Largest DDoS Attacks: Are we safe?

27.04.2018 2,044 0

DDoS attacks are starting to be common. No matter what kind of business you have, you for sure, have suffered at least once a DDoS attack.

Those attacks are thanks to the many cyber-criminals out there and the growing number of unprotected IoT devices. They are making stronger DDoS attacks every year. Let’s show you some of the largest DDoS attacks ever recorded.

  1. March has been full of DDoS attacks. On the 5th the US service provider Arbor Networks was hit by the largest ever Distributed Denial of Service Attack – 1.7Tbps. The considerable number was achieved by exploiting the UDP port 11211. DNS servers use UDP because it is fast, but it lacks verification which makes it vulnerable to IP spoofing. This attack is called memcaching.
  2. On March the 1st 2018, GitHub was hit by the largest DDoS attack yet. At its peak it was 1.35Tbps. The type of attack was again memcaching. It uses an exploit to amplify the attack massively – 50 times! GitHub was down for about 10 minutes.
  3. Dyn DDoS attack. On October 21st 2016, the DNS provider Dyn had a terrible day. Even they are quite big, they had their servers down. This affected all their clients including big brands like Netflix, Twitter, Reddit, Amazon and more. The problem was the botnet of IoT called Mirai. It hijacked many connected devices and the attack was amplified to 1.2Tbps* (the number is not confirmed).
  4. Kerbs on Security. Just one month before, there was another DDoS related to the Mirai botnet. The traffic was around the half 665 Gbps, and luckily Kerbs’s security managed to resist it.
  5. BBC attack of 2016. On the New Year’s Eve, the popular media was attacked by New World Hacking group. The attack of 620Gbps caused some downtime. BBC is often a victim of DDoS attacks, they suffered a large one in 2015 as well.

So the DDoS attacks are getting stronger and more frequent. Can we do something about it?

Yes! We can choose a DNS Protection. Thanks to it we can reduce a lot the traffic by filtering it and load balancing it on different servers. This way your servers can withstand most of the DDoS attacks and your clients won’t be left without a service.

Leave a Reply

Your email address will not be published.