News

Google Blocked a DDoS Attack with a Capacity of 46 million Requests per Second

In June 2022, an unnamed Google Cloud Armor client suffered a DDoS attack over HTTPS that reached a bandwidth of 46 million RPS (requests per second). To date, this is the largest DDoS attack of this type in history.

Let me remind you that we also reported that The number of ransomware DDoS attacks has dropped significantly, and also that Taiwan resources hit by DDoS attacks and defaces due to Nancy Pelosi’s visit.

Let me remind you that the previous record in this area was recorded at the beginning of summer by Cloudflare specialists. At that time, an incident with a capacity of 26 million RPS was reported, behind which was a small but very dangerous Mantis botnet, consisting of only 5,000 devices.

As Google experts now report, on the morning of June 1 of this year, an attack began, initially targeting the HTTP / S load balancer of one of the clients, and at first its power was only 10,000 RPS.

Just eight minutes later, this attack increased to 100,000 RPS, triggering Google Cloud Armor Protection. Two minutes later, the attack peaked at 46 million requests per second. In total, the DDoS lasted 69 minutes.

DDoS attack on Google

To describe the scale of the incident, Google engineers write that this attack was equivale to getting all the daily Wikipedia requests in just 10 seconds.

We believe that the attacker probably decided that he did not achieve the desired effect, while incurring significant costs to carry out the attack.the company’s report reads.

Researchers believe that the Mēris botnet, already known from other high-profile incidents, was behind this attack.

According to Google, the attack traffic came from just 5,256 IP addresses scattered across 132 countries and exploited HTTPS, which means that the devices that sent the requests have very impressive computing resources. Another distinguishing feature of this attack was the use of Tor exit nodes. Although 22% (1169) of the sources sent requests through the Tor network, they accounted for only about 3% of the total attack traffic.
Sending
User Review
0 (0 votes)
Comments Rating 0 (0 reviews)

Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Sending

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Back to top button