What is DNS spoofing?
DNS spoofing tricks a device or user into resolving a trusted name to the wrong address.
Simple example
A user types a legitimate website name but is silently redirected to a fake server controlled by an attacker.
Why it matters
DNS issues can redirect users, expose credentials, or interrupt access to real services.
Common warning signs
- The activity is unexpected or unusual for the business context.
- The request or system behaviour creates pressure to act quickly.
- Normal approval, verification, or security processes are bypassed.
- There are signs of unauthorised access, data exposure, or system change.
- Staff are unsure whether the request, message, or system behaviour is legitimate.
Cyber Doc view
This term should be understood in business context, not only as a technical issue. Good protection usually combines clear processes, appropriate technical controls, staff awareness, and a calm response plan.
What to do
Proactive steps
- Use reputable DNS services.
- Keep routers and DNS settings protected.
- Use HTTPS and heed certificate warnings.
- Monitor unexpected DNS changes.
- Protect domain registrar and DNS accounts with MFA.
Reactive steps
- Check DNS settings on affected devices and routers.
- Review domain and hosting DNS records.
- Change exposed admin passwords.
- Flush or reset affected DNS settings.
- Investigate whether users entered credentials on fake sites.
Related terms
- Man-in-the-middle attack
- Domain security
- Phishing