Network Layer Protocol (IPv4 or IPv6)

BGP runs over IP (Internet Protocol). It can operate over both IPv4 (traditional BGP) and IPv6 (MP-BGP for multiprotocol support).

Attack tree: Compromise Internet Protocol (IP)

1. Initial Access [OR]

    1.1 Phishing & Social Engineering [OR]
    
        1.1.1 Spear Phishing (PDF/Excel malware)
        
        1.1.2 Business Email Compromise (BEC) with deepfake audio/video
        
        1.1.3 LinkedIn/Twitter impersonation for credential theft
        
    1.2 Exploiting Cloud Misconfigurations [OR]
    
        1.2.1 Exposed S3 buckets (AWS) or Azure Blob Storage
        
        1.2.2 Misconfigured GitHub/GitLab repos (API keys, credentials)
        
    1.3 Supply Chain Attacks [OR]
    
        1.3.1 Dependency confusion (malicious npm/PyPi packages) (2021)
        
        1.3.2 Compromised SaaS vendors (SolarWinds-style attacks)

2. Lateral Movement & Privilege Escalation [AND]

    2.1 Exploiting Zero-Day Vulnerabilities [OR]
    
        2.1.1 RCE in enterprise VPNs (Pulse Secure, Citrix CVE-2023-3519)
        
        2.1.2 Windows/Linux privilege escalation (Dirty Pipe, Log4Shell)
        
    2.2 Cloud Identity Attacks [OR]
    
        2.2.1 OAuth token hijacking (Microsoft/Azure AD)
        
        2.2.2 Shadow API abuse (undocumented cloud APIs)

3. Data Exfiltration [AND]

    3.1 Encrypted Exfiltration [OR]
    
        3.1.1 DNS tunneling (DoH/DoT for stealth)
        
        3.1.2 Legitimate cloud services (Dropbox, Google Drive, Slack)
        
    3.2 Insider Threats [OR]
    
        3.2.1 Rogue employees using USB exfiltration (Rubber Ducky attacks)
        
        3.2.2 Compromised contractors with excessive access

4. Persistence & Evasion [OR]

    4.1 Fileless Malware [OR]
    
        4.1.1 PowerShell/Cobalt Strike in-memory execution
        
        4.1.2 Linux rootkits (Symbiote, 2022)
        
    4.2 Cloud Backdoors [AND]
    
        4.2.1 Malicious Lambda functions (AWS)
        
        4.2.2 Hidden service accounts in Google Workspace

5. Counter-Forensics [OR]

    5.1 Log Manipulation [OR]
    
        5.1.1 SIEM poisoning (fake logs)
        
        5.1.2 Deleting AWS CloudTrail logs
        
    5.2 AI-Assisted Evasion [AND]
    
        5.2.1 AI-generated fake traffic (mimicking normal behaviour)
        
        5.2.2 Deepfake video calls to bypass MFA (2023+)

IP spoofing & DDoS amplification

Attack Pattern: Attackers forge source IP addresses to launch reflection/amplification attacks (e.g., using UDP-based protocols like DNS, NTP, or even TCP middlebox abuse).

Example (2022): The “APT28 TCP Amplification DDoS” abused misconfigured firewalls and load balancers to reflect SYN-ACK packets, generating multi-Tbps attacks against Ukrainian and Western targets.

Why It Works: Many networks still allow source IP spoofing due to weak BCP38 (anti-spoofing) enforcement.

Mitigation

  • Network-level filtering (BCP38/84) to block spoofed packets.

  • Cloud-based DDoS scrubbing (AWS Shield, Cloudflare Magic Transit).

BGP hijacking & route leaks

Attack Pattern: Attackers manipulate BGP routing to redirect traffic through malicious networks for interception or DoS.

Examples:

  • 2021: Russian ISP “DDoS-Guard” hijacked Western financial traffic.

  • 2023: A Chinese state-linked group rerouted US military traffic through China Telecom.

Why It Works: BGP lacks cryptographic authentication, making route manipulation easy.

Mitigation

  • RPKI (Resource Public Key Infrastructure) for route origin validation.

  • BGP monitoring (e.g., Cloudflare Radar, BGPMon).

IP fragmentation attacks (Teardrop, Ping of Death Revisited)

Attack Pattern: Exploiting fragmentation reassembly flaws in network stacks to crash systems.

Example (2023): A variant of Ping of Death resurfaced in IoT devices, causing kernel panics in Linux-based systems.

Why It Works: Some devices still mishandle overlapping fragments or malformed packets.

Mitigation

  • Patch systems (e.g., Linux net.ipv4.ipfrag_high_thresh tuning).

  • Stateful firewalls to drop malicious fragments.

ICMP ause (Smurf, flooding, covert channels)

Attack Pattern

  • ICMP floods (e.g., Smurf attacks) or ICMP tunneling for data exfiltration.

  • Example (2022): A Russian APT group used ICMP tunnels to bypass network monitoring in a cyber-espionage campaign.

Why It Works: Many networks allow unrestricted ICMP for diagnostics.

Mitigation

  • Rate-limiting ICMP at network edges.

  • Deep Packet Inspection (DPI) to detect tunneling.

IPv6 exploitation (Flooding, SLAAC attacks)

Attack Pattern

  • IPv6 DDoS: Attackers abuse large IPv6 neighbor discovery (ND) packets to overwhelm routers.

  • SLAAC Attacks: Spoofing IPv6 router advertisements (RAs) to hijack traffic.

Example (2023): A Mirai-variant botnet launched IPv6-based floods against ISPs.

Why It Works: Many networks lack IPv6 security controls.

Mitigation

  • RA Guard to block rogue IPv6 advertisements.

  • IPv6-specific DDoS protections (e.g., AWS Shield Advanced).

TTL expiry attacks (Resource exhaustion)

Attack Pattern: Attackers send packets with low TTL values, forcing routers to generate ICMP Time Exceeded messages, overwhelming infrastructure.

Example (2024): A cryptocurrency exchange was hit by a TTL-based attack, disrupting API services.

Why It Works: Many networks don’t rate-limit ICMP responses.

Mitigation

  • Rate-limiting ICMP Time Exceeded messages.

  • Filtering packets with TTL=1 at the edge.

Geolocation spoofing (Evasion & Censorship bypass)

Attack Pattern: Attackers fake IP geolocation to bypass geo-blocks or evade detection.

Example (2023): A ransomware group used cloud proxies to mask origins as legitimate US IPs.

Why It Works: Many geo-IP databases are outdated.

Mitigation

  • Strict ASN-based filtering (e.g., only allow traffic from known cloud providers).

  • Behavioral analysis (unusual traffic patterns from “legit” IPs).

Defence recommendations

For Networks:

  • Deploy RPKI + BGP monitoring.

  • Enforce strict anti-spoofing (BCP38).

  • Rate-limit ICMP & TTL expiry packets.

For Enterprises:

  • Use DDoS-protected cloud services.

  • Patch IP stack vulnerabilities (e.g., Linux kernel updates).

For Governments/Critical Infra: Mandate BGP security (MANRS compliance).

Emerging tech

  • Confidential Computing (for example Intel SGX, Azure Confidential VMs) to protect IP in use.

  • Post-Quantum Cryptography Prep (NIST’s CRYSTALS-Kyber for future-proofing).