Global DDoS attack hits 3.8 Tbps

  • 441 Views
  • 3 mins read

During a large-scale distributed denial-of-service (DDoS) campaign targeting the financial services, internet, and telecommunications sectors, attacks reached an unprecedented peak of 3.8 terabits per second (Tbps), the highest recorded to date. This month-long assault consisted of over 100 hyper-volumetric DDoS attacks, which inundated network infrastructure with vast amounts of garbage data.

The mechanics of a volumetric DDoS attack

Volumetric DDoS attacks work by overwhelming the target with enormous volumes of data, leading to bandwidth consumption and resource exhaustion of applications and devices, ultimately cutting off access for legitimate users. Many attacks aimed at the network’s infrastructure exceeded two billion packets per second and three terabits per second, particularly affecting network and transport layers (L3/4).

According to Cloudflare researchers, the compromised devices were globally distributed, with concentrations in countries like Russia, Vietnam, the U.S., Brazil, and Spain. These devices, which included Asus routers, MikroTik systems, DVRs, and web servers, were exploited using the User Datagram Protocol (UDP), known for its fast data transfer speeds and lack of a formal connection.

DDoS packets delivered from all over the world (Cloudflare)

Before this record-breaking attack, Microsoft had held the defense record for mitigating a 3.47 Tbps attack against an Azure customer in Asia. Most DDoS attackers use botnets, or networks of infected devices, to launch these attacks or exploit methods to amplify data delivery. A report from Akamai also confirmed that newly disclosed CUPS vulnerabilities in Linux systems could be another major vector for future DDoS campaigns, with over 58,000 systems vulnerable.

Conclusion

While Cloudflare successfully mitigated the attacks autonomously, including one that peaked at 3.8 Tbps lasting for 65 seconds, these incidents highlight the evolving threat posed by DDoS campaigns. With attackers continuously exploring new methods and vulnerabilities, organizations must remain vigilant and prepared to defend against these large-scale disruptions.

 Join Our Monthly Newsletter

Get the latest news and popular articles to your inbox every month

We never send SPAM nor unsolicited emails

0 Comments

Leave a Reply

Your email address will not be published.

Replying to the message: View original

Hey visitor! Unlock access to featured articles, remove ads and much more - it's free.