Cloudflare announced last October 29 that it had blocked the largest DDoS attack ever. The attack, which targeted an internet service provider in East Asia, reached a speed of 5.6 terabits per second (Tbps). Behind the attack was a botnet consisting of more than 13 thousand compromised devices.
Cloudflare blocks record-breaking 5.6 Tbps DDoS attack
The UDP-based attack, which lasted only 80 seconds, did not cause any service interruptions or alerts thanks to Cloudflare’s autonomous detection and mitigation systems. This incident also surpassed the previous record DDoS attack of 3.8 Tbps reported in early October 2024.
Cloudflare observed a sharp increase in DDoS attacks in 2024, especially in the fourth quarter. There was a 1.89 percent increase in attack volume compared to the previous quarter, with many attacks exceeding 1 Tbps. Additionally, attacks exceeding 100 million packets per second increased by 175 percent.
Hyper-volume HTTP DDoS attacks accounted for 3 percent of the total, while 63 percent of attacks were at a volume of less than 50 thousand attacks per second. Similarly, 93 percent of DDoS attacks affecting the network layer remained below 500 Mbps.
The report highlights that short-lived DDoS incidents are becoming more common. 72 percent of HTTP attacks and 91 percent of network layer DDoS attacks ended within 10 minutes. Attacks lasting 10 minutes or less make human intervention impossible, making it difficult to prevent damage.
Hackers generally try to maximize the impact by carrying out these attacks during periods such as holidays or discount events. Ransom-focused DDoS attacks also increased by 78 percent and peaked during the holiday season.
Source link: https://shiftdelete.net/tarihin-en-buyuk-ddos-saldirisi-gerceklesti-56-tbps