header bg

Question:

How did the attacker accomplish the hack in the situation:
Jason is at home, attempting to access his music store's website. When he visits the website, he is greeted with a basic form that requests his name, email address, and phone number. This is not the website of a music retailer. Jason is certain that the website has been hacked.

A DNS cache poisoning
Explaination