A company's employees attempt to visit their corporate email portal, but they are unknowingly redirected to a fake login page controlled by an attacker. Even though they typed the correct website URL, their DNS settings were modified, sending their traffic to a malicious server. Further investigation reveals that the attack was executed by compromising the organization's DNS resolver. What type of attack has occurred?