A DNS water torture attack targets an organization’s DNS infrastructure by flooding it with DNS queries for non-existent subdomains. Attackers use a botnet to generate and send these queries, forcing the target’s authoritative DNS servers to spend resources trying to resolve them. The relentless stream of queries can exhaust server resources and disrupt legitimate DNS traffic, causing service disruptions for the targeted organization.
