Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

150,000 IoT Devices Abused for Massive DDoS Attacks on OVH

The hosting provider OVH continues to be targeted by massive distributed denial-of-service (DDoS) attacks powered by a large botnet capable of generating significant attack traffic.

The hosting provider OVH continues to be targeted by massive distributed denial-of-service (DDoS) attacks powered by a large botnet capable of generating significant attack traffic.

The first major attack was reported last week by investigative journalist Brian Krebs, whose website had been hit by a 620 Gbps attack. Krebs’ blog had been protected by Akamai free of charge, but the company decided to stop providing protection after the attack began to impact its paying customers.

CloudFlare offered to help, but the journalist decided to secure his website by signing up for Google’s Project Shield, a service that protects freedom of expression from DDoS.

OVH, one of the world’s largest hosting providers, later reported that its systems had been hit by simultaneous attacks that peaked at nearly 1 terabit per second (Tbps).

According to Octave Klaba, the founder and CTO of OVH, the attacks are powered by more than 150,000 Internet of Things (IoT) devices, including cameras and DVRs, capable of launching attacks that exceed 1.5 Tbps.

Klaba said the attacks are ongoing and the size of the botnet continues to increase. OVH has observed various types of attack traffic, including Generic Routing Encapsulation (GRE) traffic, which attackers only recently started to abuse for DDoS.

 Many cameras, DVRs and routers can be easily hacked because their owners fail to change default credentials or set easy-to-guess passwords. Symantec reported last week that the primary purpose of malware designed to infect IoT devices is to launch DDoS attacks.

The attacks aimed at OVH and Krebs’ website are the largest ones reported so far. Previously, DDoS protection providers had reported seeing 400-500 Gbps attacks and some anti-ISIS hackers claimed to have launched a 600 Gbps attack on BBC websites, although their claims could not be confirmed.

Related Reading: Britain’s HSBC Recovers from Massive DDoS Attack

Related Reading: DDoS Attacks Continue to Rise in Power and Sophistication

Related Reading: Thousands of CCTV Devices Abused for DDoS Attacks

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.

Register

Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Malware & Threats

Threat actors are increasingly abusing Microsoft OneNote documents to deliver malware in both targeted and spray-and-pray campaigns.

Malware & Threats

Microsoft plans to improve the protection of Office users by blocking XLL add-ins from the internet.

Cybercrime

More than 3,800 servers around the world have been compromised in recent ESXiArgs ransomware attacks, which also include an improved process.

Malware & Threats

A vulnerability affecting IBM’s Aspera Faspex file transfer solution, tracked as CVE-2022-47986, has been exploited in attacks.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.