When a DDoS attack is conducted, the server being targeted receives a large number of garbage requests. As a result, the server’s capacity is depleted, and a large number of garbage requests are being sent.
As Akamai reported recently, one of the largest DDoS attacks ever launched against a customer in the Asia-Pacific region. This attack has been mitigated by the company after it had launched against that customer.
At its peak, there were 900.1 gigabits per second and 158.2 million packets per second of attack traffic, according to the reports presented by the Akamai.
The top mitigation on September 12, 2022, was a DDoS attack that targeted a client in Eastern Europe and resulted in the highest mitigation for the company.
This attack resulted in a volume of packets sent per second reaching 704 million, 4.5 times more than the recent event. Unfortunately, we cannot provide volumetric data for this attack at this time because it’s unavailable.
While the attack was distributed across Akamai’s scrubbing network, it primarily originated in APAC, the most heavily targeted region.
The top five scrubbing centers for traffic accounted for less than 12% of the total traffic. However, the top five places are:-
The experts noticed some amount of attack traffic from all 26 of their scrubbing centers over the last few weeks.
Using Akamai Prolexic’s industry-leading combination of platform, people, and processes to help thwart this attack and protect our customers, Akamai Prolexic was able to pre-mitigate the attack successfully by implementing the following measures:
The Cyber Security and Infrastructure Security Agency (CISA) recommends that you review and implement its recommendations as soon as possible.
Among the recent cases of this scale is Cloudflare’s mitigation of a DDoS attack that targeted Wynncraft, a Minecraft server that is one of the largest in the world and peaked at 2.5 terabits per second.
Network Security Checklist – Download Free E-Book
Related News:
The QSC Loader service DLL named "loader.dll" leverages two distinct methods to obtain the path…
Cybercriminals are exploiting the recent critical LDAP vulnerabilities (CVE-2024-49112 and CVE-2024-49113) by distributing fake proof-of-concept…
A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has been…
Fraudsters in the Middle East are exploiting a vulnerability in the government services portal. By…
Juniper Networks has disclosed a significant vulnerability affecting its Junos OS and Junos OS Evolved…
CrowdStrike, a leader in cybersecurity, uncovered a sophisticated phishing campaign that leverages its recruitment branding…