Sunday, April 6, 2025
Homecyber securityMajor BGP Leak Affects Thousand of Networks and Websites Globally

Major BGP Leak Affects Thousand of Networks and Websites Globally

Published on

SIEM as a Service

Follow Us on Google News

Thousands of websites and networks around the world are temporarily unavailable due to a large-scale leakage of BGP (dynamic routing protocols) routes. 

Initially, the problems started with the Vodafone Autonomous System (AS55410) in India, but it affected large enterprises in the USA also, including Google.

Operators of the Cisco BGPMon real-time BGP routing information monitoring tool have discovered inconsistencies in the routing systems of Internet traffic, indicating an attacker attempting to intercept BGP routes.

- Advertisement - Google News

BGP Leak Causes 13 Spike

The head of the security team at Kentik, Doug Madori has confirmed BGPMon’s data on the social network. According to him, the volume of traffic passing through ASN 55410 autonomous system has increased 13 times.

The system mistakenly announced support for more than 30,000 BGP prefixes or routes, and as a result, it was “flooded” with traffic that was not intended for it, and this autonomous network is owned by Vodafone India Limited.

BGPMon asserted that “the prefix 24.152.117.0/24 is usually announced by the AS270497 RUTE MARIA DA CUNHA, BR. However, starting at 2021-04-16 15:07:01, the same prefix (24.152.117.0/24) was also announced by ASN 55410.”

Networks Globally Impacted

In the below image you can see all the networks that are impacted by this BGP leak globally:-

Guard Against BGP Leak

The security researchers at Kentik security firm has shared some common safeguards and security mechanisms that the companies can use to protect themselves against this type of BGP leaks.

Here are the security mechanisms that the security analysts have recommended the companies to protect against this type of BGP leaks:-

  • Setting MAXPREF – When a downstream network abruptly starts sending a large number of BGP routes, this security mechanism will help the organisations to disable a BGP connection automatically.
  • Configuring filters – By using AS1273 and AS9498 companies can filter all the routes that are received from AS55410.
  • Deploying RPKI – The routes that are leaked with ROAs (Route Origin Authorizations) can be configured in the RPKI that have been released using this security mechanism.

The event lasted for 10 minutes, and during this 10 minutes, users around the world have experienced difficulties connecting to Internet resources with IP addresses in leaked routes that mistakenly directed traffic to the AS55410 autonomous system in India. 

Moreover, one of the known BGP experts, Anurag Bhatia have identified 20,000 prefixes around the world that are affected by this BGP leak incident.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a...

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by...

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...