Wednesday , October 30 2024

DDoS Attacks at 633.7 Gbps Combining ACK, PUSH, RESET, and SYN Packets

The DDoS attack is constantly evolving due to advancements in technology and the changing motivations of attackers. Recent cases have shown that these attacks can cause significant damage and have severe legal consequences.

ALSO READ:

Rented bank account used to illegal transection: 5 arrested

The Indian Cyber Crime Coordination Centre (I4C) has warned about illegal payment gateways set up by transnational cyber criminals using...
Read More
Rented bank account used to illegal transection: 5 arrested

Successfully held “InfoSecCon-2024″at Dhaka Bangladesh

With a festive look and the participation of more than one hundred participants from Bangladesh cyber industry, another successful cyber...
Read More
Successfully held “InfoSecCon-2024″at Dhaka Bangladesh

Bangladeshi hacker hack for girlfriend’s expenses; finally caught

Fazle Hassan Anik hacked girls' Facebook accounts to steal sensitive pictures, which he used to blackmail them for money. He...
Read More
Bangladeshi hacker hack for girlfriend’s expenses; finally caught

Bangladeshi Social media flooded with unauthorized withdrawals from bank accounts

Bangladeshi Social media posts have raised concerns about unauthorized withdrawals from bank accounts, affecting at least 7 to 8 people...
Read More
Bangladeshi Social media flooded with unauthorized withdrawals from bank accounts

Unprotected UN Database Exposes 228GB of Gender Violence Victims’ Data

Cybersecurity researcher Jeremiah Fowler found a non-password-protected database with 115,000 records linked to the UN Trust Fund to End Violence...
Read More
Unprotected UN Database Exposes 228GB of Gender Violence Victims’ Data

Cisco Issues Urgent Fix for ASA and FTD Software Vulnerability

Cisco announced updates on Wednesday to fix a security flaw in its Adaptive Security Appliance (ASA) that is currently being...
Read More
Cisco Issues Urgent Fix for ASA and FTD Software Vulnerability

Hackers Earn $500,000 on First Day of Pwn2Own Ireland 2024

White hat hackers at the Pwn2Own Ireland 2024 contest by Trend Micro's Zero Day Initiative earned $500,000 on the first...
Read More
Hackers Earn $500,000 on First Day of Pwn2Own Ireland 2024

Fortinet + Crowdstrike team on protection from endpoint to firewall

In today's rapidly changing cybersecurity environment, organizations encounter numerous complex threats targeting endpoints and networks. CrowdStrike and Fortinet have partnered...
Read More
Fortinet + Crowdstrike team on protection from endpoint to firewall

Sophos to Acquire Secureworks in $859M

Sophos, based in the UK, is to acquire Secureworks, a Nasdaq-listed company, for $859 million in cash from Dell Technologies....
Read More
Sophos to Acquire Secureworks in $859M

2nd time hacker breached Internet Archive

The Internet Archive was breached again, this time through their Zendesk email support platform, following warnings that threat actors had...
Read More
2nd time hacker breached Internet Archive

MGM hacker hit at least 100 organizations

Akamai Prolexic’s DDoS defense platfam has successfully thwarted the most colossal DDoS attack ever recorded on a prominent U.S. financial institution’s platform. The attack, which unleashed a formidable torrent of 633.7 Gbps and 55.1 Mpps, was powerfully neutralized.

Akamai security analysts reported a major DDoS attack that lasted less than 2 minutes. During the attack, the threat actors used a combination of flood attack vectors.

ACK
PUSH
RESET
SYN

In Europe and the Asia-Pacific region, Prolexic‘s DDoS protection shield platform successfully thwarted numerous unprecedented attacks. Among them, a staggering 704.8 million packets per second (Mpps) spike in September 2022 and an astounding 900.1 gigabits per second (Gbps) surge in February 2023 were skillfully neutralized.
Malicious Traffic source

Here below, Akamai have mentioned the top malicious traffic sources:-

Bulgaria
Brazil
China
India
United States
Thailand
Russia
Ukraine
Vietnam
Japan

   Distribution of peacetime traffic and attack traffic (Source – Akamai)

Akamai mentioned the following recommendations :-

  • Make sure to adopt CISA recommendations promptly.
  • Check all the key subnets and IPs for effective mitigation controls.
  • Establish continuous DDoS security controls as your initial defense layer.
  • Enhance security with advanced network cloud firewall beyond basic DDoS protection.
  • Form a proactive crisis team and keep incident plans and runbooks up to date.

Check Also

Internet archive

2nd time hacker breached Internet Archive

The Internet Archive was breached again, this time through their Zendesk email support platform, following …

Leave a Reply

Your email address will not be published. Required fields are marked *