Zayo Group Holdings, Inc., a prominent global player in communication infrastructure, has unveiled its annual Distributed Denial of Service (DDoS) Insights Report, shedding light on the alarming rise of DDoS attacks and their profound impact across various sectors during the first half of 2023.
According to Google Cloud, it successfully stopped the greatest distributed denial-of-service (DDoS) assault ever, which reached a peak of 46 million requests per second (rps). One Google Cloud client who was utilizing the DDoS protection service Google Cloud Armor was the target of the assault on June 1. The attackers blasted consumers’ HTTP/S Load Balancer with HTTPS requests for 69 minutes, starting with 10,000 rps and quickly scaling up to 100,000 rps until peaking at a stunning 46 million rps. The assault was notable not just for its surprisingly enormous level of traffic, but also for other factors. 5,256 source IPs from 132 different countries participated in the assault. According to Google, it is the largest ever attack at Layer 7, which refers to the applications top layer in the Internet’s OSI model. The assault on Google’s client was nearly twice as large as a June HTTPS…
There has recently been a significant surge in Distributed Denial-of-Service (DDoS) assaults all around the world. A DDoS attack is a malicious attempt to interrupt regular traffic to a targeted server, service, or network by flooding the target or its surrounding infrastructure with excessive Internet traffic. Cloudflare has reported that it has neutralized a Distributed Denial-of-Service attack that leveraged about 15,000 compromised devices and topped at just under 2 Tbps of bandwidth. The assault was believed to have employed a combination of Mirai-infected Internet of Things devices, which are frequently used to conduct enormous DDoS attacks, and unpatched versions of the GitLab developer tool. The DDoS assault comes only a few weeks after Rapid7 announced a GitLab vulnerability on November 1, 2021, rated a full 10.0 on the CVSS severity scale, that could be leveraged to enable an attacker to remotely run code, and warned that exploitation would…