Tuesday, February 11, 2025
HomeSecurity NewsGitHub Hit With Record Breaking 1.35Tbps DDoS Attack

GitHub Hit With Record Breaking 1.35Tbps DDoS Attack

Published on

SIEM as a Service

Follow Us on Google News

GitHub DDoS attack recorded the largest yet DDoS attack that peaked at 1.35Tbps via 126.9 million packets per second. The Volumetric DDOS attack takes place between 17:21 and 17:30 UTC on February 28th.

With the First wave of attack it peaks up to 1.35Tbps and the wave last for 8 minutes and the second wave of attacks spikes up to 400Gbps after 18:00 UTC.

The GitHub DDoS attack was due to vulnerability via the common misconfiguration in Memcached servers that unique among amplification class of attacks.

GitHub DDoS attack

Cloudflare says a carefully crafted technique allows an attacker with limited IP spoofing capacity (such as 1Gbps) to launch very large attacks (reaching 100s Gbps) “amplifying” the attacker’s bandwidth.

Github confirms that at no point was the confidentiality or integrity of your data at risk and we are sorry for the impact of this incident.

For attack mitigation, Github moved the traffic through Akamai and the attacked mitigated by reconfiguring the Access Control Lists to filter the packets that pass through the router.

Skottler from Github saysWe’re investigating the use of our monitoring infrastructure to automate enabling DDoS mitigation providers and will continue to measure our response times to incidents like this with a goal of reducing mean time to recovery (MTTR)“.

Also Read How to Launch a DoS Attack by using Metasploit Auxiliary

According to DDoS Threat Landscape, the Memcached graph is almost flat and the spike is only just for a couple of the days.

The Memcached is a middleware so it lacks access controls and it should not be exposed to the public Internet, according to Shodan reports there are around 88,000 open Memcached servers found.

Security researchers recommended disabling the UDP support if it is not in use and to place the Memcached servers behind the Firewall. Also, it is recommended to specify Memcached servers to listen only on localhost.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

12,000+ KerioControl Firewalls Exposed to 1-Click RCE Attack

Cybersecurity researchers caution that over 12,000 instances of GFI KerioControl firewalls remain unpatched and...

Apple iOS 0-day Vulnerability Exploited Wild in Extremely Sophisticated Attack

Apple has released emergency security updates to address a zero-day vulnerability, CVE-2025-24200, that has...

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed "Tiny FUD," has emerged,...

Google Blocks 2.28 Million Malicious Apps from Play Store in Security Crackdown

In a continued commitment to enhancing user safety and trust, Google has outlined significant...

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...