Here's a number that should terrify your security team: BGP hijacking attacks have been used to steal millions of dollars in cryptocurrency — not by breaking encryption, but by forging the certificate that proves a site is real. The victim sees the padlock. The URL looks right. HTTPS checks out. And they're already on an attacker's server.
This is the threat Crosslayer Labs was built to stop. And unusually for a YC security startup, the founders didn't stumble onto the problem — they invented the defense that's currently built into every major certificate authority on the internet.
That's a founding story you don't get to make up.
What They Build
Crosslayer Labs provides outside-in monitoring of internet infrastructure. Their platform continuously watches everything your web presence depends on: DNS records, BGP routing tables, TLS certificate issuance, and JavaScript supply chain. When something changes in a way that looks like an impersonation attack — a spoofed site, a hijacked route, a fraudulent cert — they catch it and give you a remediation path.
The target customer is any organization that gets impersonated. Healthcare providers watching for fake patient portals. Crypto exchanges that have already been burned by BGP attacks. Banks whose login pages get cloned for phishing. The pitch is simple: your perimeter firewall watches inbound traffic, but nobody watches what attackers build outside your network to look like you.
Business model is B2B SaaS — attack surface discovery, continuous monitoring, and security analytics. Pricing isn't public, which is table stakes for enterprise security. They offer a demo call and security assessment as the top-of-funnel entry point.
The Technical Problem They're Solving
To understand why Crosslayer Labs is interesting, you need to understand BGP hijacking and what it enables against TLS certificates.
BGP (Border Gateway Protocol) is the routing protocol that decides which path internet traffic takes between networks. It was designed in an era when you trusted every operator on the internet, which means it's trivially easy for a malicious network operator to advertise routes they don't own and intercept traffic. BGP hijacking has been documented for years — usually dismissed as a theoretical attack, periodically a practical catastrophe.
Here's where it gets clever: Certificate Authorities (CAs) like Let's Encrypt, DigiCert, and others verify you control a domain before issuing a certificate. The standard verification method is Domain Validation — the CA sends a challenge to your domain and checks for the response. If an attacker can BGP-hijack traffic between the CA's verification server and your domain, they can complete that challenge themselves and get a valid, trusted certificate for a domain they don't own.
A valid certificate for yourbank.com. Issued by a real CA. Trusted by every browser. Combined with DNS manipulation, that's enough to build a nearly perfect phishing site that defeats every standard warning sign users are trained to look for.
