Ask Dave Taylor
  • Facebook
  • Instagram
  • Linkedin
  • Pinterest
  • Twitter
  • YouTube
  • Home
  • YouTube Videos
  • Top Categories
  • Subscribe via Email
  • Ask A Question
  • Meet Dave
  • Home
  • Articles, Tutorials, and Reviews
  • How to Avoid the New DNS Hijacking Attacks (Step by Step Guide)

How to Avoid the New DNS Hijacking Attacks (Step by Step Guide)

August 23, 2019 / Dave Taylor / Articles, Tutorials, and Reviews / No Comments

In today’s interconnected online world, most people have heard of computer viruses and hackers. However, it often seems that many of the significant computer virus outbreaks or hacking events fly under the radar. We often rely on our antivirus programs such as Windows Defender to protect us from whatever is out there. And, for the most part – that works just fine.

These out-of-sight-out-of-mind approaches to security are a significant reason why hackers and other malicious actors on the Internet have been forced to use more technically challenging methods that attack the very infrastructure of the internet. One of these methods – DNS hijacking – is actually a pretty well-known hack that cybersecurity experts hoped had been solved years ago. That hope ended in late 2018 when cyber security experts realized that internet domain registrars themselves had been infiltrated by DNS hackers.

Domain registrars are familiar websites and providers such as GoDaddy.com, Namecheap.com or Domain.com. These services allow you to host your own website for a monthly or annual fee, and they are regulated by national and international rules and laws. The DNS, or domain name system, changes the usual URL that you would type into your browser into a number-based IP address which is easier for computers to find. Today, this system is also decentralized among many DNS servers to make surfing the web easier and faster as opposed to having one giant server with all internet addresses on it. However, this also means that DNS hackers can slip into these side channels on the internet much easier.

stop hackers cybercrooks breaking into hacking system

The technically complicated nature of this part of the internet means that a DNS hack can happen without you initially noticing it. In some cases, hackers will break into a DNS server and insert an incorrect corresponding address for a website. When your computer tries to access that website, it will then be redirected to the incorrect address which is usually a fake or malicious website run by the hackers. Since this process happens automatically, you may not realize that you’ve been redirected to a bad website until you’ve possibly already entered in sensitive personal data – even if it’s just your username and password for a trusted online service.

Thankfully, there are several ways in which you can avoid the potentially disastrous effects of a DNS hack. Let’s review a few of these steps below.

1. Make sure your basic antivirus security and operating system are up to date

If you’re using Windows, make sure that Windows Defender is up-to-date and operational. Also make sure that you’ve updated Windows itself – along with all of the necessary security patches. This should happen automatically unless you’ve changed the settings yourself. Visit Microsoft’s website for more details on these updates. These basic security steps will ensure that the hackers cannot insert any malware or viruses on your computer which will hijack your local DNS settings on your computer. It’s also a good idea to keep your internet router’s firmware (the nuts-and-bolts program that tells your device how to run) updated and regularly change your router’s username and password, too – just like you should with your other usernames and passwords.

2. Avoid using public WiFi networks when sending or receiving personal data

Public WiFi networks are notorious for their less-than-optimal security. If you have to use a public WiFi network, avoid having to enter in information like user names, passwords, and other personal information you want to protect. If a public WiFi doesn’t have a Terms of Service that appears when you first connect, you should avoid using that WiFi connection for anything at all.

3. Don’t click on links in suspicious emails or social media posts

Accidentally clicking on such links is how trojan viruses and malware can be installed on your computer or device. If you think you’ve received an email from a trusted online service such as Facebook or Paypal, check the sender’s email address and the contents of the email itself for anything suspicious, such as obvious typos and poor grammar. These suspicious things should also be looked out for when visiting websites, which leads us to our next step.

4. Be very aware of the URLs you’re visiting

Since DNS hacks can redirect you to malicious websites automatically, you should always be acutely aware of the website addresses at which you arrive. These websites might also have unusually long loading times, or their visual layout will appear differently than normal. Check the entire web address and the website’s home page, and if something looks incorrect or suspicious, do not enter any information on the page – promptly close your browser and check your DNS service for leaks, which can be done by following the instructions in the next step.

linksys wrt 3200 acm mu-mimo gigabit wifi router5. Check your router and DNS settings for suspicious activity

There are two great free online tools which you can use check to see if your router or DNS settings have been hacked. F-Secure Corporation’s Router Checker is just what it sounds like – it checks your router’s connection to its DNS server to make sure the server is an authorized one. The second service, which is the website WhoIsMyDNS.com, allows you to see exactly which DNS server you’re connecting to. If the website shows you a DNS server that looks unfamiliar, it could be that your DNS settings have been hacked.

6. Use a VPN (virtual private network) when surfing the web

A VPN is a great way to protect yourself from many different threats when you’re online, including DNS leaks or hacks. VPNs create a virtual “tunnel” from your computer or mobile device to another secure server. Any data which is transferred through this virtual tunnel cannot be seen or stolen by outside parties. However, only certain VPN services offer effective protection against DNS hacks, and most of those require payment for their VPN service. Try to find a well-respected, highly-rated VPN service with an OpenVPN protocol (as opposed to a L2TP or IPSec service).

With just a little bit of extra attention to detail and an awareness of your computer’s or device’s security settings, you should be able to avoid the DNS hacking that has made cybersecurity headlines in the past year. Be safe out there!

About the Author: Dave Taylor has been involved with the online world since the early days of the Internet. Author of over 20 technical books, he runs the popular AskDaveTaylor.com tech help site. You can also find his gadget reviews on YouTube and chat with him on Twitter as @DaveTaylor.

Let’s Stay In Touch!

Never miss a single article, review or tutorial here on AskDaveTaylor, sign up for my fun weekly newsletter!
Name: 
Your email address:*
Please enter all required fields
Correct invalid entries
No spam, ever. Promise. Powered by FeedBlitz
Please choose a color:
Starbucks coffee cup I do have a lot to say, and questions of my own for that matter, but first I'd like to say thank you, Dave, for all your helpful information by buying you a cup of coffee!
dns hijacking, hack your dns, hacking, online safety, safe dns, vpn

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Search

Recent Posts

  • How to Check Energy Recommendations on your Windows Laptop
  • How Do I Customize New Tab Windows in Safari for Mac?
  • Can AI-Generated ChatGPT Text Be Accurately Identified?
  • How to Perform a Microsoft Account Security Audit and Checkup
  • How Can I Customize My Linux Dock / Taskbar?

On Our YouTube Channel

How to: Replace a Switchbot Door Sensor Battery

EMEET Luna vs INNOTRIK Studio Bluetooth Speakerphones -- DEMOS & REVIEW

Categories

  • AdSense, AdWords, and PPC Help (106)
  • Amazon, eBay, and Online Shopping Help (163)
  • Android Help (226)
  • Apple iPad Help (147)
  • Apple Watch Help (53)
  • Articles, Tutorials, and Reviews (346)
  • Auto Tech Help (15)
  • Business Advice (200)
  • ChromeOS Help (31)
  • Computer & Internet Basics (778)
  • d) None of the Above (166)
  • Facebook Help (383)
  • Google, Chrome & Gmail Help (188)
  • HTML & Web Page Design (247)
  • Instagram Help (49)
  • iPhone & iOS Help (623)
  • iPod & MP3 Player Help (173)
  • Kindle & Nook Help (99)
  • LinkedIn Help (88)
  • Linux Help (173)
  • Linux Shell Script Programming (89)
  • Mac & MacOS Help (911)
  • Most Popular (16)
  • Outlook & Office 365 Help (33)
  • PayPal Help (68)
  • Pinterest Help (54)
  • Reddit Help (19)
  • SEO & Marketing (82)
  • Spam, Scams & Security (95)
  • Trade Show News & Updates (23)
  • Twitter Help (220)
  • Video Game Tips (66)
  • Web Site Traffic Tips (62)
  • Windows PC Help (947)
  • Wordpress Help (206)
  • Writing and Publishing (72)
  • YouTube Help (47)
  • YouTube Video Reviews (159)
  • Zoom, Skype & Video Chat Help (62)

Archives

Social Connections:

Ask Dave Taylor


Follow Me on Pinterest
Follow me on Twitter
Follow me on LinkedIn
Follow me on Instagram


AskDaveTaylor on Facebook



microsoft insider mvp


This web site is for the purpose of disseminating information for educational purposes, free of charge, for the benefit of all visitors. We take great care to provide quality information. However, we do not guarantee, and accept no legal liability whatsoever arising from or connected to, the accuracy, reliability, currency or completeness of any material contained on this site or on any linked site. Further, please note that by submitting a question or comment you're agreeing to our terms of service, which are: you relinquish any subsequent rights of ownership to your material by submitting it on this site. Our lawyer says "Thanks for your cooperation."
© 2023 by Dave Taylor. "Ask Dave Taylor®" is a registered trademark of Intuitive Systems, LLC.
Privacy Policy - Terms and Conditions - Accessibility Policy