{"id":13582,"date":"2020-06-29T18:23:52","date_gmt":"2020-06-29T18:23:52","guid":{"rendered":"https:\/\/prensa.lacnic.net\/news?p=13582"},"modified":"2020-06-29T18:23:54","modified_gmt":"2020-06-29T18:23:54","slug":"routing-incidents-as-a-gateway-for-cyberattacks","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/","title":{"rendered":"Routing Incidents as a Gateway for Cyberattacks"},"content":{"rendered":"\n<p><strong>Augusto\nMathurin &#8211; FORT Project Consultant<\/strong><\/p>\n\n\n\n<p><br>\nToday we are increasingly connected,\nand our digital and analog lives converge more and more each day. This\nphenomenon, which was already increasing at a considerable rate, was further\naccelerated by the crisis caused by the COVID-19 pandemic. A natural\nconsequence of having more connected devices and people depending on them is\nthe increase in the number of people performing malicious actions on the\nInternet, and with it the increase in cyberattack attempts.<\/p>\n\n\n\n<p>News\nabout Internet incidents and attacks have been part of traditional news portals\nfor a long time, but these news typically focus on events that occur in the\nupper layers of the Internet and&nbsp;\ndisregard the Internet&#8217;s \u201cpipelines\u201d \u2013 the routing layer \u2013 even when\nthere is still a long way to go to ensure that there are no significant routing\nincidents.<\/p>\n\n\n\n<p>While\nthe general public is unaware of how vulnerable the network is at this level,\nthe technical community has been tackling this challenge for some time by\ndeveloping and deploying various solutions.<\/p>\n\n\n\n<p>Along\nwith NIC.MX, LACNIC has developed the <a href=\"https:\/\/fortproject.net\/\">FORT\nProject<\/a>,\nwhich is implementing an RPKI deployment campaign in Latin America and the\nCaribbean in order to increase routing system security and resilience. Other\norganizations such as the Internet Society address this problem through MANRS,\nan initiative that provides solutions to reduce major routing threats. Their goal\nis to support both network operators (ISPs) and Internet exchange points\n(IXPs). This problem has even been part of the World Economic Forum&#8217;s agenda,\nwhich has addressed the topic and generated a report containing <a href=\"https:\/\/www.weforum.org\/reports\/cybercrime-prevention-principles-for-internet-service-providers\">Cybercrime Prevention Principles for Internet\nService Providers<\/a>.\nThe fourth of these principles, \u201cTake action to shore up the security of\nrouting and signaling to reinforce effective defense against attacks,\u201d\nrecommends the actions proposed by the MANRS initiative. Likewise, network\noperators such as Cloudflare, one of the largest global cloud infrastructure\nproviders, has been promoting and deploying measures such as RPKI for years.\nRecently, they have said that \u201c<a href=\"https:\/\/blog.cloudflare.com\/is-bgp-safe-yet-rpki-routing-security-initiative\/\">It&#8217;s time networks prevented leaks and hijacks from\nhaving any impact<\/a>.\nIt&#8217;s time to make BGP safe. No more excuses.\u201d<\/p>\n\n\n\n<p>But\nwhy are all these organizations so focused on securing the Internet routing\nlayer? What are the consequences of not paying attention to this layer\u2019s\nsecurity?<\/p>\n\n\n\n<p>First,\nit is essential to know which actors are involved and have an interest in\ncausing these cyberattacks \u2013 which may not necessarily be direct attacks on the\nInternet routing system \u2013 to understand their main goals are and how routing\nlayer vulnerabilities are a possible door to achieving them.<\/p>\n\n\n\n<p>On\nthe one hand, according to the report produced by the World Economic Forum, illegal\nonline activities will have a cost of six trillion dollars by 2021. These\nactivities are carried out by an enormous diversity of groups operating at a\nlarger or a smaller scale and with various levels of sophistication. To get an\nidea of just how enormous their activity is as a whole, all we need to do is look\nin our personal email account\u2019s spam folder to see the sheer number of\nmalicious emails attempting to commit fraud on a mass scale.<\/p>\n\n\n\n<p>On\nthe other hand, many governments are trying to censor and control online\nactivities. A large part of new Internet users, those who have recently started\nconnecting or those who will connect for the first time in the near future,\nlive in highly censored societies. Various studies have been able to prove the\nexistence of institutional actions aimed at blocking certain types of content\nat different times. OONI (Open Observatory of Network Interference) is a\nproject that aims to empower decentralized efforts in increasing transparency\nof Internet censorship around the world. Based on free software tools, they\ndetect these blocks and generate a series of <a href=\"https:\/\/ooni.org\/reports\/\">reports\nwhere they show when certain Internet users are being the victims of censorship<\/a>.<\/p>\n\n\n\n<p>In short,\nattacks include espionage, censorship and fraud, to name but a few. But how can\nan attacker exploit the routing layer to achieve their goals? Does this truly\nrepresent a risk?<\/p>\n\n\n\n<p>Just\nas most Internet protocols, BGP was designed in the late 1980s, when only a\nhandful of networks needed to be connected, a very different scenario than the\none we are living in today. Back then, security was not a basic principle that\nneeded to be considered, so the protocol was strongly based on a trust among\nthe different parties. Today the reality is quite different. <a href=\"https:\/\/www-public.imtbs-tsp.eu\/~maigron\/RIR_Stats\/RIR_Delegations\/World\/ASN-ByNb.html\">Now, with almost 100,000 autonomous systems<\/a>, it is no longer possible to\nassume that all participants are reliable.<\/p>\n\n\n\n<p>For\ninstance, when we visit a website, both our device and the server hosting the website\nhave an IP address that allows them to be identified. Data packets have an\norigin and a destination. In order to get from one end to the other, the\npackets will travel through various intermediate networks and autonomous\nsystems, following routes that are generated based on BGP announcements.<\/p>\n\n\n\n<p>When,\neither maliciously or due to an error, an autonomous system makes an incorrect\nannouncement, it can cause traffic to be diverted towards them. Once traffic is\nredirected, it is possible to successfully carry out the attacks mentioned\nabove.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"680\" height=\"242\" src=\"https:\/\/prensa.lacnic.net\/news\/wp-content\/uploads\/2020\/06\/ciberataques-por-ruteo.jpg\" alt=\"\" class=\"wp-image-13531\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/06\/ciberataques-por-ruteo.jpg 680w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/06\/ciberataques-por-ruteo-300x107.jpg 300w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/><\/figure>\n\n\n\n<p>Figure\n1: Different types of cyberattacks that can result from a routing incident<\/p>\n\n\n\n<p>While\nthere are increasing efforts on the part of network operators to implement\nfiltering and RPKI as well as other initiatives such as LACNIC&#8217;s FORT Project,\na significant number of incidents continue to occur on a daily basis, and some\nof them even manage to have a significant impact on the Internet.<\/p>\n\n\n\n<p>On 6\nJune 2019, <a href=\"https:\/\/www.theregister.com\/2019\/06\/10\/bgp_route_hijack_china_telecom\/\">more than 70,000 BGP routes were leaked from Swiss\ncompany Safe Host (AS21217) to China Telecom<\/a>, which then announced them on the global Internet.\nThis resulted in a massive rerouting of mobile operator traffic via China\nTelecom systems in Europe.<\/p>\n\n\n\n<p>On 1<sup>st<\/sup>\nApril 2020, <a href=\"https:\/\/blog.qrator.net\/en\/how-you-deal-route-leaks_69\/\">the largest Russian ISP \u2014 Rostelecom (AS12389) \u2014 was\nannouncing prefixes belonging to prominent internet players including Akamai,\nCloudflare, Hetzner, Digital Ocean, Amazon AWS, and others<\/a>. The route was hijacked for\napproximately an hour and for a few minutes it affected major operators such as\nCogent (AS174) and Level3 (AS3356), which then propagated these announcements\nglobally. This caused inconveniences for a significant number of ISPs.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"\"><tbody><tr><td>\n  \n   \n    \n    \n    <strong>Routing incidents over the past few years<\/strong>\n    \n    \n   \n  \n  &nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"680\" height=\"242\" src=\"https:\/\/prensa.lacnic.net\/news\/wp-content\/uploads\/2020\/06\/incidentes-de-ruteo-junio-2020.jpg\" alt=\"\" class=\"wp-image-13534\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/06\/incidentes-de-ruteo-junio-2020.jpg 680w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/06\/incidentes-de-ruteo-junio-2020-300x107.jpg 300w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/><\/figure>\n\n\n\n<p>Figure\n2: Evolution of routing incidents over the past few years (source: <a href=\"https:\/\/bgpstream.com\/\">https:\/\/bgpstream.com\/<\/a>)<\/p>\n\n\n\n<p>To\nlearn more about the incidents that have had an impact on the Internet, you can\ncheck out the <a href=\"https:\/\/fortproject.net\/wicket\/resource\/net.lacnic.fortweb.HomePage\/assets\/reports\/FORT-Report-ver-9ECEAD789C29A7C1945BFC4C084F6DAE.pdf\">FORT Project diagnostic report<\/a>, which also analyzes routing\nincidents and route hijacks that have occurred in recent years in the LAC\nregion and explains in greater detail the different types of potential\nincidents with the BGP protocol and their causes.<\/p>\n\n\n\n<p>Likewise,\nyou can also take a look at <a href=\"https:\/\/monitor.fortproject.net\/overview\">FORT\nMonitor<\/a>, a\ntool that presents data on the status of routing security in Latin America and\nthe Caribbean and its impact on Internet end users in a simplified format. For\nexample, it shows that over the past three months there have been five route\nhijacks affecting critical infrastructure.<\/p>\n\n\n\n<p>Much\nhas happened since that AS7007 routing incident in 1997. In practice, it is\nimpossible to calculate the damages caused by routing attacks and issues, the\nnumber of hours that portals and Internet services remain unreachable, the\nmoney lost due to successful fraud attempts such as the Route53 hijack on\nAmazon DNS, or the immense amount of Internet traffic intercepted by unknown autonomous\nsystems. Routing can no longer depend on the goodwill of its almost 100,000\nautonomous systems, and infrastructure has matured thanks to the development of\ntools and best practices to mitigate this type of incidents.<\/p>\n\n\n\n<p>Although\nthe greatest efforts seems to focus on the security of the upper layers of the\nInternet, and while it is true that protection measures implemented in these\nlayers such as end-to-end encryption reduce the impact of attacks on the\nnetwork routing system, we cannot say that we have a secure and reliable\nInternet if network operators do not continue to work on strengthening the\nrouting system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Augusto Mathurin &#8211; FORT Project Consultant Today we are increasingly connected, and our digital and analog lives converge more and more each day. This phenomenon, which was already increasing at a considerable rate, was further accelerated by the crisis caused by the COVID-19 pandemic. A natural consequence of having more connected devices and people depending [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":13538,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[919],"tags":[1280],"archivo":[1345,952],"taxonomy-authors":[],"tipo_autor":[],"class_list":["post-13582","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-routing","tag-routing","archivo-editions","archivo-june-2020-edition"],"acf":{"author":"","related_notes":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | Routing Incidents as a Gateway for Cyberattacks<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | Routing Incidents as a Gateway for Cyberattacks\" \/>\n<meta property=\"og:description\" content=\"Augusto Mathurin &#8211; FORT Project Consultant Today we are increasingly connected, and our digital and analog lives converge more and more each day. This phenomenon, which was already increasing at a considerable rate, was further accelerated by the crisis caused by the COVID-19 pandemic. A natural consequence of having more connected devices and people depending [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-29T18:23:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-29T18:23:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/06\/ciberseguridad-ataques-de-ruteo-junio-2020.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"Routing Incidents as a Gateway for Cyberattacks\",\"datePublished\":\"2020-06-29T18:23:52+00:00\",\"dateModified\":\"2020-06-29T18:23:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/\"},\"wordCount\":1335,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/06\/ciberseguridad-ataques-de-ruteo-junio-2020.jpg\",\"keywords\":[\"Routing\"],\"articleSection\":[\"Routing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/\",\"name\":\"LACNIC Blog | Routing Incidents as a Gateway for Cyberattacks\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/06\/ciberseguridad-ataques-de-ruteo-junio-2020.jpg\",\"datePublished\":\"2020-06-29T18:23:52+00:00\",\"dateModified\":\"2020-06-29T18:23:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/06\/ciberseguridad-ataques-de-ruteo-junio-2020.jpg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/06\/ciberseguridad-ataques-de-ruteo-junio-2020.jpg\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Routing Incidents as a Gateway for Cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | Routing Incidents as a Gateway for Cyberattacks","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | Routing Incidents as a Gateway for Cyberattacks","og_description":"Augusto Mathurin &#8211; FORT Project Consultant Today we are increasingly connected, and our digital and analog lives converge more and more each day. This phenomenon, which was already increasing at a considerable rate, was further accelerated by the crisis caused by the COVID-19 pandemic. A natural consequence of having more connected devices and people depending [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2020-06-29T18:23:52+00:00","article_modified_time":"2020-06-29T18:23:54+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/06\/ciberseguridad-ataques-de-ruteo-junio-2020.jpg","type":"image\/jpeg"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"Routing Incidents as a Gateway for Cyberattacks","datePublished":"2020-06-29T18:23:52+00:00","dateModified":"2020-06-29T18:23:54+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/"},"wordCount":1335,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/06\/ciberseguridad-ataques-de-ruteo-junio-2020.jpg","keywords":["Routing"],"articleSection":["Routing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/","url":"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/","name":"LACNIC Blog | Routing Incidents as a Gateway for Cyberattacks","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/06\/ciberseguridad-ataques-de-ruteo-junio-2020.jpg","datePublished":"2020-06-29T18:23:52+00:00","dateModified":"2020-06-29T18:23:54+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/06\/ciberseguridad-ataques-de-ruteo-junio-2020.jpg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/06\/ciberseguridad-ataques-de-ruteo-junio-2020.jpg","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/routing-incidents-as-a-gateway-for-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Routing Incidents as a Gateway for Cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2020\/06\/ciberseguridad-ataques-de-ruteo-junio-2020.jpg","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":13529,"post_title":"Los incidentes de ruteo como puerta de ingreso para los ciberataques","slug":"los-incidentes-de-ruteo-como-puerta-de-ingreso-para-los-ciberataques","href":"https:\/\/blog.lacnic.net\/los-incidentes-de-ruteo-como-puerta-de-ingreso-para-los-ciberataques\/"},{"locale":"pt_BR","id":13610,"post_title":"Os incidentes de roteamento como porta de acesso para os golpes cibern\u00e9ticos.","slug":"os-incidentes-de-roteamento-como-porta-de-acesso-para-os-golpes-ciberneticos","href":"https:\/\/blog.lacnic.net\/pt-br\/os-incidentes-de-roteamento-como-porta-de-acesso-para-os-golpes-ciberneticos\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/13582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=13582"}],"version-history":[{"count":1,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/13582\/revisions"}],"predecessor-version":[{"id":13583,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/13582\/revisions\/13583"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/13538"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=13582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=13582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=13582"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=13582"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=13582"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=13582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}