Cybercrime

Small Botnet Launches Record-Breaking 26 Million RPS DDoS Attack

Security and web performance services provider Cloudflare this week announced that it has mitigated a record-breaking distributed denial-of-service (DDoS) attack that peaked at 26 million requests-per-second (RPS).

<p><strong><span><span>Security and web performance services provider Cloudflare this week announced that it has mitigated a record-breaking distributed denial-of-service (DDoS) attack that peaked at 26 million requests-per-second (RPS).</span></span></strong></p>

Security and web performance services provider Cloudflare this week announced that it has mitigated a record-breaking distributed denial-of-service (DDoS) attack that peaked at 26 million requests-per-second (RPS).

Considered the largest HTTPS DDoS attack on record, the assault was launched by a botnet of roughly 5,000 devices.

According to Cloudflare, the attack originated mostly from cloud service providers instead of residential internet services providers, which explains its size and suggests that hijacked virtual machines and powerful servers were abused during the assault.

“On average, each node generated approximately 5,200 RPS at peak,” the web protection company notes.

The attack should also be seen as evidence of the power that hijacked cloud resources provide when compared to much weaker consumer devices such as Internet of Things (IoT) products.

For comparison, a botnet of 730,000 devices was observed generating roughly 1 million RPS, which makes the botnet behind the 26 million RPS DDoS attack 4,000 times stronger.

Within roughly 30 seconds, the botnet generated over 212 million HTTPS requests originating from more than 1,500 networks located in 121 countries. Indonesia, the United States, Brazil, and Russia were the top source countries, with the French OVH, the Indonesian Telkomnet, the US-based iboss and the Libyan Ajeel being the top source networks.

“Worth noting that this attack was over HTTPS. HTTPS DDoS attacks are more expensive in terms of required computational resources because of the higher cost of establishing a secure TLS encrypted connection,” Cloudflare notes.

Advertisement. Scroll to continue reading.

DDoS attacks conducted over encrypted connections cost more for both the attacker and the victim.

The attack came roughly two months after a Cloudflare client was targeted in a 15.3 million RPS HTTPS DDoS attack. In August 2021, the company mitigated a 17.2 million RPS attack that was conducted over HTTP.

Related: Mēris Botnet Flexes Muscles With 22 Million RPS DDoS Attack

Related: DDoS Attacks Abuse Network Middleboxes for Reflection, Amplification

Related: Mitel Devices Abused for DDoS Vector With Record-Breaking Amplification Ratio

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version