Akamai stopped new record-breaking DDoS attack in Europe

Gandalf_The_Grey

Level 76
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Apr 24, 2016
6,603
A new distributed denial-of-service (DDoS) attack that took place on Monday, September 12, has broken the previous record that Akamai recorded recently in July.

DDoS attacks are cyberattacks that flood servers with fake requests and garbage traffic, rendering them unavailable to legitimate visitors and customers.

The cybersecurity and cloud services company Akamai reports that the recent attack appears to originate from the same threat actor, meaning that the operators are in the process of empowering their swarm further.

The victim is also the same as in July, an unnamed customer in Eastern Europe who has been “bombarded relentlessly” by the DDoS operatives all this time.

On September 12, these attacks culminated at unprecedented levels when the “garbage” traffic sent to the target network peaked at 704.8 Mpps, roughly 7% higher than the July attack.

Apart from the volume of the attack, the threat actors also expanded their targeting, which was previously rather narrow, focusing on the company’s primary data center.

This time, the threat actors spread their firepower to six data center locations in Europe and North America.

Additionally, Akamai detected and blocked 201 cumulative attacks, compared to 75 in July, and recorded traffic sources from 1813 IPs, compared to 512 previously.
 

Lightning_Brian

Level 15
Verified
Top Poster
Content Creator
Sep 1, 2017
742
We seem to be witnessing/hearing/seeing a lot of DDoS attacks this year - seems like each major one is record breaking now too. Companies that aren't using DDoS mitigation are asking for trouble. Not sure if all of ya' caught but in the article it states the following from Bleeping Computer:

The particular company, however, had taken precautions due to the July attack and had secured all their 12 data centers, resulting in 99.8% of the malicious traffic being pre-mitigated.

With that being said, this company fell victim or presumably was under attack in July and the steps they took recently helped to stop this large attack. As I tell most customers (of any size) you need to button up the hatches and make sure vulnerabilities are patched while verification occurs. In addiiton to this, pen tests and vulnerability tests must occur on a much more frequent scale than ever before.

Another good post @Gandalf_The_Grey!

~Brian
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top