Posted on Leave a comment

Microsoft Blocks Record 2.4 Tbps DDoS Attack On Azure Customers.

Amir Dahan, Senior programme manager for Azure Networking, stated in a blog post  describing it as a “UDP reflection” that lasted around 10 minutes. That’s 140 percent more than 2020’s 1 Tbps attack and better than any previous community volumetric event detected on Azure.

Microsoft said on Monday that its Azure cloud platform neutralised a 2.4 Tbps distributed denial-of-service (DDoS) attack against an unidentified user in Europe in the final week of August, exceeding a 2.3 Tbps attack prevented by Amazon Web Services in February 2020.

Microsoft had reported that they had prevented 2.4 Tbps of distributed denial-of-service(DDOS) which had  came from over 70,000 different sources across the Asia-Pacific area, including Malaysia, Vietnam, Taiwan, Japan, and China, as well as the United States. It  increased  up to terabit quantities in seconds. While 2.3 Tbps was the largest ever till 2020 which was faced by AWS cloud vendor, Microsoft’s Azure customers was the latest victim which noticed attacks on three variation such as on the first at 2.4 Tbps, the second at 0.55 Tbps, and the third at 1.7 Tbps.

DDoS attack 1080P, 2K, 4K, 5K HD wallpapers free download | Wallpaper Flare

Wider range of attack sources and industries targeted

The top source countries to generate DDoS attacks were the United States and Russia, followed by the United Kingdom. Unknown sources indicate that the autonomous system numbers (ASNs) were either garbage, spoofed, or private ASNs that we could not translate.Most attacks were concentrated in Europe, Asia, and the US as the financial services and gaming industries are especially vulnerable to DDoS attacks, although we also saw that a wider range of industries were just as susceptible.

Source: Microsoft

The top source countries to generate DDoS attacks were the United States and Russia, followed by the United Kingdom. Unknown sources indicate that the autonomous system numbers (ASNs) were either garbage, spoofed, or private ASNs that we could not translate.

Most attacks were concentrated in Europe, Asia, and the US as the financial services and gaming industries are especially vulnerable to DDoS attacks, although we also saw that a wider range of industries were just as susceptible.

Finally Dahan Reported that , “Bad actors are looking for methods to take applications offline today more than ever.” Attacks of this size indicate bad actors have the   ability to cause damage by flooding targets with massive traffic volumes in an attempt to limit network capacity.”  

–-For more Cyber security news in crisp content . Please follow our site via twitter handle @cyberworkx1, Linkedin handle @linkedin

Leave a Reply