Nope. The issue (ssl certificate) is still entirely a Big Giant Fail(tm) on Let's Encrypt's part. If I can take over your DNS, I can effectively become your server and *poof* now I can those fools to sign a certificate for my stolen domain. Now, these guys didn't actually do that, so there actions where immediately evident.
Yes, they used BGP to announce more specific routes to parts of Amazon's DNS infrastructure so that traffic came to them. They were then in effective control of many domains, but apparently chose to hijack some cryptocurrency site.
There are plenty of ways to secure BGP, and routing in general. However, just like the locks on your house, they don't do you any good if you don't actually lock them. We have yet to see a BGP session be hijacked, or an external attack inject a rogue route into an established BGP session. What we DO see all the time are flaming idiots accepting whatever the hell someone advertises.