The China Telecom BGP Hijack (2010)

On April 8, 2010, China Telecom (AS4134) announced approximately 50,000 IP prefixes belonging to networks it had no authority over. For roughly 18 minutes, traffic destined for the US Department of Defense, the Senate, NASA, the Department of Commerce, and dozens of Fortune 500 companies was rerouted through Chinese infrastructure. The incident remains one of the largest and most consequential BGP hijacks in internet history, and it exposed just how vulnerable the global routing system is to nation-state-level disruption.

What Happened on April 8, 2010

At approximately 15:50 UTC, a router within China Telecom's network began originating BGP announcements for roughly 50,000 prefixes that belonged to other networks around the world. These were not obscure or unused address blocks. They included prefixes assigned to:

The hijacked prefixes were propagated globally by China Telecom's upstream peers and transit providers. Because BGP routers accept announcements from their neighbors on trust, networks around the world updated their routing tables to send traffic for these prefixes toward AS4134 rather than the legitimate origins.

The event lasted approximately 18 minutes before the erroneous announcements were withdrawn and normal routing was restored.

Normal Routing vs. During the Hijack (April 8, 2010) NORMAL ROUTING US DoD Network AS721 US Transit/IX Tier 1 providers US Users/ISPs Domestic traffic Direct path DURING HIJACK (18 MINUTES) US DoD Network AS721 US Users/ISPs Dell, IBM, MSFT... China Telecom AS4134 ? Rerouted through China Traffic inspected? Forwarded to origin? ~50,000 prefixes hijacked

The Scale of the Hijack

To understand why this incident was so alarming, consider its sheer scope. Previous high-profile BGP hijacks had typically involved a single prefix or a small handful of routes. The 2008 Pakistan Telecom/YouTube incident involved one prefix. The China Telecom event involved approximately 50,000 prefixes simultaneously, spanning networks across every populated continent.

According to the US-China Economic and Security Review Commission's 2010 annual report to Congress, China Telecom's AS4134 announced prefixes covering approximately 15% of the internet's routable address space during the incident. The affected prefixes included routes from at least 170 countries, though the heaviest concentration was in US address space.

The report documented specific categories of affected networks:

How the Hijack Worked Technically

The mechanism behind the hijack was a straightforward exploitation of BGP's trust model. Here is how it unfolded, step by step:

Step 1: Prefix Origination

A router within China Telecom's autonomous system (AS4134) began originating BGP announcements for approximately 50,000 prefixes. In BGP terms, "originating" means the router advertised these prefixes as if AS4134 were the authoritative source — the network that legitimately owned those IP address blocks.

Step 2: Propagation via Peers and Transits

China Telecom is one of the largest ISPs in the world, with extensive peering relationships and transit connections to major international carriers. When AS4134 announced these prefixes, its peers and transit providers accepted the announcements and propagated them further. Each network that received the routes added its own ASN to the AS path and forwarded the announcements to its own peers.

Within minutes, the false routes had propagated across significant portions of the global routing table. Networks in the US, Europe, and Asia updated their forwarding tables to direct traffic for the hijacked prefixes toward China Telecom.

Step 3: Traffic Redirection

Once the hijacked routes were installed in routers worldwide, traffic that would normally flow directly between US networks — or between any two networks outside China — was instead routed through China Telecom's infrastructure. A user in Washington, DC, attempting to reach a DoD server in Virginia might have had their packets travel across the Pacific to China and (possibly) back.

BGP Hijack Propagation Timeline T+0 AS4134 begins announcing ~50k prefixes T+2m Peers accept routes, begin propagation T+5m Routes reach global routing table T+10m Peak impact: traffic actively rerouted T+18m Announcements withdrawn, routes converge ~18 minute window of active traffic redirection Affected Prefixes by Category US Commercial & ISP ~60% International ~25% .mil ~8% .gov ~7% Approximate distribution based on USCC report analysis

Step 4: Withdrawal

After approximately 18 minutes, the erroneous announcements were withdrawn. BGP routers globally converged back to the legitimate routes over the following minutes. Because BGP convergence is not instantaneous, some traffic may have continued to take suboptimal paths for a short period after the withdrawal.

Why BGP Made This Possible

The fundamental vulnerability that enabled this hijack is BGP's lack of authentication. When BGP was designed in 1989, the internet was a small, collegial network of academic and government institutions. The protocol was built on the assumption that every network operator could be trusted to announce only the prefixes they legitimately controlled.

Three properties of BGP made this particular hijack effective:

In 2010, RPKI was still in its infancy. Almost no networks had deployed Route Origin Authorizations (ROAs) for their prefixes, and even fewer networks were performing Route Origin Validation (ROV) on incoming routes. There was essentially no automated mechanism to detect or prevent this kind of mass hijack in real time.

The Debate: Accident or Intentional?

The nature and intent of the incident remain contested. There are two primary interpretations:

The "Accidental Leak" Theory

China Telecom and some network engineers argued that the incident was a routing leak — an internal route table or BGP configuration was accidentally propagated to external peers. This kind of accident is not uncommon in BGP operations. Internal routing policies, traffic engineering configurations, or static route entries can be inadvertently redistributed into eBGP sessions due to misconfiguration or software bugs.

Proponents of this theory point out that:

The "Intentional Hijack" Theory

The US-China Economic and Security Review Commission took a different view. Their 2010 report stated that China Telecom "ichanneled roughly 15 percent of the world's Internet traffic through Chinese servers for about 18 minutes." The report raised the possibility that the redirection could have been used to:

Skeptics of the accidental theory note that 50,000 prefixes is an unusually large number for an accidental leak, and that the specific set of prefixes included a disproportionate share of sensitive US government and military address space.

The Technical Reality

From a purely technical standpoint, it is difficult to distinguish an intentional hijack from a large-scale accidental leak. Both look identical in BGP data: an unauthorized AS originating prefixes it does not own. The intent is unknowable from the protocol data alone. What is indisputable is that the traffic was rerouted, and that AS4134 did announce prefixes it had no authority to announce.

What a Hijacked Route Looked Like in BGP LEGITIMATE ROUTE (before hijack) Prefix: 6.0.0.0/8 Origin: AS721 (DoD) Path: 2914 1239 721 VALID - traffic stays within US backbone HIJACKED ROUTE (during incident) Prefix: 6.0.0.0/8 Origin: AS4134 (China Telecom) Path: ... 4134 HIJACK - traffic rerouted through China Both routes exist simultaneously. Routers choose based on path length, local preference, and prefix specificity. No mechanism to verify which is legitimate.

Security Implications

Regardless of intent, the incident demonstrated several alarming capabilities and vulnerabilities:

Unencrypted Traffic Was Fully Exposed

In 2010, a large fraction of internet traffic was still unencrypted HTTP. Any unencrypted traffic that was rerouted through China Telecom's infrastructure could have been read, copied, or modified by any system with access to those routers. Email, web traffic, file transfers, and DNS queries were all potentially visible.

Even Encrypted Traffic Leaks Metadata

Even encrypted traffic (HTTPS, VPN tunnels, SSH) reveals metadata to the networks carrying it: source and destination IP addresses, packet sizes, timing patterns, and connection durations. A state-level actor with access to traffic flowing through its routers could perform traffic analysis to map communication patterns between sensitive networks without needing to break encryption.

A Man-in-the-Middle Position

If the rerouted traffic was forwarded to its original destination (rather than blackholed), the hijacking network would occupy a classic man-in-the-middle position. For unencrypted protocols, this allows reading and modification. For encrypted protocols with weak certificate validation, it could enable interception. Even for properly encrypted traffic, the ability to inject delays, drop specific packets, or perform selective denial of service exists.

No Detection Mechanism

Most end users and even many network operators had no real-time indication that their traffic was being rerouted. BGP monitoring services like RIPE RIS and RouteViews recorded the anomalous announcements, but there was no automated alerting system that notified affected prefix holders in real time. The incident was largely identified through retrospective analysis of BGP data archives.

The US-China Economic and Security Review Commission Report

The US-China Economic and Security Review Commission (USCC) highlighted the incident in their 2010 Annual Report to Congress. The commission's analysis raised it as a case study in the vulnerability of critical US communications infrastructure to disruption by foreign actors. Key points from the report included:

The report recommended that the US government invest in BGP security research and develop capabilities to detect and respond to routing anomalies affecting government networks.

China Telecom's Response

China Telecom denied any intentional wrongdoing and characterized the incident as a routing error. The company did not publish a detailed technical postmortem, which is common in BGP incidents — many network operators treat internal routing configurations as proprietary information and do not disclose the root cause of routing incidents publicly.

It is worth noting that AS4134 (CHINANET) is one of the largest autonomous systems in the world, serving hundreds of millions of users across China. Networks of this scale have complex internal routing configurations, and accidental leaks of internal routes into the global routing table, while serious, are a known failure mode in BGP operations.

This Was Not an Isolated Event

The 2010 incident was not the only time China Telecom's network was associated with routing anomalies. Researchers from the US Naval War College and Tel Aviv University published a paper in 2018 documenting systematic patterns of traffic interception by China Telecom over a period of years. The paper, "China's Maxim: Leave No Access Point Unexploited," documented multiple instances where traffic between North American networks was rerouted through China Telecom's points of presence in North America before being forwarded to China and back.

Some of the documented cases included:

These later incidents were more subtle than the 2010 event — involving fewer prefixes over longer durations — but they reinforced the concern that China Telecom's network was being used (intentionally or not) as a waypoint for traffic that had no logical reason to transit Chinese infrastructure.

Lessons for BGP Security

The China Telecom incident of 2010 became a landmark case study in BGP security. It drove several important developments in how the internet community thinks about and defends against routing hijacks:

1. RPKI Gained Urgency

RPKI (Resource Public Key Infrastructure) was already under development in 2010, but the China Telecom incident added urgency to its deployment. RPKI allows prefix holders to cryptographically sign Route Origin Authorizations (ROAs) that specify which autonomous system is authorized to announce their prefixes. Networks that perform Route Origin Validation (ROV) can then reject announcements from unauthorized origins.

If RPKI had been widely deployed in 2010, networks performing ROV would have rejected the hijacked routes because the ROAs for the affected prefixes would not have listed AS4134 as an authorized origin. Today, over 40% of global prefixes have valid ROAs, and major networks like Cloudflare, Google, and many Tier 1 providers enforce ROV.

2. BGP Monitoring Became Essential

The incident underscored the need for real-time BGP monitoring. Services like RIPE RIS, RouteViews, and commercial BGP monitoring platforms now provide alerts when anomalous route announcements are detected. Network operators can configure alerts for their own prefixes to detect hijacks within minutes.

A BGP looking glass is one of the simplest tools for checking whether your prefixes are being announced correctly. By querying a looking glass, you can verify the origin AS and AS path for any prefix and spot unauthorized announcements.

3. Prefix Filtering Practices Improved

The incident highlighted the importance of prefix filtering — the practice of configuring routers to only accept route announcements that are expected and verified. Internet Routing Registry (IRR) databases, which contain records of which ASes are authorized to announce which prefixes, saw increased adoption as operators built automated filter generation systems.

4. The Need for Path Validation

RPKI validates only the origin of a route. It cannot detect a hijack where the attacker includes the legitimate origin AS in a fabricated AS path. Emerging standards like ASPA (Autonomous System Provider Authorization) and BGPsec aim to provide path validation, ensuring that every hop in the AS path is authorized. These are still in early deployment.

BGP Security Evolution Since 2010 2010: At Time of Incident ✗ No RPKI deployment ✗ No origin validation ✗ Limited prefix filtering ✗ No real-time hijack alerts ✗ No path validation ✗ Low HTTPS adoption ✗ No MANRS framework Any AS could announce any prefix with no automated checks Today: Defenses in Place ✓ 40%+ prefixes have ROAs ✓ Major networks enforce ROV ✓ Automated IRR filtering ✓ Real-time BGP monitoring ○ ASPA/BGPsec emerging ✓ ~95% web traffic encrypted ✓ MANRS best practices Significant improvement, but BGP remains trust-based at its core

Could It Happen Again?

A hijack of the exact same scale and impact would be more difficult today, but not impossible. Several factors have changed since 2010:

That said, smaller-scale hijacks continue to occur. In 2022 and 2023, there were documented incidents of Russian networks announcing Ukrainian prefixes during the ongoing conflict, and cryptocurrency-related hijacks remain a persistent threat. BGP's trust-based architecture means that any network with upstream connectivity can announce any prefix — the defenses are improving, but the fundamental vulnerability persists.

Explore the Networks Involved

You can use the looking glass to examine the networks involved in the 2010 incident and see their current routing state:

Look up any of these ASNs to see their current prefixes, AS paths, RPKI status, and peering relationships. The routing data for these networks today reflects over a decade of security improvements since the 2010 incident — but the underlying protocol remains the same BGP that made the hijack possible.

Check your network's BGP security

Look up any IP address, prefix, or ASN to see its current BGP routes, origin AS, and RPKI validation status. Try the BGP Looking Glass

See BGP routing data in real time

Open Looking Glass
More Articles
The Pakistan YouTube BGP Hijack (2008)
The Facebook DNS Outage (October 2021)
The Cloudflare-Verizon BGP Leak (2019)
The AWS S3 Outage (February 2017)
The Dyn DNS DDoS Attack and Mirai Botnet (2016)
The CenturyLink/Level3 Flowspec Outage (2020)