Understanding stealthy BGP hijacking risk in the ROV era

03/11/2025

Understanding stealthy BGP hijacking risk in the ROV era

By Yihao Chen, 16 de octubre de 2025

Co-authors: Qi LiKe XuZhuotao LiuJianping Wu

This article was originally published on the APNIC blog.

Border Gateway Protocol (BGP) hijacking has long been one of the protocol’s most persistent security threats. RPKI and ROV were standardized to provide origin authentication and mitigate the threat, but Route Origin Validation (ROV) deployment is likely to remain partial for the next decade. Partial deployment not only leaves obvious gaps in protection but also creates a subtle threat, which we refer to as ROV-related stealthy BGP hijacking (or simply stealthy hijacking).

In a stealthy hijack, the affected Autonomous System (AS) never sees the malicious origin on the control plane because ROV-enabled neighbors drop the invalid announcement. Yet, traffic can still be silently diverted to an attacker via legacy (non-ROV) ASes along the data plane path. This makes the attack effectively evade detection that relies on control-plane visibility. In other words, BGP hijacking becomes stealthier — the victim’s routing tables and RPKI checks look perfectly normal, even as its traffic is being diverted.

Below, we present a real-world case that illustrates how a stealthy hijack occurs.

Figure 1 — Hijacking incident on 203.127.225.0/24 (last seen on 24 April 2025). This incident was most likely the result of a benign misconfiguration.

(Free access, no subscription required)

In this case, AS17894, the supposed hijacker, mis-announced a /24 prefix, which is part of a /16 that is legitimately owned and originated by AS3758. Technically, this is a classic sub-prefix hijack.

What makes this case subtle is how ROV comes into play. In Figure 1, only AS37100 applies ROV filtering. Because AS37100 dropped the invalid /24 route, it kept only the valid /16 route in its routing table. As a result, AS37100 and its customers had no visibility of the invalid route on the control plane. In other words, AS37100 and its customers had no reason to suspect anything wrong. Yet their traffic to the /24 was still diverted to AS17894 via legacy AS6762, which does not perform ROV and accepted the invalid /24 route. Unless notified or actively probing the /24 for some reason, they would remain unaware of the ongoing hijack.

Evidence from AS37100’s looking glass confirms the incident. We manually inspected AS37100’s control-plane view and data-plane reachability using its public looking glass ‘g-01-ams.nl‘. All observations were captured on 10 February 2025.

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of LACNIC.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments