Threat Talks - Your Gateway to Cybersecurity Insights

BGP Vortex: Internet Kill Switch?


Listen Later

Could a single BGP trick really break the internet?

A new “BGP Vortex” claim says yes  - by abusing route oscillation and BGP communities to trigger endless update loops and exhaust router CPU. So we check what actually holds up in the real world.
In this Threat Talks Deep Dive, Rob Maas, Field CTO at ON2IT, sits down with Eric Nghia Nguyen Duy, Network Engineer at AMS-IX, to understand what BGP (short for Border Gateway Protocol) actually does, how the proposed Vortex mechanism works (route oscillation + community behavior), and why real-world internet operators are far more resilient than the headline suggests.
Yes, it’s an attention-grabbing claim.

No, it’s not a “break the whole internet tomorrow” button.

  • (00:00) - – 02:29 Introduction: The BGP Vortex Claim
  • (02:29) - - 06:35 What is BGP?
  • (06:35) - - 13:13 BGP Vortex: How it works
  • (13:13) - - 15:02 What an Attacker Would Actually Need
  • (15:02) - - 19:08 What can we do to prevent this
  • (19:08) - - 19:56 What role AMS-IX plays
  • (19:56) - – 22:01 Conclusion

  • Key topics covered
    • What BGP is and why the internet depends on it
    • How route oscillation and update amplification can overload routers
    • Why the attack relies on upstream policy choices (communities aren’t “magic”)
    • Why the “break the internet” claim is mostly theoretical
    • Practical mitigations: filtering/inspecting communities, monitoring, session shutdown

    Resources
    • BGP Vortex research paper: https://www.usenix.org/system/files/usenixsecurity25-stoeger.pdf 
    • BGP Vortex presentation video: https://www.youtube.com/watch?v=dd6L1mdQLmk
    • Threat Talks: https://threat-talks.com/
    • ON2IT (Zero Trust as a Service): https://on2it.net/
    • AMS-IX: https://www.ams-ix.net/ams

    Subscribe to Threat Talks and turn on notifications for deep dives into the world’s most active cyber threats and hands-on exploitation techniques.

    Click here to view the episode transcript.


    🔔 Follow and Support our channel! 🔔
    === 
    ► YOUTUBE: https://youtube.com/@ThreatTalks
    ► SPOTIFY: https://open.spotify.com/show/1SXUyUEndOeKYREvlAeD7E
    ► APPLE: https://podcasts.apple.com/us/podcast/threat-talks-your-gateway-to-cybersecurity-insights/id1725776520

    👕 Receive your Threat Talks T-shirt
    https://threat-talks.com/

    🗺️ Explore the Hack's Route in Detail 🗺️
    https://threat-talks.com

    🕵️ Threat Talks is a collaboration between @ON2IT and @AMS-IX

    ...more
    View all episodesView all episodes
    Download on the App Store

    Threat Talks - Your Gateway to Cybersecurity InsightsBy Threat Talks