Man-in-the-middle attack over internet

man-in-the-middle

I'm interested in understand the mechanism of man-in-the-middle attack. I know that, in a LAN scenario, in order to do an MitM attack, an attacker usually changes the routing table of the targeted devices (ARP poisoning). But in an internet context, is possible to perform a man-in-the-middle attack?

Best Answer

This is indeed possible, and called "{BGP|IP|route|prefix} hijacking".

These attacks are however more complicated than a lan mitm, but not very stealth.

On April 8th, 2010, a chinese ISP announced A LOT of prefixes, and this was seen by bgp probes all over the world.

Wired has a good article describing it, and you can also read the wikipedia entry.