Another BGP Hijacking Event Highlights the Importance of MANRS and Routing Security
Another BGP hijacking event is in the news today. This time, the event is affecting the Ethereum cryptocurrency. (Read more about it here, or here.) Users were faced with an insecure SSL certificate. Clicking through that, like so many users do without reading, they were redirected to a server in Russia, which proceeded to empty the user’s wallet. DNSSEC is important to us, so please check out the Deploy360 DNSSEC resources to make sure your domain names are protected. In this post, though, we’ll focus on the BGP hijacking part of this attack.
What happened?
First, here’s a rundown of routing attacks on cryptocurrency in general – https://btc-hijack.ethz.ch/.
In this case specifically, the culprit re-routed DNS traffic using a man in the middle attack using a server at an Equinix data center in Chicago. Cloudflare has put up a blog post that explains the technical details. From that post:
“This [hijacked] IP space is allocated to Amazon(AS16509). But the ASN that announced it was eNet Inc(AS10297) to their peers and forwarded to Hurricane Electric(AS6939).
“Those IPs are for Route53 Amazon DNS servers. When you query for one of their client zones, those servers Continue reading
5G trials from Kalamazoo, Michigan, to Waco, Texas, have helped the company fine-tune its commercial deployment plans. 
Figure 22-1. Example production configuration for the Shakespeare search service
The investment firm was part of the funding behind VeloCloud, Perspica, and Appcito.


The software integrates with public cloud APIs so that backups scale automatically as cloud workloads are added or deleted.