Google Traffic Temporarily Rerouted via Russia, China
The incident, which Google reports is now resolved, could be the result of either technical mistakes or malicious activity.
Google users experienced connectivity issues yesterday when online traffic destined for Google services was rerouted through networks in Russia, China, and Nigeria. While the incident has since been resolved, Google has launched an investigation to determine its cause.
On Nov. 12 between 1PM-2:23PM PST, analysts at Internet research company ThousandEyes had problems connecting with G Suite. Closer inspection revealed everyone at ThousandEyes' office was having the same issue, which also extended to Google Search and Google Analytics.
Traffic intended for Google, it seemed, was getting dropped at China Telecom. Several ThousandEyes vantage points around the world showed similarly strange traffic patterns, all culminating at China Telecom, writes Ameet Naik, technical marketing manager, in a blog post.
In addition to China Telecom, researchers noticed traffic being rerouted to TransTelecom, a Russian network provider, and MainOne, a small ISP based in Nigeria. Most of the traffic was being directed to China, ThousandEyes reports. Its surveillance shows the origin of this leak was the BGP peering relationship between MainOne and China Telecom, says Naik.
"This incident at a minimum caused a massive denial of service to G Suite and Google Search," Naik explains. "However, this also put valuable Google traffic in the hands of ISPs in countries with a long history of Internet surveillance."
Google addressed the problem on its Cloud Stats Dash and reported services were not compromised in the incident. It has not found evidence this attack was malicious – and, as the Wall Street Journal points out, this could be the result of a cyberattack or an error in system configuration.
Naik says overall, this problem "further underscores one of the fundamental weaknesses in the fabric of the Internet." BGP was designed to rely on the mutual trust between ISPs and universities to exchange information, and it hasn't been updated to reflect the commercial and geopolitical relationships that exist between nations and service providers on today's Internet.
He advises companies to monitor their BGP routes so they can quickly detect issues like these and minimize the effect on their business. BGP-related incidents have occurred recently, he adds, pointing to the April 2018 cryptocurrency heist involving the hijack of a DNS provider.
Related Content:
Black Hat Europe returns to London Dec 3-6 2018 with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.
About the Author
You May Also Like