August 18, 2025
What to look for in a business email service (and why it matters)
Key features to help you stay organized, write better emails, and keep your data secure.
Learn moreWhile many cyberattacks require a user to click on a link or download a file, pharming can happen without the user doing anything. Learn more about how pharming works, the danger it poses, and, most importantly, how to protect yourself.

Pharming is a cyberattack that works at the DNS (domain name server) level. A hacker redirects a legitimate web address to a fake site with the intention of collecting passwords and other personal data. The best pharming attacks are the most convincing, making users believe that they are on a legitimate, trusted website.
Unlike phishing, which usually depends on a user clicking a link or downloading a file, pharming can occur with or without user action.
Stay safer online with one easy-to-use app1
1Microsoft 365 Personal or Family subscription required; app available as separate download
There are two ways you can be directed to a fraudulent website in a pharming attack:
In malware-based pharming, malicious software changes the cache information on your computer. Web browsers use the cache to store IP addresses for websites you’ve previously visited. This helps you get to that site more quickly instead of needing your computer to retrieve the IP address each time from the server. In a pharming attack, malware can access your cache and replace the correct IP address. The new IP address then directs you to a fake site designed to look like the page you are trying to visit.
In this form of pharming, hackers change the IP address within the server. When you enter a web address into your browser, the browser sends that request to the server, where it is translated into an IP request. In DNS server poisoning, the server is programed to return a fraudulent IP address. As a result, a fake page appears in your browser.
Even though pharming attacks can occur without warning or clicking on something untrustworthy, you can still protect yourself. Here are several ways to guard against pharming attacks and avoid falling for a fake website:
Antivirus and anti-malware software, including Microsoft Defender, are an important line of defense against pharming sites. This software, which is available individually or as a bundle, is especially useful against malware-based pharming, which relies upon the user clicking a suspicious link or accidentally downloading malware. Antivirus and anti-malware software are designed to recognize and neutralize these threats.
Promptly accepting available updates on your operating system, browser, and antivirus software quickly raises your level of protection against all forms of cybercrime. These updates carry the latest security patches that are developed in response to the most immediate threats. As hackers develop new strategies to steal your data, updates are developed to counter them. Staying updated is one of the best actions you can take to protect yourself.
When you’re on a webpage, there’s valuable information to help verify that you are on an authentic site. Look for these signs of safety:
One of the most valuable tools against a pharming attack is attention to detail. These fraudulent websites may be lookalikes, but they’re usually not perfect. Watch out for these details that can signal a pharming attack:
While pharming attacks do their best to trick you into believing a site is authentic, they’re often preventable and detectable. By practicing good cyber hygiene and paying close attention to the sites you visit, you will have the best chance to keep your data safe.
The powerful productivity apps and creativity tools in Microsoft 365 just got better. Work, play, and create better than ever before with the apps you love and Microsoft Copilot by your side.
Try for free