The Rostelecom BGP Hijacks (2020)

On April 1, 2020, Rostelecom (AS12389) -- Russia's state-owned telecommunications provider -- began announcing more-specific BGP prefixes for over 200 networks including Google, Amazon, Cloudflare, Facebook, Akamai, and Apple. For approximately one hour, traffic destined for some of the world's largest internet services was rerouted through Russian infrastructure. This was not an isolated event -- Rostelecom had prior hijacking incidents in 2017 and 2019 -- and it reignited the debate about whether BGP hijacks by state-backed operators represent genuine misconfigurations or deliberate surveillance capability testing.

What Happened on April 1, 2020

At approximately 19:28 UTC on April 1, 2020, BGP route collectors observed AS12389 (Rostelecom) originating prefixes belonging to more than 200 autonomous systems. The hijacked prefixes were more-specific routes -- longer prefix lengths that override the legitimate, less-specific announcements from the actual owners under BGP's longest prefix match rule.

Among the affected networks:

The hijack lasted roughly one hour before the illegitimate announcements were withdrawn. During this window, traffic from networks that accepted these routes was diverted through Rostelecom's infrastructure in Russia before potentially being forwarded to the legitimate destination -- or dropped entirely.

Normal Routing vs. Rostelecom Hijack Normal routing: User / ISP Transit Providers Google / AWS / Cloudflare /16 During hijack: User / ISP Rostelecom AS12389 Google / AWS / Cloudflare /24 (hijacked) forwarded? Why the hijack wins: Legitimate: Google announces 8.8.0.0/16 (origin AS15169) Hijacked: Rostelecom announces 8.8.8.0/24 (origin AS12389) BGP longest-prefix-match: /24 is more specific than /16 Routers prefer the /24 --> traffic goes to Rostelecom

The Mechanics: More-Specific Prefix Hijacking

The technique Rostelecom used is the most effective form of BGP hijacking: announcing more-specific prefixes. Here is why it works.

BGP routers select routes using the longest prefix match rule. If a router's table contains both 8.8.0.0/16 (from Google) and 8.8.8.0/24 (from Rostelecom), any packet destined for an address in 8.8.8.0/24 will follow the /24 route -- because it is more specific. The legitimate /16 announcement, while still present, is simply not consulted for addresses that fall within the hijacked /24.

This makes more-specific hijacks particularly dangerous:

In Rostelecom's case, the hijacked prefixes were typically /24s covering portions of larger blocks announced by the affected providers. Because most networks globally filter prefixes longer than /24 for IPv4, the /24 was the most specific route Rostelecom could announce and still have it propagate widely.

Scale and Scope of the Attack

What set the April 2020 incident apart from typical BGP hijacks was its sheer scale. Over 200 distinct autonomous systems were affected simultaneously. BGPStream, RIPE RIS, and multiple independent monitoring services detected the anomaly within minutes.

The affected networks read like a directory of the internet's critical infrastructure:

The breadth of affected prefixes suggested this was not a simple fat-finger misconfiguration of one or two routes. The hijacked prefixes spanned diverse address ranges belonging to unrelated organizations across multiple continents.

Affected Networks (April 1, 2020) Rostelecom AS12389 Google AS15169 AWS AS16509 Cloudflare AS13335 Facebook AS32934 Akamai AS20940 Apple AS714 Microsoft AS8075 Netflix AS2906 + over 200 additional networks affected

Rostelecom's History of BGP Incidents

The April 2020 hijack was not Rostelecom's first. The company, which is majority-owned by the Russian government and serves as the country's largest telecommunications provider, has a documented pattern of BGP anomalies:

2017: Financial Services Hijack

In April 2017, Rostelecom hijacked prefixes belonging to several major financial institutions, including Visa, Mastercard, and HSBC. Traffic destined for these networks was routed through Rostelecom's infrastructure for approximately seven minutes. The hijacked prefixes were again more-specific routes, and the incident affected payment processing networks during business hours. BGPMon and Oracle's Internet Intelligence team documented the event.

2019: Google Traffic Rerouted

In November 2019, Google (AS15169) traffic was rerouted through Rostelecom for roughly one hour. The incident primarily affected users in parts of Asia and Europe. Traffic to Google services -- including search, Gmail, and YouTube -- traversed Russian infrastructure before reaching its intended destination. Google confirmed the anomaly but did not attribute intent.

2020: The 200+ Network Incident

The April 2020 event was by far the largest. The number of affected networks jumped from a handful in prior incidents to over 200, suggesting either a more ambitious operation or a more catastrophic misconfiguration -- depending on which explanation one finds credible.

This pattern of repeated incidents involving a state-controlled provider, each growing in scope, is what makes the Rostelecom case particularly significant in the history of BGP security.

Accident or Intentional? The Debate

Rostelecom's official explanation was that the hijack resulted from an internal traffic optimization system that accidentally leaked routes to the global internet. According to the company, a system designed to manage internal traffic engineering announced the prefixes to external peers due to a software error.

This explanation has both supporters and skeptics in the network operations community.

The Case for Accidental Misconfiguration

The Case for Intentional Activity

The truth may never be definitively established. What is clear is that the incident demonstrated the feasibility of large-scale traffic interception through BGP manipulation by a state-backed operator.

Technical Impact: What Happens to Hijacked Traffic

When a BGP hijack succeeds, the hijacker's network receives traffic that was meant for the legitimate destination. The hijacker then has several options:

During the April 2020 Rostelecom incident, monitoring services observed that some hijacked traffic was being forwarded to the legitimate destination after passing through Rostelecom's network. This "pass-through" behavior is more consistent with an interception scenario than a simple blackhole, though it could also result from a misconfigured system that happened to have routes to the real destinations.

Traffic Flow During BGP Hijack User ISP Rostelecom INSPECT Destination Three possible outcomes for hijacked traffic: 1. Blackhole Traffic dropped. Service goes offline. 2. Inspect + Forward Copy metadata, then forward to real dest. 3. MITM Attack Modify unencrypted traffic in transit. TLS encryption protects payload content in scenarios 2 and 3, but metadata (IPs, SNI hostnames, timing, volume) is exposed. The April 2020 hijack showed forwarding behavior (scenario 2).

Detection and Response

The hijack was detected within minutes by multiple BGP monitoring services:

However, detection is not the same as mitigation. Even after the hijack was identified, remediation required Rostelecom to withdraw the routes. Networks that had deployed RPKI Route Origin Validation were partially protected -- they could reject the hijacked announcements because the routes were RPKI-invalid (the ROA for those prefixes specified a different origin AS). But in April 2020, RPKI adoption was still limited, and many networks were not performing route origin validation.

The incident resolution timeline:

Why RPKI Could Have Prevented This

RPKI is the primary defense against origin-based BGP hijacks. If every network along the path had enforced RPKI Route Origin Validation, the Rostelecom hijack would have been automatically rejected.

Here is why: each of the affected providers (Google, AWS, Cloudflare, etc.) had published Route Origin Authorizations (ROAs) specifying that only their AS was authorized to originate their prefixes, with a maximum prefix length. When Rostelecom announced those same prefixes with AS12389 as the origin, any router performing ROV would have marked those routes as RPKI Invalid and dropped them.

The problem in 2020 was twofold:

Since 2020, RPKI adoption has accelerated dramatically. Major transit providers including Lumen (AS3356), NTT (AS2914), and Arelion (AS1299) now perform ROV. Cloud and CDN providers have expanded their ROA coverage. But gaps remain, and RPKI only validates the origin AS -- it does not verify the full AS path, leaving room for more sophisticated path manipulation attacks.

RPKI Defense Against BGP Hijack Without RPKI enforcement: ISP Router 8.8.8.0/24 via AS12389 No validation -- ACCEPTED Traffic hijacked With RPKI enforcement: ISP Router 8.8.8.0/24 via AS12389 ROA says AS15169 -- REJECTED X 8.8.8.0/24 via AS15169 ROA matches -- VALID Traffic reaches Google ROA: "Only AS15169 may originate 8.8.8.0/24 (maxLength /24)"

The Broader Problem: State-Level BGP Threats

The Rostelecom incident is part of a broader pattern of state-affiliated BGP anomalies that have been documented over the past two decades:

State-level BGP threats are uniquely dangerous because:

MANRS and Industry Response

The Rostelecom hijack gave renewed urgency to MANRS (Mutually Agreed Norms for Routing Security), an industry initiative coordinated by the Internet Society. MANRS participants commit to four actions:

  1. Filtering -- Preventing propagation of incorrect routing information by validating BGP announcements against IRR (Internet Routing Registry) data and RPKI
  2. Anti-spoofing -- Preventing traffic with spoofed source IP addresses from leaving the network
  3. Coordination -- Maintaining up-to-date contact information and responding promptly to routing incidents
  4. Global validation -- Publishing routing data (ROAs, IRR entries) so others can validate announcements

As of 2025, over 1,000 network operators have joined MANRS. However, participation is voluntary, and some of the world's largest networks -- including many state-owned telecoms -- have not committed to these norms.

Beyond MANRS, the incident accelerated several concrete changes across the industry:

Lessons for Network Operators

The Rostelecom hijack underscores several practical lessons for anyone operating an autonomous system:

Investigate the Networks Involved

You can explore the routing data for all the key networks involved in the Rostelecom hijack using the looking glass. Check their current BGP announcements, AS paths, RPKI status, and peering relationships:

See BGP routing data in real time

Open Looking Glass
More Articles
The Pakistan YouTube BGP Hijack (2008)
The Facebook DNS Outage (October 2021)
The Cloudflare-Verizon BGP Leak (2019)
The AWS S3 Outage (February 2017)
The Dyn DNS DDoS Attack and Mirai Botnet (2016)
The CenturyLink/Level3 Flowspec Outage (2020)