Cloudflare’s system detected and mitigated a 17.2 million request-per-second DDoS attack

cloudflare-review

Cloudflare says it stopped the largest DDoS attack ever reported!

Cloudflare claimed that its system was able to stop the largest DDoS attack reported in July. They explained in a blog post how the attack was 17.2 Million requests-per-second, which is three times more than any other one they have recorded.

Cloudflare’s Omer Yoachimik explained in a blog post that the company serves over 25 million HTTP requests per second on average in 2021 Q2, illustrating the enormity of the attack.

He said that the botnet was attacking a customer in the financial sector of Cloudflare. He said that it was able to reach Cloudflare’s edge with more than 330 million requests in less than a second.

cloudflare
cloudflare

“The attack traffic originated from more than 20,000 bots in 125 countries around the world. Based on the bots’ source IP addresses, almost 15% of the attack originated from Indonesia and another 17% from India and Brazil combined. Indicating that there may be many malware infected devices in those countries,” Yoachimik said.

“This 17.2 million rps attack is the largest HTTP DDoS attack that Cloudflare has ever seen to date and almost three times the size of any other reported HTTP DDoS attack. This specific botnet, however, has been seen at least twice over the past few weeks. Just last week it also targeted a different Cloudflare customer, a hosting provider, with an HTTP DDoS attack that peaked just below 8 million rps.”

Yoachimik pointed out that two weeks prior, a Mirai variant botnet had launched over a dozen UDP- and TCP-based DDoS attacks. These attacks peaked multiple times at 1 Tbps with a maximum peak of about 1.2 Tbps.

SEE ALSO:
Zoom Released New Update to Enhance Security Features

Customers of Cloudflare, including a gaming company as well as a major APAC-based telecommunications provider and hosting provider, are being attacked with attacks on the Magic Transit and Spectrum services along with the WAF/CDN service.

Yoachimik claims that the Mirai botnet generated significant attack traffic, despite being smaller than its original 30,000 bots.

“These attacks join the increase in Mirari-based DDoS attacks that we’ve observed on our network over the past weeks. In July alone, L3/4 Mirai attacks increased by 88% and L7 attacks by 9%,” Yoachimik said.

“Additionally, based on the current August per-day average of the Mirai attacks, we can expect L7 Mirai DDoS attacks and other similar botnet attacks to increase by 185% and L3/4 attacks by 71% by the end of the month.”

Cyberhaven CEO Howard Ting said that DDoS attacks have become a more serious problem. We should be expecting to see more of them.

He pointed out that botnets like Mirai, which launched the attack on Mirai, heavily depend on compromised IoT devices as well as other unmanaged devices.

“As the number of these devices grows, so too does the potential army for DDoS attacks,” Ting said.

Yoachimik stated that their autonomous edge DDoS protection systems detected the 17.2million attack. He also noted that their system is powered a software-defined, denial of service damon they call dosd.

SEE ALSO:
Cyberspy Party Nation-State Lowers Coin Miners as Diversion Strategy
Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post
Digital Marketing

Three Tech Marketing Trends To Rock With Right Now

Next Post
Udemy Acquired Online Leadership Development Platform

Udemy Acquired Online Leadership Development Platform CorpU

Related Posts