BGP software • BGP Utilities • BGP Attack Tree Development and testing
BGP MiTM can redirect traffic from major networks such as Google or Facebook to some custom ISP network
This exact use case was presented a few years back at Defcon16 in a presentation titled “Stealing The Internet, An Internet-Scale Man In The Middle Attack”.
During this presentation the presenters, Tony Kapela and Alex Pilosov, demonstrated how one can launch a Man-in-The-Middle attack using CIAG BGP tools and redirect traffic for any destination from any location in the world by just introducing some new BGP announcements while staying relatively stealthy.