OREANDA-NEWS  In 2022, the number of autonomous networks of Russian telecom operators that were involved in traffic interception has halved. Such incidents may occur by mistake of the operator himself or as a result of a deliberate attack by intruders and lead to the unavailability of Internet resources. The positive result was affected by increased security on provider networks, as well as the departure of foreign companies that loaded the networks with the transfer of a large amount of information to the parent structures abroad, experts say. Kommersant got acquainted with the data of Qrator Labs specializing in cybersecurity on the interception of traffic of Russian autonomous systems consisting of IP networks and routers controlled by one or more telecom operators.

It follows from them that 2.5 thousand systems were affected by interceptions last year, almost half as many as in 2021. In 2020, the problem affected 3.6 thousand, and in 2019 - 4.7 thousand systems.

Last spring, after the outbreak of hostilities in Ukraine, experts recorded several large-scale incidents of interception of traffic from Russian Internet providers by Ukrainian operators. For example, Lurenet pulled the traffic of networks owned by Rostelecom, MegaFon, Vimpelcom, MTS and Transtelecom (TTK), among others. Due to the attack, services based on these networks were unavailable from different countries for ten hours (see Kommersant of April 24, 2022). Then the incident affected 146 autonomous systems. Vimpelcom, MegaFon and Transtelecom declined to comment.