Skip to main content

Europe just suffered its worst DDoS attack ever, but we don’t know why

A record-breaking distributed denial-of-service (DDoS) attack situated within Europe was attempted during July, a new report has confirmed, but the lack of details on the target leaves the motive undetermined.

The largest DDoS attack ever detected in European-based regions was revealed by cybersecurity and cloud service firm Akamai, who said the target was one of its own customers.

A digital depiction of a laptop being hacked by a hacker.
Digital Trends

As reported by Bleeping Computer, the target, which is based in Eastern Europe, has been subjected to numerous DDoS attacks during the last 30 days. But we’re not really sure why this organization or individual was on the receiving end of this onslaught.

Akamai stated in its report that the attempt was recorded last week on July 21. Over the course of 14 hours, the attack peaked at a whopping 853.7 Gbps (gigabits per second), as well as 659.6 Mpps (million packets per second).

For reference, a DDoS attack is when a threat actor tries to overwhelm the target’s systems and effectively disable its operations by directing an unmanageable amount of traffic to that infrastructure.

Although Akamai understandably opted to not divulge information pertaining to who its client is, it confirmed that the unprecedented DDoS attack was prevented via mitigation methods it had in place.

The threat actor specifically concentrated its efforts on various specific IP addresses. As we touched on above, the attack itself was not an isolated, one-off incident. In fact, the target was connected to 75 DDoS attempts in July alone.

A large monitor displaying a security hacking breach warning.
Stock Depot / Getty Images

Hackers preferred to use the UDP (user datagram protocol) flood in its record-breaking DDoS attempt, which was discovered in both record spikes. They didn’t stop there, though. Its arsenal of tools included other methods, such as UDP fragmentation, ICMP flood, RESET flood, SYN requests flood, TCP anomaly, TCP fragment, PSH ACK flood, FIN push flood, and PUSH flood.

Akamai stated that a “highly-sophisticated global botnet” of infected devices orchestrated the DDoS attacks. Bleeping Computer highlights how this follows a trend of more capable botnets trying to execute DDoS attacks on a level that’s never been seen before.

For example, cloud services firm Cloudflare managed to prevent a DDoS incident that reached 26 million requests per second (RPS) in June, which represents the biggest such attack in history.

Hackers have been quite busy as of late, especially after the pandemic. DDoS attacks are on the rise, ransomware gangs are evolving, the number of attacks in general from threat actors is accelerating at an extremely aggressive rate, newly discovered malware is nearly impossible to remove, and hackers are moving faster than ever in regard to scanning vulnerabilities.

Editors' Recommendations

Zak Islam
Computing Writer
Zak Islam was a freelance writer at Digital Trends covering the latest news in the technology world, particularly the…
Hackers just launched the largest HTTPS DDoS attack in history
A depiction of a hacker breaking into a system via the use of code.

The largest ​​HTTPS distributed denial-of-service (DDoS) attack in history materialized last week, Cloudflare has confirmed.

Cloudflare, which specializes in DDoS mitigation, announced that it successfully prevented the record-breaking onslaught before it could inflict any real damage.

Read more
Cloudflare just stopped one of the largest DDoS attacks ever
Hands on a laptop.

Cloudflare, a company that specializes in web security and distributed denial of service (DDoS) attack mitigation, just reported that it managed to stop an attack of an unprecedented scale.

The HTTPS DDoS attack was one of the largest such attacks ever recorded, and it came from unusual sources -- data centers.

Read more
Microsoft stopped the largest DDoS attack ever reported
Nvidia T4 Enterprise Server Wall

Distributed Denial-of-Service (DDoS) attacks have become more common, and Microsoft recently published a blog post looking into the trends for such attacks on its own servers. In that post, the company says that, at one point, it stopped one of the largest-ever-recorded DDoS attacks on a Microsoft Azure server in Asia.

According to Microsoft's data, in November, an unnamed Azure customer in Asia was targeted with a DDoS attack with a throughput of 3.47 Tbps and a packet rate of 340 million packets per second (pps.) The attack came from 10,000 sources from multiple countries across the globe, including China, South Korea, Russia, Iran, and Taiwan. The attack itself lasted 15 minutes. Yet it is not the first one of such scale, as there were two additional attacks, one of 3.25 Tbps and another of 2.55 Tbps in December in Asia.

Read more