Google Chrome and Chromium can check the potential for a network to hijack DNS credentials using random domain names to test. The domain names are restricted between 7-15 characters, and if pingback for both browsers is the same IP, it is assumed that network redirects to nonexistent domain requests after capturing data. The issue highlighted by researchers at CSO shows that random domains end up being directed to root DNS servers.
Researchers say that such a large volume of requests will make the infrastructure vulnerable. They suggest end-users use more than a single DNS server and run in-house secondary name servers.
Source: Zdnet