Google might not be immune to border gate protocol (BGP) hijacking and leaks.On Monday, Google services\u00a0went down for over an hour\u00a0as internet traffic for some G Suite and Google search users was rerouted to Nigeria, China, and Russia. Internet research firm ThousandEyes, which suspects nation-state involvement,\u00a0called\u00a0the traffic misdirection the worst affecting Google that it had seen. Google\u2019s internet traffic was rerouted to the government-owned China Telecom, as well as the Russian internet provider TransTelecom and the Nigerian ISP MainOne.Alex Henthorn-Iwane, an executive at ThousandEyes, said told The Associated Press the hijacking may have been "a war-game experiment" by a nation-state."This incident at a minimum caused a massive denial of service to G Suite and Google Search. However, this also put valuable Google traffic in the hands of ISPs in countries with a long history of internet surveillance. Overall, ThousandEyes detected over 180 prefixes affected by this route leak, which covers a vast scope of Google services," ThousandEyes said.Google, however, said it has no reason to believe it was a malicious hijacking attempt. And\u00a0Cloudflare CEO Matthew Prince told Ars Technica that it was likely a \u201cbig, ugly screw-up.\u201d\u00a0Other cybersecurity news:U.S. aligns with Russia and China, saying no to more trust and security in cyberspaceAlthough 51 countries and hundreds of tech corporations (pdf) such as Facebook, Google, and Microsoft supported the \u201cParis Call for Trust and Security in Cyberspace\u201d (pdf), the United States did not sign\u00a0it \u2014 nor did Russia, China, Iran, Israel or the U.K., according to Wired. The initiative was primarily aimed at improving the internet\u2019s security, stopping private companies from hacking back, and preventing malicious cyber activities and interference with electoral processes.\u2018The White Company' \u2014 a new, state-sponsored APT group discoveredThe Cylance Threat Intelligence team says it has discovered a new, highly sophisticated state-sponsored APT group. It was dubbed \u201cThe White Company,\u201d as the group takes \u201cmany elaborate measures\u201d to \u201cwhitewash all signs of their activity and evade attribution.\u201dLike other sophisticated government-backed cyber-espionage groups, The White Company is capable of developing malware and exploits made specifically for targets. However, its profile \u201cdoes not resemble that of the U.S., Five Eyes, or India \u2014 nor any known Russian, Chinese, North Korean, Iranian, or Israeli groups.\u201dCylance said the new threat actors have access to zero-day exploit developers, a complex and automated exploit system, and the capacity for advanced reconnaissance of targets. It is the first threat actor seen by Cylance to effectively evade \u201cno less than eight different antivirus products \u2014 Sophos, ESET, Kaspersky, BitDefender, Avira, Avast!, AVG, and Quick Heal \u2014 before turning them against their owners by deliberately surrendering to them on specific dates in order to distract, delay, and divert the targets\u2019 resources.\u201dTo escape attribution, The White Company had four different ways within an exploit to check if the malware was on an investigator\u2019s system, could clean up Word and launch a decoy document to reduce suspicion, and could completely delete itself from a target\u2019s system. Its malware had five different obfuscation techniques, with the payload buried within \u201cnesting-doll layers,\u201d and used \u201ccompromised or otherwise un-attributable network infrastructure for command and control.\u201dMore details, such as the exploit kits, malware and infrastructure used by The White Company, as well as details on the year-long espionage campaign, Operation Shaheen, waged against the Pakistani government and military can be found in Cylance\u2019s 138-page report.