||This article needs additional citations for verification. (January 2009)|
Pharming[p] is an attacker's attack intended to redirect a website's traffic to another, bogus site. Pharming can be conducted either by changing the hosts file on a victim's computer or by exploitation of a vulnerability in DNS server software. DNS servers are computers responsible for resolving Internet names into their real IP addresses. Compromised DNS servers are sometimes referred to as "poisoned". Pharming requires unprotected access to target a computer, such as altering a customer's home computer, rather than a corporate business server.
The term "pharming" is a neologism based on the words "farming" and "phishing". Phishing is a type of social-engineering attack to obtain access credentials, such as user names and passwords. In recent years, both pharming and phishing have been used to gain information for online identity theft. Pharming has become of major concern to businesses hosting ecommerce and online banking websites. Sophisticated measures known as anti-pharming are required to protect against this serious threat. Antivirus software and spyware removal software cannot protect against pharming.
Pharming vulnerability at home 
While malicious domain-name resolution can result from compromises in the large numbers of trusted nodes that participate in a name lookup, the most vulnerable points of compromise are near the leaves of the Internet. For instance, incorrect entries in a desktop.computer's hosts file, which circumvents name lookup with its own local name to IP address mapping, is a popular target for malware. Once rewritten, a legitimate request for a sensitive website can direct the user to a fraudulent copy. Desktops are often better targets for pharming because they receive poorer administration than most Internet servers.
Alternatively, many routers have the ability to replace their firmware (i.e. the internal software that executes the device's more complex services). Like malware on desktop systems, a firmware replacement can be very difficult to detect. A stealthy implementation will appear to behave the same as the manufacturer's firmware; the administration page will look the same, settings will appear correct, etc. This approach, if well-executed, could make it difficult for network administrators to discover the reconfiguration, if the device appears to be configured as the administrators intend but actually redirects DNS traffic in the background. Pharming is only one of many attacks that malicious firmware can mount; others include eavesdropping, active man in the middle attacks, and traffic logging. Like misconfiguration, the entire LAN is subject to these actions.
By themselves, these pharming approaches have only academic interest. However, the ubiquity of consumer grade wireless routers presents a massive vulnerability. Administrative access can be available wirelessly on most of these devices. Moreover, since these routers often work with their default settings, administrative passwords are commonly unchanged. Even when altered, many are guessed quickly through dictionary attacks, since most consumer grade routers don't introduce timing penalties for incorrect login attempts. Once administrative access is granted, all of the router's settings including the firmware itself may be altered. These attacks are difficult to trace because they occur outside the home or small office and outside the Internet.
Instances of pharming 
In January 2008, Symantec reported a drive-by pharming incident, directed against a Mexican bank, in which the DNS settings on a customer's home router were changed after receipt of an e-mail that appeared to be from a legitimate Spanish-language greeting-card company.
Controversy over the use of the term 
The term "pharming" has been controversial within the field. At a conference organized by the Anti-Phishing Working Group, Phillip Hallam-Baker denounced the term as "a marketing neologism designed to convince banks to buy a new set of security services".
Scott Chasin, a former CTO of McAfee and founder of email security firm MX Logic, coined the term in 2005.
See also 
[p] - ^The word "pharming" is pronounced as "farm-ing".
- "Can You Trust a Wireless Router?". Indiana University Bloomington. February 24, 2006.
- "Drive-By Pharming". Indiana University Bloomington. December 13, 2006.
- Messmer, Ellen (January 22, 2008). "First case of "drive-by pharming" identified in the wild". Network World.
- "Security: Phishing and Pharming". Windows IT Pro Magazine. June 22, 2005.
- "How Can We Stop Phishing and Pharming Scams?". CSO Magazine. July 20, 2005.
- BIND 9 DNS Cache Poisoning (DNS Pharming Attack) - Discovered by Amit Klein (Trusteer)
- "The Pharming Guide" by Gunter Ollmann
- ZD Net Article "Alarm over "Pharming" Attacks
- Wired News: Pharming Out-Scams Phishing
- Network World Article on New Anti-Pharming Technology
- eWeek article on the Hushmail.com DNS pharming attack
- After Phishing? Pharming!
- Main Trusteer Wikipedia Page