Phishing scams don't need to hijack a device on your LAN or manipulate DNS responses. That makes their job a lot harder for very little reward.
Basically what a phishing scammer does is:
1) Register a domain like "amezon.com". Or, more realistically, something like "amazon.com.loginform.io".
2) Get a valid SSL certificate for that domain (easy, because they own the domain).
3) Set up a website that looks like the one they are pretending to be. The tool described in the article helps with this.
4) Distribute links to their fake site by any and all means. Email, forums, social media, etc.
A lot of people won't check the address bar very carefully (or not at all), and a lot of people would have trouble telling a legitimate amazon.com from a fake one if you gave them a side-by-side comparison with the important bits highlighted. That is the biggest problem here.