March 25, 2023
In what might either be a mishap or a tried hijack, a Russian telecommunications provider briefly marketed itself as the location for Twitter traffic for more than 2 hours the other day. As noted by Johannes Ullrich of the SANS Institute: "Previously today, RTComm.ru started to advertise 104.244.42.0/ 24, a prefix used by Twitter. "Pirating…

In what might either be a mishap or a tried hijack, a Russian telecommunications provider briefly marketed itself as the location for Twitter traffic for more than 2 hours the other day.

As noted by Johannes Ullrich of the SANS Institute: “Previously today, RTComm.ru started to advertise 104.244.42.0/ 24, a prefix used by Twitter.

“Pirating a BGP prefix is one way to block access, however it can likewise be used to intercept traffic to the respective IP addresses”, Ullrich explained.

The system for route hijacking utilizes the Border Gateway Procedure (BGP), the system by which routers disperse details about which networks can be reached through them.

BGP is an old protocol, very first released in 1990, and like a number of the Internet’s structure procedures it wasn’t designed with security in mind.

As the FCC put it in late February when it revealed an inquiry into routing vulnerability: “A bad network actor might deliberately falsify BGP reachability details to reroute traffic to itself or through a specific third-party network, and avoid that traffic from reaching its intended recipient”.

Fortunately, as Doug Madory of Internet analysis firm Kentik pointed out in a tweet, Twitter utilizes a security mechanism called Resource Public Secret Infrastructure (RPKI).

“The hijack didn’t propagate far due to a RPKI ROA [path authorisation] which asserted AS13414 was the rightful origin,” he stated.