Network Security, Security Architecture, Threat Management
Role of US agencies limited in protecting against BGP hijacks, attacks on internet architecture

A GAO-led panel of experts concluded in 2021 that under the status quo, less sophisticated, non-state actors are capable of disrupting or rerouting specific BGP providers or certain geographic regions, while some threat groups are capable of “more severe damage” on a global scale. (Photo credit: ntdanai via Getty)
The fundamental resilience of the global internet is strong, but manipulation of the domain name system (DNS) and Border Gateway Protocol (BGP), denial of service attacks, supply chain exploitation and insiders can still threaten major disruptions, according to the Government Accountability Office.In particular, the agency worries that BGP — which functions as the postal service of the internet, routing network traffic along the most efficient paths between devices — can be subject to both intentional and unintentional breakdowns that could lead to such traffic being misrouted or hijacked by a malicious party.It’s not a new concern. The threats are more than hypothetical and even errors can result in significant disruptions or exposure of unintended traffic.In 2015, a misconfiguration by Telekom Malaysia resulted in “significant packet loss and internet slow down in all parts of the world” as well as “severe service degradation between the Asia Pacific region and the rest of their network,” according to BGPMon. A similar mistake by Nigerian Internet Service Provider Main One in 2018 wound up rerouting internet traffic to China Telecom, an incident that repeated in 2019 with Swiss data center colocation company Safe Host.More recently, the Ukrainian Computer Emergency Readiness Team (CERT) has claimed that an unnamed bank was subject to a BGP hijacking attack in February. A panel of experts in 2021 concluded that under the status quo, less sophisticated, non-state actors are capable of disrupting or rerouting specific BGP providers or certain geographic regions, while some advanced persistent threat groups (APT) are capable of “more severe damage.”
An In-Depth Guide to Network Security
Get essential knowledge and practical strategies to fortify your network security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds