{"id":15049,"date":"2024-08-02T13:38:33","date_gmt":"2024-08-02T13:38:33","guid":{"rendered":"https:\/\/trustpair.com\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/"},"modified":"2025-07-22T09:36:46","modified_gmt":"2025-07-22T09:36:46","slug":"what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening","status":"publish","type":"post","link":"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/","title":{"rendered":"What is a pharming attack and how can you stop it from happening?"},"content":{"rendered":"<p>Pharming, as part of the wider phishing culture, is the biggest threat to Americans today. As with other white-collar crimes, businesses stand to lose the most from pharming. It damages ongoing operational efficiency, on top of the financial and reputational effects. <strong>Pharming attacks are best prevented with knowledge and strategy<\/strong>. This piece explores the threat and how to stop it.<\/p>\n<p>Trustpair blocks the financial effects of pharming by continuously controlling payments before they\u2019re executed, and blocking payments to suspicious third parties. <a href=\"https:\/\/trustpair.com\/gb\/demo-5\/\">Contact an expert to learn more!<\/a><\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-node hs-cta-f87ea066-7298-4ae0-bcd1-f309efec12d5\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/f87ea066-7298-4ae0-bcd1-f309efec12d5\"><img decoding=\"async\" id=\"hs-cta-img-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/f87ea066-7298-4ae0-bcd1-f309efec12d5.png\" alt=\"Nouveau call-to-action\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, 'f87ea066-7298-4ae0-bcd1-f309efec12d5', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2>What is pharming?<\/h2>\n<p><strong>Pharming = phishing + farming.<\/strong><\/p>\n<p>It\u2019s a play on words, but not quite as fun as it sounds, as <strong>pharming is a dangerous hacking technique<\/strong>. It can cause millions worth of damage to individuals and companies alike. In this case, phishing is a <a href=\"https:\/\/trustpair.com\/gb\/blog\/what-is-social-engineering-fraud-and-how-does-it-work\/\">social engineering scam<\/a> where users trust giving away their personal information, and farming refers to the harvesting of such data.<\/p>\n<p>Pharmers (the perpetrators) typically set up with <a href=\"https:\/\/trustpair.com\/gb\/blog\/spoofing-an-open-door-to-corporate-fraud\/\">a fake website that is very carefully spoofed<\/a> to look like the original, making it look legitimate and convincing. Then, they snare their victims into visiting the site through a range of techniques with the goal to yield as much confidential information as possible.<\/p>\n<p>Sometimes, the targets of pharming attacks are individuals, but more often than not, it\u2019s businesses and their employees that should be wary of pharming. That\u2019s because 82% of organizational data breaches involve a human element, such as clicking on a malicious link or typing credentials into a spoof site.<\/p>\n<p>Pharming attackers may use the data they harvest in a number of ways:<\/p>\n<ul>\n<li>To sell on the dark web (the black market of the internet)<\/li>\n<li>To make <a href=\"https:\/\/trustpair.com\/gb\/blog\/how-can-you-effectively-fight-fraudulent-b2b-transactions\/\">fraudulent transactions<\/a> via identity theft<\/li>\n<li>To steal further data, using details to convince a third party to trust their impersonation and reveal further confidential data<\/li>\n<li>To hack into company or personal accounts and <a href=\"https:\/\/trustpair.com\/gb\/blog\/anti-money-laundering-everything-you-need-to-know\/\">launder money<\/a> to their accounts<\/li>\n<\/ul>\n<h2>How does a pharming attack work?<\/h2>\n<p>Because it\u2019s a <strong>complex hacking technique<\/strong>, pharming can happen in a few different ways. In each of them, the perpetrators gain access to a device or its network and exploit the human on the other end.<\/p>\n<p>Here are two of the ways that pharming can work:<\/p>\n<ul>\n<li>Attacking host file<\/li>\n<li>Attacking DNS server<\/li>\n<\/ul>\n<h3>Attacking host file<\/h3>\n<p>Host files are the part of a computer\u2019s operating system that manually checks the URL you\u2019ve typed and maps it to the correct IP address.<\/p>\n<p>When cybercriminals attack host files, they corrupt them by spreading malware through the network or the device. This typically happens through<a href=\"https:\/\/trustpair.com\/gb\/blog\/business-email-compromise-what-it-is-why-it-matters-and-how-to-avoid-it\/\"> business email compromise (BEC)<\/a>, with a malicious link. Once clicked, this code changes the host file and meddles with the data, messing up the entire mapping process. This is the phishing part of pharming.<\/p>\n<p>It means that t<strong>he victim is automatically redirected to a different IP address<\/strong>, often one that the perpetrators have spoofed to look exactly like the legitimate site. From here, the unknowing victims will input their login credentials as usual and the hackers on the other side automatically harvest that data. This is the farming side of pharming.<\/p>\n<h3>Attacking DNS server<\/h3>\n<p>DNS stands for domain name systems, and these servers also translate URLs into IP addresses. But unlike host files, DNS servers contain huge databases to automatically complete this process, instead of relying on an individual device to manually do this.<\/p>\n<p>When DNS servers are attacked, it means that hackers can either install malware onto the DNS server itself, or on one of the devices within the network. Again, this typically happens with a phishing email that contains a malicious link, downloading spyware once clicked.<\/p>\n<p>Similarly, <strong>the user is redirected to a spam site and can end up typing in their personal information for the cyberattackers to use<\/strong>. Or, they might end up <a href=\"https:\/\/trustpair.com\/gb\/blog\/the-6-types-of-bank-account-fraud-to-watch-out-for\/\">transferring funds straight from their bank account<\/a> in exchange for fake products that will never arrive.<\/p>\n<p>DNS attacks are much more dangerous than host file corruption, because as soon as one is poisoned, it can affect other servers. Just like how you can\u2019t use antibiotics to treat a viral infection, anti-malware programs are much less effective at preventing this type of pharming attack.<\/p>\n<h2>What are some examples of real-life pharming attacks?<\/h2>\n<p>Although it\u2019s a complex and technical cybersecurity threat, there are plenty of notable pharming accounts that have taken place since the internet first began. Here are two of the most famous:<\/p>\n<ol>\n<li>Operation Ghost Click<\/li>\n<li>Venezuelan Charity Attack<\/li>\n<\/ol>\n<h3>Operation Ghost Click<\/h3>\n<p>Operation Ghost Click was the name of a 2009-2011 FBI operation into a pharming ring. The group in question had used a malware called DNSChanger to infect millions of computers in over 100 countries (including NASA\u2019s network). They worked by <strong>faking internet advertising banners<\/strong>, which when clicked, redirected victims to fake sites without their knowledge.<\/p>\n<p>When the victims input their details to make a purchase, the money was captured by the group instead. The six members of the ring who were convicted made over $14 million during their pharming operation.<\/p>\n<h3>Venezuelan Charity Attack<\/h3>\n<p>Only a few years ago in 2019, another pharming attack made the news. This time, the attacker stole data from those attempting to donate to victims of the Venezuelan crisis. It was one of the most severe <a href=\"https:\/\/trustpair.com\/gb\/blog\/corporate-fraud-and-how-to-prevent-it\/\">corporate fraud attacks<\/a>, because this hack damaged the reputation of the charity itself.<\/p>\n<p>One charity attempted to make it easy for their patrons to regularly donate to the cause. They did this by allowing users of their website to set up an account, where they could quickly donate without having to log personal information every time. The account creation form included the collection of information such as:<\/p>\n<ul>\n<li>Name<\/li>\n<li>Address<\/li>\n<li>Phone number<\/li>\n<li>Personal identification number<\/li>\n<\/ul>\n<p>While the theory behind the idea was great, a hacker took advantage. <strong>The perpetrator spoofed the site within days and managed to use the same IP addres<\/strong>s, making it impossible for computer DNS systems to tell the difference. Containing the same form as the original site, it meant that the pharmer collected the personal data of millions to either be sold on or used for identity theft purposes.<\/p>\n<h2>What is the difference between pharming and phishing?<\/h2>\n<p>Pharming and phishing are <strong>sometimes used interchangeably<\/strong>, but there is a hierarchy between the two terms because pharming is actually a type of phishing.<\/p>\n<p>Pharming perpetrators typically target a large group of victims, and use a \u201cspray and pray\u201d approach. That\u2019s because the attackers can\u2019t be sure who will land on their website, as once a computer infection makes it through the anti-virus barriers, it could spread.<\/p>\n<p>Instead, phishing perpetrators typically have their target in mind. <a href=\"https:\/\/trustpair.com\/gb\/blog\/whaling-vs-spear-phishing-what-are-the-differences\/\">In the case of spear phishing or whaling<\/a>, lots of research is done to target this specific victim in order to make the entire ruse more convincing.<\/p>\n<p>Moreover, pharming uses highly-technical hacking skills to poison a DNS server or corrupt host files, for example. Instead, phishing relies on <a href=\"https:\/\/trustpair.com\/gb\/blog\/the-top-5-social-engineering-techniques-and-how-to-prevent-them\/\">social engineering techniques<\/a> to scam the victim with psychology.<\/p>\n<p>Phishing could be perpetrated through the email channels, but there is also smishing (via text message) and vishing (through fake voice calls). Instead, pharming is always done over the computer network first, and may also include an email to snare the victim.<\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Pharming<\/b><\/td>\n<td><b>Phishing<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Targets large groups of potential victims<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Targets specific small groups or individual victims<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Uses highly-complex techniques such as hacking to corrupt devices and networks<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Relies on social engineering techniques to convince the victim to give over their details<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Requires perpetrators to create an almost identical website to the legitimate site they are spoofing<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Legitimacy is based on the research and information they know about the <\/span><span style=\"font-weight: 400;\">third party they are impersonating<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Carried out via computer network<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Carried out by email channels, text or calls<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>How can you detect a pharming attack?<\/h2>\n<p>Detecting a pharming attack can be <strong>very difficult<\/strong>, especially if it\u2019s an attack on the DNS server. But with strong antivirus software, some attacks can be stopped before they even enter your system.<\/p>\n<p>Moreover, relying on a well-known DNS server is likely to help against pharmers, because those managing the servers can detect and block suspicious activity before it becomes harmful.<\/p>\n<p>Finally, you might be able to detect a pharming attack by <strong>relying on your own eyes<\/strong>. Does a website look suspicious? Or too good to be true? By relying on your instincts when it comes to shady sites, you can quickly and safely exit before the hackers gain access to any of your information.<\/p>\n<h2>How can you prevent pharming attacks?<\/h2>\n<p>Prevention of pharming attacks is not as difficult as detection, because maintaining good practices makes it harder for cyber attackers to get through. These good practices include <strong>not re-using passwords across accounts<\/strong>, and ensuring that any URLs visited are labeled HTTPS instead of HTTP, as they are far more secure.<\/p>\n<p>Moreover, <strong>two-factor authentication methods<\/strong> can help verify the identity of your employees and are incredibly hard for attackers to bypass. In some industries, this is a regulatory requirement, but even if you\u2019re not working in a compliance-based environment, it\u2019s a strong practice to follow.<\/p>\n<p>Finally, you can prevent any of the financial effects of falling victim to pharming with Trustpair. We continuously validate the details of any payments before they leave your account.<\/p>\n<p>And, we block payments to any suspicious or unknown parties automatically, protecting your finances even if your business has been infiltrated by a pharming attack. It means that if scammers manage to infiltrate your systems thanks to pharming &#8211; by getting employee logins for example &#8211; they won\u2019t be able to transfer funds to themselves.<\/p>\n<p><a href=\"https:\/\/trustpair.com\/gb\/demo-5\/\">Get your bespoke Trustpair demo and experience true protection from fraudsters.<\/a><\/p>\n<h3>In Summary:<\/h3>\n<p>Pharming is a technique that aims to get hold of sensitive information by redirecting victims to fake websites. The attackers target computer network elements, such as host files and DNS servers to bypass security certificates and fool targets into typing in their data. Protect against phishing with antivirus software, security awareness and Trustpair\u2019s automated account validation platform.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pharming, as part of the wider phishing culture, is the biggest threat to Americans today. As with other white-collar crimes, businesses stand to lose the most from pharming. It damages ongoing operational efficiency, on top of the financial and reputational effects. Pharming attacks are best prevented with knowledge and strategy. This piece explores the threat [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":15050,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[117],"tags":[],"class_list":["post-15049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraud-protection-gb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to recognize and block a pharming attack - Trustpair<\/title>\n<meta name=\"description\" content=\"Pharming is on the rise and can be difficult to detect. But what is a pharming attack and what prevention measures can you set up?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to recognize and block a pharming attack - Trustpair\" \/>\n<meta property=\"og:description\" content=\"Pharming is on the rise and can be difficult to detect. But what is a pharming attack and what prevention measures can you set up?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustpair\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-02T13:38:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-22T09:36:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_693112105.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"593\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"trustpair_2438\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"trustpair_2438\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/\"},\"author\":{\"name\":\"trustpair_2438\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\"},\"headline\":\"What is a pharming attack and how can you stop it from happening?\",\"datePublished\":\"2024-08-02T13:38:33+00:00\",\"dateModified\":\"2025-07-22T09:36:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/\"},\"wordCount\":1682,\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_693112105.jpg\",\"articleSection\":[\"Fraud protection\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/\",\"url\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/\",\"name\":\"How to recognize and block a pharming attack - Trustpair\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_693112105.jpg\",\"datePublished\":\"2024-08-02T13:38:33+00:00\",\"dateModified\":\"2025-07-22T09:36:46+00:00\",\"description\":\"Pharming is on the rise and can be difficult to detect. But what is a pharming attack and what prevention measures can you set up?\",\"breadcrumb\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/#primaryimage\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_693112105.jpg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_693112105.jpg\",\"width\":1200,\"height\":593},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trustpair.com\/gb\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a pharming attack and how can you stop it from happening?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustpair.com\/gb\/#website\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"name\":\"Trustpair\",\"description\":\"Leading Payment Fraud Prevention Platform\",\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustpair.com\/gb\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\",\"name\":\"Trustpair\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"width\":304,\"height\":73,\"caption\":\"Trustpair\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\",\"name\":\"trustpair_2438\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"caption\":\"trustpair_2438\"},\"sameAs\":[\"http:\/\/trustpair.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to recognize and block a pharming attack - Trustpair","description":"Pharming is on the rise and can be difficult to detect. But what is a pharming attack and what prevention measures can you set up?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/","og_locale":"en_GB","og_type":"article","og_title":"How to recognize and block a pharming attack - Trustpair","og_description":"Pharming is on the rise and can be difficult to detect. But what is a pharming attack and what prevention measures can you set up?","og_url":"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/","og_site_name":"Trustpair","article_published_time":"2024-08-02T13:38:33+00:00","article_modified_time":"2025-07-22T09:36:46+00:00","og_image":[{"width":1200,"height":593,"url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_693112105.jpg","type":"image\/jpeg"}],"author":"trustpair_2438","twitter_card":"summary_large_image","twitter_misc":{"Written by":"trustpair_2438","Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/#article","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/"},"author":{"name":"trustpair_2438","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034"},"headline":"What is a pharming attack and how can you stop it from happening?","datePublished":"2024-08-02T13:38:33+00:00","dateModified":"2025-07-22T09:36:46+00:00","mainEntityOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/"},"wordCount":1682,"publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_693112105.jpg","articleSection":["Fraud protection"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/","url":"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/","name":"How to recognize and block a pharming attack - Trustpair","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/#primaryimage"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_693112105.jpg","datePublished":"2024-08-02T13:38:33+00:00","dateModified":"2025-07-22T09:36:46+00:00","description":"Pharming is on the rise and can be difficult to detect. But what is a pharming attack and what prevention measures can you set up?","breadcrumb":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/#primaryimage","url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_693112105.jpg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_693112105.jpg","width":1200,"height":593},{"@type":"BreadcrumbList","@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-a-pharming-attack-and-how-can-you-stop-it-from-happening\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trustpair.com\/gb\/"},{"@type":"ListItem","position":2,"name":"What is a pharming attack and how can you stop it from happening?"}]},{"@type":"WebSite","@id":"https:\/\/trustpair.com\/gb\/#website","url":"https:\/\/trustpair.com\/gb\/","name":"Trustpair","description":"Leading Payment Fraud Prevention Platform","publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustpair.com\/gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/trustpair.com\/gb\/#organization","name":"Trustpair","url":"https:\/\/trustpair.com\/gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/","url":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","width":304,"height":73,"caption":"Trustpair"},"image":{"@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034","name":"trustpair_2438","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","caption":"trustpair_2438"},"sameAs":["http:\/\/trustpair.com"]}]}},"_links":{"self":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/15049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/comments?post=15049"}],"version-history":[{"count":2,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/15049\/revisions"}],"predecessor-version":[{"id":20437,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/15049\/revisions\/20437"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media\/15050"}],"wp:attachment":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media?parent=15049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/categories?post=15049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/tags?post=15049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}