Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Meta fixes a bug that lets users leak AI prompts and can generate content

AV Startup Pronto.ai gets off-road self-driving car rival Safeai

Mira Murati’s Thinking Machine Lab is worth $12 billion in seed round

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Ultra-Volume Measurement DDOS Attack has reached record 7.3 TBPS and targets major global sectors
Identity

Ultra-Volume Measurement DDOS Attack has reached record 7.3 TBPS and targets major global sectors

userBy userJuly 15, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

July 15, 2025Ravi LakshmananBotnet/Network Security

Ultra-Volume Measurement DDOS Attack

CloudFlare said Tuesday it mitigated a 7.3 million distributed denial-of-service (DDOS) attack in the second quarter of 2025, significantly lowering its 20 million DDOS attack, which it lost in the last quarter.

“Overall, the second quarter of 2025 saw a surge in ultra-volume DDOS attacks,” said Omer Yoachimik and Jorge Pacheco. “CloudFlare blocked over 6,500 ultra-volume DDOS attacks, averaged 71 per day.”

In the first quarter of 2025, the company said an 18-day sustained campaign against its own and other critical infrastructure protected by CloudFlare was responsible for the 13.5 million attacks observed over the period. Cumulatively, CloudFlare blocked nearly 28 million DDO attacks, exceeding the number of attacks it mitigated throughout 2024.

Cybersecurity

What’s notable about the second quarter of 2025 attack is the incredible DDOS attack, which peaked at 7.3 terabits per second (TBPS) and 4.8 billion packets (BPP) within 45 seconds.

While these large traffic spikes make headlines, what is often overlooked is how attackers are combined with smaller target probes. Instead of an overwhelming system with brute force, they mix large floods with quiet scans to slip past defenses built to find weak spots and block only the obvious.

Layer 3/Layer 4 (L3/4) DDOS attacks fell by 81% quarter to 3.2 million, while HTTP DDOS attacks increased by 9% to 4.1 million. Over 70% of HTTP DDOS attacks came from known botnets. The most common L3/4 attack vectors were flood attacks carried out via DNS, TCP Syn, and UDP protocols.

Communications service providers and carriers were the most targeted, followed by the Internet, IT services, gaming and gambling sectors.

China, Brazil, Germany, India, South Korea, Turkey, Hong Kong, Vietnam, Russia and Azerbaijan emerged as the most attacked locations based on the claims of Cloudfraa customers. Indonesia, Singapore, Hong Kong, Argentina and Ukraine were the top five sources for the DDOS attack.

Web infrastructure and security companies also revealed that the number of high-voltage DDOS attacks exceeding 100 million packets per second (PPS) (PPS) increased by 592% compared to the previous quarter.

Another important aspect is the 68% increase in ransom DDOS attacks. This happens when a malicious actor tries to force money from an organization by threatening it with a DDOS attack. It also includes scenarios in which the attack is carried out and scenarios in which a ransom is required to prevent it from happening again.

“The majority of DDOS attacks are small, but the size and frequency of ultra-volume DDOS attacks are increasing,” CloudFlare said. “If six of the 100 HTTP DDOS attacks exceed 1M RPS and five of the 10,000 L3/4 DDOS attacks exceed 1 Tbps, a QOQ increase of 1,150%.”

Cybersecurity

The company will also be joining DDOS botnets that can run UDP, TCP and application layer floods, bringing attention to Linux-based systems, botnet variants called Demonbots that infect IoT devices that are primarily not responsible for, via open ports or weak credentials.

“Attacks are usually command and control (C2) driven, and can often target games, hosting or enterprise services to generate significant volume traffic,” he added. “Use antivirus software and domain filtering to avoid infection.”

Infection vectors, such as those exploited by Demonbot, highlight the broader challenges with unsecured IoT exposure, weak SSH credentials, and outdated firmware. Related attack strategies such as TCP reflection, DNS amplification, and burst layer avoidance are increasingly debated in CloudFlare’s application layer threat reporting and API security breakdowns.

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleThe newly launched global group Raas will expand operations with AI-driven negotiation tools
Next Article Mira Murati’s Thinking Machine Lab is worth $12 billion in seed round
user
  • Website

Related Posts

The newly launched global group Raas will expand operations with AI-driven negotiation tools

July 15, 2025

State-backed HagyBeacon malware uses AWS Lambda to steal data from SE Asian government

July 15, 2025

How to protect invisible identity access

July 15, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Meta fixes a bug that lets users leak AI prompts and can generate content

AV Startup Pronto.ai gets off-road self-driving car rival Safeai

Mira Murati’s Thinking Machine Lab is worth $12 billion in seed round

AI coding tools are moving to amazing locations: terminals

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

ICEX Forum 2025 Opens: FySelf’s TwinH Showcases AI Innovation

The Future of Process Automation is Here: Meet TwinH

Robots Play Football in Beijing: A Glimpse into China’s Ambitious AI Future

TwinH: A New Frontier in the Pursuit of Immortality?

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.