Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025

Europol demonstrates $ 540 million in cryptocurrency fraud, arrests five suspects

June 30, 2025

Slide

June 30, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Cloudflare Prevents Largest DDoS Attack in History at 3.8 Tbit/s Targeting Global Sectors
Global Security

Cloudflare Prevents Largest DDoS Attack in History at 3.8 Tbit/s Targeting Global Sectors

AdminBy AdminOctober 4, 2024No Comments4 Mins Read
DDoS Attack
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


DDoS attack

Cloudflare has revealed that it mitigated a record distributed denial of service (DDoS) attack that peaked at 3.8 terabits per second (Tbps) and lasted 65 seconds.

A web infrastructure and security company said he fended off “more than a hundred hyper-volume L3/4 DDoS attacks for a month, many exceeding 2 billion packets per second (Bpps) and 3 terabits per second (Tbps).”

Hyper-volume L3/4 DDoS attacks have been ongoing since early September 2024, the report said, adding that they targeted numerous customers in the financial services, Internet and telecommunications industries. The activity has not been attributed to any specific threat.

The previous record for the largest volume DDoS attack was set by a peak throughput of 3.47 Tbit/s in November 2021targeting an unnamed Microsoft Azure customer in Asia.

Cyber ​​security

The attacks use the User Datagram Protocol (UDP) on a fixed port with a stream of packets originating from Vietnam, Russia, Brazil, Spain, and the United States. These include compromised MikroTik devices, video recorders and web servers.

Cloudflare said the high-bitrate attacks are likely coming from a large botnet containing infected ASUS home routers that are being exploited using a newly discovered critical flaw (CVE-2024-3080CVSS score: 9.8).

According to statistics According to attack surface management firm Censys, just over 157,000 ASUS router models were potentially affected by this vulnerability as of June 21, 2024. The majority of these devices are located in the US, Hong Kong and China.

DDoS attack

The company’s ultimate goal, according to Cloudflare, is to exhaust the target’s network bandwidth and CPU cycles, thereby preventing legitimate users from accessing the service.

“To defend against high packet rate attacks, you must be able to inspect and reject bad packets using as few CPU cycles as possible, leaving enough CPU to handle good packets,” the company said.

DDoS attack

“Many underpowered cloud services and the use of on-premise hardware are insufficient to protect against DDoS attacks of this size, as high bandwidth usage can clog Internet links and due to high packet rates that can cause embedded devices to fail.”

Banking, financial services and utilities are hot targets for DDoS attacks, experiencing a 55% spike in the past four years, according to network performance monitoring company NETSCOUT. In the first half of 2024 alone, volume attacks increased by 30%.

The surge in DDoS attacks, mainly due to hacking activities targeting global organizations and industries, has also been linked to using DNS-over-HTTPS (DoH) for command and control (C2) to make detection difficult.

“The trend toward implementing a distributed C2 botnet infrastructure that uses bots as control nodes further complicates defense efforts because not only inbound DDoS activity, but also outbound activity from bot-infected systems must be screened and blocked.” — NETSCOUT said.

Cyber ​​security

The development comes as Akamai revealed that recently disclosed Common UNIX Printing System (CUPS) vulnerabilities. on Linux can be a viable vector for mounting DDoS attacks with a 600x amplification factor in seconds.

The company’s analysis revealed that more than 58,000 (34%) of the approximately 198,000 devices available on the public Internet could be recruited to conduct DDoS attacks.

“The problem arises when an attacker sends a crafted packet specifying the target’s address as the printer to be added,” researchers Larry Cashdollar, Kyle Lefton, and Chad Seaman said.

DDoS attack

“For each packet sent, the vulnerable CUPS server will generate a larger and partially attacker-controlled IPP/HTTP request directed to the specified target. As a result, not only the target is affected, but the CUPS server host also becomes a victim as the attack consumes network bandwidth and CPU resources.”

There are an estimated 7,171 hosts that have CUPS services exposed over TCP and are vulnerable to CVE-2024-47176, Censys saidcalling it an underestimate because “more CUPS services appear to be available over UDP than over TCP”.

Organizations are advised to consider removing CUPS when printing functionality is not required and to block the service’s (UDP/631) ports with firewalls where they are accessible from the wider Internet.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025

Europol demonstrates $ 540 million in cryptocurrency fraud, arrests five suspects

June 30, 2025

Slide

June 30, 2025

Pragmatic approach to NHI stocks

June 30, 2025

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025

Europol demonstrates $ 540 million in cryptocurrency fraud, arrests five suspects

June 30, 2025

Slide

June 30, 2025

Pragmatic approach to NHI stocks

June 30, 2025

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025

From the theft of the browser to the intelligence collection instrument

June 28, 2025

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025

Europol demonstrates $ 540 million in cryptocurrency fraud, arrests five suspects

June 30, 2025

Slide

June 30, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.