Saturday, April 12, 2025
HomeCyber Security NewsRecord-Breaking DDoS Attack - Over 71 Million RPS

Record-Breaking DDoS Attack – Over 71 Million RPS

Published on

SIEM as a Service

Follow Us on Google News

DDos is a malicious attempt to disturb the legitimate packets reaching the network equipment and services.

When the DDoS attack is in place, organizations may experience an outage with one or more services, as the attacker looted their resources with HTTP requests and traffic.

Record-Breaking DDoS Attack

The fourth and final quarter of 2022 insights shows that HTTP DDoS attacks increased by over 79% YoY and primarily targeted Aviation, Aerospace Gaming/Gambling, and Finance industries.

- Advertisement - Google News

Also, the number of attacks lasting more than three hours increased by 87%, reads the Cloudflare recent report.

Over this weekend, Cloudflare observed and mitigated an HTTP/2-based DDoS attack that exceeded 71 million rps targeting a website protected by Cloudflare.

DDoS Graph @Cloudflare

The attacks originated from over 30,000 IP addresses and their targeted websites are gaming providers, cryptocurrency companies, hosting providers, and cloud computing platforms.

“Over the past year, we’ve seen more attacks originate from cloud computing providers,” reads Cloudflare’s statement.

Cloudflare working with the Cloud providers to crack down on the botnet that launches this record-breaking attack.

Breaking Down Time to Mitigation

Mitigation time is defined as the period from when the first DDoS attack packet hits your system to when your mitigation provider begins scrubbing incoming traffic.

The time taken to execute is Based on the organization size to implement the following mitigation steps.

Detection – The speed with which a mitigation service notices that a DDoS attack is taking place.
Sampling – The time taken to analyze traffic flows and create directives for scrubbing.
Scrubbing – The ongoing process of filtering out malicious traffic, based on patterns identified during the sampling process.

DDoS mitigation is time-sensitive. When organizations are defending their assets from this attack, it’s necessary to discover and remove the threat early. 

As cybersecurity experts know, with every minute that passes amid a DDoS attack, the mitigation gets more difficult and the company has to suffer greater financial damage.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...