4.8 • 1K Ratings
🗓️ 9 November 2021
⏱️ 36 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hi and welcome to Cyber reasons Malicious Life besides I'm Ran Levy. In 2015, the US and China signed an agreement that stated that both countries would stop their military forces |
0:25.5 | from hacking and stealing information from each other. |
0:29.9 | Three years later, in 2018, a paper published by two researchers Dr. Chris Demchak from the Center |
0:37.0 | of Cyber Conflict Studies at the U.S. Naval War College and Dr. Yuvalchovit from Tel Aviv University's Naval Perundi following the 2015 agreement, a technique known as B.G.P. hijacking or I.P. hijacking. |
1:00.0 | In a nutshell, B.G.P. hijacking is when a malicious actor takes over a group of IP addresses |
1:06.4 | that belongs to someone else and forces the rerouting of all or most internet traffic to these addresses. |
1:14.7 | To steal an analogy from Cloudflare's explainer page on BGB hijacking, |
1:19.7 | it's like if someone were to change all the signs on a stretch of freeway and reroute road traffic |
1:26.1 | onto incorrect exits. In the paper, Chavit and Damchak, identify several such attacks by China in the past several years. |
1:36.5 | In 2016, for six straight months, communications between Canadian and Korean government networks were hijacked by China Telecom |
1:45.8 | and routed through China. In 2017, traffic from Sweden and Norway to a large American news organization in Japan was hijacked to China for about six weeks. |
1:59.0 | Russia might be doing the same. |
2:01.0 | In 2017, traffic for Google, Apple, Facebook, Microsoft, and several other |
2:07.0 | high-profile organizations was hijacked to Russia for two short periods of three minutes each. |
2:15.0 | What are the implications of BGB or IP hijacking? |
2:20.0 | According to Damchak and Duval's paper, this technique offers the attackers broad access to an organization's network, |
2:27.3 | allowing them to steal valuable data, add malicious implants to seemingly normal traffic, neutralize the organization's firewall, and much more. |
2:38.0 | I found IP hijacking to be an interesting topic not only because of its implications but because it also brings forth an aspect of our internet technology that we rarely think about. |
2:50.0 | Geography. Yes, geography. We tend to think of internet traffic as disconnected from the physical |
2:58.0 | space we occupy. That cyberspace somehow eliminates the distances between geographical points. |
3:05.9 | But as IP hijacking shows, and as you'll shortly learn, it turns out that geography still |
3:12.4 | matters even when it comes to the internet. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.