Route legitimacy subversion and long‑term positioning

Undermine the trust fabric of inter‑domain routing so that the attacker’s routes are treated as normal and legitimate, even when they are not. This is about shaping the routing environment itself.

Phase 0 — Preconditions (this is why it takes a state)

This is not “hack a router”. This is play the system:

  • Influence registries, operators, policy discussions

  • Maintain operations over months or years

  • Absorb reputational risk quietly

Phase 1 — Legitimacy groundwork

Before any hijack, ensures the AS looks boring:

  • Stable routing history

  • No obvious leaks or flaps

  • Clean IRR objects

  • Plausible business relationships

Result: When this AS announces something odd later, people assume it is a mistake, not malice.

Phase 2 — Registry and policy manipulation (pre‑attack)

This is where routing governance is nudged.

  • Create or influence:

    • Route objects

    • Aut‑num policies

  • Delay or complicate:

    • RPKI adoption for specific prefixes

  • Encourage “flexible” routing policies downstream

No BGP UPDATEs yet. But the board is being set.

Phase 3 — Controlled origin confusion (control‑plane attack)

Now the actual BGP attack begins with intermittent origin manipulation:

  • Announce a prefix with:

    • A different origin AS

    • Plausible upstreams

  • Alternate between:

    • Legitimate‑looking origins

    • Withdrawals

Effect:

  • Route collectors see inconsistency

  • Operators get used to seeing multiple origins

  • Alerts become background noise

The anomaly becomes normalised.

Phase 4 — Opportunistic prefix takeover

Once confusion exists, escalate carefully.

Time prefix hijacks during instability. Act:

  • During maintenance windows

  • During unrelated outages

  • During global routing churn

Because everyone is already distracted and baselines are already polluted. The hijack blends in.

Phase 5 — Trust erosion without collapse

This chain does not aim to:

  • Break routing globally

  • Cause mass outages

Instead it causes:

  • Reduced confidence in routing data

  • Disagreement between sources

  • Operator fatigue

Result: Even correct alerts start getting ignored.

Phase 6 — Strategic advantage

Now tehre are options:

  • Easier future interception

  • Easier selective blackholing

  • Faster influence operations later

The real payload is future freedom of action.

Phase 7 — Persistence through institutional memory loss

People change jobs. Tickets get closed. Mailing lists move on. What remains:

  • Dirty baselines

  • Conflicting historical data

  • Shrugged‑off anomalies

The attacker keeps their feet on the table.

Why this is unambiguously nation‑state

  • Requires years, not days

  • Exploits governance, not software

  • Depends on social trust in routing communities

  • No direct profit motive

This is infrastructure geopolitics.