HackDig : Dig high-quality web security articles for hackers

Hosting Provider Hit With Largest-Ever DDoS Attack

2020-06-16 20:29
Likely looking to make a statement, attackers targeted specific websites hosted by a single provider with a 1.44 terabit-per-second distributed denial-of-service attack, according to Akamai.

Attackers leveled the largest distributed denial-of-service attack to date against a specific website hosted by a large service provider in early June, topping a bandwidth of 1.44 terabits per second and 385 million packets-per-second.

Internet infrastructure firm Akamai, which revealed the attack today, said a second attack topped 500 megabits-per-second and targeted a different site at the same provider. While Akamai would not give more details about the targeted sites, the company said the attacker focused on the websites for a "social" reason, and Akamai does not believe that the hosting provider was the target, says Roger Barranco, vice president of global security operations for Akamai. 

The sheer variety of data types used in the attack, along with signs of significant coordination, suggests a knowledgeable attacker, he says.

"What was really different is that the absolute kitchen sink was thrown in for this attack," Barranco says. More than nine different types of traffic were used in the attack - far more than the two or three types used in a typical attack - and the traffic surge lasted about an hour. Most attacks are measured in minutes, so this was notable. "It's has been a long time that we've seen the duration that long and an attack of that size." 

A typical year of denial-of-service attacks includes a massive number of smaller attacks targeting gaming sites, often to give one player an edge over the competition, and a few massive bandwidth attacks. Over the past 24 months, the median denial-of-service attack has peaked at less than 250,000 packets-per-second, according to Akamai's State of the Internet (SOTI) report. Very few attacks have surged far beyond that average. Security firm Imperva recorded a 500 million packet-per-second attack in early 2019, for example.

The attack weathered by Akamai and its customer came close to that packet rate, but surpassed the bandwith of that previous attack because the average packet seen by Akamai consisted of more data. The attackers used volumetric attacks, or floods, of ACK, SYN, UDP, NTP, TCP reset, and SSDP packets. In addition, other attacks included CLDAP reflection, TCP anomaly, UDP fragments, and multiple botnet attack tools, according to Akamai.

The variety of attack types, along with the coordination among the tools, was a novel approach, Barranco says.

"Really, you have to go all the way back to the Mirai days, to find a time when there was something that we hadn't seen before and we had to really engineer something unique to handle it," he says.  

The attack used traffic from sources worldwide. While the Mirai botnet, which topped out at more than 600 megabits-per-second and involved widely distributed traffic, it was not to the same extent, Barranco says.

"What was really different in this case was the coordination," he says. "The actors were able to get a hold of multiple tools. It did not source from a single region. So that means that someone went way out of their way to either reserve the capability or collect the tools needed to level an attack of this size."

Akamai noted that the company quickly adjusted to the massive denial-of-service attack. The bulk of the attack was handled in seconds, but it took about ten minutes to get it 100% under control, says Barranco. 

He recommends that companies know their traffic patterns and what traffic is necessary for business before they are targeted by an attack. "A lot of enterprises do not have a good handle on their traffic patterns," he says. "If you get hit with a DDoS, you have a good chance of being able to mitigate it, but you also have a good chance of mitigating good traffic."

With remote working becoming more common during the coronavirus epidemic, revisiting the assumptions about good sources of traffic can help a company get ready for a DDoS attack.

Related Content

 
 
 
 
 
 
Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really bad day" in cybersecurity. Click for more information and to register


Source: -d/d/kcatta-sodd-reve-tsegral-htiw-tih-redivorp-gnitsoh/sehcaerb-skcatta/moc.gnidaerkrad.www

Read:544 | Comments:0 | Tags: DDOS

“Hosting Provider Hit With Largest-Ever DDoS Attack”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Tools

Tag Cloud