Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Threat actor weaponizes Hexstrike AI to exploit Citrix’s flaws within a week of disclosure

Data leaks before a disaster

Can I change the tide?

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CloudFlare blocks record-breaking 11.5 TBPS DDOS attacks
Identity

CloudFlare blocks record-breaking 11.5 TBPS DDOS attacks

userBy userSeptember 3, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 3, 2025Ravi LakshmananThreat Intelligence/Network Security

CloudFlare said Tuesday it automatically mitigates record-breaking volume distributed denial-of-service (DDOS) attacks, which peaked at 11.5 terabits per second (TBPS).

“Over the past few weeks, we have autonomously blocked hundreds of ultrasound DDOS attacks reaching their peak peaks of 5.1 BPPS and 11.5 TBP.

The entire attack lasted only about 35 seconds, but the company says “defense is working overtime.”

Volume Measurement DDOS attacks are designed to overwhelm targets with tsunamis of traffic, causing servers to slow or fail. These attacks usually result in network congestion, packet loss, and service disruption.

Such attacks are done by using malware, such as computers, IoT devices, or other machines, to send requests from botnets under threat actor control after infecting the device.

Audit and subsequent

“The initial impact of a volume attack is to create congestion that can degrade the performance of network connections to the Internet, servers, and protocols and cause outages,” Akamai said in a descriptive note.

“However, attackers may use volume attacks as a more refined exploit cover, which is called “smoke screen” attacks. As security teams work diligently to mitigate volume attacks, attackers may launch additional attacks (multi-vectors).

The development will only take two months since CloudFlare said it reached its peak at 7.3 Tbps in mid-May 2025, blocking DDOS attacks targeting unnamed hosting providers.

In July 2025, the company said it would skyrocket in the second quarter of 2025, scaling a new high of 6,500 compared to the Q1 2025 high voltage DDOS attack, exceeding high voltage DDOS attacks (L3/4 DDOS attacks) or 1 TBPS.

This development occurred as Bitsight detailed the Rapperbot Kill chain. It targets network video recorders (NVRs) and other IoT devices with the aim of participating in botnets that can carry out DDOS attacks. The botnet infrastructure was removed last month as part of law enforcement operations.

In the attack documented by a cybersecurity company, it is said that threat actors exploited the security flaws in the NVR to gain initial access, installed a remote NFS file system and downloaded the next stage wrapper bot payload (“104.194.9[.]127”) and do it.

This is achieved by a web server’s path traversal flaw, leaking valid admin credentials and using it to push fake firmware updates that run a set of BASH commands that mount Share and run Rapperbot binaries based on system architecture.

“It’s no wonder that an attacker chose to use an NFS mount to run from that share. With this NVR firmware being so limited, installing an NFS is actually a very clever choice,” said security researcher Pedro Umberino. “Of course, this means that attackers had to thoroughly investigate this brand and model and design exploits that could work under these limited conditions.”

CIS Build Kit

The malware then retrieves the DNS TXT records associated with a set of hardcoding domains (“iranistrash[.]Libre “and” pool.rentcheapcars[.]SBS “To get the actual list of actual command and control (C2) server IP addresses.

The C2 IP address is mapped to the C2 domain where fully qualified domain names (FQDNs) are generated using a simplified Domain Generation Algorithm (DGA) consisting of a combination of four domains, four subdomains, and two top-level domains (TLDs). FQDNS is resolved using a hard-coded DNS server.

Rapperbot will establish an encrypted connection to the C2 domain using a valid DNS TXT record description that has received the commands needed to launch the DDOS attack. Malware can also direct it to scan the open port’s internet to further transmit infections.

“Their methodology is simple: they make the Internet run by erratic edge devices (such as DVRs or routers), brute-force or exploiting them to run botnet malware,” Bitsite said. “The reality is that it’s just scanned and infected over and over again, and it doesn’t require persistence because vulnerable devices continue to be exposed there and are easier to spot than ever before.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleOffline biometric authentication and tokenisation
Next Article £7.8 million UKAEA investment bolsters UK fusion energy training
user
  • Website

Related Posts

Threat actor weaponizes Hexstrike AI to exploit Citrix’s flaws within a week of disclosure

September 3, 2025

Data leaks before a disaster

September 3, 2025

Iranian hackers misuse email accounts of over 100 embassies in global phishing targeting diplomats

September 3, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Threat actor weaponizes Hexstrike AI to exploit Citrix’s flaws within a week of disclosure

Data leaks before a disaster

Can I change the tide?

Iranian hackers misuse email accounts of over 100 embassies in global phishing targeting diplomats

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Beyond Compliance: The New Era of Smart Medical Device Software Integration

Unlocking Tomorrow’s Health: Medical Device Integration

Web 3.0’s Promise: What Sir Tim Berners-Lee Envisions for the Future of the Internet

TwinH’s Paves Way at Break The Gap 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.