sensitive information must be handled over a secure connection.

Known vulnerabilities in DNS or router software or in operating systems must be patched as soon as a fix has been released and tested.

End users must ensure that they provide sensitive information only to websites that they trust, over a secure connection with a valid certificate issued by a well-known certificate authority.

关键信息

CAPEC ID: CAPEC-89

抽象级别: Standard

状态: Draft

典型严重程度: Very High

攻击可能性: High

相关攻击模式
相关CWE弱点