January 1, 2026
A deep dive into prefix hijacking, real-world incidents, risks, and defenses.
Mohammed Khalil

BGP hijacking aka prefix hijacking is a network attack that maliciously redirects Internet traffic by exploiting the trust based design of the Internet’s routing protocol, BGP. In a hijack, an attacker’s network illegitimately announces someone else’s IP address range as its own. Because routers on the Internet assume announcements are legitimate and lack built-in verification, a false route can spread globally and divert traffic until corrected. In simple terms, it’s like changing road signs on the Internet’s highway system. Traffic that should go to one destination is tricked into taking a different path.
This issue matters today more than ever. Modern enterprises and cloud services rely on BGP to reach users worldwide, so a hijack can impact any organization’s connectivity, even if that organization isn’t running BGP itself. Worryingly, routing incidents whether accidental leaks or malicious hijacks are disturbingly common over 18,000 route hijacks were observed in just the first quarter of 2022. These incidents appear in a variety of contexts, from ISP level outages to targeted cyber attacks. Some are accidental misconfigurations known as route leaks, and others are deliberate attackers hijacking prefixes for espionage or fraud. In all cases, the result is the same: traffic flows where it shouldn’t, posing serious risks to security and availability. This makes BGP hijacking a critical network level attack pattern that security engineers and SOC analysts must understand and watch for.
Figure: An analogy of BGP hijacking like changing highway signs to misdirect traffic. In the illustration, an attacker’s sign diverts cars off the legitimate route. Similarly, a BGP hijacker announces a fraudulent route that causes data to take a wrong exit, sending it to the attacker’s network instead of the intended destination.
BGP Border Gateway Protocol is the Internet’s core routing system that connects thousands of autonomous systems ASes. It operates on trust: each AS advertises the IP prefixes address blocks it can reach, and others believe it by default. A BGP hijack abuses this trust. The attacker who must control or compromise a BGP capable router on some AS starts announcing a route to IP addresses they don’t actually own. If intermediate networks don’t filter out this bogus announcement, it propagates across the Internet’s routing tables.
Because BGP selects routes based on specificity and shortest path, the malicious announcement can override the legitimate route. BGP favors the most specific prefix e.g. a /24 will beat a /16 and also prefers routes with shorter AS paths. Hijackers exploit this by announcing a more specific block or a seemingly shorter path to the target network. As a result, many ISPs update their routing and start sending traffic for that prefix to the attacker’s AS. From that point until the issue is noticed and fixed, the attacker has effectively claimed that all data destined for them is misrouted to the rogue network.
Once in control of the traffic, the attacker can drop it, inspect it, or modify it. In effect, they can cause a denial of service by blackholing packets, or perform an on-path interception of a man in the middle scenario by forwarding the traffic to the real destination after spying on it or altering it. Not just anyone can pull this off the attacker needs BGP access either as an ISP or via a compromised router. But with over 80,000 ASes on the Internet, there are plenty of potential avenues for abuse.
BGP hijacks can be blatant or subtle. In some cases, a hijack is obvious: a major prefix is stolen, causing widespread outages. Other times, attackers operate quietly: they may announce unused IP blocks or route traffic through a chain of other networks to avoid detection. BGP has no global watchdog verifying ownership of routes, so unless operators or monitors notice anomalous paths, a hijack can go unnoticed for a time. This combination of high impact and low immediate visibility is what makes BGP hijacking so dangerous.
BGP hijacking is not theoretical, it has happened numerous times. A few notable incidents illustrate how it works and the damage it can cause:
These examples underscore various lessons: the YouTube case highlights the need for filtering outbound routes, the crypto heist shows how hijacks facilitate targeted attacks, and the Google/MainOne leak underlines that even well intentioned mistakes can have far reaching impact in BGP’s trust based ecosystem.
BGP hijacking has serious security and operational implications. On the security side, it undermines the fundamental integrity of Internet communications. If an attacker can reroute traffic, they can potentially monitor or tamper with data in transit. For example, hijacked traffic might be surveilled or recorded by a hostile party without the sender or recipient realizing. Attackers can also use hijacks to direct users to fraudulent websites impersonating legitimate services as part of phishing or malware attacks. Essentially, BGP hijacking is a means to perform large scale on path attacks, the kind of man in the middle capability that can defeat location based trust. In the worst cases, hackers have redirected online banking or crypto trading traffic to steal credentials and funds. Even if content is encrypted, the attacker can cause harm by denying access or by manipulating unencrypted routing metadata. And notably, spammers have abused hijacks to send spam from IP addresses that aren’t theirs, often IP blocks with good reputations, temporarily bypassing reputation blacklists.
Operationally, BGP hijacks can be devastating to uptime and performance. When your traffic is taking a bizarre detour, say, halfway around the world due to a hijack, users experience high latency or complete outages. We’ve seen how an accidental hijack made Google unreachable and how YouTube was knocked offline. For organizations, this means lost connectivity, disrupted services, and frantic incident response until routes are repaired. Even a short lived hijack can violate SLAs and erode user trust. Imagine a SaaS application suddenly slow or unavailable because its traffic is looping through unintended networks. Additionally, if your company’s prefix is hijacked and misused for spam or attacks, your IP range could end up blacklisted by spam filters or security systems, creating cleanup headaches even after the hijack ends.
From a business and risk perspective, BGP hijacking is a supply chain vulnerability in the Internet’s infrastructure. It’s not just an ISP problem; any business reliant on Internet connectivity can be a victim. The impact includes financial losses from downtime or theft, reputation damage, and potential regulatory issues if sensitive data is intercepted. The threat is significant enough that industry and governments are mobilizing to address it for instance, research and education networks have called route hijacks a serious threat to critical infrastructure, and the U.S. government released a 2024 roadmap urging adoption of BGP security measures. In short, BGP hijacking cuts to the core of Internet reliability and trust. Every security engineer should recognize that without additional safeguards, the Internet’s routing is vulnerable and that makes our systems and data vulnerable. It’s a collective problem that elevates the importance of routing security in any defense strategy.
BGP hijacking is primarily known as an attack technique, and threat actors have leveraged it in various cunning ways:
A big reason attackers and misconfigurations get away with hijacks is that it’s hard to immediately detect. BGP hijacking is not always obvious; the bad actors can camouflage their activity by making the hijack short lived or by announcing prefixes that aren’t closely monitored. They might also only divert a portion of traffic for instance, specific IP ranges or certain regions, making the symptoms less noticeable. In some advanced cases, attackers exploit the partial deployment of security measures to hide their tracks. For example, with more networks implementing RPKI route validation, a hijacker might focus on networks that haven’t deployed RPKI. In a so called stealthy hijack, the victim’s own routers never see an invalid route announcement because all their immediate neighbors drop it yet the traffic is still redirected via non validated paths in the broader Internet. The victim’s monitoring might show everything as normal: their BGP sessions see the valid route, while, behind the scenes, some portion of their traffic is quietly travelling an alternate route to the attacker. This kind of abuse evades many traditional detection methods and highlights why complete, cooperative security measures are needed to close the gaps.
In summary, attackers abuse BGP hijacking because it’s a powerful, difficult to trace way to impersonate networks, intercept data, and disrupt services. The combination of global reach and poor inherent security makes BGP an attractive target for abuse and a persistent headache for defenders.
Detecting a BGP hijack in real time is challenging, but not impossible. The key is to use a combination of network telemetry, external monitoring, and collaboration to catch anomalies. Here are important approaches and indicators:
One common blind spot is assuming that if your network is fine, everything is fine. BGP hijacks often do not affect the victim’s own BGP session with its upstreams, especially if those upstreams filter it out or if the hijack is elsewhere on the Internet. From your perspective, all routes may look normal, yet users are complaining. This is why external monitoring and multi perspective checks are essential. Partial deployment of protections can also be tricky: as noted, if you drop invalid routes via RPKI you might not see the hijack, while non validating networks still propagate it. Thus, detecting BGP hijacks relies on broad awareness and communication. Quick detection is critical the sooner a hijack is confirmed, the sooner network operators can coordinate to mitigate it e.g. by announcing correct routes or asking upstreams to drop the bad one.
Preventing BGP hijacking requires strengthening the routing ecosystem at multiple levels. There’s no single fix, but a combination of technical controls and best practices can dramatically reduce the risk:
In summary, preventing BGP hijacks is a shared responsibility. Network operators must tighten their BGP configuration filters, RPKI, etc., and enterprises should select partners who do so. The technology now exists to significantly reduce hijacks; it just needs broader implementation. Until BGP is fully secured for a long term project, vigilance and layered defenses are key. Think of it like hardening an otherwise fragile system: we bolster it with route filters, crypto validation, monitoring, and smart network design, so that an attacker can’t easily exploit the old weaknesses.
BGP hijacking touches on several other networking and security concepts:
By exploring these related topics route leaks, DNS attacks, on path/MITM threats, and routing security measures you build a more comprehensive picture around BGP hijacking. It doesn’t exist in isolation; it’s part of the larger story of securing Internet infrastructure and dealing with threats that exploit fundamental protocols.
A BGP hijack is a malicious or unauthorized takeover of IP prefixes, essentially someone deliberately announcing your network’s routes as their own. A route leak, on the other hand, is typically an accidental misannouncement. For example, an ISP might leak internal routes or prefixes learned from one peer to another peer when it shouldn’t. In both cases, traffic goes where it shouldn’t. The difference is intent and scope: hijacks are usually targeted when an attacker aims to divert traffic for specific prefixes, whereas leaks are often fat finger errors or misconfigurations that inadvertently cause widespread routing issues. Both can cause outages and security problems, and the mitigation, good filtering, etc. is similar. The 2018 MainOne incident with Google was a route leak. No one was attacking Google, but it looked and felt like a hijack until investigated. In summary: hijack = intentional attack, route leak = unintentional mistake, but the network may not care if it's disrupted either way.
Using encryption like HTTPS helps immensely, but it doesn’t completely negate the threat. If your traffic is hijacked, a malicious AS can’t easily decipher or alter the encrypted content without additional tricks assuming your encryption is properly implemented and the attacker doesn’t have the keys. For instance, if you’re visiting a banking site over HTTPS and an attacker hijacks the route, they’ll reach a roadblock when the browser tries to verify the bank’s SSL certificate the attacker would need a valid certificate for the bank’s domain to successfully impersonate it, which is not trivial. That said, encryption won’t prevent the attacker from dropping your traffic or simply reading the metadata like which sites you’re visiting, how much data you’re sending, etc.. Also, an attacker could combine BGP hijacking with DNS hijacking or a compromised certificate authority to still deceive users; there have been incidents of hijacks used to obtain fraudulent TLS certificates. VPNs add another layer: if you’re on a corporate VPN, a hijacker might divert your traffic, but it’s encrypted and going to a fixed VPN endpoint they can’t easily insert themselves between you and the VPN server without detection. So encryption certainly mitigates the damage; it turns a potential secrecy breach into mostly an availability issue; they can’t read data, only block or delay it. However, remember that an attacker controlling your traffic path could perform a DoS or attempt downgrade attacks. In summary: Always use strong encryption TLS, VPN for sensitive data. It's your best defense if traffic is hijacked but know that encryption won’t stop an outage or some of the more cunning hijack scenarios.
It can be tricky for an average user or even an enterprise to know for sure, but there are clues. If you suspect a BGP hijack, say, users in a certain region suddenly can’t reach your service or you see weird latency spikes, start with traceroute diagnostics from multiple locations. Traceroute will show the path packets take; if you see your data going through an unexpected AS or geography, that’s a red flag. You can use public tools like RIPE Atlas or online Looking Glass services to run traces toward your network from various ISPs globally. Another clue is if only some portion of the Internet can’t reach you while others can, which often indicates a routing issue rather than your server being down. For organizations, BGP monitoring services such as BGPMon, Cloudflare Radar, ThousandEyes, etc. can send alerts if your IP prefix is announced by an unfamiliar AS. Many large network operators or cloud providers also publicly report routing incidents; checking forums like NANOG or Twitter X can sometimes reveal if others are seeing something strange with routes to your network. On the end user side, if you’re extremely suspicious, check the IP address you’re reaching a service at, does it resolve to an unexpected address block?. Also, pay attention to browser warnings if a normally secure website throws certificate errors suddenly, don’t ignore that; it could be a sign of a traffic interception attempt. In short, detection often requires looking at routing from multiple perspectives. Enterprises should invest in route monitoring and have procedures to verify any anomalous connectivity issues.
Unfortunately, BGP hijacks and leaks are more common than most people realize. Literally thousands of routing incidents happen each year. In fact, one study observed over 3,000 route leaks and 18,000 hijack events in just the first three months of 2022. The majority of these were likely accidental route leaks due to misconfiguration, since every day some network somewhere slips up. However, a significant number are malicious or at least suspicious. We’ve seen explicit attacks like those targeting cryptocurrency services, payment processors, or even attempts to steal credentials for certificate issuance. Some hijacks are very brief and targeted, indicating a deliberate motive for example, hijacking a few minutes of traffic to a bank or crypto exchange during a specific window. In terms of ratio, it’s hard to say the Internet doesn’t have an incident report form for hijackers but many experts estimate the majority are leaks accidents with a smaller but important percentage being intentional hijack attacks. Even a small percentage of tens of thousands is a lot of attacks. So both kinds are regular occurrences. What’s changing is that the community is getting better at catching them quickly and mitigating them with RPKI, etc.. But as long as BGP remains based on trust, both human errors and malicious exploits will keep happening.
In the current Internet routing model, no, not completely at least not yet. BGP was not built with security in mind, so retrofitting it is an ongoing effort. However, we’re moving toward a much more secure state. Wide adoption of RPKI/ROV can eliminate the vast majority of simple hijacks where one AS just starts announcing another’s prefix. If every network filtered out routes that failed RPKI validation, attackers would be forced to find other tricks like compromising the target’s own AS, which is much harder. Initiatives like BGPsec securing the path aim to close the remaining gap by ensuring that even intermediate AS hops are legitimate that would pretty much prevent both hijacks and many leaks. The challenge is deployment: all routers worldwide would need to support and use these features, which is a tall order and will take time. BGP is like the airplane engine of the Internet; it's hard to swap out while flying. In the meantime, what can be prevented is large scale damage: network operators can drastically reduce the risk by doing things like prefix filtering, maintaining IRR records, enabling RPKI, and monitoring. These measures have already made hijacks harder today. If someone hijacks a major prefix, many Tier1 networks will catch it or drop it if RPKI is enabled. But can an extremely clever or lucky attacker still hijack some routes? Yes, especially in parts of the world or among providers that haven’t tightened their BGP security. So we can’t say the problem is solved. It’s a work in progress. The end goal is an Internet where invalid routes are automatically rejected and every route announcement is verifiable. We’re not fully there yet, but every year the situation improves. Until then, completely preventing hijacks isn’t feasible, but mitigating their impact is and that’s what network defenders focus on.
Both are attacks that redirect users to the wrong destination, but they operate at different layers of the Internet. BGP hijacking targets the network layer; it tricks routers into sending traffic to a malicious network by falsifying route information. The user is still asking for the correct IP address, but the network doesn’t deliver the packets along the correct path. DNS hijacking targets the naming layer; it tricks the resolution of a domain name to give the user a wrong IP address. For example, if an attacker hijacks DNS for example.com, when you try to find example.com’s IP, you might get the attacker’s IP instead of the real server. In that case, the routing BGP could be perfectly fine, but you were led to the wrong place from the start. Sometimes the two are used together: an attacker could hijack BGP routes to a target’s DNS servers, effectively controlling name resolution for that target like the MyEtherWallet attack, where BGP hijack enabled a DNS hijack of a crypto website. In terms of detection and prevention: DNS hijacking can be mitigated by DNSSEC which ensures authenticity of DNS answers, whereas BGP hijacking is mitigated by the routing protections we discussed RPKI, etc.. From a user perspective, DNS hijack might be noticed if you get an invalid certificate warning when visiting a site since you end up with a fake IP that hopefully can’t present a valid cert for the real domain. BGP hijack might be noticed if things are slow or not loading. Both are serious, and they’re not mutually exclusive. An attacker with resources might use one, the other, or both to achieve their goal of traffic redirection. Think of DNS hijack as giving someone the wrong street address, versus BGP hijack as messing with the roads on the way to that address.
RPKI Resource Public Key Infrastructure is a security framework designed to make BGP routing more trustworthy. In simple terms, it lets the legitimate owner of an IP prefix publish a signed statement about which autonomous system AS is authorized to originate that prefix in BGP. That statement is called a ROA Route Origin Authorization. Other networks can check this statement; if they see a BGP announcement for that prefix coming from a different AS than the one in the ROA, they’ll know it’s invalid and can discard it. In practice, network operators deploy RPKI by running validation software that pulls these signed records from global repositories hosted by the regional Internet registries. Their routers are then configured for ROV Route Origin Validation, meaning every BGP update is checked: Does this prefix+ASN pair have a valid ROA? If yes, accept or prefer the route; if no meaning it’s marked invalid, drop it. This mechanism directly thwarts many hijacks if an attacker, ASN X, hijacks a prefix that actually belongs to ASN Y, and ASN Y has a ROA saying only ASN Y is allowed, then routers doing ROV will reject ASN X’s announcement. RPKI doesn’t solve everything an attacker could hijack a prefix that has no ROA many prefixes are still unsigned, and it doesn’t stop route leaks where the origin ASN is actually correct but it’s being propagated wrong. But it closes a major vulnerability: fake origin. It’s akin to having route passports or ID cards. Before RPKI, any AS could claim I own this prefix and others had no automated way to verify that. Now, there’s a decentralized but authoritative way to validate at least that first hop of trust. As more networks enforce RPKI, the window for a successful hijack narrows significantly. RPKI is one of the most important developments in routing security in recent years, and when you hear about governments and companies pushing for routing security, RPKI is usually front and center.
BGP hijacking is essentially an exploit of the Internet’s weakest link, the trust between networks. By injecting false route information, attackers or careless operators can divert and disrupt the flow of data on a global scale. We’ve defined what BGP hijacking is, seen how it works step by step, and examined real incidents that show its impact from stolen cryptocurrency to worldwide outages. The key takeaway is that while BGP hijacks exploit a fundamental vulnerability in Internet architecture, the network community is fighting back. Through better practices like filtering and monitoring and new technologies like RPKI, we are making it harder for hijacks to succeed. However, no single entity can solve this alone; it requires collective action among ISPs, businesses, and regulators. As a security professional, you should ensure your organization and providers are adopting these measures, and stay aware of routing anomalies as part of your threat landscape. In the end, BGP hijacking reminds us that even the plumbing of the Internet needs strong security oversight. By shoring up the routing infrastructure, we protect not just networks, but the reliability and trustworthiness of the Internet itself.
About the Author
Mohammed Khalil is a Cybersecurity Architect at DeepStrike, specializing in advanced penetration testing and offensive security operations. With certifications including CISSP, OSCP, and OSWE, he has led numerous red team engagements for Fortune 500 companies, focusing on cloud security, application vulnerabilities, and adversary emulation. His work involves dissecting complex attack chains and developing resilient defense strategies for clients in the finance, healthcare, and technology sectors.

Stay secure with DeepStrike penetration testing services. Reach out for a quote or customized technical proposal today
Contact Us