Cloudflare Observed The Peak DDOS Attack of 201 Million HTTP Requests Per Second <!-- wp:html --><p><a href="https://cybersecuritynews.com/ddos-protection-tools/">DDoS (Distributed Denial of Service)</a> attacks are extremely destructive and alarming since they flood a target’s web services with overwhelming traffic.</p> <p>This can disrupt or even completely disable:-</p> <p>Websites</p> <p>Servers</p> <p>Networks</p> <p>This can cause significant financial losses, damage to reputation, and potential security vulnerabilities.</p> <p>Recently, cybersecurity analysts at Cloudflare observed the DDoS attack of 201 million HTTP requests per second. </p> <h2 class="wp-block-heading"><strong>Peak DDOS Attack</strong></h2> <p>With one of the world’s largest networks, Cloudflare handles vast data, serving 64 million HTTP requests per second and 2.3 billion <a href="https://cybersecuritynews.com/dns-filtering-solutions/">DNS queries</a> daily. </p> <p>Cloudflare prevents 140 billion cyber threats daily, offering valuable insights into DDoS trends. </p> <p>Attacks against Israeli websites using Cloudflare (Source – Cloudflare)</p> <p>Lately, there’s been a rise in DDoS attacks against:-</p> <p>Israeli media sites</p> <p>Israeli financial sites</p> <p>Israeli government sites</p> <p>Palestinian websites</p> <p>HTTP DDoS attacks target web properties, including mobile apps and e-commerce sites, exploiting HTTP/2 for better performance, which can aid botnets.</p> <p>An HTTP DDoS attack Cloudflare (Source – Cloudflare)</p> <p>From late August 2023, Cloudflare and others faced a relentless DDoS campaign, exploiting the CVE-2023-44487 HTTP/2 Rapid Reset vulnerability. </p> <p>These attacks reached millions of requests per second, averaging 30M rps, with some hitting 201M rps.</p> <p>Cloud-based botnets using <a href="https://cybersecuritynews.com/http-2-rapid-reset-zero-day/" target="_blank" rel="noopener">HTTP/2</a> deliver 5,000 times more power per node, enabling hyper-volumetric DDoS attacks with small 5-20K node botnets, far surpassing previous IoT botnets with millions of nodes, reads the <a href="https://blog.cloudflare.com/ddos-threat-report-2023-q3/" target="_blank" rel="noopener">report</a>.</p> <p>Over two months, the following percentage of attacks were performed:-</p> <p>19% of attacks hit Cloudflare infrastructure</p> <p>18% targeted gaming companies</p> <p>10% went after recognized VoIP providers</p> <p>The attack campaign caused a 65% QoQ increase in HTTP DDoS attacks, totaling 8.9 trillion requests mitigated by Cloudflare. L3/4 attacks also increased by 14%, driven by large volumetric attacks, with the largest reaching 2.6 Tbps, launched by a variant of Mirai botnet.</p> <h2 class="wp-block-heading"><strong>Top HTTP DDoS Attack Sources</strong></h2> <p>Here below, we have mentioned all the top HTTP DDoS attack sources:-</p> <p>United States with 15.78%</p> <p>China with 12.62%</p> <p>Brazil with 8.74%</p> <p>Germany with 7.52%</p> <p>Indonesia with 5.36%</p> <p>Argentina, with 3.04%</p> <p>Russian Federation with 2.73%</p> <p>India with 2.48%</p> <p>Egypt with 2.33%</p> <p>Netherlands with 2.26%</p> <h2 class="wp-block-heading"><strong>Top Attacked Industries</strong></h2> <p>Here below, we have mentioned all the top attacked industries:-</p> <p>Gaming & Gambling with 5.41%</p> <p>Information Technology and Internet with 4.38%</p> <p>Cryptocurrency with 3.43%</p> <p>Computer Software with 2.16%</p> <p>Telecommunications with 1.58%</p> <p>Marketing & Advertising with 1.43%</p> <p>Retail with 1.36%</p> <p>BFSI with 0.33%</p> <p>Hospitality with 0.20%</p> <p>Online Media with 0.18%</p> <p>Cloudflare users with HTTP reverse proxy (CDN/WAF) are shielded from HTTP DDoS attacks. Others, including non-HTTP users and those not using Cloudflare, should adopt automated HTTP DDoS protection.</p> <p class="has-text-align-center has-background">Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a <strong><a href="https://www.manageengine.com/patch-management/?utm_source=GBHackers&utm_medium=Website-CPM&utm_campaign=PMP-300x600" target="_blank" rel="noopener">free trial</a></strong> to ensure 100% security.</p> <p>The post <a href="https://cybersecuritynews.com/ddos-attack-201-million-http-requests/">Cloudflare Observed The Peak DDOS Attack of 201 Million HTTP Requests Per Second </a> appeared first on <a href="https://cybersecuritynews.com/">Cyber Security News</a>.</p> <p> <a href="https://cybersecuritynews.com/ddos-attack-201-million-http-requests/" target="_blank" class="feedzy-rss-link-icon" rel="noopener">Read More</a> </p> <p>Cyber Security News </p><!-- /wp:html -->
DDoS (Distributed Denial of Service) attacks are extremely destructive and alarming since they flood a target’s web services with overwhelming traffic.
This can disrupt or even completely disable:-
Websites
Servers
Networks
This can cause significant financial losses, damage to reputation, and potential security vulnerabilities.
Recently, cybersecurity analysts at Cloudflare observed the DDoS attack of 201 million HTTP requests per second.
Peak DDOS Attack
With one of the world’s largest networks, Cloudflare handles vast data, serving 64 million HTTP requests per second and 2.3 billion DNS queries daily.
Cloudflare prevents 140 billion cyber threats daily, offering valuable insights into DDoS trends.
Attacks against Israeli websites using Cloudflare (Source – Cloudflare)
Lately, there’s been a rise in DDoS attacks against:-
Israeli media sites
Israeli financial sites
Israeli government sites
Palestinian websites
HTTP DDoS attacks target web properties, including mobile apps and e-commerce sites, exploiting HTTP/2 for better performance, which can aid botnets.
An HTTP DDoS attack Cloudflare (Source – Cloudflare)
From late August 2023, Cloudflare and others faced a relentless DDoS campaign, exploiting the CVE-2023-44487 HTTP/2 Rapid Reset vulnerability.
These attacks reached millions of requests per second, averaging 30M rps, with some hitting 201M rps.
Cloud-based botnets using HTTP/2 deliver 5,000 times more power per node, enabling hyper-volumetric DDoS attacks with small 5-20K node botnets, far surpassing previous IoT botnets with millions of nodes, reads the report.
Over two months, the following percentage of attacks were performed:-
19% of attacks hit Cloudflare infrastructure
18% targeted gaming companies
10% went after recognized VoIP providers
The attack campaign caused a 65% QoQ increase in HTTP DDoS attacks, totaling 8.9 trillion requests mitigated by Cloudflare. L3/4 attacks also increased by 14%, driven by large volumetric attacks, with the largest reaching 2.6 Tbps, launched by a variant of Mirai botnet.
Top HTTP DDoS Attack Sources
Here below, we have mentioned all the top HTTP DDoS attack sources:-
United States with 15.78%
China with 12.62%
Brazil with 8.74%
Germany with 7.52%
Indonesia with 5.36%
Argentina, with 3.04%
Russian Federation with 2.73%
India with 2.48%
Egypt with 2.33%
Netherlands with 2.26%
Top Attacked Industries
Here below, we have mentioned all the top attacked industries:-
Gaming & Gambling with 5.41%
Information Technology and Internet with 4.38%
Cryptocurrency with 3.43%
Computer Software with 2.16%
Telecommunications with 1.58%
Marketing & Advertising with 1.43%
Retail with 1.36%
BFSI with 0.33%
Hospitality with 0.20%
Online Media with 0.18%
Cloudflare users with HTTP reverse proxy (CDN/WAF) are shielded from HTTP DDoS attacks. Others, including non-HTTP users and those not using Cloudflare, should adopt automated HTTP DDoS protection.
Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.
The post Cloudflare Observed The Peak DDOS Attack of 201 Million HTTP Requests Per Second appeared first on Cyber Security News.
Cyber Security News