{"id":12678,"date":"2021-05-19T20:01:03","date_gmt":"2021-05-20T00:01:03","guid":{"rendered":"https:\/\/192.168.1.20\/wordpress\/?p=12678"},"modified":"2023-12-01T04:28:35","modified_gmt":"2023-12-01T04:28:35","slug":"the-perfect-crime-continues","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/2021\/05\/19\/the-perfect-crime-continues\/","title":{"rendered":"The perfect crime\u2026continued"},"content":{"rendered":"\n

The perfect crime\u2026continued<\/h2>\n\n\n\n

As we learned in my previous post,<\/a> even when route hijack attacks are given attention such as by Mutually Agreed Norms for Routing Security<\/a> (MANRS), there can exist an even more pernicious problem: packet duplication<\/strong>.<\/p>\n\n\n\n

Packet dups are the unspoken nightmare for system administrators. With packet dups, enterprises may never know that their data is being archived en mass. As the malicious actor duplicates the packets, they can send the original packets directly to their intended destination over the fastest path, while at the same time diverting duplicate packets to their own server. As far as the network administrator knows, the data arrived securely and intact. Even route tracing wouldn\u2019t detect that anything is awry. When the packet is duplicated and sent directly to the correct destination, the duplicate path cannot be detected and there is no way of knowing that fraud occurred.<\/p>\n\n\n\n

Think about this: As this mountain of content grows, much of it may be encrypted and stacked up in the new \u2018packet dup archives.\u2019 The bad actor can, at their leisure or when technologies allow, read and gain benefit from the most important content. Granted, there may be a lot of trash and everyday data to be sorted, but as artificial intelligence, machine learning and eventually quantum computing mature, bad actors will be able to decrypt, machine-read and reconstitute entire intellectual property databases. There are signs that these packet dup farms are already up and running, waiting for advancements that will unravel the many treasures that await.<\/p>\n\n\n\n

Packet dups is the gift that keeps on giving. Additional \u201cbenefits\u201d for the cybercriminal include:<\/p>\n\n\n\n