TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Hacking Team and a case of BGP hijacking

171 点作者 rolux将近 10 年前

8 条评论

acaloiar将近 10 年前
As someone who works in technology, but has only a cursory understanding of BGP, I find BGP's trust mechanism flabbergasting. Would anyone like to explain why it remains the preferred protocol and what improvements are in the works to mitigate the effect of these sort of hijacks?
评论 #9866557 未加载
评论 #9865592 未加载
评论 #9865676 未加载
评论 #9865763 未加载
评论 #9866595 未加载
评论 #9865758 未加载
diafygi将近 10 年前
For those who are curious, 46.166.163.0&#x2F;24 (the hijacked IPs) belong to balticservers.com, which is based out of Lithuania[1].<p><a href="http:&#x2F;&#x2F;wikiscan.org&#x2F;plage-ip&#x2F;46.166.163.0&#x2F;24?submenu=whois" rel="nofollow">http:&#x2F;&#x2F;wikiscan.org&#x2F;plage-ip&#x2F;46.166.163.0&#x2F;24?submenu=whois</a>
评论 #9868593 未加载
vultour将近 10 年前
Everyone should just blackhole any traffic to and from the Aruba ISP. They have failed to maintain the trust relationship needed at high-tier ISPs and should no longer be operational.
gr0wln1n将近 10 年前
Can somebody explain how they got the police to help them?<p>&quot;You remember the RAT we sold you? Yea... That&#x27;s broken because ... Help us or people might notice.&quot; If that&#x27;s it.. Wow. This whole story gets more fishy by the minute.
评论 #9866566 未加载
评论 #9868597 未加载
acd将近 10 年前
You can take over other providers IP space by announcing their IPs via BGP from well connected high ranked tier ISPs, but just because you can do one thing does not mean you should exercise it.<p>Internet was built on the premise that you can trust other organisations such as good willed universites, it was not built for a landscape of internet crime and state sponsored hackers.<p>BGP and central certificate authorities is flawed in princicple and this sense. Its very easy to create fake certificates for big organisations if you have the power of a state.<p>Diginotar is such an Epic fail of CA which shows exactly why you cannot trust central trust when there is state hackers at work.<p>So you either hijack BGP, DNS or Central certificate authority then you steal peoples cookies. Since most does not use two factor authentication that is enough to take ownership of their email accounts. Once the email accounts is compromised all other accounts can be compromised through password resets.
rudolf0将近 10 年前
This is pretty crazy. I wonder how the route hijack didn&#x27;t get noticed by anyone at the time, though? Or at least if someone did notice, they didn&#x27;t make a fuss about it.
评论 #9865315 未加载
评论 #9866381 未加载
cft将近 10 年前
I do not undertsand this. We recently had to change our announcement to upstream ISPs from&#x2F;23 to &#x2F;22 and our ISPs verified with ARIN that the entire &#x2F;22 belonged to us, before changing their filters. Also, there&#x27;s RADb database.
评论 #9868679 未加载
评论 #9868281 未加载
based2将近 10 年前
<a href="http:&#x2F;&#x2F;www.bortzmeyer.org&#x2F;bgp-malaisie.html" rel="nofollow">http:&#x2F;&#x2F;www.bortzmeyer.org&#x2F;bgp-malaisie.html</a>