top of page

BGP Hijacking

An attack where hackers manipulate Border Gateway Protocol (BGP) routes to redirect internet traffic.

Understanding BGP Hijacking


BGP is responsible for routing internet traffic between autonomous systems (AS). Attackers exploit vulnerabilities in BGP by announcing false IP prefixes, tricking networks into misrouting traffic.

Common BGP Hijacking Techniques


Prefix Hijacking

  • Attackers announce ownership of an IP range they don’t control.

  • Can disrupt services and enable traffic interception.

Route Leakage

  • Misconfigured BGP settings cause unintentional traffic redirection.

  • Can degrade network performance and expose sensitive data.

Man-in-the-Middle (MitM) Attacks

  • Redirects traffic through malicious networks for surveillance or modification.

  • Used in state-sponsored cyber espionage.

Best Practices for BGP Security


  • Implement RPKI (Resource Public Key Infrastructure) to verify route authenticity and prevent unauthorized advertisements.

  • Use BGP monitoring tools to detect anomalies in traffic patterns and identify suspicious route changes.

  • Enable route filtering to block suspicious route announcements and ensure proper validation of routing paths.

  • Collaborate with other network operators and use Mutually Agreed Norms for Routing Security (MANRS) to improve global routing security.

bottom of page