Monday, February 24, 2025
Homecyber securityRecord Breaking DDoS Attack 419 TB of Malicious Traffic Within 24-Hours

Record Breaking DDoS Attack 419 TB of Malicious Traffic Within 24-Hours

Published on

SIEM as a Service

Follow Us on Google News

A record-breaking Distributed Denial of Service (DDoS) attack unleashed 419 terabytes of malicious traffic over 24 hours.

This unprecedented event, which began at 8:05 UTC on July 15, 2024, targeted a financial services company in Israel, showcasing the evolving threat landscape of cyber warfare.

A Sustained Assault

The attack commenced with a small probing attempt, quickly escalating into a full-scale assault lasting nearly a day.

Unlike typical DDoS attacks, which are often short-lived, this campaign sustained its intensity for hours, peaking at traffic levels between 300 and 798 gigabits per second (Gbps).

Although not the largest in peak traffic, it ranks as the sixth-largest attack ever mitigated by Akamai’s Prolexic platform.

How to Build a Security Framework With Limited Resources IT Security Team (PDF) - Free Guide

Traffic Flow During the Main Attack Window

The attackers employed various techniques, including UDP flood, UDP fragmentation, DNS reflection, and PSH+ACK attacks.

This multi-vector approach indicates a sophisticated adversary capable of orchestrating complex cyber operations.

The Global Botnet Behind the Attack

The DDoS attack originated from a globally distributed botnet, targeting more than 278 IP addresses simultaneously.

This horizontal Layer 3 and Layer 4 attack was part of a larger wave of assaults on financial institutions in Israel, suggesting a deliberate and coordinated campaign.

Distinct IP Addresses Targeted

The aggressor’s ability to sustain such a high-volume attack for an extended period marks them as a significant threat.

Cybersecurity experts are concerned about their potential to launch similar or even more potent attacks on other targets worldwide.

The Impact on Israel

According to Akamai’s threat intelligence, Israel has experienced an unprecedented number of DDoS attacks in 2024, with the financial services sector being a primary target. This cyberattack surge coincides with ongoing regional conflicts, further complicating the geopolitical landscape.

Despite the severity of the attack, Akamai’s Prolexic platform successfully mitigated the threat, preventing sustained downtime for the targeted financial institution.

This success underscores the importance of robust cybersecurity measures in defending against modern DDoS attacks.

Organizations relying solely on on-premises DDoS defense systems without cloud backup are at higher risk. Shared DDoS defense resources in multi-tenant environments may also be insufficient to withstand similar attacks.

Strengthening Cyber Defenses

To mitigate future risks, businesses are advised to:

  1. Conduct thorough risk assessments of existing DDoS mitigation services.
  2. Implement always-on DDoS security controls.
  3. Extend security postures with edge-based network cloud firewalls.
  4. Protect DNS infrastructure from DNS-focused attacks.
  5. Develop comprehensive incident response plans.
Quarterly DDoS Attack Events by Region

The July 15 DDoS attack is a stark reminder of the evolving nature of cyber threats. As attackers grow more sophisticated, the need for advanced cybersecurity measures becomes increasingly critical.

Organizations worldwide must remain vigilant and proactive in strengthening their defenses to protect against the growing menace of DDoS attacks.

Are you from SOC and DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Free Access

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Apple Removes Advanced Data Protection (ADP) for UK Users

Apple has discontinued its Advanced Data Protection (ADP) feature for UK users following a...

Wireshark 4.4.4 Released – Explore the Latest Features!

The Wireshark Foundation has announced the release of Wireshark 4.4.4, the latest iteration of...

Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers

The cryptocurrency sector faced one of its most significant security breaches this year as...

GhostSocks Malware Uses SOCKS5 Proxy to Evade Detection Systems

GhostSocks, a Golang-based SOCKS5 backconnect proxy malware, has emerged as a significant threat within...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Apple Removes Advanced Data Protection (ADP) for UK Users

Apple has discontinued its Advanced Data Protection (ADP) feature for UK users following a...

Wireshark 4.4.4 Released – Explore the Latest Features!

The Wireshark Foundation has announced the release of Wireshark 4.4.4, the latest iteration of...

Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers

The cryptocurrency sector faced one of its most significant security breaches this year as...