A BGP hijacking incident that I think indicates a larger problem.
In September 2022, someone BGP hijacked a cryptocurrency thing called Celer Network Bridge.
They got a valid TLS certificate for an imposter website by paying $18 and stole $235,000 in three hours
https://www.coinbase.com/blog/celer-bridge-incident-analysis
If a service is doing proper encryption and cryptographic authentication then a BGP hijack should just result in the service not working, but it seems that just seeing https in your browser is not a guarantee of that.
The operator of a website can, if they choose, do extra work to configure CAA to make it harder for an imposter website to show valid https but end users are never aware if that has been done. People putting together a website just think "showing ok in a browser and the free certificate is auto-renewing, great, it's all good".
Last year 'someone' put a man-in-the-middle proxy in front of the jabber.ru server in a Hetzner datacenter in Germany, it was noticed six months later when the certificate it was using expired.