Why BGP Hijacking Remains a Security Scourge for Organizations Worldwide?

Why BGP Hijacking Remains a Security Scourge for Organizations Worldwide?
Border Gateway Protocol (BGP) hijacking, sometimes called prefix hijacking or IP hijacking, occurs when an attacker redirects web traffic away from its intended destination.
One such attack had lately impacted more than 200 of the world’s largest content delivery networks (CDNs) and cloud hosting providers. 

The lesser-known BGP hijacking attack was in the news of late for impacting more than 200 of the world’s largest Content Delivery Networks (CDNs) and cloud hosting providers. The impacted companies were a who’s who of the cloud services and the CDN market, including big names such as Google, Amazon, Facebook, Akamai, Cloudflare, GoDaddy, Digital Ocean, and Joyent.

Most commonly, BGP is used on the internet to exchange routing information between various locations. It is the language that is spoken by routers on the internet to make decisions on the most optimal path to reach a destination. However, due to its antiquated design and lack of adoption of encryption or an automatic verification method, BGP has become the cause of hundreds of outages.   

How BGP hijacking works?


BGP hijacking, sometimes called prefix hijacking or IP hijacking, occurs when attackers redirect web traffic away from its intended destination and instead send incoming requests to IP addresses under their control. It is an attack against the routing protocol in which cybercriminals impersonate their victims’ IP identity to perform malicious activities such as spamming, phishing, and malware hosting.  

In other words, this attack can be compared to a user sending private information to the wrong address that was provided by an imposter for the delivery of orders. Once the information is emailed to the wrong address, the imposter has it forever and can use it for his malicious purposes. 

How prevalent is the attack?


One of the most rem ..

Support the originator by clicking the read the rest link below.