Wednesday, April 23, 2025
HomeCyber AttackRecord Breaking DDoS Attack - 158.2 Million Packets Per Second

Record Breaking DDoS Attack – 158.2 Million Packets Per Second

Published on

SIEM as a Service

Follow Us on Google News

When a DDoS attack is conducted, the server being targeted receives a large number of garbage requests. As a result, the server’s capacity is depleted, and a large number of garbage requests are being sent.

As Akamai reported recently, one of the largest DDoS attacks ever launched against a customer in the Asia-Pacific region. This attack has been mitigated by the company after it had launched against that customer.

At its peak, there were 900.1 gigabits per second and 158.2 million packets per second of attack traffic, according to the reports presented by the Akamai.

- Advertisement - Google News

Record DDoS Attack

The top mitigation on September 12, 2022, was a DDoS attack that targeted a client in Eastern Europe and resulted in the highest mitigation for the company.

This attack resulted in a volume of packets sent per second reaching 704 million, 4.5 times more than the recent event. Unfortunately, we cannot provide volumetric data for this attack at this time because it’s unavailable.

Distributed across scrubbing network

While the attack was distributed across Akamai’s scrubbing network, it primarily originated in APAC, the most heavily targeted region.

The top five scrubbing centers for traffic accounted for less than 12% of the total traffic. However, the top five places are:-

  • Hong Kong
  • Tokyo
  • So Paulo
  • Singapore
  • Osaka 

The experts noticed some amount of attack traffic from all 26 of their scrubbing centers over the last few weeks.

Defense strategy

Using Akamai Prolexic’s industry-leading combination of platform, people, and processes to help thwart this attack and protect our customers, Akamai Prolexic was able to pre-mitigate the attack successfully by implementing the following measures:

  • Platform: As such, it is important to have a dedicated defense capability that has the ability to scale up to several times the size of the largest types of attacks that are publicly disclosed.
  • People: Six global locations and more than 225 frontline responders with decades of experience mitigating sophisticated attacks for the largest and most demanding organizations in the world.
  • Process: Optimize the incident response plans for DDoS attacks after developing custom runbooks, performing service validations, and conducting operational readiness drills.

Recommendations

The Cyber Security and Infrastructure Security Agency (CISA) recommends that you review and implement its recommendations as soon as possible.

  • Ensure that there are mitigation controls in place for critical subnets and IP spaces in your network.
  • It is always best to deploy DDoS security controls in an always-on mitigation posture to avoid an emergency integration scenario and reduce the burden on incident responders in an attack.
  • The situation response plan and runbooks need to be updated on a regular basis to ensure that they are responsive to changes in the situation.

Among the recent cases of this scale is Cloudflare’s mitigation of a DDoS attack that targeted Wynncraft, a Minecraft server that is one of the largest in the world and peaked at 2.5 terabits per second.

Network Security Checklist – Download Free E-Book

Related News:

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...

Cybercriminals Exploit Network Edge Devices to Infiltrate SMBs

Small and midsized businesses (SMBs) continue to be prime targets for cybercriminals, with network...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit Cloudflare Tunnel Infrastructure to Deploy Multiple Remote Access Trojans

The Sekoia TDR (Threat Detection & Research) team has reported on a sophisticated network...

Threat Actors Leverage npm and PyPI with Impersonated Dev Tools for Credential Theft

The Socket Threat Research Team has unearthed a trio of malicious packages, two hosted...

Hackers Exploit Legitimate Microsoft Utility to Deliver Malicious DLL Payload

Hackers are now exploiting a legitimate Microsoft utility, mavinject.exe, to inject malicious DLLs into...