RPKI vs social engineering: A case study in route hijacking

March 24, 2026

RPKI vs social engineering: A case study in route hijacking

Carlos and Sanjaya present this topic during APRICOT 2026/APNIC 61 (presentation recording below).

Sanjaya and Carlos Martinez

Excerpt: A short BGP hijack in 2025 showed how routing security can fail when attackers exploit weaknesses in provider onboarding.

During the APNIC Routing Security Special Interest Group (SIG) session at APRICOT 2026/APNIC 61, APNIC and LACNIC presented a case study of a Border Gateway Protocol (BGP) hijack that combined a technical attack with social engineering. The incident occurred in July 2025. This article explains the incident, the coordination between Regional Internet Registries (RIRs), and what it means for Route Origin Authorizations (ROAs) and Autonomous System Provider Authorizations (ASPAs).

(Free access, no subscription required)

The incident

The first report came from a user who could not send email. Messages were accepted by the server but never reached the recipient. At first, this looked like a routine system issue because it occurred late in the evening, so the team planned to investigate the next day. A closer review showed that part of LACNIC’s address space was being originated by networks that were not authorized to do so.

Analysis showed that the attacker spoofed the Autonomous System Number (ASN) in a way that avoided creating an invalid state. This choice helped the false announcements propagate. The attacker also redirected traffic through an upstream that was later confirmed to be another victim, not an accomplice.

Three short hijack events occurred:

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of LACNIC.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments