- FASTNETMON detected record of 1.5 billion packages per second attack DDOS
- Traffic came from IoT devices kidnapped and routine mikrotik in 11,000 networks
- FASTNETMON warns of ISP level filtering is essential for stopping large -scale future floods
Fastnetmon has seen a distributed attack of denial of service aimed at a DDOS mitigation provider somewhere in Western Europe.
The firm says that the attack reached its maximum point in a huge package of 1.5 billion per second, which makes it one of the largest package rate floods confirmed to date.
Fastnetmon says that traffic was mainly a UDP flood of equipment committed to customer facilities, including IoT devices and Mikrotik routers.
Part of a dangerous tendency
According to reports, the attack was based on resources of more than 11,000 unique networks worldwide.
The target company was not appointed, although Fastnetmon described it as a scrubbing ddos provider, a type of service that filters malicious traffic during this type of attack.
“This event is part of a dangerous trend,” said Pavel Odintsov, founder of Fastnetmon. “When tens of thousands of CPE devices can be kidnapped and used in the floods of coordinated packages of this magnitude, the risks for network operators grow exponentially. The industry must act to implement the logic of detection at the ISP level to stop the outgoing attacks before they climb.”
The attack was detected and managed in real time, with fastnetmon systems that automatically identify abnormal traffic in seconds.
Mitigation efforts were based on scrubbing technology in customer facilities and involved the implementation of access control lists in rings that are known to be vulnerable to amplification techniques.
Fastnetmon says that its platform is designed to process events on this scale by using C ++ algorithms optimized to provide visibility to network traffic.
The rapid action allowed the attacked company to resist the attack without any visible interruption in its service.
This announcement follows the recent dissemination of Cloudflare of a record volumetric attack that reached 11.5 Tbps and 5.1 billion packages per second.
“Taken together, the two incidents underline an increase in floods of packages and bandwidth rate, a trend that presses the capacity of mitigation platforms worldwide,” said Fastmon.
“What makes this case remarkable is the large number of distributed sources and the abuse of everyday networks. Without proactive ISP level filtering, committed consumption hardware can be arranged on a large scale,” the company warned.