Friday , March 21 2025

DDoS Attacks at 633.7 Gbps Combining ACK, PUSH, RESET, and SYN Packets

The DDoS attack is constantly evolving due to advancements in technology and the changing motivations of attackers. Recent cases have shown that these attacks can cause significant damage and have severe legal consequences.

ALSO READ:

IBM and Veeam Release Patches in AIX System and Backup

IBM has resolved two critical vulnerabilities in its AIX operating system that could allow command execution. The list of shortcomings,...
Read More
IBM and Veeam Release Patches in AIX System and Backup

WhatsApp patched zero-click flaw exploited in spyware attacks

WhatsApp has patched a zero-click, zero-day vulnerability used to install Paragon's Graphite spyware following reports from security researchers at the...
Read More
WhatsApp patched zero-click flaw exploited in spyware attacks

CVE-2025-24472
CISA Warns of Fortinet FortiOS Auth Bypass Vuln Exploited in Wild

CISA has issued a critical alert about a critical vulnerability in Fortinet’s FortiOS and FortiProxy systems. CVE-2025-24472, an authentication bypass...
Read More
CVE-2025-24472  CISA Warns of Fortinet FortiOS Auth Bypass Vuln Exploited in Wild

11 state hackers exploit new Windows zero-day since 2017

11 nation-state groups from North Korea, China, and Russia are exploiting a vulnerability in a common feature of Microsoft Windows....
Read More
11 state hackers exploit new Windows zero-day since 2017

Hackers Exploit ChatGPT with CVE-2024-27564

Attackers are actively targeting OpenAI, exploiting CVE-2024-27564, a Server-Side Request Forgery (SSRF) vulnerability in OpenAI’s ChatGPT infrastructure. Veriti’s latest research...
Read More
Hackers Exploit ChatGPT with CVE-2024-27564

(CVE-2024-540385)
CVSS 10 Alert! HPE Cray Vulnerability Authentication Bypass Threat

A critical vulnerability, CVE-2024-540385, has been found in HPE Cray XD670 servers using the AMI BMC Redfish API, allowing remote...
Read More
(CVE-2024-540385)  CVSS 10 Alert! HPE Cray Vulnerability Authentication Bypass Threat

CVE-2025-24813
Apache Tomcat Flaw Exploited In The Wild

CVE-2025-24813, a critical remote code execution vulnerability, is actively exploited, enabling attackers to control vulnerable Apache Tomcat servers with a...
Read More
CVE-2025-24813  Apache Tomcat Flaw Exploited In The Wild

B1nary_Band1ts secure first for “MIST CyberTron 2025”

MIST Cyber Security Club hosted an exciting MIST CyberTron 2025, featuring a CTF competition, hacking sessions, live demonstrations, and real-world...
Read More
B1nary_Band1ts secure first for “MIST CyberTron 2025”

CVE-2025-24016
Critical RCE vulnerability affects Wazuh

Cybersecurity researchers unveil a critical remote code execution vulnerability (CVE-2025-24016) in Wazuh, a popular open-source SIEM platform. The vulnerability has...
Read More
CVE-2025-24016  Critical RCE vulnerability affects Wazuh

AWS SNS misused for Data Exfiltration and Phishing

A recent report from Elastic reveals that threat actors misuse Amazon Web Services (AWS) Simple Notification Service (SNS) for malicious...
Read More
AWS SNS misused for Data Exfiltration and Phishing

MGM hacker hit at least 100 organizations

Akamai Prolexic’s DDoS defense platfam has successfully thwarted the most colossal DDoS attack ever recorded on a prominent U.S. financial institution’s platform. The attack, which unleashed a formidable torrent of 633.7 Gbps and 55.1 Mpps, was powerfully neutralized.

Akamai security analysts reported a major DDoS attack that lasted less than 2 minutes. During the attack, the threat actors used a combination of flood attack vectors.

ACK
PUSH
RESET
SYN

In Europe and the Asia-Pacific region, Prolexic‘s DDoS protection shield platform successfully thwarted numerous unprecedented attacks. Among them, a staggering 704.8 million packets per second (Mpps) spike in September 2022 and an astounding 900.1 gigabits per second (Gbps) surge in February 2023 were skillfully neutralized.
Malicious Traffic source

Here below, Akamai have mentioned the top malicious traffic sources:-

Bulgaria
Brazil
China
India
United States
Thailand
Russia
Ukraine
Vietnam
Japan

   Distribution of peacetime traffic and attack traffic (Source – Akamai)

Akamai mentioned the following recommendations :-

  • Make sure to adopt CISA recommendations promptly.
  • Check all the key subnets and IPs for effective mitigation controls.
  • Establish continuous DDoS security controls as your initial defense layer.
  • Enhance security with advanced network cloud firewall beyond basic DDoS protection.
  • Form a proactive crisis team and keep incident plans and runbooks up to date.

Check Also

SuperBlack

CVE-2024-55591 and CVE-2025-24472
New SuperBlack ransomware exploits Fortinet flaws

Forescout Research- Vedere Labs identified a series of intrusion based on two Fortinet vulnerabilities which …

Leave a Reply

Your email address will not be published. Required fields are marked *