•  
Support crystalwind.ca with your donation and help spread spirituality and positivity. Blessings!

This article was posted by CrystalWind.ca.

A+ A A-

Internet’s new biggest threat? How web traffic can be secretly redirected

intenetworking-cabling

Internet experts say huge chunks of sensitive web traffic have been routinely hijacked by hackers and diverted to foreign computers, compromising the data of victims in at least 150 cities worldwide.

Researchers at New Hampshire-based global internet intelligence company Renesys say that they’ve witnessed a complex type of Man-in-the-Middle attack occur on computer networks no fewer than 60 days this year already, the likes of which they say should never have happened.

In incidents described in a report released by Renesys last month, the firm claims that web data from major financial institutions, government agencies and Internet Service Providers (ISPs) alike were all compromised when unidentified hackers exposed a rarely-discussed vulnerability in order to almost silently divert that information away from its intended destinations, and instead route it abroad to be collected, read and then re-sent to the rightful recipient.

The method of attack exploits a vulnerability in the Border Gateway Protocol, or BGP, and takes advantage of the fact that much of the information routed through the global system of networks considered to be the backbone of the internet is exchanged based off of little more than trust among administrators.

BGP is "essentially the glue that holds the disparate parts of the Internet together," Jennifer Rexford, a computer science professor at Princeton University, told the Washington Post’s Andrea Peterson last month.

"Each domain (AT&T, Princeton and so on) will tell its neighbors it connects to directly which destinations it can reach and over what paths," Rexford said of BGP. "Those neighbors will then choose amongst those set of paths that are offered by their respective neighbors, add themselves to the front of the path and tell their neighbors."

"By default your neighbor just believes you, and doesn't have a really reliable way to tell if you are actually telling the truth," Rexford added. Unfortunately for many, though, hackers are alleged to have taken advantage of this vulnerability and in turn exploited the trusting relationship between neighboring domains.

"Like a lot of the technologies underlying the Internet, it was designed without security in mind under this sort of implicit assumption that all the guys on the network are good guys, and all the bad guys -- if they exist at all -- are outside the network," Rexford added. "People worried about the network being vulnerable to physical attacks, but the idea of cyberattacks wasn't really in people's thinking at the time."

Decades later, the internet has emerged to become a beast that even the developers of the protocols it relies on wouldn’t have expected. Renesys says hackers took advantage of this, and were able to therefore hijack web data without relying on the sophisticated means conjured up by officials at, say, the National Security Agency.

While classified documents released this year suggest that the NSA has physically tapped into fiber optic cables carrying internet data and even developed methods of attack to compromise the most complex of encryption algorithms, the method identified by Renesys is a whole different sort of sneaky. What these hackers have been doing, the company claims, involves hijacking the route web traffic is intended to travel and diverting it elsewhere for analysis before sending it back on its right path.

Why settle for simple denial of service, when you can instead steal a victim’s traffic, take a few milliseconds to inspect or modify it and then pass it along to the intended recipient?” Renesys co-founder Jim Cowie wrote last month. “This year, that potential has become reality.”

renesys-trace-route

According to Cowie and company, hackers have been using their skills to take web data meant for certain servers and send it all the way to Belarus in one example, and Ireland in another. The victims, the company claims, were computer users in the United States, South Korea, Germany, the Czech Republic, Lithuania, Libya and Iran, who likely never knew that their internet transmissions were secretly diverted to unintended recipients during the normal transfer of bits and bytes.

In one example cited by Cowie, a computer that connects to the internet in Mexico willingly transmits data to Washington, DC that is carried over BPG by the networking firm PCCW.

Mexican provider Alestra hands it to PCCW for transit in Laredo, Texas,” Cowie wrote, and then “PCCW takes it to the Washington, DC metro area, where they would normally hand it to Qwest/Centurylink for delivery.”

Instead, he continued, PCCW gives that data to another fiber cable owner, Level3, and that’s when hackers have their way with the information.

Level3 . . . is advertising a false Belarus route, having heard it from Russia’s TransTelecom, who heard it from their customer, Belarus Telecom,” he says. “Level3 carries the traffic to London, where it delivers it to Transtelecom, who takes it to Moscow and on to Belarus. Beltelecom has a chance to examine the traffic, and then sends it back out on the ‘clean path’ through Russian provider ReTN. ReTN delivers it to Frankfurt and hands it to NTT, who takes it to New York. Finally, NTT hands it off to Qwest/Centurylink in Washington DC, and the traffic is delivered.”

The recipient, perhaps sitting at home in a pleasant Virginia suburb drinking his morning coffee, has no idea that someone in Minsk has the ability to watch him surf the web,” Cowie said.

Renesys believes around 1,500 individual IP blocks from 150 cities around the world — including Chicago, Denver, Montreal and New York — were compromised in what the firm claims was not an accident, but indeed an attack.

In practical terms, this means that Man-In-the-Middle BGP route hijacking has now moved from a theoretical concern to something that happens fairly regularly, and the potential for traffic interception is very real,” Cowie wrote. “Everyone on the internet — certainly the largest global carriers, certainly any bank or credit card processing company or government agency — should now be monitoring the global routing of their advertised IP prefixes.”

“This kind of attack should not happen,” he added. “You cannot carry out this kind of hijacking without leaving permanent, visible footprints in global routing that point right back to the point of interception. We believe that people are still attempting this because they believe (correctly, in most cases) that nobody is looking.”


rt-logo

Source Here

Crystal Wind™Crystal WindSee us onCrystal Wind Facebook Fan Pageand Crystal Wind Pinterest HomeFollow us onCrystal Wind Twitter Home

 

Pin It

© CrystalWind.ca 2025. All content (articles, imagery, fair use) & design protected. Written permission required for copying. All rights reserved.

Join the Conversation Now! Comment Below! arrow down small 11

CrystalWind.ca is free to use because of donations from people like you. Please help support us! 
Blessings!
 

Follow this blog

Featured Writers

Thank You for Visiting CrystalWind!

We hope you’ve found inspiration on your awakening journey.

Share your thoughts at . Let’s awaken and transform together!

crystal-wind-oracle-mobile-app
Cut Through The Illusions!
Available On
Apple  | Android | Amazon
NEW Expanded Version - 53 cards!

Spirit Animal Totem Of The Day!

CrystalWind.ca is free to use because of
donations from people like you.
Donate Now »

CrystalWind.ca Donation!

Unlock Your Light: Join Lightworkers Worldwide on CrystalWind.ca!

 

Call For Writers

Call For Writers!

Articles: AndEl: Technology

Follow Us!

 

Who is Online Now

We have 19617 guests and no members online

Featured This Month

Page:

Imbolc

Imbolc

Imbolc Ritual Celebrated February 2 Imbolc is also known as Candlemas, Imbo... Read more

Midwinter Feast of Light: Reviving the Magic…

Midwinter Feast of Light: Reviving the Magical Foods of Imbolc

I love the ancient feast days of the pagan calendar. Celebrating the tu... Read more

The Birch Tree - December 24 - January 20

The Birch Tree - December 24 - January 20

Celtic Symbol : The White Stag Zodiac Degrees : 2º00` - 29º59` Capricorn Read more

Tiger's Eye

Tiger's Eye

The Physical Mastery Stone Because of its range of colours, tiger’s eye is... Read more

Spirit of White Tiger

Spirit of White Tiger

Spirit of White Tiger Role: Seeker of Personal Truth Lesson: Power of Conv... Read more

Capricorn

Capricorn

CAPRICORN Dec 22 - Jan 20 Read more

Earth Renewal Moon

Earth Renewal Moon

Snow Goose – Quartz – Birch - White December 22 to January 19 The Earth Rene... Read more

Garnet

Garnet

The Vibrant Body Stone The particular color of a garnet specimen will deter... Read more

Smoky Quartz

Smoky Quartz

The Root Chakra Balancer Stone Smoky quartz is a stone of quietness. It co... Read more

Birth Totem - Goose

Birth Totem - Goose

Birth Totem Goose Birth dates: December 22 - January 19 Read more

Imbolc - The Feast of Brighid

Imbolc - The Feast of Brighid

Image source: The Crystal Wind Oracle Myth & Magic Card Deck.Get it here... Read more

Sun in Capricorn

Sun in Capricorn

An Overview of Sun Sign Characteristics for Capricorn Read more

Annual Blessing Of the Sacred Hearth at Imbo…

Annual Blessing Of the Sacred Hearth at Imbolc

Blessed Brigid Blessed Brigid, Flame of Delight ,  May the fires of yo... Read more

Imbolc Customs

Imbolc Customs

Imbolc, (pronounced im-bolk) or Candlemass, Imbolg, Bride's Day, Oimelc, and... Read more

Imbolc Lore

Imbolc Lore

Imbolc (pronounced "IM-bulk", "IM mol'g" or "EM-bowl/k") is one of the Great... Read more

© 2008-2025 CrystalWind.ca. All rights reserved. Site Creation by CrystalWind.ca.
Web Hosting by Knownhost.com

 

 

X

Right Click

No right click