
- Vishal 38TB DDOS attack targeted a hosting provider
- Cloudflare’s DDOS security kicks and blocked the attack
- This was the biggest DDOS attack ever
The distributed-in-service-service (DDOS) attacks usually use a network of equipment compromised to bomb a server with unusually large amounts of data to unusable a service.
But cloudflare They say This recently blocked a monumental DDOS attack, which tried to dump data of about 38TB worth in just 45 seconds – this became the biggest attack in history.
For comparison, 38TB 9,350 is equivalent to full-length HD movies, or 9.35 million songs, or downloading a 7,480 hour high-language video.
Cloudflare blocks Mega-Dos
Claudflare said that the attack resulted in 7.3 terabites of traffic per second (TBPS) to hit an average of 21,925 destination ports on an average at an IP address related to an anonymous hosting provider.
The attack used UDP packets as the main attack vector, so that the IP address with illegitimate packets would be unable to process the service that would be unable to process the service, which would be about 99.996% of the attack.
The remaining 0.004% attack used a combination of reflection and amplification attacks that bounce back the data on the victim and increase the attacks, and flood attacks.
Some additional attacks used obsolete diagnostic tools to ‘ping’ IP addresses for an automatic response, which when N Masses, overloads the network’s ability to respond and enhance the network’s traffic.
The DDOS attack took place from 161 countries, with half of the traffic coming from IP addresses located in Brazil and Vietnam.
Claudflare said one of the traffic and third of Taiwan, China, Indonesia, Ukraine, Ecuador, Thailand, the United States and Saudi Arabia was detected.
For bin calling, it can make the attack a sound like a huge coordinated attempt by a highly organized group that spreads the globe, but actually mostly used equipment is compromised by the Internet -linked devices that have become infected with malware, converting the device to ‘bot’.
Hackers continued to work until they were called to participate in an attack with infected devices to spread malware.
With an average of 26,855 for the attack period, 45,097 unique sources of IP address were attacked. To compete with the attack, Cloudflare stated that it was used to spread the traffic load in data centers from where it was generated from traffic.
The detection of Cloudflare’s DDOS and the mitigation system also detect suspected packets and ‘fingerprints’, allowing the system to identify equality in attack packets and reduce them without affecting legitimate traffic.

