Google Discloses Biggest-Ever DDoS Attack

Google has said it fended off a record-breaking distributed denial-of-service (DDoS) attack in 2017.

The company said the 2.5 Tbps attack in September 2017 was carried out from within China, originating from the network of four Chinese internet service providers.

Damian Menscher, a security reliability engineer for Google Cloud, said the 2.5 Tbps peak was the “culmination of a six-month campaign” that used multiple methods of attack to disrupt Google’s infrastructure.

“Despite simultaneously targeting thousands of our IPs, presumably in hopes of slipping past automated defenses, the attack had no impact,” Mescher said.

Can more data save our climate?

Record-breaker

He said the incident demonstrates the volumes of DDoS traffic that can be achieved by a “well-resourced attacker”.

“This was four times larger than the record-breaking 623 Gbps attack from the Mirai botnet a year earlier,” he said, adding that it remains the highest-bandwidth attack to date.

An attack on Amazon Web Services’ (AWS) infrastructure in February of this year, peaking at 2.3 Tbps, was previously thought to be the biggest-ever DDoS attack.

Google disclosed the incident as part of a study into “exponential growth” in DDoS attack volumes.

Part of the rapid growth is due to the growth of the internet itself, which also provides bandwidth and compute resources to those defending against such attacks, Menscher noted.

“After accounting for the expected growth, the results are less concerning, though still problematic,” he said in the study.

Disruption

DDoS attacks are increasingly being used by criminals and nation-state groups to disrupt targets, for political or financial gain.

Security firm Radware last week warned of increasing activity by an unknown group threatening companies in a range of sectors with DDoS attacks unless they paid a Bitcoin ransom.

The group’s messages claim the threats originate with the “Fancy Bear”, “Armada Collective” or “Lazarus Group” hacking groups, depending on the intended recipient.

Radware advised organisations not to pay the ransom, as there is no guarantee the attackers will honour the terms of their threat.

“Paying only funds future operations, allows them to improve their capabilities and motivates them to continue the campaign,” the company said.

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

France Fines Apple Over Ad Tracking Feature

Apple fined 150m euros over App Tracking Transparency feature that it says abuses Apple's market…

21 hours ago

OpenAI To Release Open-Weight AI Model

OpenAI to release customisable open-weight model in coming months as it faces pressure from open-source…

22 hours ago

Samsung AI Fridge Creates Shopping Lists, Adjusts AC

Samsung's Bespoke AI-powered fridge monitors food to create shopping lists, displays TikTok videos, locates misplaced…

22 hours ago

Huawei Consumer Revenues Surge Amidst Smartphone Comeback

Huawei sees 38 percent jump in consumer revenues as its smartphone comeback continues to gather…

23 hours ago

China Approves First ‘Flying Car’ Licences

In world-first, China approves commercial flights for EHang autonomous passenger drone, paving way for imminent…

23 hours ago

Microsoft Shutters Shanghai Lab In Latest China Pullback

Microsoft closes down IoT and AI lab it operated in Shanghai tech district in latest…

24 hours ago