Skip to main content
Explainer

BGP hijacking, in plain English

Every minute of every day, somewhere on the internet, a router is telling the rest of the network "I can reach IP range 192.0.2.0/24, send those packets to me." That sentence is a BGP announcement, and the entire global routing table is built from them. The problem is that nobody verifies the speaker. If a network announces a prefix it doesn't own — by mistake or on purpose — a chunk of the internet starts sending traffic to the wrong place. That's a BGP hijack.

How a hijack happens

Every ASN (see our ASN explainer) speaks BGP with its peers at internet exchange points and over private links. When a router learns multiple paths to the same destination, it picks the "best" one according to operator-configured rules — typically the shortest AS-path, the most-preferred peer, or the most-specific prefix.

That last detail is the lever attackers pull:

Famous incidents

The defence stack

Three layers work together. None is sufficient on its own; combined, they raise the cost of a successful hijack.

1. RPKI + ROAs (origin validation)

A Route Origin Authorization is a digitally-signed statement: "ASN X is authorised to originate prefix Y at maximum length Z." The five regional registries (ARIN, RIPE NCC, APNIC, LACNIC, AFRINIC) host the trust anchors; networks publish ROAs covering their own resources.

Routers that perform Route Origin Validation drop announcements that conflict with a ROA. As of 2026, the major Tier-1s (Lumen, Cogent, NTT, Telia/Arelion, Tata) and most large CDNs validate. Cloudflare publishes their state at isbgpsafeyet.com.

2. IRR + filtering

Internet Routing Registries (RADb, AltDB, the RIR-hosted ones) hold route objects— older, weaker assertions of "this AS originates these prefixes." Most networks still generate their inbound prefix filters from IRR data because it predates RPKI and covers more of the table. Belt-and-braces with ROV.

3. Path-validation (ASPA, BGPsec)

ASPA (Autonomous System Provider Authorization) is the newest layer, addressing path manipulation rather than just origin. BGPsec — cryptographic path signing — has been on the IETF books since 2017 but has near-zero production deployment because of the per-hop signing cost.

What can you do?