Aggressive DDoS Attack – Over 700 Mpps Attack Traffic to Cripple Target Organization

Akamai identified a new Record-Breaking DDoS assault in Europe with attack traffic spiking to 704.8 Mpps to cripple the organization’s business operations.

“On Monday, September 12, 2022, Akamai successfully detected and mitigated the now-largest DDoS attack ever launched against a European customer on the Prolexic platform, with attack traffic abruptly spiking to 704.8 Mpps in an aggressive attempt to cripple the organization’s business operations”, reads the analysis published by Akamai.

Akamai stated that the recent attack originate from same threat actor behind that Akamai blocked in July. Notably, it attacked the same customer.

Aggressive DDoS Attack

“Distributed Denial-of-Service (DDoS) Attack” is a cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online services and sites.

Comparison of the two massive DDoS attacks

While comparing, the number of cumulative attacks was 75 in July and in September it jumped up to 201. Also, in this recent attack the attackers launched the attack against 6 data center locations from Europe to North America.

These attacks culminated at extraordinary levels on September 12, when the “garbage” traffic sent to the target network peaked at 704.8 Mpps, about 7% higher than the July attack.

“The attackers’ command and control system had no delay in activating the multidestination attack, which escalated in 60 seconds from 100 to 1,813 IPs active per minute”, Akamai.

IP count diagram

The company secured all of its 12 data centers, reports say nearly 99.8% of the malicious traffic being pre-mitigated.

“Having a proven DDoS mitigation strategy and platform in place is imperative for shielding your business from downtime and disruption”, concludes the report.

Download Free SWG – Secure Web Filtering – E-book

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Lotus Blossom Hacker Group Uses Dropbox, Twitter, and Zimbra for C2 Communications

The Lotus Blossom hacker group, also known as Spring Dragon, Billbug, or Thrip, has been…

5 hours ago

Squidoor: Multi-Vector Malware Exploiting Outlook API, DNS & ICMP Tunneling for C2

A newly identified malware, dubbed "Squidoor," has emerged as a sophisticated threat targeting government, defense,…

5 hours ago

Unpatched Vulnerabilities Attract Cybercriminals as EDR Visibility Remains Limited

Cyber adversaries have evolved into highly organized and professional entities, mirroring the operational efficiency of…

5 hours ago

Threat Actors Attack Job Seekers of Fortune 500 Companies to Steal Personal Details

In Q3 2024, Cofense Intelligence uncovered a targeted spear-phishing campaign aimed at employees working in…

5 hours ago

DragonForce Attacks Critical Infrastructure to Exfiltrate Data and Halt Operations

The DragonForce ransomware group has launched a significant cyberattack on critical infrastructure in Saudi Arabia,…

5 hours ago

New Malware Uses Legitimate Antivirus Driver to Bypass All System Protections

In a concerning development, cybersecurity researchers at Trellix have uncovered a sophisticated malware campaign that…

6 hours ago