- PDF Association dunks on Mueller report PDF Friday 7:33 PM
- Robert Downey Jr. says ‘Endgame’ finale is ‘best 8 minutes’ of any MCU film Friday 4:42 PM
- Elizabeth Warren calls on Congress to impeach Trump Friday 3:43 PM
- BlackBerry Messenger is still a thing—but not for much longer Friday 2:56 PM
- Matt Gaetz hires speechwriter fired by White House for attending white nationalist event Friday 1:33 PM
- Here’s why Elon Musk is a sheep on Twitter Friday 12:14 PM
- Trump is already running Facebook ads on the Mueller report Friday 12:07 PM
- 20 thoughtful gifts grads actually want Friday 12:00 PM
- 7 of the best psychological thriller movies on Shudder Friday 11:44 AM
- Seth Abramson’s epic Mueller thread finally comes to a conclusion Friday 11:40 AM
- Netflix is testing out a random play feature Friday 11:28 AM
- Teen star Danielle Cohn faked pregnancy for YouTube prank Friday 10:55 AM
- How to watch ‘A Discovery of Witches’ for free Friday 10:42 AM
- Rev up your own family rivalries with these ‘Game of Thrones’ board games Friday 10:29 AM
- Mueller’s ‘harm to ongoing matter’ is the best way to stay silent about your life Friday 10:21 AM
The incident, known as “BGP hijacking,” refers to a technique in which the internet’s Border Gateway Protocol is exploited to change where network traffic travels.
According to cloud security company ThousandEyes, the issue lasted roughly two hours and caused internet traffic to go through numerous locations including Nigeria, Russia, and China.
The issue “caused a massive denial of service to G Suite and Google Search” and also “put valuable Google traffic in the hands of ISPs in countries with a long history of internet surveillance,” a blog post from ThousandEyes said.
Despite concerns over what appeared to be malicious behavior, Google responded by stating that it did not see any evidence that the hijacking was intentional.
The Nigerian ISP, MainOne, alleged that the issue was inadvertent and caused by a misconfiguration during a planned network upgrade.
“The error was corrected within 74 minutes and processes put in place to avoid reoccurrence,” MainOne said.
We have investigated the advertisement of @Google prefixes through one of our upstream partners. This was an error during a planned network upgrade due to a misconfiguration on our BGP filters. The error was corrected within 74mins & processes put in place to avoid reoccurrence
— MainOne (@Mainoneservice) November 13, 2018
Google also argued that the traffic, despite temporarily going through hostile countries, was protected due to widespread encryption.
A recent transparency report noted that 94 percent of traffic to Google services is encrypted.
Monday’s incident comes only months after the release of a study from the U.S. Naval War College and Tel Aviv University accusing China of regularly hijacking U.S. internet traffic.
Mikael Thalen is a freelance journalist based in Seattle, covering all things technology, including social media, data breaches, hackers, and more.