logo svg
logo

December 28, 2025

What Is BGP Hijacking? How Internet Routing Attacks Work

A deep dive into BGP hijacking, real-world incidents, risks, and defenses

Mohammed Khalil

Mohammed Khalil

Featured Image

BGP hijacking is an Internet routing attack where a malicious or misconfigured network operator announces IP address blocks prefixes it does not own. In plain terms, an AS Autonomous System lies about the locations of specific IP addresses in BGP updates, tricking other routers into sending traffic toward the attacker’s network instead of the legitimate owner. Since BGP lacks built-in authentication of announcements, this false information propagates quickly across the Internet, corrupting routing tables along the way.

This issue is critical today because nearly all Internet traffic from web services to cloud APIs to blockchain networks relies on correct BGP routing. A single hijack can make large websites or critical services unreachable or hijack sensitive traffic for espionage or theft. High profile examples include hijacks that targeted cloud DNS services and cryptocurrency sites, costing victims hundreds of thousands of dollars. Enterprises, cloud providers, and ISPs therefore treat BGP security as a core concern. BGP hijacks most commonly appear in discussions of network and cloud security incidents, but they are also a fundamental networking threat that can amplify or enable many other attacks for example, by redirecting or intercepting data.

How BGP Hijacking Works

BGP is the protocol that routers use to exchange route information between ASes external or eBGP and within an AS internal or iBGP. In normal operation, each AS announces the IP prefixes it legitimately controls. Other routers choose routes based on attributes like prefix length longest match and AS path length shortest path. A BGP hijack exploits this trust model by injecting one of two basic anomalies into BGP:

These techniques almost always involve eBGP sessions between ASes. In eBGP hijacking, one ISP AS announces bad routes to its peers. The false routes propagate across the Internet’s backbone if not stopped. By contrast, iBGP misuse within an AS typically only affects internal routing; it doesn’t easily escape into other networks. Still, an internal misconfiguration such as a route reflector leak can disrupt all customers of an AS or confuse traffic engineering, so iBGP errors are a local risk. The overwhelming majority of high impact hijacks, however, exploit external BGP peering.

Because BGP has no native validation, an attacker’s announcement will be trusted by default. Only after the fact checks like the Resource Public Key Infrastructure RPKI have become available to counter this. In practice, any AS that neglects proper filtering or RPKI validation can unwittingly accept a hijacked route. The attacker typically injects the false routes into BGP for example, by logging in to a misconfigured router, compromising an Internet exchange, or via a rogue customer, waits for other networks to propagate those announcements, and then diverts or drops the victim’s traffic.

Real World Examples

BGP hijacks have occurred repeatedly with serious consequences. Notable cases include:

These incidents highlight how hijacks can be malicious cryptocurrency theft, espionage or benign accidents misconfiguration. They also underscore key factors in real world attacks: targeting cloud DNS and blockchain infrastructure, exploiting the longest prefix rule, and evading detection by injecting into high tier networks. Several well known cases involved cryptocurrency and cloud services, reflecting the high impact of intercepting those high value targets.

Why BGP Hijacking Is Important

BGP is the Internet’s backbone routing system. Any compromise of BGP integrity can have far reaching effects on security and operations. Key reasons this topic matters:

In short, BGP hijacking matters because it attacks the very infrastructure of the Internet. The consequences span from technical outages to strategic security breaches, making it a high priority concern in network defense.

Common Abuse or Misuse

How attackers abuse BGP: Malicious actors exploit BGP hijacking because it can reroute a large volume of traffic with relatively little effort. Common abuses include:

Why it’s effective and hard to detect: BGP hijacking often works because Internet routers largely trust BGP announcements and rarely validate them. An AS with significant connectivity like Hurricane Electric or Level 3 can propagate bogus routes globally in minutes. Unless other networks have prefix filters or RPKI checks, they will accept and forward these announcements. From the perspective of end users, traffic simply fails or goes to the wrong place; there are no on screen alarms for a BGP hijack except, perhaps, a TLS certificate warning if users reach a fake HTTPS site. Without specialized monitoring, neither network operators nor victims immediately realize a hijack is happening. Even when detected, attribution is difficult: the announcement often comes from a downstream ISP, not directly naming the perpetrator. These factors make BGP hijack a subtle, yet powerful attack tool.

Detection & Monitoring

Defenders must combine global routing data with local monitoring to spot hijacks promptly:

Blind spots: Many networks lack full visibility. If an ISP does not share BGP logs or enforce RPKI, it may never notice a hijack unless others tell them. Moreover, iBGP issues inside an AS can be invisible to outside monitors. Regular audits of BGP sessions, prefix filters, and coordination with peering partners help cover these gaps.

Mitigation & Prevention

To defend against BGP hijacks, networks implement multiple layers of controls:

Collectively, these controls cryptographic validation of routes, strict filters, and active monitoring form a defense in depth. No single control is foolproof, but together they dramatically reduce the risk that an attacker’s false BGP update will take root. Encouragingly, incidents like the Rostelecom leak caused far less harm to networks enforcing RPKI or prefix filters, showing the value of these precautions.

Related Concepts

BGP hijacking is part of a broader set of routing security issues and attack chains:

FAQs

A hijack typically means an AS intentionally announces IP prefixes it doesn’t own, often more specific subnets to steal or drop traffic. A route leak is usually accidental: an AS improperly redistributes routes between its providers or peers. Both cause misrouting, but leaks are configuration errors while hijacks are malicious though in practice the line can blur.

Routers choose the longest prefix match. If an attacker announces a more specific prefix e.g. 203.0.113.0/24 than the legitimate one 203.0.112.0/23, all traffic for addresses within 203.0.113.x will go to the attacker’s route. This is why hijackers often use smaller subnets: they win over the broader announcement.

RPKI greatly reduces hijacks by cryptographically binding IP prefixes to ASes. If networks validate routes, any announcement not matching a valid ROA is dropped as happened with the 1.1.1.1/32 hijack. However, RPKI adoption is not universal. A hijack can still succeed against networks that ignore RPKI or have no ROA configured. In addition, RPKI doesn’t yet protect AS paths, only origin ASes, so advanced attacks could bypass it without careful filtering.

Attackers target services like cryptocurrency wallets or exchanges. They hijack the prefix of a DNS or API server used by the service. For example, in 2018 hackers announced AWS DNS routes so that MyEtherWallet’s DNS traffic went to a malicious server. The fake server responded with an IP for a phishing site. Users who went there entered private keys or login data, allowing the thieves to empty their wallets. Essentially, the hijack redirects the initial traffic DNS or HTTP through the attacker’s infrastructure, enabling credential theft.

Network operators use BGP monitoring tools RouteViews, RIPE RIS, or commercial BGPMon to catch unexpected route announcements. Router logs showing a new origin AS for a critical prefix or withdrawals can also signal trouble. On the service side, DNS errors or unusual traffic drops hint at hijacks. Real time notification services like BGPStream alerts and community reports often flag big hijacks within minutes. It’s crucial to correlate BGP data with operational symptoms e.g. a global service outage to confirm a hijack.

Yes, state affiliated actors can and have exploited BGP weaknesses. Examples some disputed include alleged cases of traffic surveillance by hijacking specific country or organization routes. While exact attribution is tricky, any BGP hijack could theoretically be state sponsored if it aligns with national cyber espionage interests. The sheer scope of potential impact makes BGP an attractive vector for advanced persistent threats.

The most effective steps are: 1 Publish and use RPKI ROAs and enforce ROV on all BGP sessions; 2 Apply strict prefix filtering only allow prefixes an AS should announce; 3 Monitor BGP feeds for anomalies; and 4 Coordinate with upstream providers. These actions together ensure that even if a malicious route is announced, it gets dropped before affecting end users. Also, using DNSSEC and HSTS for web services means end users are less likely to trust a hijacked site even if the traffic is misrouted.

BGP hijacking is the practice of corrupting Internet routing by falsely announcing IP address ownership, and it poses serious security and operational risks. By hijacking routes, attackers can disrupt services, eavesdrop on traffic, or perpetrate financial theft as in cryptocurrency heists. The root cause is the trust based design of BGP, any network can claim any IP block. Modern defenses RPKI, prefix filtering, vigilant monitoring are essential to detect and block hijacks. Understanding BGP hijacking is crucial for network and security teams because even well protected web applications or cloud services can be undermined by a bad routing update. In short, ensuring the integrity of BGP routing is vital for maintaining a secure and reliable Internet.

About the Author

Mohammed Khalil is a Cybersecurity Architect at DeepStrike, specializing in advanced penetration testing and offensive security operations. With certifications including CISSP, OSCP, and OSWE, he has led numerous red team engagements for Fortune 500 companies, focusing on cloud security, application vulnerabilities, and adversary emulation. His work involves dissecting complex attack chains and developing resilient defense strategies for clients in the finance, healthcare, and technology sectors.

background
Let's hack you before real hackers do

Stay secure with DeepStrike penetration testing services. Reach out for a quote or customized technical proposal today

Contact Us