{"id":14896,"date":"2024-08-02T13:38:33","date_gmt":"2024-08-02T13:38:33","guid":{"rendered":"https:\/\/trustpair.com\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/"},"modified":"2025-07-15T13:33:08","modified_gmt":"2025-07-15T13:33:08","slug":"pharming-what-is-it-and-how-can-you-protect-yourself","status":"publish","type":"post","link":"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/","title":{"rendered":"Pharming: what is it and how can you protect yourself?"},"content":{"rendered":"<p>The most infamous <strong>pharming attack<\/strong> happened in 2007 when hackers managed to steal the user logins of 50 financial institutions. While the financial losses weren&#8217;t officially disclosed, we can safely say those businesses suffered greatly from this fraud.<\/p>\n<p>How can you <strong>protect your company from pharming and its negative effects?<\/strong> How does pharming work? Read on to find out!<\/p>\n<p>Trustpair blocks the financial effects of pharming by continuously controlling payments before they\u2019re executed. Any suspicious payment to an unknown third party is blocked. <a href=\"https:\/\/trustpair.com\/gb\/demo-5\/\">Contact an expert to learn more!<\/a><\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-node hs-cta-f87ea066-7298-4ae0-bcd1-f309efec12d5\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/f87ea066-7298-4ae0-bcd1-f309efec12d5\"><img decoding=\"async\" id=\"hs-cta-img-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/f87ea066-7298-4ae0-bcd1-f309efec12d5.png\" alt=\"Nouveau call-to-action\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, 'f87ea066-7298-4ae0-bcd1-f309efec12d5', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2>What is pharming?<\/h2>\n<p>Pharming is a contraction between two terms:<\/p>\n<ul>\n<li>Farming: harvesting (or stealing) data.<\/li>\n<li><a href=\"https:\/\/trustpair.com\/gb\/blog\/the-7-ways-to-recognize-phishing-and-avoid-it\/\">Phishing<\/a>: tricking users into revealing personal data under false pretenses.<\/li>\n<\/ul>\n<p>It describes a type of cyberattack where<strong> victims are directed to fake websites that steal their data.<\/strong> Using social engineering techniques, hackers redirect unsuspecting users to their <a href=\"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/\">spoofed<\/a> websites to get them to reveal sensitive information.<\/p>\n<p>Cybercriminals (called pharmers in this case) often target financial institutions like banks, e-commerce websites, or online payment platforms.<\/p>\n<p>Their goal is to collect confidential information like:<\/p>\n<ul>\n<li>Passwords,<\/li>\n<li>Login credentials,<\/li>\n<li>Social Security numbers,<\/li>\n<li>Bank account numbers<\/li>\n<\/ul>\n<p>They\u2019ll use this private information to<strong> impersonate their victim (leading to identity theft) or to sell on the dark web.<\/strong><\/p>\n<p>Having this personal information publicly available is bad news for your business. Unethical organizations could get their hands on it, and cause direct and indirect damage to your company \u2014 by <a href=\"https:\/\/trustpair.com\/gb\/blog\/the-6-strategies-for-effective-payment-fraud-management\/\">committing payment fraud<\/a> or using it for espionage.<\/p>\n<h2>How does pharming work?<\/h2>\n<p>Pharming works by <strong>exploiting the Internet\u2019s vulnerabilities<\/strong>. See, when you type an address into your browser, the URL address has to be converted into an IP address using what\u2019s called the DNS protocol.<\/p>\n<p>It\u2019s this conversion process that is dangerous, as it creates two ways for phishers to redirect you to a website of their choosing:<\/p>\n<h3>Attacking the host file<\/h3>\n<p>When you type in an URL, your device first checks its local files to see if this website has been visited before and knows its IP address already.<\/p>\n<p>Hackers exploit this vulnerability by corrupting these host files. Instead of accessing your regular trusted website, your computer\u2019s files redirect to fake websites.<\/p>\n<p>Since the fraudulent website is usually very similar to the real one, it\u2019s hard to know you\u2019re falling victim to pharming.<\/p>\n<p>Host file corruption happens through malware, for instance when someone within your organization downloads an unknown attachment or clicks on a link that installs some kind of virus or Trojan horse. This happens locally but can spread through your organization\u2019s network. In this case, phishing is what enables pharming.<\/p>\n<h3>Attacking the DNS server<\/h3>\n<p>The other way phishers can attack you is by <strong>directly targeting your DNS server<\/strong>, where the IP addresses are checked when receiving URL requests.<\/p>\n<p>This hacking technique is called DNS poisoning, or DNS flooding (DNS stands for \u201cDomain Name System\u201d).<\/p>\n<p>Hackers modify the DNS information directly on the server, which means it redirects all Internet users using this server to their scam website. What\u2019s more, a poisoned DNS can infect other servers, creating a ripple effect.<\/p>\n<p>Unfortunately, <strong>individual anti-virus and anti-malware software don\u2019t protect you against DNS server pharming<\/strong>. While DNS servers are usually well-protected behind your organization\u2019s network, any security breach would end up affecting your whole company.<\/p>\n<p>Entering addresses manually in your browser doesn\u2019t help either, as the redirection happens while the device connects to the DNS.<\/p>\n<p>It makes this type of pharming particularly dangerous. DNS poisoning is harder to realize, but the payoff for cybercriminals is also bigger, making it an enticing opportunity.<\/p>\n<h2>What is the difference between pharming and phishing?<\/h2>\n<p>Pharming and phishing <strong>both use social engineering attacks<\/strong> to achieve their goals. In both cases, they intend to steal your confidential information to:<\/p>\n<ul>\n<li>Commit fraud themselves (usually kinds of wire transfer scams <a href=\"https:\/\/trustpair.com\/gb\/blog\/ceo-fraud-how-to-protect-your-organization-from-fraudsters\/\">like CEO fraud<\/a> or <a href=\"https:\/\/trustpair.com\/gb\/vendor-fraud-prevention\/\">vendor fraud<\/a>),<\/li>\n<li>Sell this information to other hackers.<\/li>\n<\/ul>\n<p>Directly or indirectly, there is some financial fraud happening. This is why protecting yourself against fraud is essential to safeguard your business.<\/p>\n<p>While the end result of pharming and phishing is often similar, the way they achieve this is different:<\/p>\n<ul>\n<li><strong>Phishing relies on its victims to click on a link<\/strong> \u2014 downloading an attachment or clicking on a too-good-to-be-true offer that\u2019ll redirect them to a fake website. Even though the victim receives a phishing email, they still have to take action for it to work. It\u2019s an active form of fraud.Of course, the more personalized the malicious email is, the better the odds are of succeeding! <a href=\"https:\/\/trustpair.com\/gb\/blog\/4-examples-of-spear-phishing-attacks\/\">Spear phishing<\/a> and <a href=\"https:\/\/trustpair.com\/gb\/blog\/whaling-phishing-attacks-what-are-they-and-how-to-protect-yourself\/\">whaling<\/a> are sub-categories of phishing targeting specific individuals using social engineering hacks.<\/li>\n<\/ul>\n<ul>\n<li><strong>Pharming is a passive form of fraud.<\/strong> It corrupts the DNS protocol, which is beyond the user\u2019s control. Although some pharming uses malware, you can still be a victim of pharming without having any malware on your device or network. In pharming, the attack happens directly in your browser, so anti-phishing techniques aren\u2019t effective. Pharming is less common than phishing, but it\u2019s also more dangerous.<\/li>\n<\/ul>\n<p>Learn all there is to know about fraud in business by <a href=\"https:\/\/trustpair.com\/gb\/resources\/2025-uk-fraud-trends-and-insights\/\">downloading our latest fraud report!<\/a><\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-26e69232-c009-4130-a9a9-c5b1c44d4013\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-26e69232-c009-4130-a9a9-c5b1c44d4013\" class=\"hs-cta-node hs-cta-26e69232-c009-4130-a9a9-c5b1c44d4013\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/26e69232-c009-4130-a9a9-c5b1c44d4013\"><img decoding=\"async\" id=\"hs-cta-img-26e69232-c009-4130-a9a9-c5b1c44d4013\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/26e69232-c009-4130-a9a9-c5b1c44d4013.png\" alt=\"fraud study us\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, '26e69232-c009-4130-a9a9-c5b1c44d4013', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2>What are some pharming examples?<\/h2>\n<h3>Famous examples<\/h3>\n<p>In 2007, the hackers targeting 50 financial institutions across the World did so through a vulnerability in Microsoft\u2019s software.<\/p>\n<p><strong>Victims were directed to a website containing malicious code<\/strong>, prompting them to download trojans that would corrupt their host files. Every time they\u2019d try to access their bank\u2019s website, they\u2019d be automatically redirected to a bogus version of it and prompted to enter their login. Because it was seamlessly done, the attack lasted 3-days before it got stopped.<\/p>\n<p>\u201cOperation Ghost Click\u201d is another infamous example of pharming attacks. It was uncovered by the FBI in 2011 after spreading to over 4 million computers across the world. Hackers had managed to redirect users to fake websites with advertisements and were profiting from the ad revenue from the fraudulent traffic.<\/p>\n<h3>Pharming in the private sector<\/h3>\n<p>In the B2B world specifically, pharming can look like accessing a spoofed website of your financial institutions, your vendors, or even governmental agencies.<\/p>\n<p>Regardless of who the phishers impersonate,<strong> the effects on your business could be disastrous<\/strong>. Criminals with access to sensitive data can use it to transfer money to their own account, or elaborate another type of fraud based on the information they collected:<\/p>\n<ul>\n<li>Hackers use your pharmed customer information to send fake invoices by impersonating your suppliers \u2014 that\u2019s <a href=\"https:\/\/trustpair.com\/gb\/blog\/how-to-detect-and-prevent-invoice-fraud\/\">invoice fraud<\/a>.<\/li>\n<li>Fraudsters impersonate a tax agency, requesting an \u201curgent\u201d payment \u2014 a form of wire transfer scam.<\/li>\n<\/ul>\n<p>The best way to protect against those effects is by using anti-fraud solutions like Trustpair. Our platform automatically checks the credentials of your vendors before any transaction is sent, so you always know your funds are sent to the right bank account.<\/p>\n<h2>How can you spot pharming?<\/h2>\n<p>Pharming is insidious, making it very hard to detect. The only red flags of pharming are:<\/p>\n<ol>\n<li><strong>A nonsecured connection<\/strong>: the URLs begin with http instead of https.<\/li>\n<li><strong>A questionable-looking website.<\/strong><\/li>\n<\/ol>\n<p>In the latter case, let\u2019s say you connect to a supplier\u2019s website to order some goods. <strong>You notice things looking a bit weird<\/strong>, a few typos here and there, a pixelated image, or even a new (but not improved) layout. These can be tell-tales of a spoofed website.<\/p>\n<p>Even if you\u2019ve never visited the website before, pay attention to the way the login process works or is phrased. Pharming websites often prompt you to enter your credentials, but then display an error message.<\/p>\n<p>While some people might dismiss it and move on, the cyber-aware person will know that it\u2019s suspicious. In this case, it\u2019s best to get in touch with your contact to double-check you haven\u2019t been compromised. If pharming just happened, <strong>reacting quickly<\/strong> is what might give you a chance in fighting fraud.<\/p>\n<p>Here are some common signs of pharming:<\/p>\n<ul>\n<li>Unrecognized or unauthorized transactions on your business bank accounts,<\/li>\n<li>Social media posts or emails you never sent,<\/li>\n<li>Your online passwords have been changed.<\/li>\n<\/ul>\n<p>In case of suspicious activity: don\u2019t wait! Contact your IT department and law enforcement agencies if pharming is confirmed. Hopefully, you also have a contingency plan for such situations, as part of your <a href=\"https:\/\/trustpair.com\/gb\/blog\/risk-management-definition-steps-and-best-practices\/\">risk management strategy<\/a>.<\/p>\n<p><strong>Financial fraud can happen very quickly<\/strong> with pharming attacks. Fortunately, you have anti-fraud software like Trustpair blocking the effects of it. Using our solution means no unauthorized transaction can go through, and any payment fraud attempt is blocked.<\/p>\n<h2>How can you protect yourself?<\/h2>\n<h3>Security protocols<\/h3>\n<p>The first thing you can do to protect yourself against pharming is to increase, or improve, your security measures. We specifically recommend:<\/p>\n<ul>\n<li><strong>Always checking the website is secure:<\/strong> the link starts with HTTPS, meaning the connection is safe. You should also be able to click on the lock in the address bar and check the website\u2019s security certificate.<\/li>\n<\/ul>\n<ul>\n<li><strong>Using antivirus and antimalware.<\/strong> While they\u2019re not sufficient protection, they can help by warning you if the website\u2019s connection or attachment you try to download isn&#8217;t safe. Make sure they\u2019re up-to-date so they safeguard you against the latest viruses.<\/li>\n<\/ul>\n<ul>\n<li><strong>Not clicking on suspicious email links.<\/strong> Be especially careful if you don\u2019t know the email\u2019s sender and take a few minutes to analyze the situation. If there is a link to click, hover your mouse over it first so you can check the full URL. In case of doubts, forward it to your IT security department to report phishing attempts, they\u2019ll be able to help.<\/li>\n<\/ul>\n<ul>\n<li><strong>Paying attention to website appearance and content.<\/strong> Be on the lookout for spelling errors in the URL but also in the website\u2019s text. Most hackers are intent on creating functional websites quickly, which means they don\u2019t pay attention to details. For instance, their T&amp;Cs or privacy policy might be missing.<\/li>\n<\/ul>\n<ul>\n<li><strong>Setting up two-factor authentication.<\/strong> This adds a layer of protection because even someone with your login credentials would need to verify their identity.<\/li>\n<\/ul>\n<p>It\u2019s really important to have these measures in place, but also to educate your employees through <a href=\"https:\/\/trustpair.com\/gb\/blog\/fraud-awareness-and-prevention-policies-safeguard-against-deceptive-practices\/\">security awareness training<\/a> regularly.<\/p>\n<p>Your key staff (like the ones authorizing transactions, or paying invoices for example) should be able to recognize pharming or phishing attempts and know what to do in case of a <a href=\"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-what-it-is-why-it-matters-and-how-to-avoid-it\/\">Business Email Compromise (BEC)<\/a>. It\u2019s a great way to prevent <a href=\"https:\/\/trustpair.com\/gb\/blog\/corporate-fraud-and-how-to-prevent-it\/\">corporate fraud<\/a> from happening.<\/p>\n<p>Your goal is to make your company cyber-aware, making cybersecurity a priority for everyone.<\/p>\n<h3>Using anti-fraud software to counter the impact of cyberattacks<\/h3>\n<p>While anti-fraud software doesn\u2019t prevent you <em>directly<\/em> from pharming, they protect you from its negative effect: financial loss.<\/p>\n<p>Choosing a software solution like Trustpair means <strong>no unauthorized transactions can go through.<\/strong> For example, even if a fraudster gained your employee\u2019s login details, they wouldn\u2019t be able to send money to themselves by hijacking your vendor\u2019s bank account information and adding their own.<\/p>\n<p>Our solution always treats a change in credentials as a fraud attempt and automatically checks the new bank account against international databases to check:<\/p>\n<ul>\n<li>Ownership (the name is correct)<\/li>\n<li>Veracity (the bank account number is correct)<\/li>\n<li>The match between the name and the bank account number.<\/li>\n<\/ul>\n<p>Pharming leads to <a href=\"https:\/\/trustpair.com\/gb\/blog\/third-party-fraud-how-to-fight-back-in-your-business\/\">third-party fraud<\/a>, so protecting against both is needed to safeguard your organization.<\/p>\n<p><strong>Key Takeaways:<\/strong><\/p>\n<ul>\n<li>Pharming is a type of cyber attack where users are unknowingly directed to scam websites stealing their personal data.<\/li>\n<li>It\u2019s important to protect yourself against pharming and its negative impact: financial losses.<\/li>\n<li>Trustpair is an anti-fraud solution that eradicates the risk of financial fraud.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The most infamous pharming attack happened in 2007 when hackers managed to steal the user logins of 50 financial institutions. While the financial losses weren&#8217;t officially disclosed, we can safely say those businesses suffered greatly from this fraud. How can you protect your company from pharming and its negative effects? How does pharming work? Read [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":14897,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[117],"tags":[],"class_list":["post-14896","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraud-protection-gb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is pharming and how can you safeguard against it? - Trustpair<\/title>\n<meta name=\"description\" content=\"Pharming is on the rise and can be difficult to detect. What is it exactly and how can you set up efficient measures to block it?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is pharming and how can you safeguard against it? - Trustpair\" \/>\n<meta property=\"og:description\" content=\"Pharming is on the rise and can be difficult to detect. What is it exactly and how can you set up efficient measures to block it?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustpair\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-02T13:38:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-15T13:33:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2285786613.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"593\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"trustpair_2438\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"trustpair_2438\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/\"},\"author\":{\"name\":\"trustpair_2438\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\"},\"headline\":\"Pharming: what is it and how can you protect yourself?\",\"datePublished\":\"2024-08-02T13:38:33+00:00\",\"dateModified\":\"2025-07-15T13:33:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/\"},\"wordCount\":1947,\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2285786613.jpg\",\"articleSection\":[\"Fraud protection\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/\",\"url\":\"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/\",\"name\":\"What is pharming and how can you safeguard against it? - Trustpair\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2285786613.jpg\",\"datePublished\":\"2024-08-02T13:38:33+00:00\",\"dateModified\":\"2025-07-15T13:33:08+00:00\",\"description\":\"Pharming is on the rise and can be difficult to detect. What is it exactly and how can you set up efficient measures to block it?\",\"breadcrumb\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/#primaryimage\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2285786613.jpg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2285786613.jpg\",\"width\":1200,\"height\":593},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trustpair.com\/gb\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pharming: what is it and how can you protect yourself?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustpair.com\/gb\/#website\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"name\":\"Trustpair\",\"description\":\"Leading Payment Fraud Prevention Platform\",\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustpair.com\/gb\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\",\"name\":\"Trustpair\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"width\":304,\"height\":73,\"caption\":\"Trustpair\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\",\"name\":\"trustpair_2438\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"caption\":\"trustpair_2438\"},\"sameAs\":[\"http:\/\/trustpair.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is pharming and how can you safeguard against it? - Trustpair","description":"Pharming is on the rise and can be difficult to detect. What is it exactly and how can you set up efficient measures to block it?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/","og_locale":"en_GB","og_type":"article","og_title":"What is pharming and how can you safeguard against it? - Trustpair","og_description":"Pharming is on the rise and can be difficult to detect. What is it exactly and how can you set up efficient measures to block it?","og_url":"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/","og_site_name":"Trustpair","article_published_time":"2024-08-02T13:38:33+00:00","article_modified_time":"2025-07-15T13:33:08+00:00","og_image":[{"width":1200,"height":593,"url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2285786613.jpg","type":"image\/jpeg"}],"author":"trustpair_2438","twitter_card":"summary_large_image","twitter_misc":{"Written by":"trustpair_2438","Estimated reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/#article","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/"},"author":{"name":"trustpair_2438","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034"},"headline":"Pharming: what is it and how can you protect yourself?","datePublished":"2024-08-02T13:38:33+00:00","dateModified":"2025-07-15T13:33:08+00:00","mainEntityOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/"},"wordCount":1947,"publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2285786613.jpg","articleSection":["Fraud protection"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/","url":"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/","name":"What is pharming and how can you safeguard against it? - Trustpair","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/#primaryimage"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2285786613.jpg","datePublished":"2024-08-02T13:38:33+00:00","dateModified":"2025-07-15T13:33:08+00:00","description":"Pharming is on the rise and can be difficult to detect. What is it exactly and how can you set up efficient measures to block it?","breadcrumb":{"@id":"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/#primaryimage","url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2285786613.jpg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_2285786613.jpg","width":1200,"height":593},{"@type":"BreadcrumbList","@id":"https:\/\/trustpair.com\/gb\/blog\/pharming-what-is-it-and-how-can-you-protect-yourself\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trustpair.com\/gb\/"},{"@type":"ListItem","position":2,"name":"Pharming: what is it and how can you protect yourself?"}]},{"@type":"WebSite","@id":"https:\/\/trustpair.com\/gb\/#website","url":"https:\/\/trustpair.com\/gb\/","name":"Trustpair","description":"Leading Payment Fraud Prevention Platform","publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustpair.com\/gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/trustpair.com\/gb\/#organization","name":"Trustpair","url":"https:\/\/trustpair.com\/gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/","url":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","width":304,"height":73,"caption":"Trustpair"},"image":{"@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034","name":"trustpair_2438","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","caption":"trustpair_2438"},"sameAs":["http:\/\/trustpair.com"]}]}},"_links":{"self":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/14896","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/comments?post=14896"}],"version-history":[{"count":2,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/14896\/revisions"}],"predecessor-version":[{"id":20162,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/14896\/revisions\/20162"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media\/14897"}],"wp:attachment":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media?parent=14896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/categories?post=14896"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/tags?post=14896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}