Understanding stealthy BGP hijacking risk in the ROV era

November 3, 2025

Understanding stealthy BGP hijacking risk in the ROV era

By Yihao Chen, 16 de octubre de 2025

Co-authors: Qi LiKe XuZhuotao LiuJianping Wu

This article was originally published on the APNIC blog.

Border Gateway Protocol (BGP) hijacking has long been one of the protocol’s most persistent security threats. RPKI and ROV were standardized to provide origin authentication and mitigate the threat, but Route Origin Validation (ROV) deployment is likely to remain partial for the next decade. Partial deployment not only leaves obvious gaps in protection but also creates a subtle threat, which we refer to as ROV-related stealthy BGP hijacking (or simply stealthy hijacking).

(Free access, no subscription required)

In a stealthy hijack, the affected Autonomous System (AS) never sees the malicious origin on the control plane because ROV-enabled neighbors drop the invalid announcement. Yet, traffic can still be silently diverted to an attacker via legacy (non-ROV) ASes along the data plane path. This makes the attack effectively evade detection that relies on control-plane visibility. In other words, BGP hijacking becomes stealthier — the victim’s routing tables and RPKI checks look perfectly normal, even as its traffic is being diverted.

Below, we present a real-world case that illustrates how a stealthy hijack occurs.

Figure 1 — Hijacking incident on 203.127.225.0/24 (last seen on 24 April 2025). This incident was most likely the result of a benign misconfiguration.

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of LACNIC.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments