The following scenario illustrates how vulnerabilities in the DNS are being exploited by miscreants and how DNSSEC mitigates those threats.
The goal of the attacker is to redirect the customers to a banking website to a fraudulent website, under the attacker’s control, to harvest customer’s credentials. In the following scenario, neither the target bank nor ISP has implemented DNSSEC.
The attacker sets up a fake banking website that looks identical to a legitimate bank’s website.
The attacker then inserts fraudulent data into an ISP’s DNS servers, with the IP address for their fake website.
When any customers of the targeted ISP enter the website address for the targeted bank into their browser, the ISP’s DNS server provides the customer with the fraudulent IP address, redirecting their customers to the attacker’s website.
When the customers log into the fraudulent website their usernames and passwords are captured and recorded by the attacker.
The attacker then uses those credentials to log into the targeted bank’s website, masquerading as a legitimate user, and transfers funds to an account they control.
In this scenario if either the bank or the ISP had implemented DNSSEC then the ISP’s customers may not have ended up being redirected to the attacker’s fraudulent website.
If the bank had implemented DNSSEC, the customer’s computer may have detected the fraudulent IP address when it attempted to validate the response from the ISP’s DNS server.
If the ISP had implemented DNSSEC then the ISP’s caching server would have rejected the attempt to poison its cache.