Record-Breaking 7. 3 Tbps DDoS Attack Targets Hosting Provider Cloudflare noted that the 7 3 Tbps attack managed to deliver 37 4 Tb of traffic — the equivalent of over 9,000 HD movies — in just 45 seconds “The attack carpet-bombed an average of 21,925 destination ports of a single IP address owned and used by our customer, with a peak of 34,517 destination ports per second,” the company explained
Defending the Internet: how Cloudflare blocked a monumental 7 . . . The 7 3 Tbps attack was a multivector DDoS attack Around 99 996% of the attack traffic was categorized as UDP floods However, the remaining 0 004%, which accounted for 1 3 GB of the attack traffic, were identified as QOTD reflection attacks, Echo reflection attack, NTP reflection attack, Mirai UDP flood attack, Portmap flood, and RIPv1 amplification attacks
Cloudflare Thwarts Record-Breaking 7. 3 Tbps DDoS Attack Brazil and Vietnam were the top contributors, each accounting for roughly a quarter of the traffic Other major contributors included networks in Taiwan, China, the U S , and Saudi Arabia AS27699 (Telefonica Brazil) and AS7552 (Viettel Group) were the top source networks, together responsible for over 20% of the malicious traffic
Cloudflare blocked record-breaking 7. 3 Tbps DDoS attack . . . An X user claimed a 7-Zip zero-day vulnerability, but 7-Zip's creator says is a fake | Cisco states that the second data leak is linked to the one from October | Threat actors attempt to exploit a flaw in Four-Faith routers | ZAGG disclosed a data breach that exposed its customers' credit card data |
Record-Breaking 7. 3 Tbps DDoS Attack Hits Hosting Provider . . . In a startling demonstration of the escalating scale and sophistication of cyber threats, a record-breaking Distributed Denial of Service (DDoS) attack recently targeted a prominent hosting provider, unleashing an unprecedented 7 3 terabits per second (Tbps) of malicious traffic