Here’s our list of the biggest security incidents involving the Internet’s core routing protocol, the Border Gateway Protocol. Some of these incidents were attacks; others were accidental misconfigurations. But all of them disrupted traffic to Web sites or entire networks because of incorrect routing messages being propagated across the Internet through BGP. (Read the latest on U.S. government efforts to secure BGP, and about four open source BGP tools.)Pakistan Telecom blocks YouTubebrought down the entire YouTube site worldwide for two hours as it was attempting to restrict local access to the site. When Pakistan Telecom tried to filter access to YouTube, it sent new routing information via BGP to PCCW, an ISP in Hong Kong that propagated the false routing information across the Internet. In February 2008, Pakistan Telecom inadvertently ICANN puts root server at riskscrewed up in November 2007 when it renumbered the DNS root server “L” that it operates. ICANN failed to notice several unauthorized L root servers operating across the Internet until six months later. By May 2008, ICANN had all the bogus L root servers turned off. The Internet Corporation for Assigned Names and Numbers (ICANN) Malaysian ISP blocks Yahooinvolved the hijacking of two of its in-use prefixes.In May 2004, Yahoo’s Santa Clara data-center prefix was hijacked by DataOne, a Malaysian ISP. http://www.web-malaysia.com/?page_id=18 Network security experts say the incident was malicious, with DataOne intentionally trying to block traffic from Yahoo http://www.renesys.com/tech/notes/WP_BGP_rev6.pdf The Yahoo attack Northrop Grumman hit by spammersIn May 2003, a group of spammers hijacked an unused block of IP address space owned by Northrop Grumman and began sending out massive amounts of unwanted e-mail messages. It took two months for the military contractor to reclaim ownership of its IP addresses and get the rogue routing announcements blocked across the Internet. In the meantime, Northrop Grumman’s IP addresses ended up on high-profile spam blacklists. Turkish ISP takes over the InternetBGP experts Renesys. The mistake resulted in shifting all traffic from sites such as Amazon, Microsoft, Yahoo and CNN to TTNet.On Dec. 24, 2004, TTNet sent out a full table of Internet routes via BGP that routed most Internet traffic through Turkey for several hours that morning. TTNet’s routing information claimed that the carrier was the best route to everything on the Internet, according to Brazilian carrier leaks BGP tablewere affected. In November 2008, Brazilian service provider CTBC leaked a full table of routes that could have resulted in an accidental hijacking of other carrier’s routes. Thankfully, the BGPMon volunteer service noticed the problem and sent out alerts across the Internet, which minimized the impact of the mistake. Only a few local customers Biggest-ever BGP threat unveiledwithout the owner’s knowledge. What we don’t know yet is whether this type of BGP eavesdropping attack is happening on the Internet today.If these real-world BGP incidents don’t scare you, here’s one that will. In August 2008, two security researchers demonstrated at DEFCON how an attacker could eavesdrop or change a company’s unencrypted data by exploiting BGP. The attacker would reroute all of the company’s traffic through their own network and then send it to its destination Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe