BGP Vortex: New, Subtle Attack Threatens Internet Stability

13/11/2025

BGP Vortex: New, Subtle Attack Threatens Internet Stability
Designed by Freepik

By: Celsa Sánchez, Alejandro Acosta

Introduction

The Border Gateway Protocol (BGP) is the backbone of the Internet. It is responsible for directing traffic between different autonomous systems (AS), in other words, to any website. While BGP hijacking attacks are a known threat, a new type of attack known as BGP Vortex introduces a particularly insidious challenge to network stability. First presented at the USENIX Security Conference in August 2025, this attack exploits standard BGP extensions to trigger a denial-of-service DoS by flooding the network with update messages.

Unlike traditional hijacking attacks that redirect traffic, the BGP Vortex doesn’t manipulate routes to intercept data. Instead, it destabilizes them to generate a message storm (hence the name Vortex) that floods the routers’ control plane. What makes it particularly dangerous is that it uses completely legitimate, standard BGP messages, which allows it to bypass current defenses such as BGPSEC and RPKI.

About the BGP Vortex

The BGP Vortex is a phenomenon where three interconnected ASes get trapped in a state of persistent route oscillations. These oscillations not only overload routers of ASes in the Vortex but also cause a surge of route advertisements that are disseminated across the Internet and possibly overload routers of ASes that are not part of the Vortex.

Attack Mechanism

The BGP Vortex manipulates two commonly used BGP communities for traffic engineering:

  • Lower Local Preference Below Peer: When attached to a route advertisement, this community instructs a BGP peer to reduce the local preference of that route below the preference it would have if received from other peers.
  • Selective NOPEER: This community instructs an autonomous system not to advertise the routes it receives to certain peers.

The attack exploits a specific configuration involving three vulnerable autonomous systems (AS) that are peers and use these communities. By sending three specific UPDATE messages (BGP Update messages), the attacker induces these ASes to enter a vicious cycle of routing oscillations.

  1. Triggering the oscillation: An attacker sends an UPDATE message to a vulnerable AS. This message, which contains the malicious communities, causes a cascade of route update and withdrawal messages between the three ASes.
  2. Creating the loop: The routing configurations and policies of the three ASes react to the messages creating an infinite loop. The route is repeatedly announced and withdrawn by the three peers.
  3. Creating the update storm: The oscillation amplifies as it propagates through the network’s “branches.” Each time the route changes within the loop, a new wave of BGP UPDATE messages is generated, propagating to thousands of networks in the customer cones of the affected ASes. This can generate thousands of updates per second.

Impact and Consequences

What makes this attack particularly serious is that it uses only legitimate BGP rules and packets — no malformed or malicious packets are involved. The technique simply manipulates BGP communities and BGP UPDATE messages.

(Free access, no subscription required)

The BGP Vortex can cause major Internet disruptions:

  • Router overload: The flood of BGP UPDATE messages saturates the routers’ control plane, which must process each update and withdrawal. This consumes a significant amount of CPU and memory resources, leading to widespread slowdowns.
  • Data layer failures: Control-plane overload can make routers’ forwarding tables inconsistent. This can cause intermittent forwarding loops, which in turn can congest links and cause packet losses, severely impacting connectivity.
  • Internet instability: The update storm’s domino effect can spread beyond the initially targeted networks. A single BGP Vortex could destabilize large sections of Internet infrastructure, affecting multiple users and services.

Attack Flow

This scenario shows how the combination of the Lower Local Pref and Selective NOPEER communities can cause persistent route oscillations between three autonomous systems (AS 1, AS 2, AS 3) connected in a triangular topology.

The attacker (AS 4, a multihomed customer) uses these communities to manipulate route selection and propagation.

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of LACNIC.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments