Skip to main content

Hackers used 30,000 computers for record-breaking DDoS attack

Hackers launched a record-breaking distributed denial of service (DDoS) attack over the weekend, employing a network of botnets to make requests from over 30,000 IP addresses.

While that isn’t a big network of computers, the onslaught was able to exceed 71 million requests per second (rps), surpassing the previous record of 46 million rps set in June 2022 by 35%. This is what’s known as a volumetric attack that consumes the target website’s bandwidth by sending large amounts of data from multiple sources at once.

Last year’s DDoS attack persisted for over an hour, and Google Cloud Armor identified more than 5,000 IP addresses from 132 countries. The attack reported by CloudFlare was similar in that a small number of IP addresses pushed a massive number of requests to servers ranging from 50 million to 71 million rps.

An illustration of a grid of devices with one in red, infected device highlighted.
Image used with permission by copyright holder

The targets of the attacks were not named but generally identified as popular gaming, cryptocurrency, hosting, and cloud computing websites. CloudFlare notes that DDoS attacks are relatively inexpensive and easy to arrange, with DDoS-as-a-service platforms priced as low as $30 per month.

With readily available hacking services becoming cheap and accessible, the pressure is on to meet this challenge with stronger protections. HTTP DDoS attacks have increased by 79% year-over-year and volumetric attacks such as the recent record-setting barrage has grown by 67% in the last quarter.

Massive content delivery networks like CloudFlare are well aware of the issue and are constantly on guard to keep major websites running and critical infrastructure safe. As hacking efforts ramp up, protecting the internet will become more difficult.

As consumers, there is something that we can do to help prevent this problem. By keeping your computer’s operating system updated, as well as being wary of shady websites and cracked software, you can reduce the likelihood of getting a computer virus that might add your computer to a botnet.

Alan Truly
Alan is a Computing Writer living in Nova Scotia, Canada. A tech-enthusiast since his youth, Alan stays current on what is…
Microsoft stopped the largest DDoS attack ever reported
Nvidia T4 Enterprise Server Wall

Distributed Denial-of-Service (DDoS) attacks have become more common, and Microsoft recently published a blog post looking into the trends for such attacks on its own servers. In that post, the company says that, at one point, it stopped one of the largest-ever-recorded DDoS attacks on a Microsoft Azure server in Asia.

According to Microsoft's data, in November, an unnamed Azure customer in Asia was targeted with a DDoS attack with a throughput of 3.47 Tbps and a packet rate of 340 million packets per second (pps.) The attack came from 10,000 sources from multiple countries across the globe, including China, South Korea, Russia, Iran, and Taiwan. The attack itself lasted 15 minutes. Yet it is not the first one of such scale, as there were two additional attacks, one of 3.25 Tbps and another of 2.55 Tbps in December in Asia.

Read more
Cloudflare reports a massive 175% increase in DDoS attacks
Person using laptop with security graphics in front.

Cloudflare, a web infrastructure and security company, has just released a report titled "DDoS Attack Trends for Q4 2021." According to Cloudflare, 2021 has been a particularly bad year in terms of DDoS attacks.

Ransom distributed denial of service (DDoS) attacks increased by over 175 percent quarter over quarter, highlighting the large scale of the problem described by Cloudflare.

Read more