Cloudflare Experiences All-Time High DDoS Attack Reaching 26 Million Requests Per Second

Record-Breaking DDoS Attack Thwarted by Cloudflare

In a significant cybersecurity event, Cloudflare disclosed on Tuesday that it successfully mitigated a record-setting distributed denial-of-service (DDoS) attack that peaked at an astounding 26 million requests per second (RPS). This marks the largest HTTPS DDoS attack identified to date, showcasing the escalating scale of cyber threats.

The attack primarily targeted a customer utilizing Cloudflare’s basic Free plan, originating from a sophisticated botnet comprising over 5,000 devices. Each device was capable of generating nearly 5,200 requests per second, resulting in an overwhelming surge of more than 212 million HTTPS requests in less than half a minute. The assault was notable not only for its intensity but also for its geographical diversity, as requests originated from more than 1,500 networks across 121 countries, including major sources like the United States, Brazil, and India. Interestingly, approximately 3% of the total attack traffic was traced back to Tor nodes.

Omer Yoachimik, a representative from Cloudflare, highlighted that the majority of attack traffic was sourced from cloud service providers rather than traditional residential internet service providers. This distinction suggests that compromised virtual machines and robust servers were exploited to launch the attack, contrasting with less powerful Internet of Things (IoT) devices typically associated with smaller-scale DDoS incidents. The resources behind such an attack indicate a well-orchestrated operation that leverages high-capacity infrastructure for malicious purposes.

Online security protocols make HTTPS-based attacks particularly demanding from a computational standpoint due to the complexities involved in establishing secure TLS-encrypted connections. This factor not only heightens the challenge for defenders but also elevates the overall cost for attackers, adding a layer of complexity to the cyber threat landscape.

Cloudflare has previously reported similar trends, notably thwarting a 15.3 million RPS HTTPS DDoS attack targeting a crypto launchpad just a few months prior. Their Q1 2022 report indicated a staggering increase in volumetric DDoS attacks exceeding 100 gigabits per second, with a remarkable 645% rise recorded quarter-on-quarter. Such trends underscore the urgent need for robust cybersecurity measures among businesses, especially those reliant on online infrastructure.

The researchers noted that DDoS attacks can be classified based on their methodology. High bit-rate assaults aim to congest a network link, while high packet-rate attacks focus on overwhelming servers and hardware appliances. In both cases, the outcome is a denial-of-service event where legitimate user traffic is dropped, leading to significant service disruptions.

Given the sophisticated nature of the recent DDoS attack, several MITRE ATT&CK tactics may have been employed to facilitate its execution. Initial access could have been established through exploiting vulnerabilities in cloud services. Meanwhile, the heavy reliance on a botnet points towards persistence strategies that involve maintaining control over compromised devices. Privilege escalation may have also been a factor, allowing the perpetrators to maximize the attack’s overall impact by leveraging the capabilities of hijacked virtual machines.

As businesses navigate an increasingly perilous cyber landscape, these high-profile incidents serve as critical reminders of the imperative to adopt comprehensive security solutions. The evolution of DDoS attacks illustrates not only the growing threat posed by cyber adversaries but also the necessity for continuous vigilance and adaptive security strategies.

For the latest updates and insights on cybersecurity trends, follow us on platforms such as Google News, Twitter, and LinkedIn. Staying informed can provide essential context in an ever-evolving threat environment.

Source link