Threat actors send spoofed, falsified record resource (RR) information to a DNS resolver to redirect users from legitimate sites to malicious sites. It can also be used to inform the DNS resolver to use a malicious name server that is providing RR information for malicious activities.