How does DNS spoofing attack function?

In a DNS spoofing attack known as DNS cache poisoning, phony data is stored in a DNS resolver cache by the attacker. The bogus data is subsequently received by all clients using this DNS cache, who use it to link to an attacker-controlled resource rather than the trusted one. A sort of man-in-the-middle attack known as DNS cache poisoning allows attackers to intercept sensitive data by simultaneously connecting to the legitimate server in the background and sending the victim to a phony website. The same method can also be used to propagate malware and conduct exceptionally successful phishing attacks, often known as pharming. Find more information about DNS spoofing.