Record DDoS pummels site with once-unimaginable 7.3Tbps of junk traffic

Date:

Share:

Large-scale attacks designed to bring down Internet services by sending them more traffic than they can process keep getting bigger, with the largest one yet, measured at 7.3 terabits per second, being reported Friday by Internet security and performance provider Cloudflare.

The 7.3Tbps attack amounted to 37.4 terabytes of junk traffic that hit the target in just 45 seconds. That’s an almost incomprehensible amount of data, equivalent to more than 9,300 full-length HD movies or 7,500 hours of HD streaming content in well under a minute.

Indiscriminate target bombing

Cloudflare said the attackers “carpet bombed” an average of nearly 22,000 destination ports of a single IP address belonging to the target, identified only as a Cloudflare customer. A total of 34,500 ports were targeted, indicating the thoroughness and well-engineered nature of the attack.

The vast majority of the attack was delivered in the form of User Datagram Protocol packets. Legitimate UDP-based transmissions are used in especially time-sensitive communications, such as those for video playback, gaming applications, and DNS lookups. It speeds up communications by not formally establishing a connection before data is transferred. Unlike the more common Transmission Control Protocol, UDP doesn’t wait for a connection between two computers to be established through a handshake and doesn’t check whether data is properly received by the other party. Instead, it immediately sends data from one machine to another.

UDP flood attacks send extremely high volumes of packets to random or specific ports on the target IP. Such floods can saturate the target’s Internet link or overwhelm internal resources with more packets than they can handle.

Since UDP doesn’t require a handshake, attackers can use it to flood a targeted server with torrents of traffic without first obtaining the server’s permission to begin the transmission. UDP floods typically send large numbers of datagrams to multiple ports on the target system. The target system, in turn, must send an equal number of data packets back to indicate the ports aren’t reachable. Eventually, the target system buckles under the strain, resulting in legitimate traffic being denied.

Source link

Subscribe to our magazine

━ more like this

‘I wish the stones here could talk’: an epic hike through Kosovo’s Accursed mountains | Kosovo holidays

There are stone bunkers shrouded in the mist on the hillside to my right, just shy of the ridgeline marking the Albanian-Kosovo border. To...

I’m Ensorcelled by Books by Friends

I love books. I love reading. I love reading books.Ensorcelled by Eliot Peper is genius. It’s a unique format that can be read in...

‘I worked at a place that gave you “points”… Every sick day:’ Employees share the most non-functional sick leave policies they’ve had to work...

Employees are sharing some of the most ridiculous sick leave policies they have had to work with and they make you want to smack...

I Tried Taylor Swift’s Viral Corset Outfits—See How They Fit

While each product featured is independently selected by our editors, we may include paid promotion. If you buy something through our links, we may...

Analog(ue) #202: Over Before it Begins

#202: Over Before it Begins June 19th, 2022 · 81 minutes Haven't you heard? Myke had COVID. This episode of Analog(ue) is sponsored by: Fitbod: Get stronger, faster with a fitness plan...