Cloudflare recently blocked yet another record-breaking distributed denial-of-service (DDoS) attack, which peaked at 7.3 terabits per second (Tbps).
Previous record-breaking DDoS attacks seen by Cloudflare reached 5.6 Tbps and 6.5 Tbps. Cybersecurity blogger Brian Krebs reported last month that his website had been targeted in a 6.3 Tbps attack.
The 7.3 Tbps DDoS attack, seen by Cloudflare in mid-May, lasted only 45 seconds and it was aimed at a hosting provider.
“Hosting providers and critical Internet infrastructure have increasingly become targets of DDoS attacks,” the web performance and security solutions provider said in a blog post on Thursday.
Cloudflare noted that the 7.3 Tbps attack managed to deliver 37.4 Tb of traffic — the equivalent of over 9,000 HD movies — in just 45 seconds.
“The attack carpet-bombed an average of 21,925 destination ports of a single IP address owned and used by our customer, with a peak of 34,517 destination ports per second,” the company explained. “The attack also originated from a similar distribution of source ports.”
According to Cloudflare, the record-breaking DDoS attack consisted more than 99% of UDP floods, while the rest — representing 1.3 Gb of traffic — was made up of QOTD reflection, Echo reflection, NTP reflection, Mirai UDP flood, Portmap flood, and RIPv1 amplification attacks.
The attack originated from more than 122,000 IP addresses across 5,400 autonomous systems in 161 countries.
Related: Surge in Cyberattacks Targeting Journalists: Cloudflare
Related: Record-Breaking DDoS Attack Peaked at 3.8 Tbps, 2.14 Billion Pps
Related: 27 DDoS Attack Services Taken Down by Law Enforcement
Related: New Eleven11bot DDoS Botnet Powered by 80,000 Hacked Devices
