
Follow ZDNET: Add us as a favorite source On Google.
Key takeaways of zdnet
- The biggest, worst DDOS attack ever was stopped.
- The attack used trivial, but bad, UDP flood attack.
- You should protect yourself against DDOS attacks.
Labor Day weekend, Cloudflare says it successfully stopped A record-bracing distributed Daniel-of-Service (DDOS) attack that reached 11.5 terabit per second (TBPS). It came only a few months later when Cloudflare blocked the then high DDOS attack of 7.3 TBPS. This latest attack was about 60% big.
According to Cloudflare, the attack was the result of a hyper-woltric user Datagram Protocol (UDP) flood attack that lasted for about 35 seconds. During that time during the attack more than half a minute, it distributed 5.1 billion packets per second.
This attack, Cloudflare reportedMany IOTs and clouds came from a combination of providers. Although accounts compromised on Google Cloud were a major source, wholesalers of the attack originated from other sources.
Hyper-Volumetric UDP Flood Attack Simple, but they are becoming more common and dirty. The attack tries to overwhelm a target with a huge amount of UDP packets, ranging from millions to billions of UDP packets per second. It works by saturating the bandwidth of a target. Furthermore, since the target should process each packet and for unused ports, usually the Internet Control Message Protocol (ICMP) “Destination should answer with unaccounted messages, it quickly eliminates the compute resources of the target.
Also: How to protect your site from DDOS attacks – before it is too late
The specific goal of this attack has not been publicly disclosed, but we can ensure that the intention intended to overwhelm the victim’s network and neutralize online services. Cloudflare states that its globally distributed, a completely autonomous DDOS mitigation network detected and neutralized the danger in real -time, without the need for a significant impact on customer services or manual intervention. This operation exposes both the growing sophistication of the methods of the attack and the flexibility of modern internet infrastructure defense, especially Cloudflare’s real-time packet analysis, fingerprinting and using rapid threat intelligence Sharing in your network.
The Labor Day event overshadowed the weeks of DDOS activity. Cloudflare is reporting a dramatic year-on-year increase in the overall frequency and amounts of attacks. Overall, Cloudflare has reported that in Q2 2025, Hyper-Volumetric DDOS attacks have touched the sky,
During these months, Cloudflare blocked more than 6,500 hyper-woltric DDOs attacks, on average for 71 per day. Content delivery network (CDN) and Internet Security Company also stated in July that “Cloudflare has already blocked 27.8 million DDOs attacks, which is equal to 130% of all the DDOS attacks we blocked in the entire calendar year 2024.”
Also: I asked AI to modify the Mission-Critical Code, and what happened next
These DDOS campaigns rapidly exploit cloud resources and IOT boatnets, Cloudflare, to launch ultra-short but extremely intensive hyper-volumetric attacks worldwide.
Cloudflare says its intervention was a major success. But this phenomenon is also a warning about future risks as attackers increase their abilities by misusing legitimate cloud platforms and compromised IOT devices. If you are not using DDOS Prevention Services to protect your business websites, it is time to start. In addition CloudflareOther Top DDOS Prevention Services Like companies come from Akamai, Imperva, Redware, F5And Foretnet,