• Home
  • Contact Us !
  • Privacy Policy
Snipblog
  • Home
  • News
  • Mobile
  • Internet News
  • Social Media
  • Real Estate
  • Gadgets
  • Education
  • Technology
  • Finance
  • Car 2K17-2K18
No Result
View All Result
  • Home
  • News
  • Mobile
  • Internet News
  • Social Media
  • Real Estate
  • Gadgets
  • Education
  • Technology
  • Finance
  • Car 2K17-2K18
No Result
View All Result
Snipblog
No Result
View All Result
Home Internet News

Grand Theft Internet

souvik by souvik
February 25, 2016
in Internet News
0
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

internet theft.shutterstock_251313145

How much would it matter to you if all of a sudden your company’s Internet traffic started going somewhere else?  Maybe to your competitor, a criminal organization, or a foreign government?  Sound bad?

In my last article, “The Great Network Forgery,” I explained how the Internet infrastructure industry allows mass forgery of IP addresses. That digital identity theft allows botnets to exist, and the consequences plague us all.  Well, there’s another, grander sort of identity theft that the Internet also allows: theft of an entire organization’s Internet traffic.

How and why it happens

Consider the IP address on your laptop.  It’s handed out of a block of addresses to your laptop by your company’s network devices.  Your company’s ISP announces that block of addresses (a ‘route’) to the 60,000 telecom, enterprise, government, and education organizations networks that connect in a hierarchical mesh of routers and fiber, and *are* the Internet.

Each of those 60K Internet node organizations has a unique identifier called an “Autonomous System Number” (ASN), and uses the Internet standard Border Gateway Protocol (BGP), to announce routes to the rest of the Internet.

What happens when someone accidentally mis-configures one of their routers to announce another company’s routes?  The victim company’s Internet traffic can become “black-holed.” This actually happens on a regular basis.  Sometimes whole countries at the periphery of the Internet are taken offline accidentally.

And this has happened since the early days of the commercial Internet.  The reason: there is no authoritative list of who is allowed to announce which Internet routes.

What if It’s not a mistake?

If you’re someone like me who personally owns an ASN and announces routes from your house, you could theoretically steal the traffic from a corporate network by announcing or ‘hijacking’ that network’s routes with malice, or accidentally with a typo.

Route hijacking can form one basis for what’s called a “man in the middle” attack.  That ill-gotten traffic flows into the attacker’s network, and then they can create traffic “tunnels” to remote ISP(s) so that it keeps flowing to and fro on the Internet.  Then, it’s technically feasible to set up servers to insinuate themselves into every email, and hack into traffic sessions — even, in some cases, secure HTTP.  Or, to proxy email with a server that refuses to accept encrypted communication sessions.

[“Source-venturebeat”]

Tags: Grand TheftInternet
Previous Post

Sony Xperia C5 Ultra Dual

Next Post

Protecting the Open Internet

souvik

souvik

Next Post
Protecting the Open Internet

Protecting the Open Internet

  • Trending
  • Comments
  • Latest
The 3 Main Types of Scaffolding and What They are used for

The 3 Main Types of Scaffolding and What They are used for

December 18, 2016
Microsoft’s OneNote Can Now Help With Your Maths Homework

Microsoft’s OneNote Can Now Help With Your Maths Homework

September 3, 2016
A Brief History of Mayo Stands and Other Tools and Equipment

A Brief History of Mayo Stands and Other Tools and Equipment

October 25, 2016
Modest Fashion 2023: A Comprehensive Guide

Modest Fashion 2023: A Comprehensive Guide

May 26, 2023
Asus ZenFone 2 Variant With 4GB RAM, 16GB Inbuilt Storage Launched

Asus ZenFone 2 Variant With 4GB RAM, 16GB Inbuilt Storage Launched

0
Optical Fibre Laid in 68,000 Village Panchayats: Telecom Minister

Optical Fibre Laid in 68,000 Village Panchayats: Telecom Minister

0
iPhone 6s Sports 1.8GHz Dual-Core Apple A9 SoC in Certification Listing

iPhone 6s Sports 1.8GHz Dual-Core Apple A9 SoC in Certification Listing

0
Microsoft Targeting SMBs in Punjab, Haryana for Cloud Services

Microsoft Targeting SMBs in Punjab, Haryana for Cloud Services

0
How to Become Topper: 10 Easy Yet Practical Strategies

How to Become Topper: 10 Easy Yet Practical Strategies

May 30, 2025
You Could Use Some of Your Equity To Give Your Children the Gift of Home

You Could Use Some of Your Equity To Give Your Children the Gift of Home

May 20, 2025
Navigating Technological Challenges: How Redapt Can Drive Your Success

Navigating Technological Challenges: How Redapt Can Drive Your Success

May 10, 2025
7 benefits of mobile apps for businesses

7 benefits of mobile apps for businesses

May 5, 2025

Recent News

How to Become Topper: 10 Easy Yet Practical Strategies

How to Become Topper: 10 Easy Yet Practical Strategies

May 30, 2025
You Could Use Some of Your Equity To Give Your Children the Gift of Home

You Could Use Some of Your Equity To Give Your Children the Gift of Home

May 20, 2025
Navigating Technological Challenges: How Redapt Can Drive Your Success

Navigating Technological Challenges: How Redapt Can Drive Your Success

May 10, 2025
7 benefits of mobile apps for businesses

7 benefits of mobile apps for businesses

May 5, 2025
  • Home
  • Contact Us !
  • Privacy & Policy

No Result
View All Result
  • Home
  • News
  • Mobile
  • Internet News
  • Social Media
  • Real Estate
  • Gadgets
  • Education
  • Technology
  • Finance
  • Car 2K17-2K18