A DNS attack on St. Louis Federal Reserve prompted the Central bank to force password reset. The cyberattack cause visitors to be redirected from parts of the website to sham Web pages.
On April 24, the IT team of St. Louis Federal Reserve found that the DNS (domain name system) settings of their website had been changed to divert its visitors to fake Web pages. They didn’t name the bank’s DNS provider. There is a strong possibility that those who were diverted into fake Web pages called Phishing sites, may have been introduced to malware or had their login information stolen.
An advisory said that “if you attempted to log into your user account on that date, it is possible that this malicious group may have accessed your user name and password.”
The DNS is a global database that determines the domain names’ IP addresses. Those who run DNS systems watch them painstakingly, as modifications can send individuals to the wrong website.
DNS hacks are powerful since it can send people to a different IP address regardless of the possibility that they write in the right domain name on their browser.
The bank said that the bogus webpages were designed to appear like its research website. Other fake pages were made to emulate those in the research site, which contains databases of economic information.