
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 07:22:33 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Cloudflare mitigates record-breaking 71 million request-per-second DDoS attack]]></title>
            <link>https://blog.cloudflare.com/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/</link>
            <pubDate>Mon, 13 Feb 2023 18:37:51 GMT</pubDate>
            <description><![CDATA[ This was a weekend of record-breaking DDoS attacks. Over the weekend, Cloudflare detected and mitigated dozens of hyper-volumetric DDoS attacks. The majority of attacks peaked in the ballpark of 50-70 million requests per second (rps) with the largest exceeding 71 million rps ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4zzsCqug2fzQ1LZ9cDhPPc/f41f616c5972ce12c9dedbb8844a2147/DDoS-protection-1.png" />
            
            </figure><p>This was a weekend of record-breaking <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attacks</a>. Over the weekend, Cloudflare detected and mitigated dozens of <i>hyper-volumetric</i> DDoS attacks. The majority of attacks peaked in the ballpark of 50-70 million requests per second (rps) with the largest exceeding 71 million rps. This is the largest reported HTTP DDoS attack on record, more than 54% higher than the previous reported record of 46M rps in June 2022.</p><p>The attacks were HTTP/2-based and targeted websites protected by Cloudflare. They originated from over 30,000 IP addresses. Some of the attacked websites included a popular gaming provider, cryptocurrency companies, hosting providers, and cloud computing platforms. The attacks originated from numerous cloud providers, and we have been working with them to crack down on the botnet.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/TDtAM4ae2w8i3WkfQqd08/737282a05169368edb3dfaaa54b7afaa/1711-1.png" />
            
            </figure><p>Record breaking attack: DDoS attack exceeding 71 million requests per second</p><p>Over the past year, we’ve seen more attacks originate from cloud computing providers. For this reason, we will be providing service providers that own their own autonomous system a <a href="/botnet-threat-feed-for-isp/">free Botnet threat feed</a>. The feed will provide service providers threat intelligence about their own IP space; attacks originating from within their autonomous system. Service providers that operate their own IP space can now <a href="https://www.cloudflare.com/lp/botnet-threat-feed/">sign up</a> to the early access waiting list.</p>
    <div>
      <h3>Is this related to the Super Bowl or Killnet?</h3>
      <a href="#is-this-related-to-the-super-bowl-or-killnet">
        
      </a>
    </div>
    <p>No. This campaign of attacks arrives less than two weeks after the <a href="/uptick-in-healthcare-organizations-experiencing-targeted-ddos-attacks/">Killnet DDoS campaign that targeted healthcare websites</a>. Based on the methods and targets, we do not believe that these recent attacks are related to the healthcare campaign. Furthermore, yesterday was the US Super Bowl, and we also do not believe that this attack campaign is related to the game event.</p>
    <div>
      <h3>What are DDoS attacks?</h3>
      <a href="#what-are-ddos-attacks">
        
      </a>
    </div>
    <p>Distributed Denial of Service attacks are cyber attacks that aim to take down Internet properties and make them unavailable for users. These types of cyberattacks can be very efficient against unprotected websites and they can be very inexpensive for the attackers to execute.</p><p>An HTTP DDoS attack usually involves a <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/">flood of HTTP requests</a> towards the target website. The attacker’s objective is to bombard the website with more requests than it can handle. Given a sufficiently high amount of requests, the website’s server will not be able to process all of the attack requests along with the <i>legitimate</i> user requests. Users will experience this as website-load delays, timeouts, and eventually not being able to connect to their desired websites at all.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/41VYHEH1KGaJHxqfyuCUX3/62edd1a178f035d50b0ec325fde9d074/1711-2.png" />
            
            </figure><p>Illustration of a DDoS attack</p><p>To make attacks larger and more complicated, attackers usually leverage a network of bots — a <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/"><i>botnet</i></a>. The attacker will orchestrate the botnet to bombard the victim’s websites with HTTP requests. A sufficiently large and powerful botnet can generate very large attacks as we’ve seen in this case.</p><p>However, building and operating botnets requires a lot of investment and expertise. What is the average Joe to do? Well, an average Joe that wants to launch a DDoS attack against a website doesn’t need to start from scratch. They can hire one of numerous DDoS-as-a-Service platforms for as little as $30 per month. The more you pay, the larger and longer of an attack you’re going to get.</p>
    <div>
      <h3>Why DDoS attacks?</h3>
      <a href="#why-ddos-attacks">
        
      </a>
    </div>
    <p>Over the years, it has become easier, cheaper, and more accessible for attackers and attackers-for-hire to launch DDoS attacks. But as easy as it has become for the attackers, we want to make sure that it is even easier - and free - for defenders of organizations of all sizes to protect themselves against DDoS attacks of all types.</p><p>Unlike <a href="https://www.cloudflare.com/learning/security/ransomware/what-is-ransomware/">Ransomware</a> attacks, <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attacks</a> don’t require an actual system intrusion or a foothold within the targeted network. Usually Ransomware attacks start once an employee naively clicks an email link that installs and propagates the malware. There’s no need for that with DDoS attacks. They are more like a hit-and-run attack. All a DDoS attacker needs to know is the website’s address and/or IP address.</p>
    <div>
      <h3>Is there an increase in DDoS attacks?</h3>
      <a href="#is-there-an-increase-in-ddos-attacks">
        
      </a>
    </div>
    <p>Yes. The size, sophistication, and frequency of attacks has been increasing over the past months. In our latest <a href="/ddos-threat-report-2022-q4/">DDoS threat report</a>, we saw that the amount of HTTP DDoS attacks increased by 79% year-over-year. Furthermore, the amount of volumetric attacks exceeding 100 Gbps grew by 67% quarter-over-quarter (QoQ), and the number of attacks lasting more than three hours increased by 87% QoQ.</p><p>But it doesn’t end there. The audacity of attackers has been increasing as well. In our latest DDoS threat report, we saw that Ransom DDoS attacks steadily increased throughout the year. They peaked in November 2022 where one out of every four surveyed customers reported being subject to Ransom DDoS attacks or threats.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1dtJk2dHnMO7XbQ7RQM79W/02faf2f2a4494adf85062060581c1644/1711-3.png" />
            
            </figure><p>Distribution of Ransom DDoS attacks by month</p>
    <div>
      <h3>Should I be worried about DDoS attacks?</h3>
      <a href="#should-i-be-worried-about-ddos-attacks">
        
      </a>
    </div>
    <p>Yes. If your website, server, or networks are not protected against volumetric DDoS attacks using a cloud service that provides automatic detection and mitigation, we really recommend that you consider it.</p><p>Cloudflare customers shouldn’t be worried, but should be aware and prepared. Below is a list of recommended steps to ensure your security posture is optimized.</p>
    <div>
      <h3>What steps should I take to defend against DDoS attacks?</h3>
      <a href="#what-steps-should-i-take-to-defend-against-ddos-attacks">
        
      </a>
    </div>
    <p>Cloudflare’s systems have been automatically detecting and <a href="https://www.cloudflare.com/learning/ddos/ddos-mitigation/">mitigating</a> these DDoS attacks.</p><p>Cloudflare offers many features and capabilities that you may already have access to but may not be using. So as extra precaution, we recommend taking advantage of these capabilities to improve and optimize your security posture:</p><ol><li><p>Ensure all <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/">DDoS Managed Rules</a> are set to default settings (High sensitivity level and mitigation actions) for optimal DDoS activation.</p></li><li><p><a href="https://www.cloudflare.com/plans/enterprise/">Cloudflare Enterprise</a> customers that are subscribed to the Advanced DDoS Protection service should consider enabling <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/adaptive-protection/">Adaptive DDoS Protection</a>, which mitigates attacks more intelligently based on your unique traffic patterns.</p></li><li><p>Deploy <a href="https://developers.cloudflare.com/firewall/cf-firewall-rules/">firewall rules</a> and <a href="https://developers.cloudflare.com/waf/rate-limiting-rules/">rate limiting rules</a> to enforce a combined positive and negative security model. Reduce the traffic allowed to your website based on your known usage.</p></li><li><p>Ensure your origin is not exposed to the public Internet (i.e., <a href="https://developers.cloudflare.com/fundamentals/get-started/setup/allow-cloudflare-ip-addresses/">only enable access to Cloudflare IP addresses</a>). As an extra security precaution, we recommend contacting your hosting provider and requesting new origin server IPs if they have been targeted directly in the past.</p></li><li><p>Customers with access to <a href="https://developers.cloudflare.com/fundamentals/global-configurations/lists/ip-lists/#managed-ip-lists">Managed IP Lists</a> should consider leveraging those lists in firewall rules. Customers with <a href="https://developers.cloudflare.com/bots/get-started/bm-subscription/">Bot Management</a> should consider leveraging the bot scores within the firewall rules.</p></li><li><p>Enable <a href="https://developers.cloudflare.com/cache/">caching</a> as much as possible to reduce the strain on your origin servers, and when using <a href="https://workers.cloudflare.com/">Workers</a>, avoid overwhelming your origin server with more subrequests than necessary.</p></li><li><p>Enable <a href="https://developers.cloudflare.com/ddos-protection/reference/alerts/">DDoS alerting</a> to improve your response time.</p></li></ol>
    <div>
      <h3>Preparing for the next DDoS wave</h3>
      <a href="#preparing-for-the-next-ddos-wave">
        
      </a>
    </div>
    <p>Defending against DDoS attacks is critical for organizations of all sizes. While attacks may be initiated by humans, they are executed by bots — and to play to win, you must fight bots with bots. Detection and mitigation must be automated as much as possible, because relying solely on humans to mitigate in real time puts defenders at a disadvantage. Cloudflare’s automated systems constantly detect and mitigate DDoS attacks for our customers, so they don’t have to. This automated approach, combined with our wide breadth of security capabilities, lets customers tailor the protection to their needs.</p><p>We've been providing <a href="/unmetered-mitigation/">unmetered and unlimited DDoS protection</a> for free to all of our customers since 2017, when we pioneered the concept. Cloudflare's mission is to help build a better Internet. A better Internet is one that is more secure, faster, and reliable for everyone - even in the face of DDoS attacks.</p> ]]></content:encoded>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Botnet]]></category>
            <guid isPermaLink="false">4Z0r3SJQWb9Ja607hPbCW0</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Julien Desgats</dc:creator>
            <dc:creator>Alex Forster</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare’s free Botnet Threat Feed for service providers]]></title>
            <link>https://blog.cloudflare.com/botnet-threat-feed-for-isp/</link>
            <pubDate>Wed, 28 Sep 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ We’re pleased to introduce Cloudflare’s free Botnet Threat Feed for Service Providers. This includes all types of service providers, ranging from hosting providers to ISPs and cloud compute providers. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We’re pleased to introduce Cloudflare’s free Botnet Threat Feed for Service Providers. This includes all types of service providers, ranging from hosting providers to ISPs and cloud compute providers.</p><p>This feed will give service providers threat intelligence on their own IP addresses that have participated in HTTP DDoS attacks as observed from the Cloudflare network — allowing them to crack down on abusers, take down botnet nodes, reduce their abuse-driven costs, and ultimately reduce the amount and force of DDoS attacks across the Internet. We’re giving away this feed for free as part of our mission to help build a better Internet.</p><p>Service providers that operate their own IP space can now <a href="https://www.cloudflare.com/lp/botnet-threat-feed/">sign up</a> to the early access waiting list.</p>
    <div>
      <h3>Cloudflare’s unique vantage point on DDoS attacks</h3>
      <a href="#cloudflares-unique-vantage-point-on-ddos-attacks">
        
      </a>
    </div>
    <p>Cloudflare provides services to millions of customers ranging from small businesses and individual developers to large enterprises, including 29% of Fortune 1000 companies. Today, <a href="https://w3techs.com/technologies/overview/proxy">about 20% of websites</a> rely directly on Cloudflare’s services. This gives us a unique vantage point on tremendous amounts of DDoS attacks that target our customers.</p><p>DDoS attacks, by definition, are distributed. They originate from botnets of many sources — in some cases, from hundreds of thousands to millions of unique IP addresses. In the case of HTTP DDoS attacks, where the victims are flooded with HTTP requests, we know that the source IP addresses that we see are the real ones — they’re not <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> (altered). We know this because to initiate an HTTP request a connection must be established between the client and server. Therefore, we can reliably identify the sources of the attacks to understand the origins of the attacks.</p><p>As we’ve seen in previous attacks, such as the <a href="/26m-rps-ddos/">26 million request per second DDoS attack</a> that was launched by the <a href="/mantis-botnet/">Mantis botnet</a>, a significant portion originated from service providers such as French-based OVH (Autonomous System Number 16276), the Indonesian Telkomnet (ASN 7713), the US-based iboss (ASN 137922), the Libyan Ajeel (ASN 37284), and others.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3XH5BRiKPqeKFPM1w6fs9X/33987e9fdbe9cd9744686da03bbbeafc/image2-59.png" />
            
            </figure><p>Source service providers of a Mantis botnet attack</p><p>The service providers are not to blame. Their networks and infrastructure are abused by attackers to launch attacks. But, it can be hard for service providers to identify the abusers. In some cases, we’ve seen as little as one single IP of a service provider participate in a DDoS attack consisting of thousands of bots — all scattered across many service providers. And so, the service providers usually only see a small fraction of the attack traffic leaving their network, and it can be hard to correlate it to malicious activity.</p><p>Even more so, in the case of HTTPS DDoS attacks, the service provider would only see encrypted gibberish leaving their network without any possibility to decrypt or understand if it is malicious or legitimate traffic. However, at Cloudflare, we see the entire attack and all of its sources, and can use that to help service providers stop the abusers and attacks.</p><p>Leveraging our unique vantage point, we go to great lengths to ensure that our threat intelligence includes actual attackers and not legitimate clients.</p>
    <div>
      <h3>Partnering with service providers around the world to help build a better Internet</h3>
      <a href="#partnering-with-service-providers-around-the-world-to-help-build-a-better-internet">
        
      </a>
    </div>
    <p>Since our previous experience mitigating Mantis botnet attacks, we’ve been working with providers around the world to help them crack down on abusers. We realized the potential and decided to double down on this effort. The result is that each service provider can subscribe to a feed of their own offending IPs, for free, so they can take action and take down the abused systems.</p><p>Our mission at Cloudflare is to help build a better Internet — one that is safer, more performant, and more reliable for everyone. We believe that providing this threat intelligence will help us all move in that direction — cracking down on DDoS attackers and taking down malicious botnets.</p><p>If you are a service provider and operate your own IP space, you can now <a href="https://www.cloudflare.com/lp/botnet-threat-feed/">sign up</a> to the early access waiting list.</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Botnet]]></category>
            <category><![CDATA[Threat Intelligence]]></category>
            <category><![CDATA[Product News]]></category>
            <guid isPermaLink="false">2OjBjPlyWW0SMrAbwy9i1C</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Mantis - the most powerful botnet to date]]></title>
            <link>https://blog.cloudflare.com/mantis-botnet/</link>
            <pubDate>Thu, 14 Jul 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ We named the botnet that launched the 26M rps (requests per second) DDoS attack "Mantis" as it is also like the Mantis shrimp, small but very powerful ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2xaCCr2mMsZGNyU53yJFTP/528dd993a62021c29f531b7034347923/image5-7.png" />
            
            </figure><p>In June 2022, we reported on the largest HTTPS DDoS attack that we’ve ever mitigated — a <a href="/26m-rps-ddos/">26 million request per second attack</a> - the largest attack on record. Our systems automatically detected and mitigated this attack and many more. Since then, we have been tracking this <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">botnet</a>, which we’ve called “<b>Mantis</b>”, and the attacks it has launched against almost a thousand Cloudflare customers.</p><p>Cloudflare <a href="https://www.cloudflare.com/waf/">WAF</a>/<a href="https://www.cloudflare.com/cdn/">CDN</a> customers are protected against HTTP DDoS attacks including Mantis attacks. Please refer to the bottom of this blog for additional guidance on how to best protect your Internet properties against DDoS attacks.</p>
    <div>
      <h3>Have you met Mantis?</h3>
      <a href="#have-you-met-mantis">
        
      </a>
    </div>
    <p>We named the botnet that launched the 26M rps (requests per second) DDoS attack "Mantis" as it is also like the <a href="https://en.wikipedia.org/wiki/Mantis_shrimp">Mantis shrimp</a>, small but very powerful. Mantis shrimps, also known as “thumb-splitters”, are very small; less than 10 cm in length, but their claws are so powerful that they can generate a shock wave with a force of 1,500 <a href="https://en.wikipedia.org/wiki/Newton_(unit)">Newtons</a> at speeds of 83 km/h from a standing start. Similarly, the Mantis botnet operates a small fleet of approximately 5,000 bots, but with them can generate a massive force — responsible for the largest HTTP DDoS attacks we have ever observed.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1V9rattTw2PrfgiSOpcd9Q/96926bd3d66f5f94146b58be97e099a5/image7-3.png" />
            
            </figure><p>Mantis shrimp. Source: <a href="https://en.wikipedia.org/wiki/File:OdontodactylusScyllarus2.jpg">Wikipedia</a>.</p><p>The Mantis botnet was able to generate the 26M HTTPS requests per second attack using <b>only</b> 5,000 bots. I’ll repeat that: 26 million HTTPS requests per second using <b>only</b> 5,000 bots. That’s an average of 5,200 HTTPS rps per bot. Generating 26M HTTP requests is hard enough to do without the extra overhead of establishing a secure connection, but Mantis did it over <a href="https://www.cloudflare.com/learning/ssl/what-is-https/">HTTPS</a>. HTTPS DDoS attacks are more expensive in terms of required computational resources because of the higher cost of establishing a secure <a href="https://www.cloudflare.com/learning/ssl/transport-layer-security-tls/">TLS</a> encrypted connection. This stands out and highlights the unique strength behind this botnet.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/70DLbkvVYf1WA6sJWGbkAr/4e110635a109cf8f0d02c07971f950c5/image1-5.png" />
            
            </figure><p>As opposed to “traditional” botnets that are formed of <a href="https://www.cloudflare.com/learning/ddos/glossary/internet-of-things-iot/">Internet of Things (IoT) devices</a> such as DVRs, CC cameras, or smoke detectors, Mantis uses hijacked virtual machines and powerful servers. This means that each bot has a lot more computational resources — resulting in this combined thumb-splitting strength.</p><p>Mantis is the next evolution of the Meris botnet. The Meris botnet relied on MikroTik devices, but Mantis has branched out to include a variety of VM platforms and supports running various HTTP proxies to launch attacks. The name Mantis was chosen to be similar to "Meris" to reflect its origin, and also because this evolution hits hard and fast. Over the past few weeks, Mantis has been especially active directing its strengths towards almost 1,000 Cloudflare customers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3cfFRnyCyBOEE0mR9PMPlE/97c703de86ec5695ab95d3440e9dd478/image4-6.png" />
            
            </figure>
    <div>
      <h3>Who is Mantis attacking?</h3>
      <a href="#who-is-mantis-attacking">
        
      </a>
    </div>
    <p>In our recent <a href="/ddos-attack-trends-for-2022-q2/">DDoS attack trends report</a>, we talked about the increasing number of HTTP DDoS attacks. In the past quarter, HTTP DDoS attacks increased by 72%, and Mantis has surely contributed to that growth. Over the past month, Mantis has launched over 3,000 HTTP DDoS attacks against Cloudflare customers.</p><p>When we take a look at Mantis’ targets we can see that the top attacked industry was the Internet &amp; Telecommunications industry with 36% of attack share. In second place, the News, Media &amp; Publishing industry, followed by Gaming and Finance.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2P5E37ein7mqPYTGCT02hz/18bdce16fd1826deae687ac2981bc17e/image2-7.png" />
            
            </figure><p>When we look at where these companies are located, we can see that over 20% of the DDoS attacks targeted US-based companies, over 15% Russia-based companies, and less than five percent included Turkey, France, Poland, Ukraine, and more.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1LblhXaFqfYAkbYsd8U3YC/8ee3cfc1a48f04032c22268a8b7194e7/image6-4.png" />
            
            </figure>
    <div>
      <h3>How to protect against Mantis and other DDoS attacks</h3>
      <a href="#how-to-protect-against-mantis-and-other-ddos-attacks">
        
      </a>
    </div>
    <p>Cloudflare’s <a href="https://www.cloudflare.com/ddos/">automated DDoS protection</a> system leverages dynamic fingerprinting to detect and mitigate DDoS attacks. The system is exposed to customers as the <a href="/http-ddos-managed-rules/">HTTP DDoS Managed Ruleset</a>. The ruleset is enabled and applying mitigation actions by default, so if you haven’t made any changes, there is no action for you to take — you are protected. You can also review our guides <a href="https://support.cloudflare.com/hc/en-us/articles/200170166">Best Practices: DoS preventive measures</a> and <a href="https://support.cloudflare.com/hc/en-us/articles/200170196-Responding-to-DDoS-attacks">Responding to DDoS attacks</a> for additional tips and recommendations on how to optimize your Cloudflare configurations.</p><p>If you are only using <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> or <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Spectrum</a> but also operate HTTP applications that are not behind Cloudflare, it is recommended to <a href="https://developers.cloudflare.com/fundamentals/get-started/setup/add-site/">onboard them to Cloudflare’s WAF/CDN service</a> to benefit from L7 protection.</p> ]]></content:encoded>
            <category><![CDATA[Botnet]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">6oRJZs0MGXW4tPVg4k4VwZ</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[New WAF intelligence feeds]]></title>
            <link>https://blog.cloudflare.com/new-waf-intelligence-feeds/</link>
            <pubDate>Thu, 07 Jul 2022 12:57:12 GMT</pubDate>
            <description><![CDATA[ Cloudflare is expanding our WAF’s threat intelligence capabilities by adding four new managed IP lists that can be used as part of any custom firewall rule ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3viqacx0pyK5KfuztWaVO9/ae921f1c63025506f3709dbdff7c339e/unnamed.png" />
            
            </figure><p>Cloudflare is expanding our <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF’s</a> threat intelligence capabilities by adding four new managed IP lists that can be used as part of any custom firewall rule.</p><p>Managed lists are created and maintained by Cloudflare and are built based on threat intelligence feeds collected by analyzing patterns and trends observed across the Internet. Enterprise customers can already use the Open SOCKS Proxy list (<a href="/protecting-apis-from-abuse-and-data-exfiltration/">launched in March 2021</a>) and today we are adding four new IP lists: “VPNs”, “Botnets, Command and Control Servers”, “Malware” and “Anonymizers”.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/31yUbQ5PMWyQOuR6SKAYVm/e6b624da1f780033213cf902e1e40edb/XkegdawMtkmBmuCmAin8MIzby8BSozlKq1g_EJRwpKwYIkmx_e0t49a3yoc8YYNltTLJBQ3oFxDRmBFxP01RTytGgD-zCwQsfiQr5r2WyFChLu9wsmDjeAx5Rb0i.png" />
            
            </figure><p>You can check what rules are available in your plan by navigating to Manage Account → Configuration → Lists.</p><p>Customers can reference these lists when creating a custom firewall rule or in <a href="/advanced-rate-limiting/">Advanced Rate Limiting</a>. For example, you can choose to block all traffic generated by IPs we categorize as VPNs, or rate limit traffic generated by all Anonymizers. You can simply incorporate managed IP lists in the powerful firewall rule builder. Of course, you can also use your own <a href="/introducing-ip-lists/">custom IP list</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/72EGCZbWhomtW9Up3IT9yg/b97c63a343aa7ed580bc0d00987a53ef/WsDGsltjclo0RVf5cZlM3yiQFzdDUIIteuM2jE80480j63zup6IMVvJtrazsG7VSaBTFSgnX0kYqZBpf3xzgqdLOX_VTpxX3sb398t_tj86gO-EiDKFwVoltRR85.png" />
            
            </figure><p>Managed IP Lists can be used in WAF rules to manage incoming traffic from these IPs.</p>
    <div>
      <h3>Where do these feeds come from?</h3>
      <a href="#where-do-these-feeds-come-from">
        
      </a>
    </div>
    <p>These lists are based on Cloudflare-generated threat feeds which are made available as IP lists to be easily consumed in the WAF. Each IP is categorized by combining open source data as well as by analyzing the behavior of each IP leveraging the scale and reach of Cloudflare network. After an IP has been included in one of these feeds, we verify its categorization and feed this information back into our security systems and make it available to our customers in the form of a managed IP list. The content of each list is updated multiple times a day.</p><p>In addition to generating IP classifications based on Cloudflare’s internal data, Cloudflare curates and combines several data sources that we believe provide reliable coverage of active security threats with a low false positive rate. In today’s environment, an IP belonging to a cloud provider might today be distributing malware, but tomorrow might be a critical resource for your company.</p><p>Some IP address classifications are publicly available, OSINT data, for example Tor exit nodes, and Cloudflare takes care of integrating this into our Anonymizer list so that you don’t have to manage integrating this list into every asset in your network. Other classifications are determined or vetted using a variety of DNS techniques, like lookup, PTR record lookup, and observing passive DNS from Cloudflare’s network.</p><p>Our malware and command-and-control focused lists are generated from curated partnerships, and one type of IP address we target when we select partners is data sources that identify security threats that do not have DNS records associated with them.</p><p>Our Anonymizer list encompasses several types of services that perform anonymization, including VPNs, open proxies, and Tor nodes. It is a superset of the more narrowly focused VPN list (known commercial VPN nodes), and the Cloudflare Open Proxies list (proxies that relay traffic without requiring authentication).</p>
    <div>
      <h3>In dashboard IP annotations</h3>
      <a href="#in-dashboard-ip-annotations">
        
      </a>
    </div>
    <p>Using these lists to deploy a preventative security policy for these IPs is great, but what about knowing if an IP that is interacting with your website or application is part of a Botnet or VPN? We first released <a href="/security-center-investigate/">contextual information</a> for Anonymizers as part of Security Week 2022, but we are now closing the circle by extending this feature to cover all new lists.</p><p>As part of Cloudflare's threat intelligence feeds, we are exposing the IP category directly into the dashboard. Say you are investigating requests that were blocked by the WAF and that looked to be probing your application for known software vulnerabilities. If the source IP of these requests is matching with one of our feeds (for example part of a VPN), contextual information will appear directly on the analytics page.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3BEsz0Ts0fqS0o7Rlu0Kh0/a2eeba1c392e9d51a47efac8327e5f98/ba1SUQnRFtLMyaBYf580Fup-l4DJXdqOXEFrBm_KtT6egoEuFy0dh5HSZJvTSokZvDYC1d7US1dlhXMjn2jFgAgNr3Hmf455vhT6sT76JzXpI5ZyTO7bxGrXdj8o.png" />
            
            </figure><p>When the source IP of a WAF event matches one of the threat feeds, we provide contextual information directly onto the Cloudflare dashboard.</p><p>This information can help you see patterns and decide whether you need to use the managed lists to handle the traffic from these IPs in a particular way, for example by creating a rate limiting rule that reduces the amount of requests these actors can perform over a period of time.</p>
    <div>
      <h3>Who gets this?</h3>
      <a href="#who-gets-this">
        
      </a>
    </div>
    <p>The following table summarizes what plans have access to each one of these features. Any paying plans will have access to the contextual in-dash information, while Enterprise will be able to use different managed lists. Managed lists can be used only on Enterprise zones within an Enterprise account.</p>
<table>
<thead>
  <tr>
    <th></th>
    <th><span> FREE</span></th>
    <th><span>PRO</span></th>
    <th><span>BIZ</span></th>
    <th><span>ENT with WAF Essential</span></th>
    <th><span>ENT with WAF Advanced  *</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Annotations</span></td>
    <td><span>x</span></td>
    <td><span>✅</span></td>
    <td><span>✅</span></td>
    <td><span>✅</span></td>
    <td><span>✅</span></td>
  </tr>
  <tr>
    <td><span>Open Proxies</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>✅</span></td>
    <td><span>✅</span></td>
  </tr>
  <tr>
    <td><span>Anonymizers</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>✅</span></td>
  </tr>
  <tr>
    <td><span>VPNs</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>✅</span></td>
  </tr>
  <tr>
    <td><span>Botnets, command and control</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>✅</span></td>
  </tr>
  <tr>
    <td><span>Malware</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>x</span></td>
    <td><span>✅</span></td>
  </tr>
</tbody>
</table><p>* Contact your customer success manager to learn how to get access to these lists.</p>
    <div>
      <h3>Future releases</h3>
      <a href="#future-releases">
        
      </a>
    </div>
    <p>We are working on enriching our threat feeds even further. In the next months we are going to provide more IP lists, specifically we are looking into lists for cloud providers and Carrier-grade Network Address Translation (CG-NAT).</p> ]]></content:encoded>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[Threat Intelligence]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[Botnet]]></category>
            <guid isPermaLink="false">qdVDHWjNU7EFOMA2A5uqb</guid>
            <dc:creator>Daniele Molteni</dc:creator>
            <dc:creator>Jesse Kipp</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare mitigates 26 million request per second DDoS attack]]></title>
            <link>https://blog.cloudflare.com/26m-rps-ddos/</link>
            <pubDate>Tue, 14 Jun 2022 12:56:31 GMT</pubDate>
            <description><![CDATA[ Last week, Cloudflare automatically detected and mitigated a 26 million request per second DDoS attack — the largest HTTPS DDoS attack on record ]]></description>
            <content:encoded><![CDATA[ <p><b><i>Update from June 24, 2022</i></b><i>:  We have named the botnet that launched the 26M rps DDoS attack "</i><b><i>Mantis</i></b><i>" as it is also like the </i><a href="https://en.wikipedia.org/wiki/Mantis_shrimp"><i>Mantis Shrimp</i></a><i> small but very powerful. Mantis has been especially active in the past week, targeting VoIP and Cryptocurrency Internet properties with HTTP DDoS attacks as large as 9M requests per second.</i></p><p>Last week, Cloudflare automatically detected and mitigated a 26 million request per second <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attack</a> — the largest HTTPS DDoS attack on record.</p><p>The attack targeted a customer website using Cloudflare’s Free plan. Similar to the previous <a href="/15m-rps-ddos-attack/">15M rps attack</a>, this attack also originated mostly from Cloud Service Providers as opposed to Residential Internet Service Providers, indicating the use of hijacked virtual machines and powerful servers to generate the attack — as opposed to much weaker Internet of Things (IoT) devices.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1NOKvQqeXwENOCj0UOeRAI/04fbae8288e3f3f43130d34fa1b3e66f/image1-7.png" />
            
            </figure>
    <div>
      <h3>Record-breaking attacks</h3>
      <a href="#record-breaking-attacks">
        
      </a>
    </div>
    <p>Over the past year, we’ve witnessed one record-breaking attack after the other. Back in August 2021, we disclosed a <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">17.2M rps HTTP DDoS attack</a>, and more recently in April, a <a href="/15m-rps-ddos-attack/">15M rps HTTPS DDoS attack</a>. All were automatically detected and mitigated by our <a href="/http-ddos-managed-rules/">HTTP DDoS Managed Ruleset</a> which is powered by our <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">autonomous edge DDoS protection system</a>.</p><p>The 26M rps DDoS attack originated from a small but powerful botnet of 5,067 devices. On average, each node generated approximately 5,200 rps at peak. To contrast the size of this botnet, we’ve been tracking another much larger but less powerful botnet of over 730,000 devices. The latter, larger botnet wasn’t able to generate more than one million requests per second, i.e. roughly 1.3 requests per second on average per device. Putting it plainly, this botnet was, on average, 4,000 times stronger due to its use of virtual machines and servers.</p><p>Also, worth noting that this attack was over <a href="https://www.cloudflare.com/learning/ssl/what-is-https/">HTTPS</a>. HTTPS DDoS attacks are more expensive in terms of required computational resources because of the higher cost of establishing a secure <a href="https://www.cloudflare.com/learning/ssl/transport-layer-security-tls/">TLS</a> encrypted connection. Therefore, it costs the attacker more to launch the attack, and for the victim to mitigate it. We’ve seen very large attacks in the past over (unencrypted) HTTP, but this attack stands out because of the resources it required at its scale.</p><p>Within less than 30 seconds, this botnet generated more than 212 million HTTPS requests from over 1,500 networks in 121 countries. The top countries were Indonesia, the United States, Brazil and Russia. About 3% of the attack came through Tor nodes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2RSu52jA2eDtgH45ptbUIM/634d8cc9c991825d4962ec0c89528837/image3-9.png" />
            
            </figure><p>The top source networks were the French-based OVH (Autonomous System Number 16276), the Indonesian Telkomnet (ASN 7713), the US-based iboss (ASN 137922) and the Libyan Ajeel (ASN 37284).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/11wUFtITwfTlMcGO6mf7RX/ebae8a2ff45ba6ac2b932d11795745a0/image3-8.png" />
            
            </figure>
    <div>
      <h3>The DDoS threat landscape</h3>
      <a href="#the-ddos-threat-landscape">
        
      </a>
    </div>
    <p>It’s important to understand the attack landscape when thinking about DDoS protection. When looking at our recent <a href="/ddos-attack-trends-for-2022-q1/">DDoS Trends report</a>, we can see that most of the attacks are small, e.g. cyber vandalism. However, even small attacks can severely impact unprotected Internet properties. On the other hand, large attacks are growing in size and frequency — but remain short and rapid. Attackers concentrate their botnet’s power to try and wreak havoc with a single quick knockout blow — trying to avoid detection.</p><p>DDoS attacks might be initiated by humans, but they are generated by machines. By the time humans can respond to the attack, it may be over. And even if the attack was quick, the network and application failure events can extend long after the attack is over — costing you revenue and reputation. For this reason, it is recommended to protect your Internet properties with an automated always-on protection service that does not rely on humans to detect and mitigate attacks.</p>
    <div>
      <h3>Helping build a better Internet</h3>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>At Cloudflare, everything we do is guided by our mission to help build a better Internet. The DDoS team’s vision is derived from this mission: our goal is to make the impact of DDoS attacks a thing of the past. The level of protection that we offer is <a href="/unmetered-mitigation/">unmetered and unlimited</a> — It is not bounded by the size of the attack, the number of the attacks, or the duration of the attacks. This is especially important these days because as we’ve recently seen, attacks are getting <a href="/ddos-attack-trends-for-2022-q1/">larger and more frequent</a>.</p><p>Not using Cloudflare yet? <a href="https://dash.cloudflare.com/sign-up">Start now</a> with our Free and Pro plans to protect your websites, or <a href="https://www.cloudflare.com/magic-transit/">contact us</a> for comprehensive <a href="https://www.cloudflare.com/ddos/">DDoS protection</a> for your entire network using Magic Transit.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Botnet]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">2Sm1czBP3mzDuxqTk3DQZV</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare blocks an almost 2 Tbps multi-vector DDoS attack]]></title>
            <link>https://blog.cloudflare.com/cloudflare-blocks-an-almost-2-tbps-multi-vector-ddos-attack/</link>
            <pubDate>Sat, 13 Nov 2021 14:33:49 GMT</pubDate>
            <description><![CDATA[ Earlier this week, Cloudflare automatically detected and mitigated a DDoS attack that peaked just below 2 Tbps — the largest we’ve seen to date. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Earlier this week, Cloudflare automatically detected and mitigated a <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attack</a> that peaked just below 2 Tbps — the largest we’ve seen to date. This was a multi-vector attack combining <a href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/">DNS amplification</a> attacks and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP floods</a>. The entire attack lasted just one minute. The attack was launched from approximately 15,000 bots running a variant of the original Mirai code on IoT devices and <a href="https://www.rapid7.com/blog/post/2021/11/01/gitlab-unauthenticated-remote-code-execution-cve-2021-22205-exploited-in-the-wild/">unpatched GitLab instances</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/69O75xM8BJ3AQ4xboaaJc8/05b4efd41d8beb38aabe8f5df3b1e48c/image4-11.png" />
            
            </figure><p>DDoS attack peaking just below 2 Tbps‌‌</p>
    <div>
      <h3>Network-layer DDoS attacks increased by 44%</h3>
      <a href="#network-layer-ddos-attacks-increased-by-44">
        
      </a>
    </div>
    <p>Last quarter, we saw multiple terabit-strong DDoS attacks and this attack continues this trend of increased attack intensity. Another key finding from our <a href="/ddos-attack-trends-for-2021-q3/">Q3 DDoS Trends report</a> was that network-layer DDoS attacks actually increased by 44% quarter-over-quarter. While the fourth quarter is not over yet, we have, again, seen multiple terabit-strong attacks that targeted Cloudflare customers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16L0jRaxzWrkoprzjXWbEU/ebb62af9ba073ea608920f1b14c34a12/image1-21.png" />
            
            </figure><p>DDoS attacks peaking at 1-1.4 Tbps</p>
    <div>
      <h3>How did Cloudflare mitigate this attack?</h3>
      <a href="#how-did-cloudflare-mitigate-this-attack">
        
      </a>
    </div>
    <p>To begin with, our systems constantly analyze traffic samples “out-of-path” which allows us to asynchronously detect DDoS attacks without causing latency or impacting performance. Once the attack traffic was detected (within sub-seconds), our systems generated a real-time signature that surgically matched against the attack patterns to mitigate the attack without impacting legitimate traffic.</p><p>Once generated, the fingerprint is propagated as an ephemeral mitigation rule to the most optimal location in the Cloudflare edge for cost-efficient mitigation. In this specific case, as with most L3/4 DDoS attacks, the rule was pushed in-line into the Linux kernel <a href="/l4drop-xdp-ebpf-based-ddos-mitigations/">eXpress Data Path</a> (XDP) to drop the attack packet at wirespeed.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3aDR60Hnanrkb1TJ5cNgMO/e173eb50b8433d027d2e5ab834e4ee52/image3-17.png" />
            
            </figure><p>A conceptual diagram of Cloudflare’s DDoS protection systems</p><p>Read more about <a href="https://developers.cloudflare.com/ddos-protection/">Cloudflare’s DDoS Protection systems</a>.</p>
    <div>
      <h3>Helping build a better Internet</h3>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet — one that is secure, faster, and more reliable for everyone. The DDoS team’s vision is derived from this mission: our goal is to make the impact of DDoS attacks a thing of the past. Whether it's the <a href="/meris-botnet/">Meris botnet</a> that launched some of the <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">largest HTTP DDoS attacks on record</a>, the recent <a href="/update-on-voip-attacks/">attacks on VoIP providers</a> or this Mirai-variant that’s DDoSing Internet properties, Cloudflare’s network automatically detects and mitigates DDoS attacks. Cloudflare provides a secure, reliable, performant, and <a href="/http-ddos-managed-rules/">customizable</a> platform for Internet properties of all types.</p><p>For more information about Cloudflare’s DDoS protection, <a href="http://www.cloudflare.com/enterprise">reach out to us</a> or have a go with a hands-on evaluation of <a href="https://www.cloudflare.com/plans/free/">Cloudflare’s Free plan</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Mirai]]></category>
            <category><![CDATA[Botnet]]></category>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[UDP]]></category>
            <guid isPermaLink="false">22mxDvugzkq2hvpQyg4tig</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare thwarts 17.2M rps DDoS attack — the largest ever reported]]></title>
            <link>https://blog.cloudflare.com/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/</link>
            <pubDate>Thu, 19 Aug 2021 12:58:18 GMT</pubDate>
            <description><![CDATA[ Earlier this summer, Cloudflare’s autonomous edge DDoS protection systems automatically detected and mitigated a 17.2 million request-per-second (rps) DDoS attack, an attack almost three times larger than any previous one that we're aware of.  ]]></description>
            <content:encoded><![CDATA[ <p><i>This post is also available in </i><a href="/fr-fr/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported-fr-fr/"><i>Français</i></a><i>, </i><a href="/de-de/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported-de-de/"><i>Deutsch</i></a><i>, </i><a href="/zh-cn/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported-zh-cn/"><i>简体中文</i></a><i>, </i><a href="/zh-tw/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported-zh-tw/"><i>繁體中文</i></a><i>, </i><a href="/ja-jp/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported-ja-jp/"><i>日本語</i></a><i>, </i><a href="/ko-kr/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported-ko-kr/"><i>한국어</i></a><i>.</i></p><p>Earlier this summer, Cloudflare’s <a href="https://www.cloudflare.com/ddos/">autonomous edge DDoS protection systems</a> automatically detected and mitigated a 17.2 million request-per-second (rps) <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attack</a>, an attack almost three times larger than any previous one that we're aware of. For perspective on how large this attack was: Cloudflare serves over 25 million HTTP requests per second on average. This refers to the average rate of legitimate traffic in 2021 Q2. So peaking at 17.2 million rps, this attack reached 68% of our Q2 average rps rate of legitimate HTTP traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5MGeCblBfbMi9xV2fNGQJ7/7235f5c5e8dbf3e724643823a6fb2681/image5-18.png" />
            
            </figure><p>Comparison graph of Cloudflare’s average request per second rate versus the DDoS attack</p>
    <div>
      <h3>Automated DDoS mitigation with Cloudflare’s autonomous edge</h3>
      <a href="#automated-ddos-mitigation-with-cloudflares-autonomous-edge">
        
      </a>
    </div>
    <p>This attack, along with the additional attacks provided in the next sections, were automatically detected and mitigated by our <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">autonomous edge DDoS protection systems</a>. The system is powered by our very own denial of service daemon (dosd). Dosd is a home-grown software-defined daemon. A unique dosd instance runs in every server in each one of our data centers around the world. Each dosd instance independently analyzes traffic samples out-of-path. Analyzing traffic out-of-path allows us to scan asynchronously for DDoS attacks without causing latency and impacting performance. DDoS findings are also shared between the various dosd instances within a data center, as a form of proactive threat intelligence sharing.</p><p>Once an attack is detected, our systems generate a mitigation rule with a real-time signature that matches the attack patterns. The rule is propagated to the most optimal location in the tech stack. As an example, a <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/">volumetric HTTP DDoS attack</a> may be blocked at L4 inside the Linux iptables firewall instead of at L7 inside the L7 reverse proxy which runs in the user space. Mitigating lower in the stack, e.g. dropping the packets at L4 instead of responding with a 403 error page in L7, is more cost-efficient. It reduces our edge CPU consumption and intra-data center bandwidth utilization — thus helping us mitigate large attacks at scale without impacting performance.</p><p>This autonomous approach, along with our network’s global scale and reliability, allow us to mitigate attacks that reach 68% of our average per-second-rate, and higher, without requiring any manual mitigation by Cloudflare personnel, nor causing any performance degradation.</p>
    <div>
      <h3>The resurgence of Mirai and new powerful botnets</h3>
      <a href="#the-resurgence-of-mirai-and-new-powerful-botnets">
        
      </a>
    </div>
    <p>This attack was launched by a powerful <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">botnet</a>, targeting a Cloudflare customer in the financial industry. Within seconds, the botnet bombarded the Cloudflare edge with over 330 million attack requests.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gY7BQTsPoARDp6hOSjG9e/9366d2c0d953f840fb8b7eb2f2899d32/image10-1.png" />
            
            </figure><p>Graph of 17.2M rps attack</p><p>The attack traffic originated from more than 20,000 bots in 125 countries around the world. Based on the bots’ source IP addresses, almost 15% of the attack originated from Indonesia and another 17% from India and Brazil combined. Indicating that there may be many malware infected devices in those countries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5T6eNguCNTubMdWMB3YRxO/38371f7686bd7eae8f09d4f9783e049e/image14.png" />
            
            </figure><p>Distribution of the attack sources by top countries</p>
    <div>
      <h3>Volumetric attacks increase</h3>
      <a href="#volumetric-attacks-increase">
        
      </a>
    </div>
    <p>This 17.2 million rps attack is the largest HTTP DDoS attack that Cloudflare has ever seen to date and almost three times the size of any other reported HTTP DDoS attack. This specific botnet, however, has been seen at least twice over the past few weeks. Just last week it also targeted a different Cloudflare customer, a hosting provider, with an HTTP DDoS attack that peaked just below 8 million rps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/50oxuA0Pte28QnkKG2ND9a/3a77c2098743522e6155d30a1e690afe/image13-1.png" />
            
            </figure><p>Graph of 8M rps attack</p><p>Two weeks before, a <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai-variant botnet</a> launched over a dozen UDP and TCP based DDoS attacks that peaked multiple times above 1 Tbps, with a max peak of approximately 1.2 Tbps. And while the first HTTP attacks targeted Cloudflare customers on the <a href="https://www.cloudflare.com/waf/">WAF/CDN service</a>, the 1+ Tbps network-layer attacks targeted Cloudflare customers on the <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> and <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Spectrum</a> services. One of these targets was a major APAC-based Internet services, telecommunications and hosting provider. The other was a gaming company. In all cases, the attacks were automatically detected and mitigated without human intervention.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Ry1DG1IpHihc6q2aU3V83/1ed3236f40fff2c224c135a7841376d3/image17.png" />
            
            </figure><p>Graph of Mirai botnet attack peaking at 1.2 Tbps</p><p>The Mirai botnet started with roughly 30K bots and slowly shrinked to approximately 28K. However, despite losing bots from its fleet, the botnet was still able to generate impressive volumes of attack traffic for short periods. In some cases, each burst lasted only a few seconds.</p><p>These attacks join the increase in Mirai-based DDoS attacks that we’ve observed on our network over the past weeks. In July alone, L3/4 Mirai attacks increased by 88% and L7 attacks by 9%. Additionally, based on the current August per-day average of the Mirai attacks, we can expect L7 Mirai DDoS attacks and other similar botnet attacks to increase by 185% and L3/4 attacks by 71% by the end of the month.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4feZMCRVWgTJh3LTGKQVl8/d5a1dabda66860b415f1471b7ee3773d/image11-1.png" />
            
            </figure><p>Graph of change in Mirai based DDoS attacks by month</p>
    <div>
      <h3>Back to the Mirai</h3>
      <a href="#back-to-the-mirai">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai</a>, which means ‘future’ in Japanese, is a codename for malware that was first discovered in 2016 by <a href="https://en.wikipedia.org/wiki/MalwareMustDie">MalwareMustDie</a>, a non-profit security research workgroup. The malware spreads by infecting Linux-operated devices such as security cameras and routers. It then self-propagates by searching for open Telnet ports 23 and 2323. Once found, it then attempts to gain access to vulnerable devices by <a href="https://www.cloudflare.com/learning/bots/brute-force-attack/">brute forcing</a> known credentials such as factory default usernames and passwords. Later variants of Mirai also took advantage of zero-day exploits in routers and other devices. Once infected, the devices will monitor a Command &amp; Control (C2) server for instructions on which target to attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4fNe0WjM3f10tIZWNBTm8C/72ee117740a76a5f4b0b2a1be17b8700/image8-3.png" />
            
            </figure><p>Diagram of Botnet operator controlling the botnet to attack websites</p>
    <div>
      <h3>How to protect your home and business</h3>
      <a href="#how-to-protect-your-home-and-business">
        
      </a>
    </div>
    <p>While the majority of attacks are small and short, we continue to see these types of volumetric attacks emerging more often. It’s important to note that these volumetric short burst attacks can be especially dangerous for legacy DDoS protection systems or organizations without active, always-on cloud-based protection.</p><p>Furthermore, while the short duration may say something about the botnet’s capability to deliver sustained levels of traffic over time, it can be challenging or impossible for humans to react to it in time. In such cases, the attack is over before a security engineer even has time to analyze the traffic or activate their stand-by DDoS protection system. These types of attacks highlight the need for automated, always-on protection.</p>
    <div>
      <h3>How to protect your business and Internet properties</h3>
      <a href="#how-to-protect-your-business-and-internet-properties">
        
      </a>
    </div>
    <ol><li><p><a href="https://dash.cloudflare.com/sign-up">Onboard to Cloudflare</a> to protect your Internet properties.</p></li><li><p>DDoS is enabled out of the box, and you can also <a href="https://support.cloudflare.com/hc/en-us/articles/200172676-Understanding-Cloudflare-DDoS-protection">customize the protection settings</a>.</p></li><li><p>Follow our <a href="https://www.cloudflare.com/learning/ddos/how-to-prevent-ddos-attacks/">preventive best practices</a>, to ensure that both your Cloudflare settings and your origin server settings are optimized. As an example, make sure that you allow only traffic from <a href="https://www.cloudflare.com/ips/">Cloudflare’s IP range</a>. Ideally, ask your upstream Internet Service Provider (ISP) to apply an access control list (ACL), otherwise, attackers may target your servers’ IP addresses directly and bypass your protection.</p></li></ol>
    <div>
      <h3>Recommendations on how to protect your home and IoT appliances</h3>
      <a href="#recommendations-on-how-to-protect-your-home-and-iot-appliances">
        
      </a>
    </div>
    <ol><li><p>Change the default username and password of any device that is connected to the Internet such as smart cameras and routers. This will reduce the risk that malware such as Mirai can gain access to your router and IoT devices.</p></li><li><p>Protect your home against malware with <a href="https://developers.cloudflare.com/1.1.1.1/1.1.1.1-for-families">Cloudflare for Families</a>. Cloudflare for Families is a free service that automatically blocks traffic from your home to malicious websites and malware communication.</p></li></ol> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Mirai]]></category>
            <category><![CDATA[dosd]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Botnet]]></category>
            <guid isPermaLink="false">14h42eFO3Fqa89ZeO5Ki7U</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
    </channel>
</rss>