Not sure how genuine you're being, but there's a big difference between someone seeing the domain name of the website I'm visiting (publicdomainflix.com), and seeing my username and password when I register.
MITMing your DNS will do much more than let people see where you want to go. It will let them send you to wherever they want as if that was the place you were trying to go.
Right but that wasn't the point. The idea sometimes put out is that a more sophisticated instrumentation is less likely because it's more difficult. It's a misapplication of the threat model principle.
It's a false claim because the instrumentation is automated and the execution is identical.
To be even more specific about HTTPS, if someone is lying to you about DNS, lying to you about the key signer and lying to you about the keys, it still doesn't work because your browser ships with verification keys from the major key signers.
So the attacker would still have to break cryptography because they couldn't do a fake chain that matched the domain and the key that was sent to you with your browser.
Now if someone managed to break RSA then again, this would become a single program with as much effort to run as any other program even though it sounds like a lot more work. But there's no public break so it's assumed to be unachievable without vast computing resources.