AT2k Design BBS Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages!

You are not logged in. Login here for full access privileges.

Previous Message | Next Message | Back to Slashdot  <--  <--- Return to Home Page
   Local Database  Slashdot   [2 / 116] RSS
 From   To   Subject   Date/Time 
Message   VRSS    All   Record DDoS Pummels Site With Once-Unimaginable 7.3Tbps of Junk   June 20, 2025
 6:00 PM  

Feed: Slashdot
Feed Link: https://slashdot.org/
---

Title: Record DDoS Pummels Site With Once-Unimaginable 7.3Tbps of Junk
Traffic

Link: https://yro.slashdot.org/story/25/06/20/20102...

An anonymous reader quotes a report from Ars Technica: Large-scale attacks
designed to bring down Internet services by sending them more traffic than
they can process keep getting bigger, with the largest one yet, measured at
7.3 terabits per second, being reported Friday by Internet security and
performance provider Cloudflare. The 7.3Tbps attack amounted to 37.4
terabytes of junk traffic that hit the target in just 45 seconds. That's an
almost incomprehensible amount of data, equivalent to more than 9,300 full-
length HD movies or 7,500 hours of HD streaming content in well under a
minute. Cloudflare said the attackers "carpet bombed" an average of nearly
22,000 destination ports of a single IP address belonging to the target,
identified only as a Cloudflare customer. A total of 34,500 ports were
targeted, indicating the thoroughness and well-engineered nature of the
attack. [...] Cloudflare said the record DDoS exploited various reflection or
amplification vectors, including the previously mentioned Network Time
Protocol; the Quote of the Day Protocol, which listens on UDP port 17 and
responds with a short quote or message; the Echo Protocol, which responds
with the same data it receives; and Portmapper services used identify
resources available to applications connecting through the Remote Procedure
Call. Cloudflare said the attack was also delivered through one or more Mirai-
based botnets. Such botnets are typically made up of home and small office
routers, web cameras, and other Internet of Things devices that have been
compromised.

Read more of this story at Slashdot.

---
VRSS v2.1.180528
  Show ANSI Codes | Hide BBCodes | Show Color Codes | Hide Encoding | Hide HTML Tags | Show Routing
Previous Message | Next Message | Back to Slashdot  <--  <--- Return to Home Page

VADV-PHP
Execution Time: 0.0132 seconds

If you experience any problems with this website or need help, contact the webmaster.
VADV-PHP Copyright © 2002-2025 Steve Winn, Aspect Technologies. All Rights Reserved.
Virtual Advanced Copyright © 1995-1997 Roland De Graaf.
v2.1.250224