SlideShare a Scribd company logo
State-encouraged BGP hijacking
Marco d’Itri
<md@linux.it>
@rfc1036
End Summer Camp 2K15 - Sep 5, 2015
Background
Hacking Team
A provider of offensive intrusion and surveillance software used by law
enforcement and intelligence agencies in many countries.
The 2015 data breach
An unknown entity thoroughly owned Hacking Team and managed to
exfiltrate over 400 GB of data, among them the employees’ mailboxes,
which then have been indexed by Wikileaks.
My analysis
This presentation is based on the content of these emails, whose
veridicity has not been challenged, and corroborated by BGP routing
data publicly archived by third parties.
State-encouraged BGP hijacking Marco d’Itri
Chains of anonymizing proxies
Hacking Team’s flagship product is RCS, a malware which uploads the
data gathered from the target’s computer to a remote server, using a
chain of special purpose anonymizing proxies installed on rented
servers all over the world.
In august 2013 Santrex, a Russian supplier of some proxy servers
used by HT for their customers, had serious technical issues that
caused some of these proxies to become unreachable by instances of
RCS deployed by the Carabinieri.
State-encouraged BGP hijacking Marco d’Itri
A request for BGP hijacking
On 14 august 2013 the Carabinieri sent to Company X a request to:
[...] publish and then propagate, at least at a national level on
the internet network, of the network 46.166.163.0/24.
(my translation)
and to make available a server with a specific IP address on this
network.
46.166.163.136/29 is a network assigned to Santrex.
It is my understanding that this is a normal request for providing
commercial services and not a mandatory order.
State-encouraged BGP hijacking Marco d’Itri
Verifying with hard data
Thanks to the awesome RIPEstat service I was able to quickly verify
that 46.166.163.0/24 was announced by Company X in this period.
State-encouraged BGP hijacking Marco d’Itri
The actual scope of this hijacking
Verification
Downloaded a BGP table dump for 20 august 2013 from the RIPE
RIS archive.
Processed it with my zebra-dump-parser program to extract the
routes for 46.166.163.0/24.
Apparently Company X advertised the network to all their peers since
it was also received e.g. by Hurricane Electric at MIX-IT.
The hijacking was not limited to a couple of local networks: the route
was also propagated to others foreign networks.
State-encouraged BGP hijacking Marco d’Itri
An unprecedented breach of trust
Company X deliberately announced the IP addresses of a foreign
competitor, without their permission, to solve a technical issue of
an italian law enforcement agency.
The hijacked network was propagated all over the world.
This kind of activity is forbidden by the policies of exchange points,
by peering agreements and by transit providers.
But Company X argues that this is totally fine since a LEA asked
them do do it.
As far as I know, this never happened before.
State-encouraged BGP hijacking Marco d’Itri
Questions?
http://www.linux.it/~md/text/state-hijacking.pdf
(Google . . . Marco d’Itri . . . I feel lucky)
State-encouraged BGP hijacking Marco d’Itri
Bonus slide
Independent confirmations of my research:
BGPmon/OpenDNS
Renesys/Dyn Research
Articles about the hijacking:
Ars Technica
Brian Krebs
Heise online
Golem.de
Engadget
Wired UK
The emails from the Hacking Team archive:
1 2 3 4 5 6 7 8 9
State-encouraged BGP hijacking Marco d’Itri

More Related Content

PDF
Gov.uscourts.mied.350905.1.15
PDF
20150604 nyt-cyber-surveillance-documents
PDF
Vietnam Youth Internet Governance Forum 2021: Core Internet Technologies
PDF
How to Determine Your Attack Surface in the Healthcare Sector
PPTX
Cyber crimes Challenges in Global and Oman
PPTX
TWIGF 2020: Introducing APNIC
PDF
Fortinet security fabric
Gov.uscourts.mied.350905.1.15
20150604 nyt-cyber-surveillance-documents
Vietnam Youth Internet Governance Forum 2021: Core Internet Technologies
How to Determine Your Attack Surface in the Healthcare Sector
Cyber crimes Challenges in Global and Oman
TWIGF 2020: Introducing APNIC
Fortinet security fabric

Similar to State-encouraged BGP hijacking (20)

PDF
Diginotar Hack - Black-tulip
PPTX
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
PPTX
Detecting and Confronting Flash Attacks from IoT Botnets
PDF
InfoSec Deep Learning in Action
PPTX
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
PDF
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
PDF
The Internet of Things: We've Got to Chat
PDF
Literature survey on peer to peer botnets
PPTX
Security News Bytes Null Dec Meet Bangalore
PDF
Ce hv8 module 17 evading ids, firewalls, and honeypots
PPTX
News bytes Sept-2011
PPTX
Internet of Things (IoT) two-factor authentication using blockchain
PDF
IoT security fresh thinking 2017 sep 9
DOCX
1 Manic Menagerie Malicious activity target.docx
PDF
Apani UK GCSx Co-Co Compliance
PDF
BGP security at internet exchanges
PPTX
Privacy and security in IoT
PDF
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
PDF
ION Bangladesh - Secure BGP and Operational Report of Bangladesh
PDF
Guarding Against Large-Scale Scrabble In Social Network
Diginotar Hack - Black-tulip
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Detecting and Confronting Flash Attacks from IoT Botnets
InfoSec Deep Learning in Action
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
PLNOG 5: Rainer Baeder - Fortinet Overview, Fortinet VoIP Security
The Internet of Things: We've Got to Chat
Literature survey on peer to peer botnets
Security News Bytes Null Dec Meet Bangalore
Ce hv8 module 17 evading ids, firewalls, and honeypots
News bytes Sept-2011
Internet of Things (IoT) two-factor authentication using blockchain
IoT security fresh thinking 2017 sep 9
1 Manic Menagerie Malicious activity target.docx
Apani UK GCSx Co-Co Compliance
BGP security at internet exchanges
Privacy and security in IoT
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...
ION Bangladesh - Secure BGP and Operational Report of Bangladesh
Guarding Against Large-Scale Scrabble In Social Network
Ad

More from Marco d'Itri (20)

PDF
Exploring the Huawei HG8010H GPON ONT
PDF
The Internet of (other people's) Things
PDF
Introduzione alla sicurezza di BGP
PDF
Introduzione al peering
PDF
The Internet of (other people's) Things
PDF
Sicurezza di BGP
PDF
Un mistero di censura all'italiana
PDF
Interconnessioni tra le reti Italiane
PDF
An introduction to peering in Italy
PDF
Peering e depeering
PDF
Introduzione al peering
PDF
Depeering di Telecom Italia
PDF
RPSL and rpsltool
PDF
Piano di indirizzamento di una rete IPv6
PDF
Il nuovo Bryar.pm
PDF
Transizione a IPv6: come la vedo io
PDF
Networking in ambienti cloud
PDF
DNSSEC - una breve introduzione
PDF
RPSL e rpsltool
PDF
PBL e SBL DROP
Exploring the Huawei HG8010H GPON ONT
The Internet of (other people's) Things
Introduzione alla sicurezza di BGP
Introduzione al peering
The Internet of (other people's) Things
Sicurezza di BGP
Un mistero di censura all'italiana
Interconnessioni tra le reti Italiane
An introduction to peering in Italy
Peering e depeering
Introduzione al peering
Depeering di Telecom Italia
RPSL and rpsltool
Piano di indirizzamento di una rete IPv6
Il nuovo Bryar.pm
Transizione a IPv6: come la vedo io
Networking in ambienti cloud
DNSSEC - una breve introduzione
RPSL e rpsltool
PBL e SBL DROP
Ad

Recently uploaded (20)

PPTX
Digital Literacy And Online Safety on internet
PPTX
Funds Management Learning Material for Beg
PPTX
t_and_OpenAI_Combined_two_pressentations
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PPT
Ethics in Information System - Management Information System
PPTX
E -tech empowerment technologies PowerPoint
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
Sims 4 Historia para lo sims 4 para jugar
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PDF
Introduction to the IoT system, how the IoT system works
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
artificial intelligence overview of it and more
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
Digital Literacy And Online Safety on internet
Funds Management Learning Material for Beg
t_and_OpenAI_Combined_two_pressentations
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Ethics in Information System - Management Information System
E -tech empowerment technologies PowerPoint
Module 1 - Cyber Law and Ethics 101.pptx
artificialintelligenceai1-copy-210604123353.pptx
SAP Ariba Sourcing PPT for learning material
Exploring VPS Hosting Trends for SMBs in 2025
Sims 4 Historia para lo sims 4 para jugar
Mathew Digital SEO Checklist Guidlines 2025
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Introduction to the IoT system, how the IoT system works
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
artificial intelligence overview of it and more
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
SASE Traffic Flow - ZTNA Connector-1.pdf

State-encouraged BGP hijacking

  • 1. State-encouraged BGP hijacking Marco d’Itri <[email protected]> @rfc1036 End Summer Camp 2K15 - Sep 5, 2015
  • 2. Background Hacking Team A provider of offensive intrusion and surveillance software used by law enforcement and intelligence agencies in many countries. The 2015 data breach An unknown entity thoroughly owned Hacking Team and managed to exfiltrate over 400 GB of data, among them the employees’ mailboxes, which then have been indexed by Wikileaks. My analysis This presentation is based on the content of these emails, whose veridicity has not been challenged, and corroborated by BGP routing data publicly archived by third parties. State-encouraged BGP hijacking Marco d’Itri
  • 3. Chains of anonymizing proxies Hacking Team’s flagship product is RCS, a malware which uploads the data gathered from the target’s computer to a remote server, using a chain of special purpose anonymizing proxies installed on rented servers all over the world. In august 2013 Santrex, a Russian supplier of some proxy servers used by HT for their customers, had serious technical issues that caused some of these proxies to become unreachable by instances of RCS deployed by the Carabinieri. State-encouraged BGP hijacking Marco d’Itri
  • 4. A request for BGP hijacking On 14 august 2013 the Carabinieri sent to Company X a request to: [...] publish and then propagate, at least at a national level on the internet network, of the network 46.166.163.0/24. (my translation) and to make available a server with a specific IP address on this network. 46.166.163.136/29 is a network assigned to Santrex. It is my understanding that this is a normal request for providing commercial services and not a mandatory order. State-encouraged BGP hijacking Marco d’Itri
  • 5. Verifying with hard data Thanks to the awesome RIPEstat service I was able to quickly verify that 46.166.163.0/24 was announced by Company X in this period. State-encouraged BGP hijacking Marco d’Itri
  • 6. The actual scope of this hijacking Verification Downloaded a BGP table dump for 20 august 2013 from the RIPE RIS archive. Processed it with my zebra-dump-parser program to extract the routes for 46.166.163.0/24. Apparently Company X advertised the network to all their peers since it was also received e.g. by Hurricane Electric at MIX-IT. The hijacking was not limited to a couple of local networks: the route was also propagated to others foreign networks. State-encouraged BGP hijacking Marco d’Itri
  • 7. An unprecedented breach of trust Company X deliberately announced the IP addresses of a foreign competitor, without their permission, to solve a technical issue of an italian law enforcement agency. The hijacked network was propagated all over the world. This kind of activity is forbidden by the policies of exchange points, by peering agreements and by transit providers. But Company X argues that this is totally fine since a LEA asked them do do it. As far as I know, this never happened before. State-encouraged BGP hijacking Marco d’Itri
  • 8. Questions? http://www.linux.it/~md/text/state-hijacking.pdf (Google . . . Marco d’Itri . . . I feel lucky) State-encouraged BGP hijacking Marco d’Itri
  • 9. Bonus slide Independent confirmations of my research: BGPmon/OpenDNS Renesys/Dyn Research Articles about the hijacking: Ars Technica Brian Krebs Heise online Golem.de Engadget Wired UK The emails from the Hacking Team archive: 1 2 3 4 5 6 7 8 9 State-encouraged BGP hijacking Marco d’Itri