Tag : Border Gateway Protocol

image_pdfimage_print

Enlarge / A graphical depiction of Thursday’s BGP leak. reader comments 107 with 59 posters participating Share this story Traffic destined for some of Europe’s biggest mobile providers was misdirected in a roundabout path through the Chinese-government-controlled China Telecom on Thursday, in some cases for more than two hours, an Internet-monitoring service reported. It’s the ..

Leggi tutto

Aurich / Getty reader comments 39 with 31 posters participating Share this story Over the past decade, many attackers have exploited design weaknesses in the Internet’s global routing system. Most commonly, the Border Gateway Protocol (BGP) is abused to divert gigabytes, or possibly even petabytes, of high-value traffic to ISPs inside Russia or China, sometimes ..

Leggi tutto

reader comments 88 Share this story Amazon lost control of a small number of its cloud services IP addresses for two hours on Tuesday morning when hackers exploited a known Internet-protocol weakness that let them to redirect traffic to rogue destinations. By subverting Amazon’s domain-resolution service, the attackers masqueraded as cryptocurrency website MyEtherWallet.com and stole ..

Leggi tutto