SC-035: BGP Hijacking — Operation Route Phantom¶
Scenario Header
Type: Network / Telecommunications | Difficulty: ★★★★★ | Duration: 4–5 hours | Participants: 4–8
Threat Actor: ROUTE PHANTOM — nation-state surveillance group conducting BGP hijacking for traffic interception
Primary ATT&CK Techniques: T1557 · T1040 · T1565.002 · T1590.005 · T1584.001 · T1557.002
Facilitator Note
This scenario simulates a BGP prefix hijacking attack against an ISP's address space, enabling traffic interception and credential harvesting at scale. Participants should include network engineers, NOC analysts, SOC analysts, and ISP peering coordinators. The scenario highlights the fundamental trust-based nature of BGP and the critical importance of RPKI, route filtering, and BGP monitoring. All data is synthetic. All organizations, IPs, ASNs, and indicators are fictional.
Threat Actor Profile¶
ROUTE PHANTOM is a nation-state surveillance group with advanced network infrastructure capabilities, active since 2022. The group operates through compromised or complicit regional ISPs and transit providers to execute BGP hijacking attacks that redirect targeted traffic through attacker-controlled infrastructure. Unlike volumetric DDoS or endpoint-focused groups, ROUTE PHANTOM operates at the routing layer — manipulating the global routing table to silently intercept traffic destined for specific IP prefixes.
The group demonstrates deep understanding of BGP operations, AS path manipulation, prefix disaggregation, and the limitations of current route validation mechanisms. Their operations are characterized by surgical precision: hijacks target specific /24 prefixes (the most specific commonly accepted), last for 2–6 hours during off-peak windows, and are withdrawn before most network operators notice anomalies. Traffic is intercepted, decrypted where possible (via SSL stripping or certificate manipulation), and forwarded to the legitimate destination — making the hijack transparent to end users.
Motivation: Surveillance and intelligence collection — intercepting communications of diplomatic, military, and intelligence targets. Secondary objective: credential harvesting from unencrypted or poorly authenticated services (SMTP, DNS, HTTP) passing through hijacked prefixes.
Scenario Narrative¶
Scenario Context
TransAtlantic Telecom (AS 64501) is a mid-tier ISP and transit provider serving 340,000 residential and 12,000 business customers across the northeastern United States. TransAtlantic operates 14 PoPs (Points of Presence) and peers with 8 upstream transit providers and 23 peers at regional internet exchanges (IXPs). Their address space includes the prefix 192.0.2.0/22 (1,024 IPs), which hosts customer mail servers, web services, DNS infrastructure, and VPN concentrators. TransAtlantic has not deployed RPKI (Resource Public Key Infrastructure) — their ROAs (Route Origin Authorizations) are unsigned, and their routers do not perform RPKI validation on received routes. BGP session monitoring is limited to interface utilization and peer session state — no route anomaly detection or prefix hijack monitoring is deployed.
Phase 1 — AS Relationship Mapping and Target Selection (~40 min)¶
ROUTE PHANTOM conducts extensive passive reconnaissance of TransAtlantic Telecom's routing infrastructure using publicly available BGP data. The attacker queries RIPE RIS, BGPStream, Hurricane Electric BGP Toolkit, and PeeringDB to map TransAtlantic's peering relationships, upstream providers, announced prefixes, and AS path patterns.
The reconnaissance reveals that TransAtlantic's prefix 192.0.2.0/22 is announced as a single /22 aggregate — TransAtlantic does not announce more-specific /24 prefixes. This creates an opportunity: the attacker can announce more-specific /24 prefixes (192.0.2.0/24, 192.0.2.1/24, etc.) from a different AS, and BGP's longest-prefix-match routing will cause most of the internet to prefer the attacker's more-specific routes over TransAtlantic's /22 aggregate.
The attacker also identifies that TransAtlantic's prefix 192.0.2.0/22 has no RPKI ROA (Route Origin Authorization) — meaning no cryptographic validation exists to verify that AS 64501 is the legitimate origin for this prefix.
Evidence Artifacts:
| Artifact | Detail |
|---|---|
| BGP Toolkit Query (attacker) | AS 64501 (TransAtlantic Telecom) — Prefixes: 192.0.2.0/22 — Upstreams: AS 64510, AS 64511, AS 64512 — Peers: 23 at IXP-NE — RPKI: Not Found (no ROA) |
| PeeringDB (attacker) | AS 64501 — IRR: RADB — Policy: Open — IPv4 Prefixes: 1 — Facilities: 14 PoPs — Traffic: 40 Gbps |
| RIPE RIS Query (attacker) | 192.0.2.0/22 — Origin: AS 64501 — Visibility: 847 BGP collectors — No more-specific prefixes observed — Stable announcement (18+ months) |
| IRR Records | route: 192.0.2.0/22 — origin: AS64501 — descr: TransAtlantic Telecom — source: RADB — Created: 2024-06-15 |
| RPKI Validator | 192.0.2.0/22 — ROA Status: Not Found — No ROA exists — Validation: Unknown (neither valid nor invalid) |
Phase 1 — Discussion Inject
Technical: All of the attacker's reconnaissance uses publicly available data — BGP looking glasses, IRR databases, RPKI validators, and PeeringDB. This information is essential for internet operations but also enables attack planning. What is the trade-off between BGP transparency (needed for troubleshooting and peering) and operational security? Can TransAtlantic reduce their attack surface without degrading operational visibility?
Decision: TransAtlantic has not deployed RPKI because their NOC team considers it operationally complex and fears that misconfigured ROAs could cause self-inflicted route filtering. The RPKI deployment project has been deprioritized for 2 years. Given the cost of a BGP hijack (customer impact, reputation, regulatory), do you (A) fast-track RPKI deployment despite operational risk, (B) deploy monitoring-only (detect but don't prevent), or (C) start with ROA creation and validation enforcement in phases?
Expected Analyst Actions: - [ ] Audit RPKI status for all TransAtlantic prefixes — identify gaps in ROA coverage - [ ] Review BGP routing policy — verify prefix filters on all peering sessions - [ ] Assess whether TransAtlantic announces deaggregated /24s (defense against hijack) - [ ] Subscribe to BGP monitoring services (RIPE RIS, BGPStream, Cloudflare Radar) for prefix alerts - [ ] Review PeeringDB and IRR records for accuracy
Phase 2 — BGP Prefix Hijacking (~50 min)¶
ROUTE PHANTOM executes the BGP hijack through a compromised regional ISP in Eastern Europe (AS 64590, phantom-transit.example.com). The compromised ISP's border router is configured to announce two more-specific prefixes — 192.0.2.0/24 and 192.0.2.128/24 — with AS 64590 as the origin. These announcements are propagated to the compromised ISP's upstream transit providers and rapidly distributed across the global routing table.
Due to BGP's longest-prefix-match behavior, routers worldwide begin preferring the attacker's /24 announcements over TransAtlantic's legitimate /22 announcement. Within 12 minutes, approximately 68% of the internet routes traffic destined for 192.0.2.0/24 and 192.0.2.128/24 through the attacker's infrastructure. TransAtlantic's direct peers and upstream providers that have strict prefix filters continue to route correctly — but most of the internet is now routing through the hijack.
The attacker's infrastructure performs transparent proxying: intercepted traffic is inspected, logged, and forwarded to the legitimate TransAtlantic infrastructure via a GRE tunnel. End users experience only a slight increase in latency (15–30ms) — the hijack is functionally invisible.
Evidence Artifacts:
| Artifact | Detail |
|---|---|
| BGPStream Alert | New prefix: 192.0.2.0/24 — Origin: AS 64590 — First seen: 2026-03-10T02:14:33Z — Expected origin: AS 64501 — MOAS (Multiple Origin AS) conflict detected |
| BGPStream Alert | New prefix: 192.0.2.128/24 — Origin: AS 64590 — First seen: 2026-03-10T02:14:35Z — MOAS conflict |
| RIPE RIS Update | Prefix: 192.0.2.0/24 — AS Path: 64510 64522 64590 — Visibility: 573/847 collectors (67.6%) within 12 minutes — 2026-03-10T02:26:00Z |
| TransAtlantic NOC Dashboard | Interface utilization on peering links: dropped from 34 Gbps to 11 Gbps (68% traffic reduction) — 2026-03-10T02:30:00Z — No alert configured for traffic volume anomaly |
| Customer Support | 14 tickets opened 02:30–03:15: "email not working," "website slow," "VPN disconnecting" — NOC classified as "upstream congestion" — No BGP investigation initiated |
| TransAtlantic BGP Table | TransAtlantic's own routers still have the /22 in their RIB — they do not see the hijacked /24s because their direct peers filter correctly — TransAtlantic is unaware of the hijack |
# BGP Update Message (from compromised AS 64590)
UPDATE Message:
Withdrawn Routes Length: 0
Total Path Attribute Length: 42
Path Attributes:
ORIGIN: IGP
AS_PATH: 64590
NEXT_HOP: 198.51.100.200
COMMUNITIES: 64590:100 64590:200
Network Layer Reachability Information:
192.0.2.0/24
192.0.2.128/24
Phase 2 — Discussion Inject
Technical: The hijack exploits two fundamental BGP weaknesses: (1) longest-prefix-match routing causes /24s to be preferred over the legitimate /22, and (2) the absence of RPKI means no router can cryptographically verify the origin AS. What combination of defenses would prevent or detect this hijack? Consider: RPKI ROAs, announcing covering /24s alongside the /22, max-prefix limits, BGPStream/RIPE RIS alerting, and AS path validation.
Decision: TransAtlantic's NOC sees a 68% traffic drop but attributes it to upstream congestion (a common event). Customer complaints about email and VPN are being handled by support as individual issues. At what point should a traffic volume anomaly trigger a BGP investigation? What thresholds and correlations would you implement?
Expected Analyst Actions: - [ ] Investigate the 68% traffic drop — check BGP looking glasses for TransAtlantic's prefixes - [ ] Query RIPE RIS and BGPStream for MOAS conflicts on 192.0.2.0/22 - [ ] Identify the unauthorized origin AS 64590 announcing more-specific /24 prefixes - [ ] Contact upstream providers to implement prefix filters blocking the hijacked routes - [ ] Announce covering /24 prefixes from AS 64501 to compete with hijacked announcements
Phase 3 — Traffic Interception and Credential Harvesting (~40 min)¶
While the hijacked prefixes are active, ROUTE PHANTOM's infrastructure intercepts all traffic destined for 192.0.2.0/24 and 192.0.2.128/24. The attacker's transparent proxy infrastructure performs the following operations:
- Unencrypted traffic (HTTP, SMTP, DNS, FTP): Full packet capture and content extraction
- TLS traffic with certificate validation: Passed through transparently (no MITM possible without valid certificate)
- TLS traffic without strict validation: SSL stripping attempted via downgrade attacks
- DNS queries: Intercepted and logged — selective DNS spoofing for targeted domains
The hijack window lasts 4 hours and 22 minutes (02:14–06:36 UTC). During this window, ROUTE PHANTOM captures credentials from unencrypted SMTP sessions, DNS queries revealing browsing patterns, and HTTP session cookies.
Evidence Artifacts:
| Artifact | Detail |
|---|---|
| Intercepted SMTP (Port 25) | 2,847 unencrypted SMTP sessions — 1,204 containing authentication credentials (PLAIN/LOGIN) — Source: TransAtlantic business customers using legacy mail configurations without STARTTLS enforcement |
| Intercepted DNS | 847,000 DNS queries logged — Browsing patterns, internal hostnames, service dependencies extracted — 12 queries for *.mil and *.gov domains (intelligence targets) |
| Intercepted HTTP | 14,200 HTTP sessions (non-HTTPS) — 342 containing session cookies — 87 containing form-submitted credentials |
| TLS Passthrough | 1.2M TLS sessions passed through without interception — Certificate pinning and HSTS prevented MITM |
| SSL Strip Attempts | 847 downgrade attempts — 23 successful (clients without HSTS preload) — 824 failed (HSTS or client-side enforcement) |
| Latency Analysis | Average added latency: 22ms — Max: 47ms — Within normal variance for transatlantic routing — No user-visible performance degradation |
# Intercepted SMTP Authentication (Synthetic)
S: 220 mail.customer.example.com ESMTP
C: EHLO client.example.com
S: 250-mail.customer.example.com
S: 250-AUTH LOGIN PLAIN
S: 250 STARTTLS
C: AUTH LOGIN
S: 334 VXNlcm5hbWU6
C: dGVzdHVzZXI= # testuser (base64)
S: 334 UGFzc3dvcmQ6
C: UkVEQUNURUQ= # REDACTED (base64)
S: 235 Authentication successful
Traffic Interception Summary:
| Protocol | Sessions | Credentials Captured | Data Exposure | Mitigation Available |
|---|---|---|---|---|
| SMTP (Port 25, no TLS) | 2,847 | 1,204 (PLAIN/LOGIN auth) | Email content + credentials | Mandatory STARTTLS, DANE, MTA-STS |
| HTTP (Port 80) | 14,200 | 87 form submissions, 342 session cookies | Browsing data + credentials | HSTS preload, HTTPS-only |
| DNS (Port 53) | 847,000 | N/A (metadata only) | Browsing patterns, internal hostnames | DoH/DoT, DNSSEC |
| FTP (Port 21) | 127 | 41 cleartext credentials | File transfers | SFTP/FTPS migration |
| TLS (Port 443) | 1,200,000 | 23 (via SSL strip) | Minimal (encryption held) | HSTS preload, cert pinning |
| IMAP (Port 143) | 412 | 187 cleartext credentials | Mailbox access | IMAPS (Port 993) mandatory |
// Correlate traffic volume drops with potential BGP hijack events
let traffic_baseline = 30d;
NetworkTraffic
| where Direction == "Inbound"
| where DestinationIP startswith "192.0.2."
| summarize TrafficMbps = sum(BytesReceived) / 1000000 / 300 // 5-min bins
by bin(TimeGenerated, 5m), DestinationSubnet = strcat(extract("(\\d+\\.\\d+\\.\\d+\\.)", 1, DestinationIP), "0/24")
| join kind=inner (
NetworkTraffic
| where TimeGenerated between (ago(traffic_baseline) .. ago(1d))
| where DestinationIP startswith "192.0.2."
| summarize BaselineAvgMbps = avg(sum_BytesReceived) / 1000000 / 300
by DestinationSubnet = strcat(extract("(\\d+\\.\\d+\\.\\d+\\.)", 1, DestinationIP), "0/24")
) on DestinationSubnet
| where TrafficMbps < BaselineAvgMbps * 0.5 // >50% traffic drop
| project TimeGenerated, DestinationSubnet, TrafficMbps, BaselineAvgMbps,
DropPercent = round((1 - TrafficMbps / BaselineAvgMbps) * 100, 1)
| sort by DropPercent desc
NetworkTraffic
| where DestinationPort in (25, 80, 21, 143, 110, 23) // Unencrypted protocols
| where TimeGenerated > ago(30d)
| summarize SessionCount = count(), UniqueHosts = dcount(SourceIP),
TotalBytesMB = sum(BytesSent + BytesReceived) / 1048576
by DestinationPort, Protocol = case(
DestinationPort == 25, "SMTP",
DestinationPort == 80, "HTTP",
DestinationPort == 21, "FTP",
DestinationPort == 143, "IMAP",
DestinationPort == 110, "POP3",
DestinationPort == 23, "Telnet",
"Other"
)
| sort by SessionCount desc
Phase 3 — Discussion Inject
Technical: The attacker harvested 1,204 SMTP credentials from unencrypted SMTP sessions. Many business customers still use SMTP without mandatory STARTTLS. What technical controls can an ISP implement to protect customers from credential interception during a BGP hijack? Consider: mandatory STARTTLS, DANE (DNS-based Authentication of Named Entities), MTA-STS, and customer notification about unencrypted services.
Decision: ROUTE PHANTOM captured DNS queries to *.mil and *.gov domains, indicating potential intelligence targets among TransAtlantic's customer base. This elevates the incident from a network operations issue to a potential national security concern. Do you (A) continue handling internally while contacting upstream providers, (B) immediately notify CISA/NSA Cybersecurity Collaboration Center, or (C) engage law enforcement (FBI Cyber Division) given the nation-state attribution? What are the notification obligations for an ISP?
Expected Analyst Actions: - [ ] Confirm BGP hijack via multiple looking glasses and BGP monitoring services - [ ] Contact upstream transit providers to filter the hijacked /24 prefixes - [ ] Announce competing /24 prefixes from AS 64501 to reclaim traffic - [ ] Estimate data exposure: unencrypted traffic volume during the hijack window - [ ] Identify customers with mail servers in the hijacked prefix range - [ ] Notify affected customers to rotate all credentials
Phase 4 — Hijack Withdrawal and Attribution (~30 min)¶
At 06:36 UTC — 4 hours and 22 minutes after the initial hijack — ROUTE PHANTOM withdraws the hijacked /24 prefix announcements. Global routing converges back to TransAtlantic's legitimate /22 within 8 minutes. Traffic patterns return to normal. The hijack is over.
TransAtlantic's NOC notices traffic recovery at 06:44 UTC and logs it as "upstream congestion resolved." It is not until 09:15 UTC — when a security researcher contacts TransAtlantic via their NOC email after seeing BGPStream alerts — that the hijack is identified as a deliberate attack.
Evidence Artifacts:
| Artifact | Detail |
|---|---|
| BGPStream Alert | Withdrawn prefix: 192.0.2.0/24 — Origin: AS 64590 — Withdrawn: 2026-03-10T06:36:14Z — Duration: 4h 22m |
| BGPStream Alert | Withdrawn prefix: 192.0.2.128/24 — Origin: AS 64590 — Withdrawn: 2026-03-10T06:36:16Z |
| RIPE RIS Archive | 192.0.2.0/24 — AS 64590 — Active: 2026-03-10T02:14:33Z to 2026-03-10T06:36:14Z — 573 collectors observed the hijack — Convergence to withdrawal: 8 minutes |
| Security Researcher Email | From: researcher@bgp-monitor.example.com — To: noc@transatlantic-telecom.example.com — Subject: "BGP Hijack Alert: AS 64590 originated your prefix 192.0.2.0/24" — 2026-03-10T09:15:00Z |
| TransAtlantic NOC Ticket | NOC-2026-03-10-0247 — "Traffic drop 68% on peering links — recovered at 06:44 — classified as upstream congestion" — Closed without BGP investigation |
| AS 64590 WHOIS | Organization: phantom-transit.example.com — Country: EE — Contact: noc@phantom-transit.example.com — Registered: 2025-11-20 — No abuse reports on record |
# Traceroute comparison (before, during, after hijack)
# BEFORE HIJACK (normal routing)
traceroute to 192.0.2.50
1 gw.customer.example.com (10.0.0.1) 1ms
2 peer-ix.example.com (198.51.100.1) 5ms
3 transit.as64510.example.com (198.51.100.10) 12ms
4 border.transatlantic.example.com (192.0.2.1) 18ms ← AS 64501
# DURING HIJACK (traffic intercepted)
traceroute to 192.0.2.50
1 gw.customer.example.com (10.0.0.1) 1ms
2 peer-ix.example.com (198.51.100.1) 5ms
3 transit.as64522.example.com (198.51.100.30) 14ms
4 proxy.phantom-transit.example.com (198.51.100.200) 38ms ← AS 64590 (HIJACK)
5 border.transatlantic.example.com (192.0.2.1) 45ms ← forwarded to legitimate
# AFTER HIJACK (normal routing restored)
traceroute to 192.0.2.50
1 gw.customer.example.com (10.0.0.1) 1ms
2 peer-ix.example.com (198.51.100.1) 5ms
3 transit.as64510.example.com (198.51.100.10) 12ms
4 border.transatlantic.example.com (192.0.2.1) 18ms ← AS 64501
Phase 4 — Discussion Inject
Technical: The hijack was only identified 7 hours after it began — and only because a security researcher contacted TransAtlantic. The NOC classified the traffic anomaly as "upstream congestion." What automated monitoring would have detected this hijack in real-time? Consider: BGPStream API integration, RIPE RIS alerts, Cloudflare Radar, ThousandEyes BGP monitoring, and internal traffic baseline anomaly detection.
Decision: Attribution points to AS 64590 registered in Estonia 4 months ago — likely a shell entity. The AS is reachable via 2 upstream transit providers. Do you (A) contact the upstream providers of AS 64590 to request route filtering and peer de-provisioning, (B) file a report with the RIR (RIPE NCC) for policy violation, (C) coordinate with CISA for government-level response, or (D) all of the above? What is the standard incident response for a BGP hijack affecting an ISP?
Expected Analyst Actions: - [ ] Obtain complete BGP update archive from RIPE RIS for the hijack window - [ ] Analyze AS path data to identify transit providers propagating the hijack - [ ] Contact upstream providers of AS 64590 to request immediate de-peering - [ ] File abuse report with RIPE NCC for unauthorized prefix origination - [ ] Estimate data exposure: calculate unencrypted traffic volume during hijack window - [ ] Notify CISA given the .mil / .gov DNS query interception
Detection & Response¶
Key Detection Opportunities¶
| Detection Point | Event / Data Source | Query Logic |
|---|---|---|
| MOAS conflict | BGPStream / RIPE RIS | Multiple origin ASes for same prefix |
| More-specific prefix announcement | BGP looking glass | /24 covering existing /22 from different AS |
| Traffic volume anomaly | SNMP / NetFlow | >30% traffic drop on peering interfaces |
| Latency anomaly | Smokeping / ThousandEyes | Increased latency to own prefix from external probes |
| RPKI Invalid routes | RPKI Validator | Route origin does not match ROA |
| Customer complaints correlation | Support tickets | Clustering of email/VPN/connectivity issues |
Immediate Containment (0–4 hours)¶
- [ ] Confirm hijack via RIPE RIS, BGPStream, and multiple looking glasses
- [ ] Announce deaggregated /24 covering prefixes from AS 64501 to compete with hijacked routes
- [ ] Contact all upstream transit providers to filter routes from AS 64590 for TransAtlantic's prefixes
- [ ] Contact IXP peers to implement prefix filters
- [ ] Create emergency RPKI ROA for
192.0.2.0/22with origin AS 64501 and maxLength /24 - [ ] Notify customers with services in affected prefix range
Short-Term Actions (24–72 hours)¶
- [ ] Deploy BGP monitoring: BGPStream API, RIPE RIS alerts, Cloudflare Radar
- [ ] Implement traffic volume anomaly alerting on all peering interfaces (>30% deviation)
- [ ] Create RPKI ROAs for all TransAtlantic prefixes with appropriate maxLength
- [ ] Announce deaggregated /24 prefixes alongside /22 aggregate (defense-in-depth)
- [ ] Audit all peering sessions for prefix filters and max-prefix limits
- [ ] Notify all affected customers to rotate credentials (especially SMTP, VPN)
- [ ] File abuse reports with RIPE NCC and upstream providers of AS 64590
Long-Term Actions (1–12 weeks)¶
- [ ] Deploy RPKI validation on all border routers (drop RPKI-Invalid routes)
- [ ] Implement strict IRR-based prefix filtering on all peering sessions
- [ ] Deploy MANRS (Mutually Agreed Norms for Routing Security) compliance
- [ ] Implement mandatory STARTTLS for all customer mail services
- [ ] Deploy DANE and MTA-STS for email transport security
- [ ] Implement BGP-SEC (path validation) when operationally feasible
- [ ] Deploy network-level latency and traceroute monitoring (ThousandEyes, RIPE Atlas)
- [ ] Establish relationships with BGP monitoring community and security researchers
Lessons Learned¶
What Went Wrong¶
| Gap | Detail | Remediation |
|---|---|---|
| No RPKI deployed | No ROAs created — no cryptographic origin validation — hijack routes accepted globally | Create ROAs for all prefixes; deploy RPKI validation on border routers |
| No deaggregated /24 announcements | Only /22 aggregate announced — attacker's /24s won via longest-prefix-match | Announce covering /24s alongside aggregate; set maxLength in ROA |
| No BGP monitoring | No subscription to BGPStream, RIPE RIS alerts, or prefix hijack detection services | Deploy real-time BGP monitoring with automated alerting |
| Traffic anomaly misclassified | 68% traffic drop classified as "upstream congestion" — no BGP investigation | Implement traffic anomaly playbooks that include BGP hijack as differential diagnosis |
| No prefix filters on all peers | Some transit providers accepted the hijacked routes without filtering | Audit and enforce strict prefix filters with all peers and transit providers |
| Unencrypted SMTP | 1,204 customer mail sessions sent credentials in plaintext | Implement mandatory STARTTLS; notify customers; deploy DANE/MTA-STS |
| 7-hour detection gap | Hijack identified only after external researcher notification | Deploy automated detection — target: <15 minute detection time |
What Went Right¶
| Control | Impact |
|---|---|
| Direct peers with prefix filters | Peers with strict filters continued routing correctly — limited hijack to 68% (not 100%) |
| TLS/HSTS on most web services | 97% of TLS sessions resisted MITM — HSTS prevented SSL stripping for preloaded domains |
| BGPStream public monitoring | External researcher detected the hijack and notified TransAtlantic |
| Complete BGP archive at RIPE RIS | Full forensic record of hijack timing, propagation, and withdrawal available |
ATT&CK Navigator Mapping¶
| Technique ID | Technique Name | Phase |
|---|---|---|
| T1590.005 | Gather Victim Network Information: IP Addresses | Reconnaissance |
| T1590.004 | Gather Victim Network Information: Network Topology | Reconnaissance |
| T1584.001 | Compromise Infrastructure: Domains | Resource Development |
| T1557 | Adversary-in-the-Middle | Collection |
| T1557.002 | Adversary-in-the-Middle: ARP Cache Poisoning | Credential Access |
| T1040 | Network Sniffing | Credential Access |
| T1565.002 | Data Manipulation: Transmitted Data Manipulation | Impact |
| T1114.002 | Email Collection: Remote Email Collection | Collection |
Related Chapters¶
- Chapter 31 — Network Security Architecture — BGP security, RPKI, route filtering, network infrastructure defense
- Chapter 34 — Mobile & IoT Security — Network-layer attacks, traffic interception, protocol security
- Chapter 43 — Network Pentesting — Network reconnaissance, traffic interception, routing protocol attacks
Scenario Debrief
Operation Route Phantom exposes the fundamental fragility of BGP — the protocol that routes all internet traffic operates on trust, not cryptographic verification. A single unauthorized /24 prefix announcement from a compromised ISP redirected 68% of traffic destined for TransAtlantic Telecom's address space through attacker-controlled infrastructure for over 4 hours. The hijack was functionally invisible: 22ms of added latency fell within normal variance, traffic was forwarded to its legitimate destination after interception, and TransAtlantic's own routers never saw the hijacked routes. Detection required external monitoring that TransAtlantic had not deployed. The harvested credentials — 1,204 SMTP logins, 87 HTTP form submissions, and 847,000 DNS queries — demonstrate that BGP hijacking is not just a routing curiosity but a powerful intelligence collection capability. Defense requires RPKI deployment (ROA creation and validation enforcement), deaggregated prefix announcements, real-time BGP monitoring, strict prefix filtering on all peering sessions, and the recognition that traffic volume anomalies may indicate routing attacks, not just congestion.