BGP hijacking
This article may require cleanup to meet Wikipedia's quality standards. The specific problem is: Written in a conversational tone. Help rewrite this article as encyclopedic content. See Wikipedia Policies and guidelines. (June 2019) |
BGP hijacking (sometimes referred to as prefix hijacking, route hijacking or IP hijacking) is the illegitimate takeover of groups of IP addresses by corrupting Internet routing tables maintained using the Border Gateway Protocol (BGP).[1][2][3][4][5]
Background
[edit]The Internet is a global network that enables any connected host, identified by its unique IP address, to talk to any other, anywhere in the world. This is achieved by passing data from one router to another, repeatedly moving each packet closer to its destination, until it is delivered. To do this, each router must be regularly supplied with up-to-date routing tables. At the global level, individual IP addresses are grouped together into prefixes. These prefixes will be originated, or owned, by an autonomous system (AS), and the routing tables between ASes are maintained using the Border Gateway Protocol (BGP).
A group of networks that operates under a single external routing policy is known as an autonomous system. For example, Sprint, Verizon, and AT&T each are an AS. Each AS has its own unique AS identifier number. BGP is the standard routing protocol used to exchange information about IP routing between autonomous systems.
Each AS uses BGP to advertise prefixes that it can deliver traffic to. For example, if the network prefix 192.0.2.0/24 is inside AS 64496, then that AS will advertise to its provider(s) and/or peer(s) that it can deliver any traffic destined for 192.0.2.0/24.
Although security extensions are available for BGP, and third-party route DB resources exist for validating routes, by default the BGP protocol is designed to trust all route announcements sent by peers. Few ISPs rigorously enforce checks on BGP sessions.
Mechanism
[edit]IP hijacking can occur deliberately or by accident in one of several ways:
- An AS announces that it originates a prefix that it does not actually originate.
- An AS announces a more specific prefix than what may be announced by the true originating AS.
- An AS announces that it can route traffic to the hijacked AS through a shorter route than is already available, regardless of whether the route exists.
Common to these ways is their disruption of the normal network routing: packets end up being forwarded towards the wrong part of the network and then either enter an endless loop (and are discarded), or are found at the mercy of the offending AS.
Typically ISPs filter BGP traffic, allowing BGP advertisements from their downstream networks to contain only valid IP space. However, a history of hijacking incidents shows this is not always the case.
The Resource Public Key Infrastructure (RPKI) is designed to authenticate route origins via cryptographic certificate chains demonstrating address block range ownership but is not widely deployed yet. Once deployed, IP hijacking through errant issues at the origin (via accident or intent) should be detectable and filterable.
IP hijacking is sometimes used by malicious users to obtain IP addresses for use in spamming or a distributed denial-of-service (DDoS) attack.
When a router disseminates erroneous BGP routing information, whether intentionally or accidentally, it is defined by the Internet Engineering Task Force (IETF) in RFC 7908 as a "route leak." These leaks are characterized as "the dissemination of routing announcements beyond their intended scope. In other words, an announcement from one Autonomous System (AS) regarding a learned BGP route to another AS contravenes the intended policies of the recipient, the sender, and/or one of the ASes along the preceding AS path." Such leaks are made possible due to a long-standing "systemic vulnerability of the Border Gateway Protocol routing system."[6]
BGP hijacking and transit-AS problems
[edit]Like the TCP reset attack, session hijacking involves intrusion into an ongoing BGP session, i.e., the attacker successfully masquerades as one of the peers in a BGP session, and requires the same information needed to accomplish the reset attack. The difference is that a session hijacking attack may be designed to achieve more than simply bringing down a session between BGP peers. For example, the objective may be to change routes used by the peer, in order to facilitate eavesdropping, black holing, or traffic analysis.
By default, EBGP peers will attempt to add all routes received from another peer into the device's routing table and then proceed to advertise nearly all of these routes to other EBGP peers. This can pose a problem as multi-homed organizations may inadvertently advertise prefixes learned from one Autonomous System (AS) to another, leading the end customer to become the new best path to the relevant prefixes.
For instance, a customer with a Cisco router peering with both AT&T and Verizon, and employing no filtering, may inadvertently establish a link between the two major carriers. This could result in the providers preferring to route some or all traffic through the customer (potentially on a T1 line) instead of utilizing high-speed dedicated links. This issue can also impact other entities peering with these two providers and lead those ASs to favor the misconfigured link.
In practice, this problem rarely occurs with large Internet Service Providers (ISPs) as they typically impose restrictions on what an end customer can advertise. However, any ISP that does not filter customer advertisements may inadvertently allow incorrect information to be propagated into the global routing table, potentially affecting even the large Tier-1 providers.
The concept of BGP hijacking involves identifying an Internet Service Provider (ISP) that does not filter advertisements, whether intentionally or unintentionally, or identifying an ISP with vulnerable internal or ISP-to-ISP BGP sessions susceptible to a man-in-the-middle attack. Once identified, an attacker can potentially advertise any prefix they choose, leading to the diversion of some or all traffic from its legitimate source to the attacker. This action can be carried out to overwhelm the infiltrated ISP or to execute a Denial of Service (DoS) or impersonation attack on the entity whose prefix is being advertised. It is not uncommon for attackers to cause significant disruptions, including complete loss of connectivity.
In an incident from early 2008, at least eight US universities experienced their traffic being rerouted to Indonesia for approximately 90 minutes one morning in an attack that was largely kept under wraps by those involved.[citation needed] Also, in February 2008, a large portion of YouTube's address space was redirected to Pakistan when the PTA decided to block access[7] to the site from inside the country, but accidentally black-holed the route in the global BGP table. While filtering and MD5/TTL protection is already available for most BGP implementations (thus preventing the source of most attacks), the problem stems from the concept that ISPs rarely ever filter advertisements from other ISPs, as there is no common or efficient way to determine the list of permissible prefixes each AS can originate. The penalty for allowing errant information to be advertised can range from simple filtering by other/larger ISPs to a complete shutdown of the BGP session by the neighboring ISP (causing the two ISPs to cease peering), and repeated problems often end in permanent termination of all peering agreements. It is also noteworthy that even causing a major provider to block or shutdown a smaller, problematic provider, the global BGP table will often reconfigure and reroute the traffic through other available routes until all peers take action, or until the errant ISP fixes the problem at the source.
One useful offshoot of this concept is called BGP anycasting and is frequently used by root DNS servers to allow multiple servers to use the same IP address, providing redundancy and a layer of protection against DoS attacks without publishing hundreds of server IP addresses. The difference in this situation is that each point advertising a prefix actually has access to the real data (DNS in this case) and responds correctly to end user requests.
Public incidents
[edit]- April 1997: The "AS 7007 incident"[8]
- December 24, 2004: TTNet in Turkey hijacks the Internet[9]
- May 7, 2005: Google's May 2005 Outage[10]
- January 22, 2006: Con Edison Communications hijacks big chunk of the Internet[11]
- February 24, 2008: Pakistan's attempt to block YouTube access within their country takes down YouTube entirely.[12]
- November 11, 2008: The Brazilian ISP CTBC - Companhia de Telecomunicações do Brasil Central leaked their internal table into the global BGP table.[13] It lasted over 5 minutes. Although, it was detected by a RIPE route server and then it was not propagated, affecting practically only their own ISP customers and few others.
- April 8, 2010: Chinese ISP hijacks the Internet[14]
- July 2013: The Hacking Team aided Raggruppamento Operativo Speciale (ROS - Special Operations Group of the Italian National Military police) in regaining access to Remote Access Tool (RAT) clients after they abruptly lost access to one of their control servers when the Santrex IPv4 prefix 46.166.163.0/24 became permanently unreachable. ROS and the Hacking Team worked with the Italian network operator Aruba S.p.A. (AS31034) to get the prefix announced in BGP in order to regain access to the control server.[15]
- February, 2014: Canadian ISP used to redirect data from ISPs.[16] - In 22 incidents between February and May a hacker redirected traffic for roughly 30 seconds each session. Bitcoin and other crypto-currency mining operations were targeted and currency was stolen.
- January 2017: Iranian pornography censorship.[17]
- April 2017: Russian telecommunication company Rostelecom (AS12389) originated 37 prefixes[18] for numerous other Autonomous Systems. The hijacked prefixes belonged to financial institutions (most notably MasterCard and Visa), other telecom companies, and a variety of other organizations.[19] Even though the possible hijacking lasted no more than 7 minutes it is still not clear if the traffic got intercepted or modified.
- December 2017: Eighty high-traffic prefixes normally announced by Google, Apple, Facebook, Microsoft, Twitch, NTT Communications, Riot Games, and others, were announced by a Russian AS, DV-LINK-AS (AS39523).[20][21]
- April 2018: Roughly 1300 IP addresses within Amazon Web Services space, dedicated to Amazon Route 53, were hijacked by eNet (or a customer thereof), an ISP in Columbus, Ohio. Several peering partners, such as Hurricane Electric, blindly propagated the announcements.[22]
- July 2018: Iran Telecommunication Company (AS58224) originated 10 prefixes of Telegram Messenger.[23]
- November 2018: US-based China Telecom site originated Google addresses.[24]
- May 2019: Traffic to a public DNS run by Taiwan Network Information Center (TWNIC) was rerouted to an entity in Brazil (AS268869).[25]
- June 2019: Large European mobile traffic was rerouted through China Telecom (AS4134)[26][27] "This route leak began when [Swiss] SafeHost (AS21217) announced more than forty-thousand IPv4 routes that had been learned from other peers and providers to its provider China Telecom (AS 4134). …In turn, China Telecom accepted these routes and propagated them…"[28]
- February 2021: Initially reported that Cablevision Mexico (AS28548) leaked 282 prefixes creating conflicts for 763 ASNs in 80 countries, with the main impact in Mexico. Data from the Isolario MRT dump suggested that 7,200 IPv4 prefixes were announced and leaked to AS1874 impacting more than 1290 ASNs from over 100 countries.[29]
- April 2021: Large BGP routing leak out of India: over 30,000 BGP prefixes hijacked via Vodafone Idea Ltd (AS55410) causing 13X spike in inbound traffic. Prefixes were from around the globe but mostly US including Google, Microsoft, Akamai, and Cloudflare.[30]
- February 2022: Attackers hijacked BGP prefixes that belonged to a South Korean cryptocurrency platform, and then issued a certificate on the domain via ZeroSSL to serve a malicious JavaScript file, stealing $1.9 million worth of cryptocurrency.[31]
- March 2022: RTComm hijacked a prefix used by Twitter.[32][33]
See also
[edit]References
[edit]- ^ Zhang, Zheng; Zhang, Ying; Hu, Y. Charlie; Mao, Z. Morley. "Practical Defenses Against BGP Prefix Hijacking" (PDF). University of Michigan. Retrieved 2018-04-24.
- ^ Gavrichenkov, Artyom. "Breaking HTTPS with BGP Hijacking" (PDF). Black Hat. Retrieved 2018-04-24.
- ^ Birge-Lee, Henry; Sun, Yixin; Edmundson, Annie; Rexford, Jennifer; Mittal, Prateek. "Using BGP to Acquire Bogus TLS Certificates". Princeton University. Retrieved 2018-04-24.
- ^ Julian, Zach (2015-08-17). "An Overview of BGP Hijacking - Bishop Fox". Bishop Fox. Retrieved 2018-04-25.
- ^ Zetter, Kim (2008-08-26). "Revealed: The Internet's Biggest Security Hole". WIRED. Retrieved 2018-04-25.
- ^ Sriram, Kotikalapudi; Montgomery, Doug; McPherson, Danny R.; Osterweil, Eric; Dickson, Brian (June 2016). "Problem Definition and Classification of BGP Route Leaks". Retrieved 27 May 2021.
- ^ "Technology | Pakistan lifts the ban on YouTube". BBC News. 2008-02-26. Retrieved 2016-11-07.
- ^ "7007: From the Horse's Mouth". Archived from the original on 2009-02-27. Retrieved 2008-02-26.
- ^ "Renesys Blog: Internet-Wide Catastrophe—Last Year". Archived from the original on 2008-02-28. Retrieved 2008-02-26.
- ^ Tao Wan; Paul C. van Oorschot. "Analysis of BGP Prefix Origins During Google's May 2005 Outage" (PDF). Ccsl.carleton.ca. Retrieved 2016-11-07.
- ^ "Con-Ed Steals the 'Net - Dyn Research | The New Home Of Renesys". Renesys.com. 2006-01-23. Archived from the original on 2013-03-08. Retrieved 2016-11-07.
- ^ "YouTube Hijacking: A RIPE NCC RIS case study - News & Announcements from the RIPE NCC". Archived from the original on 2008-04-05. Retrieved 2008-03-31.
- ^ "Brazil Leak: If a tree falls in the rainforest - Dyn Research | The New Home Of Renesys". Renesys.com. Archived from the original on 2013-04-23. Retrieved 2016-11-07.
- ^ Toonk, Andree (2010-04-08). "Chinese ISP hijacks the Internet". BGPmon.net. Archived from the original on 2019-04-15. Retrieved 2019-04-15.
- ^ "How Hacking Team Helped Italian Special Operations Group with BGP Routing Hijack". bgpmon.net. Retrieved 2017-10-17.
- ^ "Hacker Redirects Traffic From 19 Internet Providers to Steal Bitcoins". Wired.com. 2014-08-07. Retrieved 2016-11-07.
- ^ Brandom, Russell (2017-01-07). "Iran's porn censorship broke browsers as far away as Hong Kong". The Verge. Retrieved 2017-01-09.
- ^ "BGP Hijacking overview - Recent BGP Hijacking Incidens". noction.com. 24 April 2018. Retrieved 2018-08-11.
- ^ "BGPstream and The Curious Case of AS12389 | BGPmon". bgpmon.net. Retrieved 2017-10-17.
- ^ "Popular Destinations rerouted to Russia". BGPMON. Retrieved 14 December 2017.
- ^ "Born to Hijack". Qrator.Radar. Retrieved 13 December 2017.
- ^ "Suspicious event hijacks Amazon traffic for 2 hours, steals cryptocurrency". 24 April 2018. Retrieved 24 April 2018.
- ^ "Telegram traffic from around the world took a detour through Iran". 30 July 2018. Retrieved 31 July 2018.
- ^ "Internet Vulnerability Takes Down Google". Internet and Cloud Intelligence Blog | ThousandEyes. 13 November 2018. Retrieved 13 November 2018.
- ^ "Public DNS in Taiwan the latest victim to BGP hijack". 15 May 2019. Retrieved 31 May 2019.
- ^ "Large European routing leak sends traffic through China Telecom". 7 June 2019. Retrieved 12 June 2019.
- ^ "For two hours, a large chunk of European mobile traffic was rerouted through China". ZDNet. Retrieved 12 June 2019.
- ^ "BGP Route Leak Incident Review: A Closer Look at a Route Leak". Retrieved 14 September 2021.
- ^ Siddiqui, Aftab (13 Feb 2021). "Major Route Leak by AS28548 – Another BGP Optimizer?". Retrieved 14 September 2021.
- ^ Siddiqui, Aftab (26 April 2021). "A major BGP route leak by AS55410". Retrieved 28 May 2021.
- ^ "KlaySwap crypto users lose funds after BGP hijack". 14 February 2022. Retrieved 17 Feb 2022.
- ^ "BGP Hijacking of Twitter Prefix by RTComm.ru". SANS.
- ^ Goodin (29 March 2022). "Some Twitter traffic briefly funneled through Russian ISP, thanks to BGP mishap". Ars Technica.
External links
[edit]- Qrator.Radar: A real-time BGP connectivity and security monitoring system.
- BGPmon.net: A BGP specific monitoring system to detect prefix hijacks, route leakage and instability.
- Cyclops Archived 2008-06-28 at the Wayback Machine: A BGP network audit tool (prefix hijack, route leakage) by UCLA
- NetViews: A Real Time BGP Topology visualization and IP Hijacking Detection tool by University of Memphis.
- AS-CRED: A service of reputation-based trust management and real-time alert (prefix hijacking, unstable prefix announcement), for inter-domain routing by University of Pennsylvania.
- Is BGP safe yet?: List of ISPs that implement Resource Public Key Infrastructure (RPKI).