Tag: bgp
-
$150k in cryptocurrency stolen through combined BGP-DNS hijack
If the Internet is, as is often said, held together with elastic bands and pieces of Sellotape, BGP is essentially a bunch of post-it notes that serve as traffic signs. BGP hijacks – in which a malicious attacker essentially takes over one or more ranges of IP addresses – are not extremely common, but for a protocol…
-
$150k in cryptocurrency stolen through combined BGP-DNS hijack
If the Internet is, as is often said, held together with elastic bands and pieces of Sellotape, BGP is essentially a bunch of post-it notes that serve as traffic signs. BGP hijacks – in which a malicious attacker essentially takes over one or more ranges of IP addresses – are not extremely common, but for a protocol…
-
Throwback Thursday: BGP – from route hijacking to RPKI: how vulnerable is the Internet?
Yesterday, a ‘ mysterious event ‘ involving BGP, the Internet’s border gateway protocol, led to the traffic to many popular websites being routed for around six minutes. BGP hijacks – the Internet equivalent of changing traffic direction signs – are not very common but occur more often than one would expect for a technology that is…
-
Throwback Thursday: BGP – from route hijacking to RPKI: how vulnerable is the Internet?
Yesterday, a ‘ mysterious event ‘ involving BGP, the Internet’s border gateway protocol, led to the traffic to many popular websites being routed for around six minutes. BGP hijacks – the Internet equivalent of changing traffic direction signs – are not very common but occur more often than one would expect for a technology that is…
-
VB2017 preview: BPH exposed – RBN never left they just adapted and evolved. Did you?
Running a cybercriminal enterprise isn’t all that easy. Try, for instance, setting up a site hosting malware and you’ll find that sooner or later the provider will suspend your account. Enter bulletproof hosting (BPH): hosting targeted at cybercriminals with the explicit goal of being invulnerable to takedown requests. Though the most infamous BPH operation, the Russian…
-
VB2017 preview: BPH exposed – RBN never left they just adapted and evolved. Did you?
Running a cybercriminal enterprise isn’t all that easy. Try, for instance, setting up a site hosting malware and you’ll find that sooner or later the provider will suspend your account. Enter bulletproof hosting (BPH): hosting targeted at cybercriminals with the explicit goal of being invulnerable to takedown requests. Though the most infamous BPH operation, the Russian…
-
$83k in bitcoins ‘stolen’ through BGP hijack
Short-lived network changes used to make miners connect to rogue pool. Researchers at Dell SecureWorks have discovered an operation that used BGP hijacking to force bitcoin miners to connect to mining pools under the attackers’ control, thus gaining them a lot of extra mining power and, ultimately, about $83,000 in bitcoins. New bitcoins are constantly…