
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 12:52:59 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Targeted by 20.5 million DDoS attacks, up 358% year-over-year: Cloudflare’s 2025 Q1 DDoS Threat Report]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2025-q1/</link>
            <pubDate>Sun, 27 Apr 2025 23:00:00 GMT</pubDate>
            <description><![CDATA[ DDoS attacks are surging. In 2025 Q1, Cloudflare blocked +20M attacks (a 358% YoY spike) along with 5.6 Tbps and 4.8 Bpps record-breaking attacks. ]]></description>
            <content:encoded><![CDATA[ <p>Welcome to the 21st edition of the Cloudflare DDoS Threat Report. Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of <a href="https://www.cloudflare.com/learning/ddos/glossary/denial-of-service/"><u>Distributed Denial of Service (DDoS) attacks</u></a> based on data from the <a href="https://www.cloudflare.com/network/"><u>Cloudflare network</u></a>. In this edition, we focus on the first quarter of 2025. To view previous reports, visit <a href="http://www.ddosreport.com"><u>www.ddosreport.com</u></a>.</p><p>While this report primarily focuses on 2025 Q1, it also includes late-breaking data from a <a href="#hyper-volumetric-ddos-attacks">hyper-volumetric DDoS campaign observed in April 2025</a>, featuring some of the largest attacks ever publicly disclosed. In a historic surge of activity, we blocked the most intense packet rate attack on record, peaking at 4.8 billion packets per second (Bpps), 52% higher than the previous benchmark, and separately defended against a massive 6.5 terabits-per-second (Tbps) flood, matching the highest bandwidth attacks ever reported.</p>
    <div>
      <h2>Key DDoS insights</h2>
      <a href="#key-ddos-insights">
        
      </a>
    </div>
    <ul><li><p>In the first quarter of 2025, Cloudflare blocked 20.5 million DDoS attacks. That represents a 358% year-over-year (YoY) increase and a 198% quarter-over-quarter (QoQ) increase. </p></li><li><p>Around one third of those, 6.6 million, targeted the Cloudflare network infrastructure directly, as part of an 18-day multi-vector attack campaign.</p></li><li><p>Furthermore, in the first quarter of 2025, Cloudflare blocked approximately 700 hyper-volumetric DDoS attacks that exceeded 1 Tbps or 1 Bpps — an average of around 8 attacks per day.</p></li></ul><p>All the attacks were blocked by our <a href="https://www.cloudflare.com/ddos/"><u>autonomous defenses</u></a>.</p><p><i>To learn more about DDoS attacks and other types of cyber threats, refer to our </i><a href="https://www.cloudflare.com/learning/"><i><u>Learning Center</u></i></a><i>. Visit </i><a href="https://radar.cloudflare.com/reports?q=DDoS"><i><u>Cloudflare Radar</u></i></a><i> to view this report in its interactive version where you can drill down further. There's a </i><a href="https://developers.cloudflare.com/radar/"><i><u>free API</u></i></a><i> for those interested in investigating Internet trends. You can also learn more about the </i><a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/"><i><u>methodologies</u></i></a><i> used in preparing these reports.</i></p>
    <div>
      <h2>DDoS attacks in numbers</h2>
      <a href="#ddos-attacks-in-numbers">
        
      </a>
    </div>
    <p>In the first quarter of 2025, we blocked 20.5 million DDoS attacks. For comparison, during the calendar year 2024, we blocked 21.3 million DDoS attacks. In just this past quarter, we blocked 96% of what we blocked in 2024.</p><p>The most significant increase was in network-layer DDoS attacks. In 2025 Q1, we blocked 16.8M network-layer DDoS attacks. That’s a 397% QoQ increase and a 509% YoY increase. HTTP DDoS attacks also increased — a 7% QoQ increase and a 118% YoY increase.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4sBpHyhcmYaGxx6bYjGhIR/c257628e5f3c3f854f734c371192de00/image2.png" />
          </figure><p>We count DDoS attacks based on unique real-time fingerprints generated by our systems. In some instances, a single attack or campaign may generate multiple fingerprints, particularly when different mitigation strategies are applied. While this can occasionally lead to higher counts, the metric offers a strong overall indicator of attack activity during a given period.</p>
    <div>
      <h3>Attacks target the Cloudflare network and Internet infrastructure</h3>
      <a href="#attacks-target-the-cloudflare-network-and-internet-infrastructure">
        
      </a>
    </div>
    <p>Of the 20.5 million DDoS attacks blocked in Q1, 16.8 million were network-layer DDoS attacks, and of those, 6.6M targeted Cloudflare’s network infrastructure directly. Another 6.9 million targeted hosting providers and service providers protected by Cloudflare.</p><p>These attacks were part of an 18-day multi-vector DDoS campaign comprising <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/"><u>SYN flood attacks</u></a>, <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/"><u>Mirai-generated DDoS attacks</u></a>, and <a href="https://www.cloudflare.com/learning/ddos/ssdp-ddos-attack/"><u>SSDP amplification attacks</u></a> to name a few. These attacks, as with all of the 20.5 million, were autonomously detected and blocked by our DDoS defenses.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3vyRgcrWUTgw9aClvNaLE9/7afb403ff99c4565c3874fe252372961/image5.png" />
          </figure><p>In the graph below, daily aggregates of attacks against Cloudflare are represented by the blue line, and the other colors represent the various hosting providers and Internet service providers using Cloudflare’s <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Magic Transit</u></a> service that were attacked simultaneously.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3sh8O0seqxOmmQxYY0xO7F/c8563ea41e431b037a7312b60ed36fdc/image1.png" />
          </figure>
    <div>
      <h3>Hyper-volumetric DDoS attacks</h3>
      <a href="#hyper-volumetric-ddos-attacks">
        
      </a>
    </div>
    <p>Hyper-volumetric DDoS attacks are attacks that exceed 1-2 Tbps or 1 Bpps. In 2025 Q1, we blocked over 700 of these attacks. Approximately 4 out of every 100,000 network-layer DDoS attacks were hyper-volumetric. Hyper-volumetric DDoS attacks tend to take place over <a href="https://www.cloudflare.com/learning/ddos/glossary/user-datagram-protocol-udp/"><u>UDP</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4GtQgxuXLcOgXRabQadxb1/00dc9fbf694fd2ec5ada0ca222dc9a2f/image10.png" />
          </figure>
    <div>
      <h3>Hyper-volumetric attacks continue spill into Q2</h3>
      <a href="#hyper-volumetric-attacks-continue-spill-into-q2">
        
      </a>
    </div>
    <p>While this report primarily focuses on 2025 Q1, we believe it is important to also highlight the significant hyper-volumetric record-breaking DDoS attacks that continued into Q2. As such, we have included initial insights from that campaign.</p><p>In the second half of April 2025, Cloudflare’s systems automatically detected and blocked dozens of hyper-volumetric DDoS attacks as part of an intense campaign. The largest attacks peaked at 4.8 Bpps and 6.5 Tbps, with these massive surges typically lasting between 35 and 45 seconds. At 6.5 Tbps, this attack matches the <a href="https://www.wired.com/story/eleven11bot-botnet-record-size-ddos-attacks/"><u>largest publicly disclosed DDoS attack</u></a> to date. The 4.8 Bpps attack is the largest ever to be disclosed from the packet intensity perspective, approximately 52% larger than the previous 3.15 Bpps record.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1F1R0SBYghSqSPjiNYYK6W/c60c183589e9d554b9fb32e9553737a6/image17.png" />
          </figure><p>The attacks originated from 147 countries and targeted multiple IP addresses and ports of a hosting provider that is protected by Cloudflare <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Magic Transit</u></a>. All the attacks were successfully blocked by Cloudflare’s network.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5oqr2yW1zOQYx3tTUbUt93/b283fda3d65be0e9e37d2e786ff13f8a/image6.png" />
          </figure>
    <div>
      <h2>Threat actors</h2>
      <a href="#threat-actors">
        
      </a>
    </div>
    <p>When surveying Cloudflare customers that were targeted by DDoS attacks, the majority said they didn’t know who attacked them. The ones that did know reported their competitors as the number one threat actor behind the attacks (39%), which is similar to last quarter. This is quite common in the gaming and gambling industry.</p><p>Another 17% reported that a state-level or state-sponsored threat actor was behind the attack, and a similar percentage reported that a disgruntled user or customer was behind the attack. </p><p>Another 11% reported that they mistakenly inflicted the DDoS attack on themselves (self-DDoS) and a similar percentage said an extortionist was behind the attacks. 6% reported that the attacks were launched by disgruntled or former employees.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5M5hxvgMluwmP7m0SLaxMz/8ef0cb0d5788e036f7b476010fab9139/image9.png" />
          </figure>
    <div>
      <h2>Anatomy of a DDoS attack</h2>
      <a href="#anatomy-of-a-ddos-attack">
        
      </a>
    </div>
    <p>On the network-layer, <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/"><u>SYN flood</u></a> remains the most common Layer 3/4 DDoS attack vector, followed by <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/"><u>DNS flood</u></a> attacks. <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/"><u>Mirai</u></a>-launched DDoS attacks take the third place, replacing <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/"><u>UDP flood</u></a> attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2vo7n97mpZ9F3ms2evLTfr/cd41b34aac742ce542ceface04edfb47/image11.png" />
          </figure><p>In the HTTP realm, over 60% of the attacks were identified and blocked as known botnets, 21% were attacks with suspicious HTTP attributes, another 10% were launched by botnets impersonating browsers, and the remaining 8% were generic floods, attacks of unusual request patterns, and cache busting attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2X6OoIc5DeB9uBA43gmNAZ/bc438e6aa93820b68cde82b483e84c27/image12.png" />
          </figure>
    <div>
      <h3>Emerging threats</h3>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>In 2025 Q1, we saw a 3,488% QoQ increase in CLDAP reflection/amplification attacks. <a href="https://datatracker.ietf.org/doc/html/rfc1798"><u>CLDAP (Connectionless Lightweight Directory Access Protocol)</u></a> is a variant of <a href="https://datatracker.ietf.org/doc/html/rfc4511"><u>LDAP (Lightweight Directory Access Protocol)</u></a>, used for querying and modifying directory services running over IP networks. CLDAP is connectionless, using UDP instead of TCP, making it faster but less reliable. Because it uses UDP, there’s no handshake requirement, which allows attackers to spoof the source IP address, thus allowing attackers to exploit it as a reflection vector. In these attacks, small queries are sent with a spoofed source IP address (the victim's IP), causing servers to send large responses to the victim, overwhelming it. Mitigation involves filtering and monitoring unusual CLDAP traffic.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1TnoEpazSZJfAwYAkXIlTi/84c59434f17502d11eeea290e27ba4f4/image4.png" />
          </figure><p>We also saw a 2,301% QoQ increase in ESP reflection/amplification attacks. The ESP (Encapsulating Security Payload) protocol is part of <a href="https://www.cloudflare.com/learning/network-layer/what-is-ipsec/"><u>IPsec</u></a> and provides confidentiality, authentication, and integrity to network communications. However, it can be abused in DDoS attacks if malicious actors exploit misconfigured or vulnerable systems to reflect or amplify traffic towards a target, leading to service disruption. Like with other protocols, securing and properly configuring the systems using ESP is crucial to block the risks of DDoS attacks.</p>
    <div>
      <h2>Attack size &amp; duration</h2>
      <a href="#attack-size-duration">
        
      </a>
    </div>
    <p>Despite the increase in hyper-volumetric attacks, most DDoS attacks are small. In 2025 Q1, 99% of Layer 3/4 DDoS attacks were under 1 Gbps and 1 Mpps. Similarly, 94% of HTTP DDoS attacks were 1 million requests per second (rps). However, ‘small’ is a relative term and most Internet properties wouldn’t be able to withstand even those small attacks. They can easily saturate unprotected Internet links and crash unprotected servers.</p><p>Furthermore, most attacks are very short-lived. 89% of Layer 3/4 DDoS attacks and 75% of HTTP DDoS attacks end within 10 minutes. Even the largest, record-breaking, hyper-volumetric DDoS attacks can be very short, such as the 35-second attack seen in the examples above. 35 seconds, or even 10 minutes, is not a sufficient time for manual mitigation or activating an on-demand solution: by the time a security analyst receives the alert, and analyzes the attack, it’s already over. And while the attacks may be very short, the trickle effect of attack leads to network and applications failures that can take days to recover from — all whilst services are down or degraded. The current threat landscape leaves no time for human intervention. Detection and mitigation should be always-on, in-line and automated — with sufficient capacity and global coverage to handle the attack traffic along with legitimate peak time traffic.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Qb588RBcnkgWlTyqpP1gF/9b582d0a766be5e200b4a608a5fc2ee0/image7.png" />
          </figure><p>On the other hand, hyper-volumetric HTTP DDoS attacks that exceed 1 Mrps doubled their share. In 2025 Q1, 6 out of every 100 HTTP DDoS attacks exceeded 1 Mrps. On the network-layer, 1 out of every 100,000 attacks exceeded 1 Tbps or 1 Bpps.</p>
    <div>
      <h3>Attack example</h3>
      <a href="#attack-example">
        
      </a>
    </div>
    <p>One example of such an attack targeted a <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> customer. The customer itself is a US-based hosting provider that offers web servers, <a href="https://www.cloudflare.com/learning/video/what-is-voip/"><u>Voice over IP (VoIP)</u></a> servers, and game servers amongst its solutions. This specific attack targeted port 27015. This port is most commonly associated with multiplayer gaming servers, especially Valve's Source engine games, such as Counter-Strike: Global Offensive (CS:GO), Team Fortress 2, Garry's Mod, Left 4 Dead, and Half-Life 2: Deathmatch.</p><p>It's used for the game server connection, letting clients connect to the server to play online. In many cases, this port is open for both UDP and TCP, depending on the game and what kind of communication it's doing. This customer was targeted with multiple hyper-volumetric attacks that were autonomously blocked by Cloudflare.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YQNMOEL84t0oPfNpYiSnF/ee44629d6a191c23eddc1bb36a66b879/image8.png" />
          </figure>
    <div>
      <h2>Top attacked locations</h2>
      <a href="#top-attacked-locations">
        
      </a>
    </div>
    <p>The first quarter of 2025 saw a significant shift in the top 10 <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-country"><u>most attacked locations</u></a> globally. Germany made a notable jump, climbing four spots — making it the most attacked country. In second place, Turkey also experienced a surge of 11 spots. In third, China, on the other hand, slipped two spots compared to the previous quarter, while Hong Kong remained unchanged. India rose four spots, and Brazil stayed the same. Taiwan dropped four positions. The Philippines experienced the largest decline, falling 6 spots. South Korea and Indonesia, however, both jumped up by two spots each.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1EZzoKCRJBdxvb4loWUImY/eb7ae5cf9c66b4fc551a8d60cf22b03b/image15.png" />
          </figure>
    <div>
      <h2>Top attacked industries</h2>
      <a href="#top-attacked-industries">
        
      </a>
    </div>
    <p>The top 10 <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-industry"><u>most attacked industries</u></a> in 2025 Q1 saw some notable changes. The Gambling &amp; Casinos industry jumped up four spots as the most attacked industry, while the Telecommunications, Service Providers and Carriers industry slid down one spot. The Information Technology &amp; Services and Internet industries both saw minor fluctuations, moving up one and down two spots, respectively. The Gaming and <a href="https://www.cloudflare.com/banking-and-financial-services/">Banking &amp; Financial Services industries</a> both saw a one-spot increase, while the Cyber Security industry made a massive leap of 37 spots compared to the previous quarter. Retail saw a slight decline of one spot, while the Manufacturing, Machinery, Technology &amp; Engineering industry surged 28 spots. The Airlines, Aviation &amp; Aerospace industry had the biggest jump of all, moving up 40 spots making it the tenth most attacked industry.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1G4wkWm6UVSR5sgPY3NjP6/fe1311ec9e7b8a2485fea2014346d65b/image16.png" />
          </figure>
    <div>
      <h2>Top attack sources</h2>
      <a href="#top-attack-sources">
        
      </a>
    </div>
    <p>The ranking of the top 10 <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#source-country"><u>largest sources of DDoS attacks</u></a> in 2025 Q1 also shifted notably. Hong Kong soared to the number one position, climbing three spots from the previous quarter. Indonesia edged down to second place, while Argentina rose two spots to third. Singapore slipped two spots to fourth, and Ukraine dropped one to fifth. Brazil made a striking leap, climbing seven places to land in sixth place, closely followed by Thailand, which also rose seven spots to seventh. Germany also increased, moving up two positions to eighth. Vietnam made the most dramatic climb, jumping 15 spots to claim ninth place, while Bulgaria rounded out the list, dipping two spots to tenth.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7tPgUpT7o7ifuMAu2aODrq/b19b39fc919f95b569a187f1ddf66ec0/image3.png" />
          </figure>
    <div>
      <h3>Top source ASNs</h3>
      <a href="#top-source-asns">
        
      </a>
    </div>
    <p>An <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>ASN (Autonomous System Number)</u></a> is a unique identifier assigned to a network or group of IP networks that operate under a single routing policy on the Internet. It’s used to exchange routing information between systems using protocols like <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/"><u>BGP (Border Gateway Protocol)</u></a>.</p><p>When looking at where the DDoS attacks originate from, specifically HTTP DDoS attacks, there are a few autonomous systems that stand out. In 2025 Q1, the German-based <a href="https://radar.cloudflare.com/as24940"><u>Hetzner (AS24940)</u></a> retained its position as the largest source of HTTP DDoS attacks. It was followed by the French-based <a href="https://radar.cloudflare.com/as16276"><u>OVH (AS16276)</u></a> in second, the US-based <a href="https://radar.cloudflare.com/as14061"><u>DigitalOcean (AS14061)</u></a> in third, and another German-based provider, <a href="https://radar.cloudflare.com/as51167"><u>Contabo (AS51167)</u></a>, in fourth. </p><p>Other major sources included the China-based <a href="https://radar.cloudflare.com/as4134"><u>ChinaNet Backbone (AS4134)</u></a> and <a href="https://radar.cloudflare.com/as132203"><u>Tencent (AS132203)</u></a>, the Austrian-based <a href="https://radar.cloudflare.com/as200373"><u>Drei (AS200373)</u></a>, and three US-based providers to wrap up the top 10 — <a href="https://radar.cloudflare.com/as8075"><u>Microsoft (AS8075)</u></a>, <a href="https://radar.cloudflare.com/as31898"><u>Oracle (AS31898)</u></a>, and <a href="https://radar.cloudflare.com/as396982"><u>Google Cloud Platform (AS396982)</u></a>. Most of the networks in this ranking are well-known cloud computing or hosting providers, highlighting how cloud infrastructure is frequently leveraged — either intentionally or through exploitation — for launching DDoS attacks.</p><p>To help hosting providers, cloud computing providers and any Internet service providers identify and take down the abusive accounts that launch these attacks, we leverage Cloudflare’s unique vantage point to provide a <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/"><u>free DDoS Botnet Threat Feed for Service Providers</u></a>. Over 600 organizations worldwide have already signed up for this feed. It gives service providers a list of offending IP addresses from within their ASN that we see launching HTTP DDoS attacks. It’s completely free and all it takes is opening a free Cloudflare account, authenticating the ASN via <a href="https://docs.peeringdb.com/howto/authenticate/"><u>PeeringDB</u></a>, and then <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/#get-full-report"><u>fetching the threat intelligence via API</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4AX4nalnfQuGKu7rea9HLM/7b2c0f6919aab8627ddcf0fff2a2449a/image13.png" />
          </figure>
    <div>
      <h2>Helping build a better Internet</h2>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>At Cloudflare, our mission is to help build a better Internet. A key part of that commitment is offering free protection against DDoS attacks, as well as supporting the broader Internet community by providing free tools to help other networks detect and dismantle botnets operating within their infrastructure.</p><p>As the threat landscape continues to evolve, we see that many organizations still adopt DDoS protection only after experiencing an attack or rely on outdated, on-demand solutions. In contrast, our data shows that those with proactive security strategies are far more resilient. That’s why we focus on automation and a comprehensive, always-on, in-line security approach to stay ahead of both existing and emerging threats.</p><p>Backed by our global network with 348 Tbps of capacity spanning 335 cities, we remain dedicated to delivering unmetered, unlimited DDoS protection, regardless of the size, duration, or frequency of attacks.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Mirai]]></category>
            <guid isPermaLink="false">4xYQnrTgTa1v8bY1lRyu4G</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2024-q4/</link>
            <pubDate>Tue, 21 Jan 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ 2024 ended with a bang. Cloudflare mitigated another record-breaking DDoS attack peaking at 5.6 Tbps. ]]></description>
            <content:encoded><![CDATA[ <p>Welcome to the 20th edition of the Cloudflare DDoS Threat Report, marking five years since our first report in 2020.</p><p>Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of <a href="https://www.cloudflare.com/en-gb/learning/ddos/glossary/denial-of-service/"><u>Distributed Denial of Service (DDoS) attacks</u></a> based on data from the <a href="https://www.cloudflare.com/network/"><u>Cloudflare network</u></a>. In this edition, we focus on the fourth quarter of 2024 and look back at the year as a whole.</p>
    <div>
      <h2>Cloudflare’s unique vantage point</h2>
      <a href="#cloudflares-unique-vantage-point">
        
      </a>
    </div>
    <p>When we published our <a href="https://blog.cloudflare.com/network-layer-ddos-attack-trends-for-q1-2020/"><u>first report</u></a>, Cloudflare’s global network capacity was 35 Terabits per second (Tbps). Since then, our network’s capacity has grown by 817% to 321 Tbps. We also significantly expanded our global presence by 65% from 200 cities in the beginning of 2020 to 330 cities by the end of 2024.</p><p>Using this massive network, we now serve and protect nearly <a href="https://w3techs.com/technologies/overview/proxy"><u>20% of all websites</u></a> and close to 18,000 unique Cloudflare customer <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-subnet/"><u>IP networks</u></a>. This extensive infrastructure and customer base uniquely positions us to provide key insights and trends that benefit the wider Internet community.</p>
    <div>
      <h2>Key DDoS insights</h2>
      <a href="#key-ddos-insights">
        
      </a>
    </div>
    <ul><li><p>In 2024, Cloudflare’s autonomous DDoS defense systems blocked around 21.3 million DDoS attacks, representing a 53% increase compared to 2023. On average, in 2024, Cloudflare blocked 4,870 DDoS attacks every hour.</p></li><li><p>In the fourth quarter, over 420 of those attacks were hyper-volumetric, exceeding rates of 1 billion packets per second (pps) and 1 Tbps. Moreover, the amount of attacks exceeding 1 Tbps grew by a staggering 1,885% quarter-over-quarter.</p></li><li><p>During the week of Halloween 2024, Cloudflare’s DDoS defense systems successfully and autonomously detected and blocked a 5.6 Terabit per second (Tbps) DDoS attack — the largest attack ever reported.</p></li></ul><p><i>To learn more about DDoS attacks and other types of cyber threats, visit our </i><a href="https://www.cloudflare.com/learning/"><i><u>Learning Center</u></i></a><i>, access </i><a href="https://blog.cloudflare.com/tag/ddos-reports"><i><u>previous DDoS threat reports</u></i></a><i> on the Cloudflare blog, or visit our interactive hub, </i><a href="https://radar.cloudflare.com/reports?q=DDoS"><i><u>Cloudflare Radar</u></i></a><i>. There's also a </i><a href="https://developers.cloudflare.com/radar/"><i><u>free API</u></i></a><i> for those interested in investigating these and other Internet trends. You can also learn more about the </i><a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/"><i><u>methodologies</u></i></a><i> used in preparing these reports.</i></p>
    <div>
      <h2>Anatomy of a DDoS attack</h2>
      <a href="#anatomy-of-a-ddos-attack">
        
      </a>
    </div>
    <p>In 2024 Q4 alone, Cloudflare mitigated 6.9 million DDoS attacks. This represents a 16% increase quarter-over-quarter (QoQ) and 83% year-over-year (YoY).</p><p>Of the 2024 Q4 DDoS attacks, 49% (3.4 million) were <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/"><u>Layer 3</u></a>/<a href="https://www.cloudflare.com/learning/network-layer/what-is-the-network-layer/"><u>Layer 4</u></a> DDoS attacks and 51% (3.5 million) were HTTP DDoS attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/33qc2yEBIE4Tmq6ke3dOIY/398216db2fb03e6093f55dac35394568/image13.png" />
          </figure><p><sup><i>Distribution of 6.9 million DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>HTTP DDoS attacks</h2>
      <a href="#http-ddos-attacks">
        
      </a>
    </div>
    <p>The majority of the HTTP DDoS attacks (73%) were launched by known <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">botnets</a>. Rapid detection and blocking of these attacks were made possible as a result of operating a massive network and seeing many types of attacks and botnets. In turn, this allows our security engineers and researchers to craft heuristics to increase mitigation efficacy against these attacks.</p><p>An additional 11% were HTTP DDoS attacks that were caught pretending to be a legitimate browser. Another 10% were attacks which contained suspicious or unusual HTTP attributes. The remaining 8% “Other” were generic <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/"><u>HTTP floods</u></a>, volumetric cache busting attacks, and volumetric attacks targeting login endpoints.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/27nsCB9HReu48XtiJKufwg/cb8814d1cc390e4cd1ffea9316fd589e/image19.png" />
          </figure><p><sup><i>Top HTTP DDoS attack vectors: 2024 Q4</i></sup></p><p>These <a href="https://www.cloudflare.com/learning/security/glossary/attack-vector/">attack vectors</a>, or attack groups, are not necessarily exclusive. For example, known botnets also impersonate browsers and have suspicious HTTP attributes, but this breakdown is our attempt to categorize the HTTP DDoS attacks in a meaningful way.</p>
    <div>
      <h3>Top user agents</h3>
      <a href="#top-user-agents">
        
      </a>
    </div>
    <p>As of this report’s publication, the current stable version of Chrome for Windows, Mac, iOS, and Android is 132, according to Google’s <a href="https://chromereleases.googleblog.com/"><u>release notes</u></a>. However, it seems that threat actors are still behind, as thirteen of the top user agents that appeared most frequently in DDoS attacks were Chrome versions ranging from 118 to 129.</p><p>The HITV_ST_PLATFORM user agent had the highest share of DDoS requests out of total requests (99.9%), making it the user agent that’s used almost exclusively in DDoS attacks. In other words, if you see traffic coming from the HITV_ST_PLATFORM user agent, there is a 0.1% chance that it is legitimate traffic.</p><p>Threat actors often avoid using uncommon user agents, favoring more common ones like Chrome to blend in with regular traffic. The presence of the HITV_ST_PLATFORM user agent, which is associated with smart TVs and set-top boxes, suggests that the devices involved in certain cyberattacks are compromised smart TVs or set-top boxes. This observation highlights the importance of securing all Internet-connected devices, including smart TVs and set-top boxes, to prevent them from being exploited in cyberattacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5uUCjjPdGu63u7OmgRE6Yw/4b15c1e88cfe86ae0bc5824346908b24/image18.png" />
          </figure><p><sup><i>Top user agents abused in DDoS attacks: 2024 Q4</i></sup></p><p>The user agent <a href="https://github.com/benoitc/hackney"><u>hackney</u></a> came in second place, with 93% of requests containing this user agent being part of a DDoS attack. If you encounter traffic coming from the hackney user agent, there is a 7% chance that it is legitimate traffic. Hackney is an HTTP client library for Erlang, used for making HTTP requests and is popular in Erlang/Elixir ecosystems.</p><p>Additional user agents that were used in DDoS attacks are <a href="https://www.utorrent.com/"><u>uTorrent</u></a>, which is associated with a popular BitTorrent client for downloading files. <a href="https://pkg.go.dev/net/http"><u>Go-http-client</u></a> and <a href="https://github.com/valyala/fasthttp"><u>fasthttp</u></a> were also commonly used in DDoS attacks. The former is the default HTTP client in Go’s standard library and the latter is a high-performance alternative. fasthttp is used to build fast web applications, but is often exploited for DDoS attacks and <a href="https://www.cloudflare.com/learning/ai/how-to-prevent-web-scraping/">web scraping</a> too.</p>
    <div>
      <h2>HTTP attributes commonly used in DDoS attacks</h2>
      <a href="#http-attributes-commonly-used-in-ddos-attacks">
        
      </a>
    </div>
    
    <div>
      <h3>HTTP methods</h3>
      <a href="#http-methods">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/"><u>HTTP methods</u></a> (also called HTTP verbs) define the action to be performed on a resource on a server. They are part of the HTTP protocol and allow communication between clients (such as browsers) and servers.</p><p>The GET method is most commonly used. Almost 70% of legitimate HTTP requests made use of the GET method. In second place is the POST method with a share of 27%.</p><p>With DDoS attacks, we see a different picture. Almost 14% of HTTP requests using the HEAD method were part of a DDoS attack, despite it hardly being present in legitimate HTTP requests (0.75% of all requests). The DELETE method came in second place, with around 7% of its usage being for DDoS purposes.</p><p>The disproportion between methods commonly seen in DDoS attacks versus their presence in legitimate traffic definitely stands out. Security administrators can use this information to optimize their security posture based on these headers.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1fD5aUHaIkRMUNPZJI0LKW/d5856e7ce13cb7d1e28727401b885b1a/image10.png" />
          </figure><p><sup><i>Distribution of HTTP methods in DDoS attacks and legitimate traffic: 2024 Q4</i></sup></p>
    <div>
      <h3>HTTP paths</h3>
      <a href="#http-paths">
        
      </a>
    </div>
    <p>An HTTP path describes a specific server resource. Along with the HTTP method, the server will perform the action on the resource.</p><p>For example, GET <a href="https://developers.cloudflare.com/ddos-protection/"><u>https://developers.cloudflare.com/ddos-protection/</u></a> will instruct the server to retrieve the content for the resource /ddos-protection/.</p><p>DDoS attacks often target the root of the website (“/”), but in other cases, they can target specific paths. In 2024 Q4, 98% of HTTP requests towards the /wp-admin/ path were part of DDoS attacks. The /wp-admin/ path is the default <a href="https://wordpress.com/support/dashboard/"><u>administrator dashboard for WordPress websites</u></a>.</p><p>Obviously, many paths are unique to the specific website, but in the graph below, we’ve provided the top <i>generic</i> paths that were attacked the most. Security administrators can use this data to strengthen their protection on these endpoints, as applicable. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/I9SweJVs4sLYjgHy469NN/b7d0e76648b0ec26af32143a45dc1dd6/image21.png" />
          </figure><p> <sup><i>Top HTTP paths targeted by HTTP DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>HTTP vs. HTTPS</h2>
      <a href="#http-vs-https">
        
      </a>
    </div>
    <p>In Q4, almost 94% of legitimate traffic was <a href="https://www.cloudflare.com/en-gb/learning/ssl/what-is-https/"><u>HTTPS</u></a>. Only 6% was plaintext HTTP (not encrypted). Looking at DDoS attack traffic, around 92% of HTTP DDoS attack requests were over HTTPS and almost 8% were over plaintext HTTP.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1grfbkXvzjh8nXJYtrhiJP/8ff46ac59d296fcad89475f2bc242184/unnamed__2_.png" />
          </figure><p><sup><i>HTTP vs. HTTPS in legitimate traffic and DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>Layer 3/Layer 4 DDoS attacks</h2>
      <a href="#layer-3-layer-4-ddos-attacks">
        
      </a>
    </div>
    <p>The top three most common Layer 3/Layer 4 (network layer) attack vectors were <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/"><u>SYN flood</u></a> (38%), <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/"><u>DNS flood attacks</u></a> (16%), and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/"><u>UDP floods</u></a> (14%).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1hXTXtKe2kVD9fjw26aIN8/7bbd5ef01b04a3bba28232cdcf876c3a/image1.png" />
          </figure><p><sup><i>Top L3/4 DDoS attack vectors: 2024 Q4</i></sup></p><p>An additional common attack vector, or rather, botnet type, is <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/"><u>Mirai</u></a>. Mirai attacks accounted for 6% of all network layer DDoS attacks — a 131% increase QoQ. In 2024 Q4, a Mirai-variant botnet was responsible for the largest DDoS attack on record, but we’ll discuss that further in the <a href="#the-largest-ddos-attack-on-record"><u>next section</u></a>.</p>
    <div>
      <h2>Emerging attack vectors</h2>
      <a href="#emerging-attack-vectors">
        
      </a>
    </div>
    <p>Before moving on to the next section, it’s worthwhile to discuss the growth in additional attack vectors that were observed this quarter. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Hz074MxtzzdG4uvCM8P93/af6c86b023160f66acf0fe209386acf7/image8.png" />
          </figure><p><sup><i>Top emerging threats: 2024 Q4</i></sup></p><p><sup><i></i></sup><a href="https://www.cloudflare.com/learning/ddos/memcached-ddos-attack/"><u>Memcached DDoS attacks</u></a> saw the largest growth, with a 314% QoQ increase. <a href="https://memcached.org/"><u>Memcached</u></a> is a database caching system for speeding up websites and networks. Memcached servers that support <a href="https://www.cloudflare.com/learning/ddos/glossary/user-datagram-protocol-udp/">UDP</a> can be abused to launch amplification or reflection DDoS attacks. In this case, the attacker would request content from the caching system and spoof the victim's IP address as the source IP in the UDP packets. The victim will be flooded with the Memcache responses, which can be up to 51,200x larger than the initial request.</p><p>BitTorrent DDoS attacks also surged this quarter by 304%. The <a href="https://en.wikipedia.org/wiki/BitTorrent"><u>BitTorrent protocol</u></a> is a communication protocol used for peer-to-peer file sharing. To help the BitTorrent clients find and download the files efficiently, BitTorrent clients may utilize <a href="https://en.wikipedia.org/wiki/BitTorrent_tracker"><u>BitTorrent Trackers</u></a> or <a href="https://en.wikipedia.org/wiki/Distributed_hash_table"><u>Distributed Hash Tables (DHT)</u></a> to identify the peers that are <a href="https://en.wikipedia.org/wiki/Glossary_of_BitTorrent_terms#Seed_/_seeding"><u>seeding</u></a> the desired file. This concept can be abused to launch DDoS attacks. A malicious actor can <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/"><u>spoof</u></a> the victim’s IP address as a seeder IP address within Trackers and DHT systems. Then clients would request the files from those IP addresses. Given a sufficient number of clients requesting the file, it can flood the victim with more traffic than it can handle.</p>
    <div>
      <h2>The largest DDoS attack on record</h2>
      <a href="#the-largest-ddos-attack-on-record">
        
      </a>
    </div>
    <p>On October 29, a 5.6 Tbps <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/"><u>UDP DDoS attack</u></a> launched by a Mirai-variant botnet targeted a Cloudflare <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Magic Transit</u></a> customer, an Internet service provider (ISP) from Eastern Asia. The attack lasted only 80 seconds and originated from over 13,000 <a href="https://www.cloudflare.com/learning/ddos/glossary/internet-of-things-iot/"><u>IoT</u></a> devices. Detection and mitigation were fully autonomous by Cloudflare’s distributed defense systems. It required no human intervention, didn’t trigger any alerts, and didn’t cause any performance degradation. The systems worked as intended.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/kx3Uj4y4G4KZ6yNritxg4/d47e8f1b51a630bce28e8b036a4e7b64/image16.png" />
          </figure><p><sup><i>Cloudflare’s autonomous DDoS defenses mitigate a 5.6 Tbps Mirai DDoS attack without human intervention</i></sup></p><p>While the total number of unique source IP addresses was around 13,000, the average unique source IP addresses per second was 5,500. We also saw a similar number of unique source ports per second. In the graph below, each line represents one of the 13,000 different source IP addresses, and as portrayed, each contributed less than 8 Gbps per second. The average contribution of each IP address per second was around 1 Gbps (~0.012% of 5.6 Tbps).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2biclYyny81QnJxQpP3PcF/8e1ec9c4b227043b1bd05914c1f543b1/image14.png" />
          </figure><p><sup><i>The 13,000 source IP addresses that launched the 5.6 Tbps DDoS attack</i></sup></p>
    <div>
      <h2>Hyper-volumetric DDoS attacks</h2>
      <a href="#hyper-volumetric-ddos-attacks">
        
      </a>
    </div>
    <p>In 2024 Q3, we started seeing a rise in hyper-volumetric network layer DDoS attacks. In 2024 Q4, the amount of attacks exceeding 1 Tbps increased by 1,885% QoQ and attacks exceeding 100 Million pps (packets per second) increased by 175% QoQ. 16% of the attacks that exceeded 100 Million pps also exceeded 1 Billion pps.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3L3X48ztfIeGRVe3Su009z/b6798328b8926b33ea78b0617ee3aad5/image6.png" />
          </figure><p><sup><i>Distribution of hyper-volumetric L3/4 DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>Attack size</h2>
      <a href="#attack-size">
        
      </a>
    </div>
    <p>The majority of HTTP DDoS attacks (63%) did not exceed 50,000 requests per second. On the other side of the spectrum, 3% of HTTP DDoS attacks exceeded 100 million requests per second.</p><p>Similarly, the majority of network layer DDoS attacks are also small. 93% did not exceed 500 Mbps and 87% did not exceed 50,000 packets per second. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/25TQ7mayQOrr3ZpG1yLADa/ce08756eec2fbb2b213aad1668d59b4f/unnamed.png" />
          </figure><p><sup><i>QoQ change in attack size by packet rate: 2024 Q4</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1eNqV8gIxZgukwropBeyvs/23f128993b6573a3acb6e2a33306813d/unnamed__1_.png" />
          </figure><p><sup><i>QoQ change in attack size by bit rate: 2024 Q4</i></sup></p>
    <div>
      <h2>Attack duration</h2>
      <a href="#attack-duration">
        
      </a>
    </div>
    <p>The majority of HTTP DDoS attacks (72%) end in under ten minutes. Approximately 22% of HTTP DDoS attacks last over one hour, and 11% last over 24 hours.</p><p>Similarly, 91% of network layer DDoS attacks also end within ten minutes. Only 2% last over an hour.</p><p>Overall, there was a significant QoQ decrease in the duration of DDoS attacks. Because the duration of most attacks is so short, it is not feasible, in most cases, for a human to respond to an alert, analyze the traffic, and apply mitigation. The short duration of attacks emphasizes the need for an <a href="https://www.cloudflare.com/ddos/">in-line, always-on, automated DDoS protection service</a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Yfb7JGpZ2GTXR2HYK5pAS/55a1dbf4eec229e7154cf223d542e3bf/unnamed__3_.png" />
          </figure><p><sup><i>QoQ change in attack duration: 2024 Q4</i></sup></p>
    <div>
      <h2>Attack sources</h2>
      <a href="#attack-sources">
        
      </a>
    </div>
    <p>In the last quarter of 2024, Indonesia remained the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#source-country"><u>largest source of DDoS attacks</u></a> worldwide for the second consecutive quarter. To understand where attacks are coming from, we map the source IP addresses launching HTTP DDoS attacks because they cannot be spoofed, and for Layer 3/Layer 4 DDoS attacks, we use the location of our data centers where the DDoS packets were ingested. This lets us overcome the spoofability that is possible in Layer 3/Layer 4. We’re able to achieve geographical accuracy due to our extensive network spanning over 330 cities around the world.</p><p>Hong Kong came in second, having moved up five spots from the previous quarter. Singapore advanced three spots, coming in third place.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Z7DgqDBlKbd3eDRv7ZVmL/49aabaee6301a3c93bb40851e645dd42/image2.png" />
          </figure><p><sup><i>Top 10 largest sources of DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h3>Top source networks</h3>
      <a href="#top-source-networks">
        
      </a>
    </div>
    <p>An <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system</u></a> (AS) is a large network or group of networks that has a unified routing policy. Every computer or device that connects to the Internet is connected to an AS. To find out what your AS is, visit <a href="https://radar.cloudflare.com/ip">https://radar.cloudflare.com/ip</a>.</p><p>When looking at where the DDoS attacks originate from, specifically HTTP DDoS attacks, there are a few autonomous systems that stand out.</p><p>The AS that we saw the most HTTP DDoS attack traffic from in 2024 Q4 was German-based <a href="https://radar.cloudflare.com/security-and-attacks/as24940"><u>Hetzner (AS24940)</u></a>. Almost 5% of all HTTP DDoS requests originated from Hetzer’s network, or in other words, 5 out of every 100 HTTP DDoS requests that Cloudflare blocked originated from Hetzner.</p><p>In second place we have the US-based <a href="https://radar.cloudflare.com/security-and-attacks/as14061"><u>Digital Ocean (AS14061)</u></a>, followed by France-based <a href="https://radar.cloudflare.com/security-and-attacks/as16276"><u>OVH (AS16276)</u></a> in third place.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7pQUunzZ0ioH48lTOJOLVe/8dc42b7904b0f0b838f117ce5f35a35a/image12.png" />
          </figure><p><sup><i>Top 10 largest source networks of DDoS attacks: 2024 Q4</i></sup></p><p>For many network operators such as the ones listed above, it can be hard to identify the malicious actors that abuse their infrastructure for launching attacks. To help network operators and service providers crack down on the abuse, we provide a <b>free</b> <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/"><u>DDoS Botnet threat intelligence feed</u></a> that provides ASN owners a list of their IP addresses that we’ve seen participating in DDoS attacks. </p>
    <div>
      <h2>Top threat actors</h2>
      <a href="#top-threat-actors">
        
      </a>
    </div>
    <p>When surveying Cloudflare customers that were targeted by DDoS attacks, the majority said they didn’t know who attacked them. The ones that did know reported their competitors as the number one threat actor behind the attacks (40%). Another 17% reported that a state-level or state-sponsored threat actor was behind the attack, and a similar percentage reported that a disgruntled user or customer was behind the attack.</p><p>Another 14% reported that an extortionist was behind the attacks. 7% claimed it was a self-inflicted DDoS, 2% reported hacktivism as the cause of the attack, and another 2% reported that the attacks were launched by former employees.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gThccj4k75gfFoGBn301W/403bd5cf3984611490e7d90f3435f3c1/image15.png" />
          </figure><p><sup><i>Top threat actors: 2024 Q4</i></sup></p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>In the final quarter of 2024, as anticipated, we observed a surge in <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/"><u>Ransom DDoS attacks</u></a>. This spike was predictable, given that Q4 is a prime time for cybercriminals, with increased online shopping, travel arrangements, and holiday activities. Disrupting these services during peak times can significantly impact organizations' revenues and cause real-world disruptions, such as flight delays and cancellations.</p><p>In Q4, 12% of Cloudflare customers that were targeted by DDoS attacks reported being threatened or extorted for a ransom payment. This represents a 78% QoQ increase and 25% YoY growth compared to 2023 Q4.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1BV3NoLbxwzO0ShVyCwQ97/7ccb684195b6efef0db209aefffff476/image17.png" />
          </figure><p><sup><i>Reported Ransom DDoS attacks by quarter: 2024</i></sup></p><p>Looking back at the entire year of 2024, Cloudflare received the most reports of Ransom DDoS attacks in May. In Q4, we can see the gradual increase starting from October (10%), November (13%), and December (14%) — a seven-month-high.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/EllNHd6iUWkQ6Z481gLss/a20b10f96d4f7a649dfa23beceebad8e/image9.png" />
          </figure><p><sup><i>Reported Ransom DDoS attacks by month: 2024</i></sup></p>
    <div>
      <h2>Target of attacks</h2>
      <a href="#target-of-attacks">
        
      </a>
    </div>
    <p>In 2024 Q4, China maintained its position as the most <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-country"><u>attacked country</u></a>. To understand which countries are subject to more attacks, we group DDoS attacks by our customers’ billing country. </p><p>Philippines makes its first appearance as the second most attacked country in the top 10. Taiwan jumped to third place, up seven spots compared to last quarter.</p><p>In the map below, you can see the top 10 most attacked locations and their ranking change compared to the previous quarter.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4TosbZ02NmNGbgpwkskUNs/6f96885b4de89c34403551a03a01e634/image5.png" />
          </figure><p><sup><i>Top 10 most attacked locations by DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>Most attacked industries</h2>
      <a href="#most-attacked-industries">
        
      </a>
    </div>
    <p>In the fourth quarter of 2024, the <i>Telecommunications, Service Providers and Carriers</i> industry jumped from the third place (last quarter) to the first place as the most <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-industry"><u>attacked industry</u></a>. To understand which industries are subject to more attacks, we group DDoS attacks by our customers’ industry. The <i>Internet</i> industry came in second, followed by <i>Marketing and Advertising</i> in third.</p><p>The <i>Banking &amp; Financial Services</i> industry dropped seven places from number one in 2024 Q3 to number eight in Q4.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/444JREdNrmb6yePqqfGI4B/a268a1d3d3cd1dd7d9e076ffcf5b06c5/image7.png" />
          </figure><p><sup><i>Top 10 most attacked industries by DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>Our commitment to unmetered DDoS protection</h2>
      <a href="#our-commitment-to-unmetered-ddos-protection">
        
      </a>
    </div>
    <p>The fourth quarter of 2024 saw a surge in hyper-volumetric Layer 3/Layer 4 DDoS attacks, with the largest one breaking our previous record, peaking at 5.6 Tbps. This rise in attack size renders capacity-limited cloud DDoS protection services or on-premise DDoS appliances obsolete.</p><p>The growing use of powerful botnets, driven by geopolitical factors, has broadened the range of vulnerable targets. A rise in Ransom DDoS attacks is also a growing concern.</p><p>Too many organizations only implement DDoS protection after suffering an attack. Our observations show that organizations with proactive security strategies are more resilient. At Cloudflare, we invest in automated defenses and a comprehensive security portfolio to provide proactive protection against both current and emerging threats.</p><p>With our 321 Tbps network spanning 330 cities globally, we remain committed to providing <a href="https://www.cloudflare.com/ddos/">unmetered and unlimited DDoS protection</a> no matter the size, duration and quantity of the attacks.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[DDoS Alerts]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Mirai]]></category>
            <category><![CDATA[Attacks]]></category>
            <guid isPermaLink="false">1qstsc71dUKtPimn2nGewc</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2024 Q1]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2024-q1/</link>
            <pubDate>Tue, 16 Apr 2024 13:00:25 GMT</pubDate>
            <description><![CDATA[ 2024 started with a bang. Cloudflare’s autonomous systems mitigated over 4.5 million DDoS attacks in the first quarter of the year — a 50% increase compared to the previous year. 
Read the full coverage ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7CRUEQXjRjK9JCmDScvOe9/202241692c52e9b98d7c4609ae6a90b5/image13.png" />
            
            </figure><p>Welcome to the 17th edition of Cloudflare’s DDoS threat report. This edition covers the DDoS threat landscape along with key findings as observed from the <a href="https://www.cloudflare.com/network/">Cloudflare network</a> during the first quarter of 2024.</p>
    <div>
      <h3>What is a DDoS attack?</h3>
      <a href="#what-is-a-ddos-attack">
        
      </a>
    </div>
    <p>But first, a quick recap. A DDoS attack, short for <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service attack</a>, is a type of cyber attack that aims to take down or disrupt Internet services such as websites or mobile apps and make them unavailable for users. DDoS attacks are usually done by flooding the victim's server with more traffic than it can handle.</p><p>To learn more about DDoS attacks and other types of attacks, visit our <a href="https://www.cloudflare.com/learning/">Learning Center</a>.</p>
    <div>
      <h3>Accessing previous reports</h3>
      <a href="#accessing-previous-reports">
        
      </a>
    </div>
    <p>Quick reminder that you can access <a href="/tag/ddos-reports">previous editions of DDoS threat reports</a> on the Cloudflare blog. They are also available on our interactive hub, <a href="https://radar.cloudflare.com/reports?q=DDoS">Cloudflare Radar</a>. On Radar, you can find global Internet traffic, attacks, and technology trends and insights, with drill-down and filtering capabilities, so you can zoom in on specific countries, industries, and networks. There’s also a <a href="https://developers.cloudflare.com/radar/">free API</a> allowing academics, data sleuths, and other web enthusiasts to investigate Internet trends across the globe.</p><p>To learn how we prepare this report, refer to our <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/">Methodologies</a>.</p>
    <div>
      <h3>2024 Q1 key insights</h3>
      <a href="#2024-q1-key-insights">
        
      </a>
    </div>
    <p>Key insights from the first quarter of 2024 include:</p><ul><li><p>2024 started with a bang. Cloudflare’s defense systems automatically mitigated 4.5 million DDoS attacks during the first quarter — representing a 50% year-over-year (YoY) increase.</p></li><li><p>DNS-based DDoS attacks increased by 80% YoY and remain the most prominent attack vector.</p></li><li><p>DDoS attacks on Sweden surged by 466% after its acceptance to the NATO alliance, mirroring the pattern observed during Finland's NATO accession in 2023.</p></li></ul>
    <div>
      <h3>Starting 2024 with a bang</h3>
      <a href="#starting-2024-with-a-bang">
        
      </a>
    </div>
    <p>We’ve just wrapped up the first quarter of 2024, and, already, our automated defenses have mitigated 4.5 million DDoS attacks — an amount equivalent to 32% of all the DDoS attacks we mitigated in 2023.</p><p>Breaking it down to attack types, HTTP DDoS attacks increased by 93% YoY and 51% quarter-over-quarter (QoQ). Network-layer DDoS attacks, also known as L3/4 DDoS attacks, increased by 28% YoY and 5% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6QB3mXk7ACemlQBJcY05Wk/ecb4b32b415ac29a3c5fe673af3520da/image1-15.png" />
            
            </figure><p>2024 Q1: Cloudflare mitigated 4.5 million DDoS attacks</p><p>When comparing the combined number of HTTP DDoS attacks and L3/4 DDoS attacks, we can see that, overall, in the first quarter of 2024, the count increased by 50% YoY and 18% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3B6aKU9fQb6RGzcJYQmjVv/e8a91d10307dc429c47ca413cf134774/pasted-image-0--7--1.png" />
            
            </figure><p>DDoS attacks by year and quarter</p><p>In total, our systems mitigated 10.5 trillion HTTP DDoS attack requests in Q1. Our systems also mitigated over 59 petabytes of DDoS attack traffic — just on the network-layer.</p><p>Among those network-layer DDoS attacks, many of them exceeded the 1 terabit per second rate — almost on a weekly basis. The largest attack that we have mitigated so far in 2024 was launched by a Mirai-variant botnet. This attack reached 2 Tbps and was aimed at an Asian hosting provider protected by <a href="https://www.cloudflare.com/network-services/products/magic-transit/">Cloudflare Magic Transit</a>. Cloudflare’s systems automatically detected and mitigated the attack.</p><p>The <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai botnet</a>, infamous for its massive DDoS attacks, was primarily composed of infected IoT devices. It notably disrupted Internet access across the US in 2016 by targeting DNS service providers. Almost eight years later, Mirai attacks are still very common. Four out of every 100 HTTP DDoS attacks, and two out of every 100 L3/4 DDoS attacks are launched by a Mirai-variant botnet. The reason we say “variant” is that the Mirai source code was made public, and over the years there have been many permutations of the original.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2QN1Ndrb3e0EEiVNPu1chA/1c3a61ed355fd74c008955659d696661/pasted-image-0-3.png" />
            
            </figure><p>Mirai botnet targets Asian hosting provider with 2 Tbps DDoS attack</p>
    <div>
      <h3>DNS attacks surge by 80%</h3>
      <a href="#dns-attacks-surge-by-80">
        
      </a>
    </div>
    <p>In March 2024, we introduced one of our latest DDoS defense systems, the <a href="/advanced-dns-protection">Advanced DNS Protection</a> system. This system complements our existing systems, and is designed to protect against the most sophisticated DNS-based DDoS attacks.</p><p>It is not out of the blue that we decided to invest in this new system. DNS-based DDoS attacks have become the most prominent attack vector and its share among all network-layer attacks continues to grow. In the first quarter of 2024, the share of DNS-based DDoS attacks increased by 80% YoY, growing to approximately 54%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4eeimQquFTBhNCOKeGTcoe/d1ccde4a4468aa1a73ee7fb5711014ba/pasted-image-0--1--1.png" />
            
            </figure><p>DNS-based DDoS attacks by year and quarter</p><p>Despite the surge in DNS attacks and due to the overall increase in all types of DDoS attacks, the share of each attack type, remarkably, remains the same as seen in our previous report for the final quarter of 2023. HTTP DDoS attacks remain at 37% of all DDoS attacks, DNS DDoS attacks at 33%, and the remaining 30% is left for all other types of L3/4 attacks, such as <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN Flood</a> and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP Floods</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5lUZwA2pBOVNWP9nW5541d/c4460eeac1d3b5a40e84dbb1fb6cf89f/pasted-image-0--2-.png" />
            
            </figure><p>Attack type distribution</p><p>And in fact, SYN Floods were the second most common L3/4 attack. The third was RST Floods, another type of TCP-based DDoS attack. UDP Floods came in fourth with a 6% share.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6mQ0isNVD7dWQbtnq5DITg/0fb241b6fd61d552d3a579323e37f38b/pasted-image-0--3-.png" />
            
            </figure><p>Top attack vectors</p><p>When analyzing the most common attack vectors, we also check for the attack vectors that experienced the largest growth but didn’t necessarily make it into the top ten list. Among the top growing attack vectors (emerging threats), Jenkins Flood experienced the largest growth of over 826% QoQ.</p><p>Jenkins Flood is a DDoS attack that exploits vulnerabilities in the <a href="https://www.jenkins.io/">Jenkins automation server</a>, specifically through UDP multicast/broadcast and DNS multicast services. Attackers can send small, specially crafted requests to a publicly facing UDP port on Jenkins servers, causing them to respond with disproportionately large amounts of data. This can amplify the traffic volume significantly, overwhelming the target's network and leading to service disruption. Jenkins addressed this vulnerability (<a href="https://smartermsp.com/cybersecurity-threat-advisory-0013-20-jenkins-udp-ddos-attack-cve-2020-2100/">CVE-2020-2100</a>) in 2020 by disabling these services by default in later versions. However, as we can see, even 4 years later, this vulnerability is still being abused in the wild to launch DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/HZBbtghkPLvvRnFaTAw9d/f1030dfaed7500861fdbc83b1c4d02ab/pasted-image-0--4-.png" />
            
            </figure><p>Attack vectors that experienced the largest growth QoQ</p>
    <div>
      <h3>HTTP/2 Continuation Flood</h3>
      <a href="#http-2-continuation-flood">
        
      </a>
    </div>
    <p>Another attack vector that’s worth discussing is the HTTP/2 Continuation Flood. This attack vector is made possible by a vulnerability that was <a href="https://nowotarski.info/http2-continuation-flood-technical-details/">discovered and reported publicly by researcher Bartek Nowotarski</a> on April 3, 2024.</p><p>The HTTP/2 Continuation Flood vulnerability targets HTTP/2 protocol implementations that improperly handle HEADERS and multiple CONTINUATION frames. The threat actor sends a sequence of CONTINUATION frames without the END_HEADERS flag, leading to potential server issues such as out-of-memory crashes or CPU exhaustion. HTTP/2 Continuation Flood allows even a single machine to disrupt websites and APIs using HTTP/2, with the added challenge of difficult detection due to no visible requests in HTTP access logs.</p><p>This vulnerability poses a potentially severe threat more damaging than the previously known <a href="/technical-breakdown-http2-rapid-reset-ddos-attack/">HTTP/2 Rapid Reset</a>, which resulted in some of the largest HTTP/2 DDoS attack campaigns in recorded history. During that campaign, thousands of hyper-volumetric DDoS attacks targeted Cloudflare. The attacks were multi-million requests per second strong. The average attack rate in that campaign, recorded by Cloudflare, was 30M rps. Approximately 89 of the attacks peaked above 100M rps and the largest one we saw hit 201M rps. Additional coverage was published in our <a href="/ddos-threat-report-2023-q3/">2023 Q3 DDoS threat report</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/72mnC1iNyKm6RX3UAwsVG4/5d66586e5833ce492bd2cbfb1eb538eb/pasted-image-0--2--1.png" />
            
            </figure><p>HTTP/2 Rapid Reset campaign of hyper-volumetric DDoS attacks in 2023 Q3</p><p>Cloudflare's network, its HTTP/2 implementation, and customers using our <a href="https://www.cloudflare.com/application-services/products/waf/">WAF</a>/<a href="https://www.cloudflare.com/application-services/products/cdn/">CDN</a> services are not affected by this vulnerability. Furthermore, we are not currently aware of any threat actors exploiting this vulnerability in the wild.</p><p>Multiple CVEs have been assigned to the various implementations of HTTP/2 that are impacted by this vulnerability. A <a href="https://kb.cert.org/vuls/id/421644">CERT alert</a> published by Christopher Cullen at Carnegie Mellon University, which was covered by <a href="https://www.bleepingcomputer.com/news/security/new-http-2-dos-attack-can-crash-web-servers-with-a-single-connection/">Bleeping Computer</a>, lists the various CVEs:</p>
<table>
<colgroup>
<col></col>
<col></col>
<col></col>
</colgroup>
<thead>
  <tr>
    <th><span>Affected service </span></th>
    <th><span>CVE</span></th>
    <th><span>Details</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Node.js HTTP/2 server</span></td>
    <td><span>CVE-2024-27983</span></td>
    <td><span>Sending a few HTTP/2 frames can cause a race condition and memory leak, leading to a potential denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Envoy's oghttp codec</span></td>
    <td><span>CVE-2024-27919</span></td>
    <td><span>Not resetting a request when header map limits are exceeded can cause unlimited memory consumption which can potentially lead to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Tempesta FW</span></td>
    <td><span>CVE-2024-2758</span></td>
    <td><span>Its rate limits are not entirely effective against empty CONTINUATION frames flood, potentially leading to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>amphp/http</span></td>
    <td><span>CVE-2024-2653</span></td>
    <td><span>It collects CONTINUATION frames in an unbounded buffer, risking an out of memory (OOM) crash if the header size limit is exceeded, potentially resulting in a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Go's net/http and net/http2 packages</span></td>
    <td><span>CVE-2023-45288</span></td>
    <td><span>Allows an attacker to send an arbitrarily large set of headers, causing excessive CPU consumption, potentially leading to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>nghttp2 library</span></td>
    <td><span>CVE-2024-28182</span></td>
    <td><span>Involves an implementation using nghttp2 library, which continues to receive CONTINUATION frames, potentially leading to a denial of service event without proper stream reset callback.</span></td>
  </tr>
  <tr>
    <td><span>Apache Httpd</span></td>
    <td><span>CVE-2024-27316</span></td>
    <td><span>A flood of CONTINUATION frames without the END_HEADERS flag set can be sent, resulting in the improper termination of requests, potentially leading to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Apache Traffic Server</span></td>
    <td><span>CVE-2024-31309</span></td>
    <td><span>HTTP/2 CONTINUATION floods can cause excessive resource consumption on the server, potentially leading to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Envoy versions 1.29.2 or earlier</span></td>
    <td><span>CVE-2024-30255</span></td>
    <td><span>Consumption of significant server resources can lead to CPU exhaustion during a flood of CONTINUATION frames, which can potentially lead to a denial of service event.</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Top attacked industries</h3>
      <a href="#top-attacked-industries">
        
      </a>
    </div>
    <p>When analyzing attack statistics, we use our <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-industry">customer’s industry</a> as it is recorded in our systems to determine the most attacked industries. In the first quarter of 2024, the top attacked industry by HTTP DDoS attacks in North America was Marketing and Advertising. In Africa and Europe, the Information Technology and Internet industry was the most attacked. In the Middle East, the most attacked industry was Computer Software. In Asia, the most attacked industry was Gaming and Gambling. In South America, it was the Banking, Financial Services and Insurance (BFSI) industry. Last but not least, in Oceania, was the Telecommunications industry.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ntlfFKUUah6DeHSlwJSq6/f488dbd9e68e2822a16c448aa55d0c12/Top-Attacked-Industry-by-Region-Q1-2024.png" />
            
            </figure><p>Top attacked industries by HTTP DDoS attacks, by region</p><p>Globally, the Gaming and Gambling industry was the number one most targeted by HTTP DDoS attacks. Just over seven of every 100 DDoS requests that Cloudflare mitigated were aimed at the <a href="https://www.cloudflare.com/gaming/">Gaming</a> and Gambling industry. In second place, the Information Technology and Internet industry, and in third, Marketing and Advertising.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/LNYVB8cgZhctz3H84y4is/c952e53b1475adcebaac1df63fd71352/pasted-image-0--5-.png" />
            
            </figure><p>Top attacked industries by HTTP DDoS attacks</p><p>With a share of 75% of all network-layer DDoS attack bytes, the Information Technology and Internet industry was the most targeted by network-layer DDoS attacks. One possible explanation for this large share is that Information Technology and Internet companies may be “super aggregators” of attacks and receive DDoS attacks that are actually targeting their end customers. The Telecommunications industry, the <a href="https://www.cloudflare.com/financial-services/">Banking, Financial Services and Insurance (BFSI)</a> industry, the Gaming and Gambling industry and the Computer Software industry accounted for the next three percent.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/61FwNZ9kUUqXnHpcSmVRaC/479e12abb25cd38a3d302bb28efa51dc/pasted-image-0--6--1.png" />
            
            </figure><p>Top attacked industries by L3/4 DDoS attacks</p><p>When normalizing the data by dividing the attack traffic by the total traffic to a given industry, we get a completely different picture. On the HTTP front, Law Firms and Legal Services was the most attacked industry, as over 40% of their traffic was HTTP DDoS attack traffic. The Biotechnology industry came in second with a 20% share of HTTP DDoS attack traffic. In third place, <a href="https://www.cloudflare.com/galileo/">Nonprofits</a> had an HTTP DDoS attack share of 13%. In fourth, Aviation and Aerospace, followed by Transportation, Wholesale, <a href="https://www.cloudflare.com/public-sector/">Government Relations</a>, Motion Pictures and Film, Public Policy, and Adult Entertainment to complete the top ten.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4I2FKWUobGjuyukeip0K5U/6f62640b53a76e3807743ed0b1865d03/pasted-image-0--8--1.png" />
            
            </figure><p>Top attacked industries by HTTP DDoS attacks (normalized)</p><p>Back to the network layer, when normalized, Information Technology and Internet remained the number one most targeted industry by L3/4 DDoS attacks, as almost a third of their traffic were attacks. In second, Textiles had a 4% attack share. In third, Civil Engineering, followed by Banking Financial Services and Insurance (BFSI), Military, Construction, Medical Devices, Defense and Space, Gaming and Gambling, and lastly Retail to complete the top ten.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4KNGEFTvu7T1NQj3nO9Jqo/28d249aa64cd6d23789ce5b6ba738642/pasted-image-0--9--1.png" />
            
            </figure><p>Top attacked industries by L3/4 DDoS attacks (normalized)</p>
    <div>
      <h3>Largest sources of DDoS attacks</h3>
      <a href="#largest-sources-of-ddos-attacks">
        
      </a>
    </div>
    <p>When analyzing the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#source-country">sources of HTTP DDoS attacks</a>, we look at the source IP address to determine the origination location of those attacks. A country/region that's a large source of attacks indicates that there is most likely a large presence of botnet nodes behind <a href="https://www.cloudflare.com/learning/access-management/what-is-a-vpn/">Virtual Private Network (VPN)</a> or proxy endpoints that attackers may use to obfuscate their origin.</p><p>In the first quarter of 2024, the United States was the largest source of HTTP DDoS attack traffic, as a fifth of all DDoS attack requests originated from US IP addresses. China came in second, followed by Germany, Indonesia, Brazil, Russia, Iran, Singapore, India, and Argentina.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4wQLyRJrrtx54hGXPY2HHC/d6e9119a6d8996713f2f4d1befad518e/pasted-image-0--10-.png" />
            
            </figure><p>The top sources of HTTP DDoS attacks</p><p>At the network layer, source IP addresses can be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a>. So, instead of relying on IP addresses to understand the source, <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#source-country">we use the location of our data centers</a> where the attack traffic was ingested. We can gain geographical accuracy due to Cloudflare’s large global coverage in over 310 cities around the world.</p><p>Using the location of our data centers, we can see that in the first quarter of 2024, over 40% L3/4 DDoS attack traffic was ingested in our US data centers, making the US the largest source of L3/4 attacks. Far behind, in second, Germany at 6%, followed by Brazil, Singapore, Russia, South Korea, Hong Kong, United Kingdom, Netherlands, and Japan.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4vggccrQzkQy6yNuHMQboq/c4de452c39e00a1d38f4c1d7a114c585/pasted-image-0--11-.png" />
            
            </figure><p>The top sources of L3/4 DDoS attacks</p><p>When normalizing the data by dividing the attack traffic by the total traffic to a given country or region, we get a totally different lineup. Almost a third of the HTTP traffic originating from Gibraltar was DDoS attack traffic, making it the largest source. In second place, Saint Helena, followed by the British Virgin Islands, Libya, Paraguay, Mayotte, Equatorial Guinea, Argentina, and Angola.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1dYeSLU5tTKxZmMoqkF8y5/ac6ff10b445c97be9a1a5e07374b0643/pasted-image-0--12-.png" />
            
            </figure><p>The top sources of HTTP DDoS attacks (normalized)</p><p>Back to the network layer, normalized, things look rather different as well. Almost 89% of the traffic we ingested in our Zimbabwe-based data centers were L3/4 DDoS attacks. In Paraguay, it was over 56%, followed by Mongolia reaching nearly a 35% attack share. Additional top locations included Moldova, Democratic Republic of the Congo, Ecuador, Djibouti, Azerbaijan, Haiti, and Dominican Republic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/qpyO1vBpvAjoCe50RnZGT/2e6001062ff51ecc9f5bb2bb30e9cf6f/pasted-image-0--13-.png" />
            
            </figure><p>The top sources of L3/4 DDoS attacks (normalized)</p>
    <div>
      <h3>Most attacked locations</h3>
      <a href="#most-attacked-locations">
        
      </a>
    </div>
    <p>When analyzing DDoS attacks against our customers, we use their <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-country">billing country</a> to determine the “attacked country (or region)”. In the first quarter of 2024, the US was the most attacked by HTTP DDoS attacks. Approximately one out of every 10 DDoS requests that Cloudflare mitigated targeted the US. In second, China, followed by Canada, Vietnam, Indonesia, Singapore, Hong Kong, Taiwan, Cyprus, and Germany.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5cGyvb0ljLm8wOQTzLHYfV/b3650336a30e2bafb717e42fc5255098/pasted-image-0--14-.png" />
            
            </figure><p>Top attacked countries and regions by HTTP DDoS attacks</p><p>When normalizing the data by dividing the attack traffic by the total traffic to a given country or region, the list changes drastically. Over 63% of HTTP traffic to Nicaragua was DDoS attack traffic, making it the most attacked location. In second, Albania, followed by Jordan, Guinea, San Marino, Georgia, Indonesia, Cambodia, Bangladesh, and Afghanistan.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6if6kI4aS8Kph16cSCEWjf/20be20d9cfe02034bf123003042dfbbb/pasted-image-0--15-.png" />
            
            </figure><p>Top attacked countries and regions by HTTP DDoS attacks (normalized)</p><p>On the network layer, China was the number one most attacked location, as 39% of all DDoS bytes that Cloudflare mitigated during the first quarter of 2024 were aimed at Cloudflare’s Chinese customers. Hong Kong came in second place, followed by Taiwan, the United States, and Brazil.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Nzw0zyRFnxer3C1SQmeHI/ae2081521fd12b399c9776a5a54748c4/pasted-image-0--16-.png" />
            
            </figure><p>Top attacked countries and regions by L3/4 DDoS attacks</p><p>Back to the network layer, when normalized, Hong Kong takes the lead as the most targeted location. L3/4 DDoS attack traffic accounted for over 78% of all Hong Kong-bound traffic. In second place, China with a DDoS share of 75%, followed by Kazakhstan, Thailand, Saint Vincent and the Grenadines, Norway, Taiwan, Turkey, Singapore, and Brazil.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2sUX9I80bmFLo0vrTNRiDu/4a96fd8283f2a5156ff02cd95fcdbda5/pasted-image-0--17-.png" />
            
            </figure><p>Top attacked countries and regions by L3/4 DDoS attacks (normalized)</p>
    <div>
      <h3>Cloudflare is here to help - no matter the attack type, size, or duration</h3>
      <a href="#cloudflare-is-here-to-help-no-matter-the-attack-type-size-or-duration">
        
      </a>
    </div>
    <p>Cloudflare's mission is to help build a better Internet, a vision where it remains secure, performant, and accessible to everyone. With four out of every 10 HTTP DDoS attacks lasting over 10 minutes and approximately three out of 10 extending beyond an hour, the challenge is substantial. Yet, whether an attack involves over 100,000 requests per second, as is the case in one out of every 10 attacks, or even exceeds a million requests per second — a rarity seen in only four out of every 1,000 attacks — Cloudflare’s defenses remain impenetrable.</p><p>Since pioneering <a href="/unmetered-mitigation">unmetered DDoS Protection</a> in 2017, Cloudflare has steadfastly honored its promise to provide enterprise-grade <a href="https://www.cloudflare.com/ddos/">DDoS protection</a> at no cost to all organizations, ensuring that our advanced technology and robust network architecture do not just fend off attacks but also preserve performance without compromise.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Mirai]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[DNS Flood]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">bRA8E8DuG6NNpZ1vHZCwP</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare blocks an almost 2 Tbps multi-vector DDoS attack]]></title>
            <link>https://blog.cloudflare.com/cloudflare-blocks-an-almost-2-tbps-multi-vector-ddos-attack/</link>
            <pubDate>Sat, 13 Nov 2021 14:33:49 GMT</pubDate>
            <description><![CDATA[ Earlier this week, Cloudflare automatically detected and mitigated a DDoS attack that peaked just below 2 Tbps — the largest we’ve seen to date. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Earlier this week, Cloudflare automatically detected and mitigated a <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attack</a> that peaked just below 2 Tbps — the largest we’ve seen to date. This was a multi-vector attack combining <a href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/">DNS amplification</a> attacks and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP floods</a>. The entire attack lasted just one minute. The attack was launched from approximately 15,000 bots running a variant of the original Mirai code on IoT devices and <a href="https://www.rapid7.com/blog/post/2021/11/01/gitlab-unauthenticated-remote-code-execution-cve-2021-22205-exploited-in-the-wild/">unpatched GitLab instances</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/69O75xM8BJ3AQ4xboaaJc8/05b4efd41d8beb38aabe8f5df3b1e48c/image4-11.png" />
            
            </figure><p>DDoS attack peaking just below 2 Tbps‌‌</p>
    <div>
      <h3>Network-layer DDoS attacks increased by 44%</h3>
      <a href="#network-layer-ddos-attacks-increased-by-44">
        
      </a>
    </div>
    <p>Last quarter, we saw multiple terabit-strong DDoS attacks and this attack continues this trend of increased attack intensity. Another key finding from our <a href="/ddos-attack-trends-for-2021-q3/">Q3 DDoS Trends report</a> was that network-layer DDoS attacks actually increased by 44% quarter-over-quarter. While the fourth quarter is not over yet, we have, again, seen multiple terabit-strong attacks that targeted Cloudflare customers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16L0jRaxzWrkoprzjXWbEU/ebb62af9ba073ea608920f1b14c34a12/image1-21.png" />
            
            </figure><p>DDoS attacks peaking at 1-1.4 Tbps</p>
    <div>
      <h3>How did Cloudflare mitigate this attack?</h3>
      <a href="#how-did-cloudflare-mitigate-this-attack">
        
      </a>
    </div>
    <p>To begin with, our systems constantly analyze traffic samples “out-of-path” which allows us to asynchronously detect DDoS attacks without causing latency or impacting performance. Once the attack traffic was detected (within sub-seconds), our systems generated a real-time signature that surgically matched against the attack patterns to mitigate the attack without impacting legitimate traffic.</p><p>Once generated, the fingerprint is propagated as an ephemeral mitigation rule to the most optimal location in the Cloudflare edge for cost-efficient mitigation. In this specific case, as with most L3/4 DDoS attacks, the rule was pushed in-line into the Linux kernel <a href="/l4drop-xdp-ebpf-based-ddos-mitigations/">eXpress Data Path</a> (XDP) to drop the attack packet at wirespeed.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3aDR60Hnanrkb1TJ5cNgMO/e173eb50b8433d027d2e5ab834e4ee52/image3-17.png" />
            
            </figure><p>A conceptual diagram of Cloudflare’s DDoS protection systems</p><p>Read more about <a href="https://developers.cloudflare.com/ddos-protection/">Cloudflare’s DDoS Protection systems</a>.</p>
    <div>
      <h3>Helping build a better Internet</h3>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet — one that is secure, faster, and more reliable for everyone. The DDoS team’s vision is derived from this mission: our goal is to make the impact of DDoS attacks a thing of the past. Whether it's the <a href="/meris-botnet/">Meris botnet</a> that launched some of the <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">largest HTTP DDoS attacks on record</a>, the recent <a href="/update-on-voip-attacks/">attacks on VoIP providers</a> or this Mirai-variant that’s DDoSing Internet properties, Cloudflare’s network automatically detects and mitigates DDoS attacks. Cloudflare provides a secure, reliable, performant, and <a href="/http-ddos-managed-rules/">customizable</a> platform for Internet properties of all types.</p><p>For more information about Cloudflare’s DDoS protection, <a href="http://www.cloudflare.com/enterprise">reach out to us</a> or have a go with a hands-on evaluation of <a href="https://www.cloudflare.com/plans/free/">Cloudflare’s Free plan</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Mirai]]></category>
            <category><![CDATA[Botnet]]></category>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[UDP]]></category>
            <guid isPermaLink="false">22mxDvugzkq2hvpQyg4tig</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[A Brief History of the Meris Botnet]]></title>
            <link>https://blog.cloudflare.com/meris-botnet/</link>
            <pubDate>Tue, 09 Nov 2021 12:59:29 GMT</pubDate>
            <description><![CDATA[ Over the past months, we’ve been tracking and analyzing the activity of the Meris botnet. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Meris first got our attention due to an exceptionally large <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">17.2 million requests per second (rps) DDoS attack</a> that it launched against one of our customers. This attack, along with subsequent attacks originated by the Meris botnet, was automatically detected and mitigated by our <a href="https://www.cloudflare.com/ddos/">DDoS protection systems</a>. Cloudflare customers, even ones on the <a href="https://www.cloudflare.com/plans/free/">free plan</a>, are protected against Meris attacks.</p><p>Over the past months, we’ve been tracking and analyzing the activity of the Meris botnet. Some main highlights include:</p><ul><li><p>Meris targets approximately 50 different websites every single day with a daily average of 104 unique DDoS attacks.</p></li><li><p>More than 33% of all Meris DDoS attack traffic targeted China-based websites.</p></li><li><p>More than 12% of all websites that were attacked by Meris are operated by US-based companies.</p></li></ul><p><i>View more Meris attack insights and trends in the interactive </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet"><i>Radar dashboard</i></a><i>.</i></p>
    <div>
      <h3>So what is Meris?</h3>
      <a href="#so-what-is-meris">
        
      </a>
    </div>
    <p>Meris (Latvian for plague) is the name of an active botnet behind a series of recent DDoS attacks that have targeted thousands of websites around the world. It was originally detected in late June 2021 by <a href="https://blog.qrator.net/en/meris-botnet-climbing-to-the-record_142/">QRator</a> in joint research they conducted with Yandex. Their initial research identified 30,000 to 56,000 bots, but they estimated that the numbers are actually much higher, in the ballpark of 250,000 bots.</p><p>The Meris botnet is formed of infected routers and networking hardware manufactured by the Latvian company MikroTik. <a href="https://blog.mikrotik.com/security/meris-botnet.html">According to MikroTik’s</a> blog, the attackers exploited a vulnerability in the router’s operating system (RouterOS) which enabled attackers to gain unauthenticated remote access to read and write arbitrary files (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14847">CVE-2018-14847</a>).</p><p><a href="https://wiki.mikrotik.com/wiki/Manual:RouterOS_FAQ#What_is_MikroTik_RouterOS.E2.84.A2.3F">RouterOS</a> is the router operating system that’s used by MikroTik’s routers and the RouterBOARD hardware product family, which can also be used to turn any PC into a router. Administration of RouterOS can be done either via direct <a href="https://www.cloudflare.com/learning/access-management/what-is-ssh/">SSH connection</a> or by using a configuration utility called <a href="https://wiki.mikrotik.com/wiki/Manual:Winbox#Summary">WinBox</a>. The vulnerability itself was possible due to a <a href="https://en.wikipedia.org/wiki/Directory_traversal_attack">directory traversal</a> vulnerability in the WinBox interface with RouterOS.</p><p>Directory traversal is a type of exploit that allows attackers to travel to the parent directories to gain access to the operating system’s <a href="https://en.wikipedia.org/wiki/File_system">file system</a>, a method and structure of how data is stored and retrieved in the operating system. Once they gain access to the file system, attackers can then read the existing files that administer the router and write files directly into the file system to administer the routers to their botnet needs.</p><p>While the vulnerability was patched after its detection back in 2018, it’s still being exploited in compromised devices that do not use the patched RouterOS versions, or that use the default usernames and passwords. MicroTik has advised its customers to upgrade their devices’ OS version, to only allow access to the devices via secure IPsec, and to inspect for any abnormalities such as unknown SOCKS proxy settings and scripts.</p><p>To launch volumetric attacks, the botnet uses HTTP pipelining which allows it to send multiple requests over a single connection, thus increasing its total attack throughput. Furthermore, in an attempt to obfuscate the attack source, the botnet uses open SOCKS proxies to proxy their attack traffic to the target.</p><p>Cloudflare’s DDoS protection systems automatically detect and mitigate Meris attacks. One of the mitigation actions that the system can choose to use is the ‘Connection Close’ action which eliminates the risk of HTTP pipelining and helps slow down attackers. Additionally, as part of Cloudflare’s threat intelligence suite, we provide a Managed IP List of Open SOCKS Proxies that customers can use as part of their firewall rules — to block, challenge or rate-limit traffic that arrives via SOCKS proxies.</p>
    <div>
      <h3>How does Meris compare to Mirai?</h3>
      <a href="#how-does-meris-compare-to-mirai">
        
      </a>
    </div>
    <p>About five years ago, <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai</a> (Japanese for future) — the infamous botnet that infected hundreds of thousands of IoT devices —  <a href="/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis/">launched record-breaking DDoS attacks</a> against websites.</p><p>There have been many variants of the Mirai botnet since its source code was leaked. One version of Mirai, called <a href="/moobot-vs-gatebot-cloudflare-automatically-blocks-botnet-ddos-attack-topping-at-654-gbps/">Moobot</a>, was detected last year when it attacked a Cloudflare customer with a 654 Gbps DDoS attack. Another variant <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/#:~:text=Two%20weeks%20before%2C%20a%20Mirai-variant%20botnet%20launched%20over%20a%20dozen%20UDP%20and%20TCP%20based%20DDoS%20attacks%20that%20peaked%20multiple%20times%20above%201%20Tbps%2C%20with%20a%20max%20peak%20of%20approximately%201.2%20Tbps.">recently made a resurgence</a> when it targeted Cloudflare customers with over a dozen UDP and TCP based DDoS attacks that peaked multiple times above 1 Tbps, with a max peak of approximately 1.2 Tbps.</p><p>While Mirai infected IoT devices with low computational power, Meris is a swarm of routers that have significantly higher processing power and data transfer capabilities than IoT devices, making them much more potent in causing harm at a larger scale to web properties that are not protected by sophisticated cloud-based DDoS mitigation.</p>
    <div>
      <h2>Tracking the Meris botnet attacks</h2>
      <a href="#tracking-the-meris-botnet-attacks">
        
      </a>
    </div>
    <p>Since the appearance of Meris, Cloudflare’s systems automatically detected and mitigated Meris attacks using the existing mitigation rules. During our analysis of the Meris botnet attacks, our security experts noticed the attack vectors adapt to try and bypass Cloudflare’s defenses. Needless to say, they were not successful. But we wanted to stay many steps ahead of attackers — and so our engineers deployed additional rules that mitigate Meris attacks even more comprehensively. A side effect of these mitigation rules is that it also provides us with more granular threat intelligence on the Meris attacks.</p><p>Since we deployed the new rules in early August, we’ve seen Meris launch an average of 104 DDoS attacks on Cloudflare customers every day. The highest figure we’ve seen was on September 6, when Meris was used to launch 261 unique attacks against Cloudflare customers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6TtZZ2lzrszMdx8N3fhjp4/6bdfaba64b916e35235136ac8be75fda/unnamed--8-.png" />
            
            </figure><p><i>View the interactive graph on</i> <a href="https://radar.cloudflare.com/notebooks/meris-botnet#meris_attacks_over_time"><i>Cloudflare Radar</i></a><i>.</i></p><p>During that same day, on September 6, attacks from Meris accounted for a record-breaking 17.5% of all L7 DDoS attacks that Cloudflare observed.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3OP78KrTmwCcDv1W1n6jPr/f1ea42eb24f867c74eff3289d16941de/unnamed--1--3.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#share_of_meris_attacks"><i>Cloudflare Radar</i></a><i>.</i></p><p>Overall, Meris targets about 50 different websites and applications every single day. Although the average attack peaked at 106K rps, the median attack size was actually smaller at 17.6K rps. The largest attack we’ve seen was 17.2M rps and that occurred in July. In the graph below, you can see the daily highest requests per second rate after we deployed the new rules. Since then, the largest attack we’ve seen was 16.7M rps, which took place on August 19.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6yGWKQcIfIFhUsuJShFunZ/8f01287788ec1337311772309fc64354/unnamed--9-.png" />
            
            </figure>
    <div>
      <h2>Meris used to target Banks, Financial Services, and Insurance companies</h2>
      <a href="#meris-used-to-target-banks-financial-services-and-insurance-companies">
        
      </a>
    </div>
    <p>Over the past few months, the industry that received the most attack traffic from the Meris botnet was the Banking, Financial Services, and Insurance (BFSI) industry</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3GdZyXvW0bu3BUGgoptusx/073d6227e2b14baa96cc57cc926ab63b/unnamed-6.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#top10_industries_by_total_requests"><i>Cloudflare Radar</i></a><i>.</i></p><p>Following the BFSI industry, the most attacked industries were the Publishing, Gaming/Gambling, and IT Services industries. And while BFSI was the number one most attacked industry when considering the Meris DDoS activity rate, it <i>only</i> came in fourth place when considering the percentage of targeted websites.</p><p>In terms of the percentage of targeted websites, the Computer Software industry came in first place. Almost 4% of all impacted websites were of Computer Software companies protected by Cloudflare, followed by Gaming/Gambling and IT Services with 3% and 2%, respectively.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/72tWyMdL7CFZWKLTUe4MSN/fa7c89b73a1d34866284c9249460cdcf/unnamed--2--3.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#top10_industries_by_internet_properties"><i>Cloudflare Radar</i></a><i>.</i></p>
    <div>
      <h3>Attacks on industries over time</h3>
      <a href="#attacks-on-industries-over-time">
        
      </a>
    </div>
    <p>Besides the total breakdowns shown above, we can also view the top industries the botnet attacked over time to understand the changing trends. These trends may be tied to political events, new video game releases, sporting events, or any other global or local public interest events.</p><p>Off the top, we can already see the two largest peaks on August 9 and August 29 — mainly on the Computer Software, Gaming/Gambling, and IT industries. Another interesting peak occurred on August 14 against Cryptocurrency providers.</p><p>In late August, the botnet was pointed against gambling and casino websites, generating attacks at rates of hundreds of thousands to millions of requests per second. A second significant wave against the same industry was launched in early September.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Ch2h4SDn7AL79q3sLbr7m/deb98d1529f528523b70bf6818d13bd4/unnamed--3--3.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#top10_industries_attacked_by_meris"><i>Cloudflare Radar</i></a><i>.</i></p>
    <div>
      <h2>Meris targets websites in China, Australia, and US</h2>
      <a href="#meris-targets-websites-in-china-australia-and-us">
        
      </a>
    </div>
    <p>Similarly to the analysis of the top industries, we can calculate the Meris DDoS activity rate per target country to identify which countries came under the most attacks. In total, China-based companies saw the largest amount of DDoS attacks. More than 33% of all requests generated by Meris were destined for China-based companies that are protected by Cloudflare. Australia came in second place, and the US in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2efvUpiNBPMcVRff9MswfD/1c4adfa719a2a27a711a7a699ad470f6/unnamed--4--3.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#top10_countries_by_total_requests"><i>Cloudflare Radar</i></a><i>.</i></p><p>On the other hand, when we look at the number of websites that were targeted by Meris, the US came in first place. More than 12% of all websites that were targeted by Meris are operated by US-based companies. China came in second place with 5.6% and Russia in third with 4.4%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ztEAlupBFh5IMb6sx2zzR/dfdfdb346b7d59a993bf32e8948246bc/unnamed--5--2.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#top10_countries_by_internet_properties"><i>Cloudflare Radar</i></a><i>.</i></p>
    <div>
      <h3>Attacks on countries over time</h3>
      <a href="#attacks-on-countries-over-time">
        
      </a>
    </div>
    <p>Over time, we can see how the attacks on the top countries change. Similarly to the per-industry breakdown, we can also see two large peaks. The first one occurred on the same spike as the per-industry breakdown on August 9. However, the second one here occurred on September 1.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4wpvipMV2Q30VIGdGaoV1o/72dc434553158e6a1b8e74f922183834/unnamed--10-.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#top10_countries_attacked_by_meris"><i>Cloudflare Radar</i></a><i>.</i></p>
    <div>
      <h2>Location of the Meris bots</h2>
      <a href="#location-of-the-meris-bots">
        
      </a>
    </div>
    <p>Although only tens of thousands of bots have been detected per attack, it is estimated that there are roughly 250,000 bots worldwide. As indicated above, the botnet is formed of MikroTik routers. Using the source IP address of the routers, we’re able to identify the origin country of the bots to paint a geographical representation of the bots' presence and growth over time.</p><p>The change in the location of the bots doesn’t necessarily indicate that the botnet is growing or shrinking. It could also be that different bot groups are activated from time to time to spread the load of the attacks while attempting not to get caught.</p><p>At the beginning of August, the majority of the bots were located in Brazil. But by the end of August, that number plummeted to a single digit percentage close to zero. Meanwhile, the number of infected devices grew in the United States. From the beginning of September, the number of bots was significantly higher in the US, Russia, India, Indonesia, and China.</p><div></div><p><i>View the interactive graph on </i><a href="http://radar.cloudflare.com/notebooks/meris-botnet#location-of-the-meris-bots"><i>Cloudflare Radar</i></a><i>.</i></p>
    <div>
      <h2>Cloudflare protects against Meris attacks</h2>
      <a href="#cloudflare-protects-against-meris-attacks">
        
      </a>
    </div>
    <p>Cloudflare operates autonomous DDoS protection systems that automatically detect and mitigate DDoS attacks of all types, including attacks launched by Meris and Mirai. These systems are also customizable, and Cloudflare customers can tweak and tune their DDoS protection settings as needed with the <a href="/http-ddos-managed-rules/">HTTP DDoS Managed Ruleset</a> and the <a href="https://developers.cloudflare.com/waf/ddos-l34-mitigation">L3/4 DDoS Managed Ruleset</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[RDDoS]]></category>
            <category><![CDATA[Meris]]></category>
            <category><![CDATA[VoIP]]></category>
            <category><![CDATA[Mirai]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">1XxFdHMIJKNoJcgPqqPKMp</guid>
            <dc:creator>Vivek Ganti</dc:creator>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare thwarts 17.2M rps DDoS attack — the largest ever reported]]></title>
            <link>https://blog.cloudflare.com/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/</link>
            <pubDate>Thu, 19 Aug 2021 12:58:18 GMT</pubDate>
            <description><![CDATA[ Earlier this summer, Cloudflare’s autonomous edge DDoS protection systems automatically detected and mitigated a 17.2 million request-per-second (rps) DDoS attack, an attack almost three times larger than any previous one that we're aware of.  ]]></description>
            <content:encoded><![CDATA[ <p><i>This post is also available in </i><a href="/fr-fr/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported-fr-fr/"><i>Français</i></a><i>, </i><a href="/de-de/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported-de-de/"><i>Deutsch</i></a><i>, </i><a href="/zh-cn/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported-zh-cn/"><i>简体中文</i></a><i>, </i><a href="/zh-tw/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported-zh-tw/"><i>繁體中文</i></a><i>, </i><a href="/ja-jp/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported-ja-jp/"><i>日本語</i></a><i>, </i><a href="/ko-kr/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported-ko-kr/"><i>한국어</i></a><i>.</i></p><p>Earlier this summer, Cloudflare’s <a href="https://www.cloudflare.com/ddos/">autonomous edge DDoS protection systems</a> automatically detected and mitigated a 17.2 million request-per-second (rps) <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attack</a>, an attack almost three times larger than any previous one that we're aware of. For perspective on how large this attack was: Cloudflare serves over 25 million HTTP requests per second on average. This refers to the average rate of legitimate traffic in 2021 Q2. So peaking at 17.2 million rps, this attack reached 68% of our Q2 average rps rate of legitimate HTTP traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5MGeCblBfbMi9xV2fNGQJ7/7235f5c5e8dbf3e724643823a6fb2681/image5-18.png" />
            
            </figure><p>Comparison graph of Cloudflare’s average request per second rate versus the DDoS attack</p>
    <div>
      <h3>Automated DDoS mitigation with Cloudflare’s autonomous edge</h3>
      <a href="#automated-ddos-mitigation-with-cloudflares-autonomous-edge">
        
      </a>
    </div>
    <p>This attack, along with the additional attacks provided in the next sections, were automatically detected and mitigated by our <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">autonomous edge DDoS protection systems</a>. The system is powered by our very own denial of service daemon (dosd). Dosd is a home-grown software-defined daemon. A unique dosd instance runs in every server in each one of our data centers around the world. Each dosd instance independently analyzes traffic samples out-of-path. Analyzing traffic out-of-path allows us to scan asynchronously for DDoS attacks without causing latency and impacting performance. DDoS findings are also shared between the various dosd instances within a data center, as a form of proactive threat intelligence sharing.</p><p>Once an attack is detected, our systems generate a mitigation rule with a real-time signature that matches the attack patterns. The rule is propagated to the most optimal location in the tech stack. As an example, a <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/">volumetric HTTP DDoS attack</a> may be blocked at L4 inside the Linux iptables firewall instead of at L7 inside the L7 reverse proxy which runs in the user space. Mitigating lower in the stack, e.g. dropping the packets at L4 instead of responding with a 403 error page in L7, is more cost-efficient. It reduces our edge CPU consumption and intra-data center bandwidth utilization — thus helping us mitigate large attacks at scale without impacting performance.</p><p>This autonomous approach, along with our network’s global scale and reliability, allow us to mitigate attacks that reach 68% of our average per-second-rate, and higher, without requiring any manual mitigation by Cloudflare personnel, nor causing any performance degradation.</p>
    <div>
      <h3>The resurgence of Mirai and new powerful botnets</h3>
      <a href="#the-resurgence-of-mirai-and-new-powerful-botnets">
        
      </a>
    </div>
    <p>This attack was launched by a powerful <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">botnet</a>, targeting a Cloudflare customer in the financial industry. Within seconds, the botnet bombarded the Cloudflare edge with over 330 million attack requests.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gY7BQTsPoARDp6hOSjG9e/9366d2c0d953f840fb8b7eb2f2899d32/image10-1.png" />
            
            </figure><p>Graph of 17.2M rps attack</p><p>The attack traffic originated from more than 20,000 bots in 125 countries around the world. Based on the bots’ source IP addresses, almost 15% of the attack originated from Indonesia and another 17% from India and Brazil combined. Indicating that there may be many malware infected devices in those countries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5T6eNguCNTubMdWMB3YRxO/38371f7686bd7eae8f09d4f9783e049e/image14.png" />
            
            </figure><p>Distribution of the attack sources by top countries</p>
    <div>
      <h3>Volumetric attacks increase</h3>
      <a href="#volumetric-attacks-increase">
        
      </a>
    </div>
    <p>This 17.2 million rps attack is the largest HTTP DDoS attack that Cloudflare has ever seen to date and almost three times the size of any other reported HTTP DDoS attack. This specific botnet, however, has been seen at least twice over the past few weeks. Just last week it also targeted a different Cloudflare customer, a hosting provider, with an HTTP DDoS attack that peaked just below 8 million rps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/50oxuA0Pte28QnkKG2ND9a/3a77c2098743522e6155d30a1e690afe/image13-1.png" />
            
            </figure><p>Graph of 8M rps attack</p><p>Two weeks before, a <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai-variant botnet</a> launched over a dozen UDP and TCP based DDoS attacks that peaked multiple times above 1 Tbps, with a max peak of approximately 1.2 Tbps. And while the first HTTP attacks targeted Cloudflare customers on the <a href="https://www.cloudflare.com/waf/">WAF/CDN service</a>, the 1+ Tbps network-layer attacks targeted Cloudflare customers on the <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> and <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Spectrum</a> services. One of these targets was a major APAC-based Internet services, telecommunications and hosting provider. The other was a gaming company. In all cases, the attacks were automatically detected and mitigated without human intervention.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Ry1DG1IpHihc6q2aU3V83/1ed3236f40fff2c224c135a7841376d3/image17.png" />
            
            </figure><p>Graph of Mirai botnet attack peaking at 1.2 Tbps</p><p>The Mirai botnet started with roughly 30K bots and slowly shrinked to approximately 28K. However, despite losing bots from its fleet, the botnet was still able to generate impressive volumes of attack traffic for short periods. In some cases, each burst lasted only a few seconds.</p><p>These attacks join the increase in Mirai-based DDoS attacks that we’ve observed on our network over the past weeks. In July alone, L3/4 Mirai attacks increased by 88% and L7 attacks by 9%. Additionally, based on the current August per-day average of the Mirai attacks, we can expect L7 Mirai DDoS attacks and other similar botnet attacks to increase by 185% and L3/4 attacks by 71% by the end of the month.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4feZMCRVWgTJh3LTGKQVl8/d5a1dabda66860b415f1471b7ee3773d/image11-1.png" />
            
            </figure><p>Graph of change in Mirai based DDoS attacks by month</p>
    <div>
      <h3>Back to the Mirai</h3>
      <a href="#back-to-the-mirai">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai</a>, which means ‘future’ in Japanese, is a codename for malware that was first discovered in 2016 by <a href="https://en.wikipedia.org/wiki/MalwareMustDie">MalwareMustDie</a>, a non-profit security research workgroup. The malware spreads by infecting Linux-operated devices such as security cameras and routers. It then self-propagates by searching for open Telnet ports 23 and 2323. Once found, it then attempts to gain access to vulnerable devices by <a href="https://www.cloudflare.com/learning/bots/brute-force-attack/">brute forcing</a> known credentials such as factory default usernames and passwords. Later variants of Mirai also took advantage of zero-day exploits in routers and other devices. Once infected, the devices will monitor a Command &amp; Control (C2) server for instructions on which target to attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4fNe0WjM3f10tIZWNBTm8C/72ee117740a76a5f4b0b2a1be17b8700/image8-3.png" />
            
            </figure><p>Diagram of Botnet operator controlling the botnet to attack websites</p>
    <div>
      <h3>How to protect your home and business</h3>
      <a href="#how-to-protect-your-home-and-business">
        
      </a>
    </div>
    <p>While the majority of attacks are small and short, we continue to see these types of volumetric attacks emerging more often. It’s important to note that these volumetric short burst attacks can be especially dangerous for legacy DDoS protection systems or organizations without active, always-on cloud-based protection.</p><p>Furthermore, while the short duration may say something about the botnet’s capability to deliver sustained levels of traffic over time, it can be challenging or impossible for humans to react to it in time. In such cases, the attack is over before a security engineer even has time to analyze the traffic or activate their stand-by DDoS protection system. These types of attacks highlight the need for automated, always-on protection.</p>
    <div>
      <h3>How to protect your business and Internet properties</h3>
      <a href="#how-to-protect-your-business-and-internet-properties">
        
      </a>
    </div>
    <ol><li><p><a href="https://dash.cloudflare.com/sign-up">Onboard to Cloudflare</a> to protect your Internet properties.</p></li><li><p>DDoS is enabled out of the box, and you can also <a href="https://support.cloudflare.com/hc/en-us/articles/200172676-Understanding-Cloudflare-DDoS-protection">customize the protection settings</a>.</p></li><li><p>Follow our <a href="https://www.cloudflare.com/learning/ddos/how-to-prevent-ddos-attacks/">preventive best practices</a>, to ensure that both your Cloudflare settings and your origin server settings are optimized. As an example, make sure that you allow only traffic from <a href="https://www.cloudflare.com/ips/">Cloudflare’s IP range</a>. Ideally, ask your upstream Internet Service Provider (ISP) to apply an access control list (ACL), otherwise, attackers may target your servers’ IP addresses directly and bypass your protection.</p></li></ol>
    <div>
      <h3>Recommendations on how to protect your home and IoT appliances</h3>
      <a href="#recommendations-on-how-to-protect-your-home-and-iot-appliances">
        
      </a>
    </div>
    <ol><li><p>Change the default username and password of any device that is connected to the Internet such as smart cameras and routers. This will reduce the risk that malware such as Mirai can gain access to your router and IoT devices.</p></li><li><p>Protect your home against malware with <a href="https://developers.cloudflare.com/1.1.1.1/1.1.1.1-for-families">Cloudflare for Families</a>. Cloudflare for Families is a free service that automatically blocks traffic from your home to malicious websites and malware communication.</p></li></ol> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Mirai]]></category>
            <category><![CDATA[dosd]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Botnet]]></category>
            <guid isPermaLink="false">14h42eFO3Fqa89ZeO5Ki7U</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Moobot vs. Gatebot: Cloudflare Automatically Blocks Botnet DDoS Attack Topping At 654 Gbps]]></title>
            <link>https://blog.cloudflare.com/moobot-vs-gatebot-cloudflare-automatically-blocks-botnet-ddos-attack-topping-at-654-gbps/</link>
            <pubDate>Wed, 16 Sep 2020 11:00:00 GMT</pubDate>
            <description><![CDATA[ On July 3, Cloudflare’s global DDoS protection system, Gatebot, automatically detected and mitigated a UDP-based DDoS attack that peaked at 654 Gbps. The attack was part of a ten-day multi-vector DDoS campaign targeting a Magic Transit customer and was mitigated without any human intervention. ]]></description>
            <content:encoded><![CDATA[ <p>On July 3, Cloudflare’s global DDoS protection system, <a href="/meet-gatebot-a-bot-that-allows-us-to-sleep/">Gatebot</a>, automatically detected and mitigated a <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP-based DDoS attack</a> that peaked at 654 Gbps. The attack was part of a ten-day multi-vector DDoS campaign targeting a <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> customer and was mitigated without any human intervention. The DDoS campaign is believed to have been generated by Moobot, a <a href="/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis/">Mirai</a>-based botnet. No downtime, service degradation, or false positives were reported by the customer.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5tZOVVWcnoNircFk2dzvgB/f4360a467a489cd7ee38f976e2e4dc1d/image7-3.png" />
            
            </figure><p><b>Moobot Targets 654 Gbps towards a Magic Transit Customer</b></p><p>Over those ten days, our systems automatically detected and mitigated over 5,000 DDoS attacks against this one customer, mainly UDP floods, SYN floods, ACK floods, and GRE floods. The largest DDoS attack was a UDP flood and lasted a mere 2 minutes. This attack targeted only one IP address but hit multiple ports. The attack originated from 18,705 unique IP addresses, each believed to be a Moobot-infected IoT device.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1SBAfKZG8YJHkfEBJnZyHV/655adca6d9f31d78fcc714e9fb49e4ac/image2-3.png" />
            
            </figure><p><b>Attack Distribution by Country - From 100 countries</b></p><p>The attack was observed in Cloudflare’s data centers in 100 countries around the world. Approximately 89% of the attack traffic originated from just 10 countries with the US leading at 41%, followed by South Korea and Japan in second place (12% each), and India in third (10%). What this likely means is that the malware has infected at least 18,705 devices in 100 countries around the world.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4L3iXSkvCp4kDRwUkyjr3d/61490559c472b36b1aa959be999e65d5/image5-4.png" />
            
            </figure><p><b>Attack Distribution by Country - Top 10</b></p>
    <div>
      <h2>Moobot - Self Propagating Malware</h2>
      <a href="#moobot-self-propagating-malware">
        
      </a>
    </div>
    <p>‘Moobot’ sounds like a cute name, but there’s nothing cute about it. According to <a href="https://blog.netlab.360.com/ddos-botnet-moobot-en/">Netlab 360</a>, Moobot is the codename of a self-propagating Mirai-based <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/">malware</a> first discovered in 2019. It infects IoT (Internet of Things) devices using remotely exploitable vulnerabilities or weak default passwords. IoT is a term used to describe smart devices such as security hubs and cameras, smart TVs, smart speakers, smart lights, sensors, and even refrigerators that are connected to the Internet.</p><p>Once a device is infected by Moobot, control of the device is transferred to the operator of the command and control (C2) server, who can issue commands remotely such as attacking a target and locating additional vulnerable IoT devices to infect (self-propagation).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7YKDGZ9yqbvb1TuYFqqYM/e72ce62dd004ea672ad3272f70b40c6e/image9.gif" />
            
            </figure><p>Moobot is a Mirai-based botnet, and has <a href="/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis/">similar capabilities (modules) as Mirai</a>:</p><ol><li><p><b>Self-propagation</b> - The self-propagation module is in charge of the botnet’s growth. After an IoT device is infected, it randomly scans the Internet for open telnet ports and reports back to the C2 server. Once the C2 server gains knowledge of open telnet ports around the world, it tries to leverage known vulnerabilities or brute force its way into the IoT devices with common or default credentials.</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ve4CTJV9L3BAVMbNMfo0a/a116c9059f8699a408cef7c13b38fe89/image6-3.png" />
            
            </figure><p>Self-propagation</p><p>2. <b>Synchronized attacks</b> - The C2 server orchestrates a coordinated flood of packets or HTTP requests with the goal of creating a denial of service event for the target's website or service.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/43xBoL19Y8IoRYqMdCmGio/e92ef9bd26ae5420d18e119166617553/image3-7.png" />
            
            </figure><p>Synchronized attacks</p><p>The botnet operator may use multiple C2 servers in various locations around the world in order to reduce the risk of exposure. Infected devices may be assigned to different C2 servers varying by region and module; one server for self-propagation and another for launching attacks. Thus if a C2 server is compromised and taken down by law enforcement authorities, only parts of the botnet are deactivated.</p>
    <div>
      <h2>Why this attack was not successful</h2>
      <a href="#why-this-attack-was-not-successful">
        
      </a>
    </div>
    <p>This is the second large scale attack in the past few months that we observed on Cloudflare's network. The previous one peaked at <a href="/mitigating-a-754-million-pps-ddos-attack-automatically/">754M packets per second</a> and attempted to take down our routers with a high packet rate. Despite the high packet rate, the 754Mpps attack peaked at a <i>mere</i> 253 Gbps.</p><p>As opposed to the high packet rate attack, this attack was a high bit rate attack, peaking at 654 Gbps. Due to the high bit rates of this attack, it seems as though the attacker tried (and failed) to cause a denial of service event by saturating our Internet link capacity. So let’s explore why this attack was not successful.</p>
    <div>
      <h3>Avoiding link saturation &amp; keeping appliances running</h3>
      <a href="#avoiding-link-saturation-keeping-appliances-running">
        
      </a>
    </div>
    <p>Cloudflare’s global <a href="https://www.cloudflare.com/network/">network</a> capacity is over 42 Tbps and growing. Our network spans more than 200 cities in over 100 countries, including 17 cities in mainland China. It interconnects with over 8,800 networks globally, including major ISPs, cloud services, and enterprises. This level of interconnectivity along with the use of <a href="https://www.cloudflare.com/learning/cdn/glossary/anycast-network/">Anycast</a> ensures that our network can easily absorb even the largest attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2kvrwYIA87fmnWCTKdl7Wi/67748d4b866d2042e2b5fb40b90207d8/image4-7.png" />
            
            </figure><p>The Cloudflare Network</p><p>After traffic arrives at an edge data center, it is then load-balanced efficiently using our own Layer 4 load-balancer that we built, <a href="/unimog-cloudflares-edge-load-balancer/">Unimog</a>, which uses our appliances' health and other metrics to load-balance traffic intelligently within a data center to avoid overwhelming any single server.</p><p>Besides the use of Anycast for inter-data center load balancing and Unimog for intra-data center load balancing, we also utilize various forms of traffic engineering in order to deal with sudden changes in traffic loads across our network. We utilize both automatic and manual traffic engineering methods that can be employed by our 24/7/365 Site Reliability Engineering (SRE) team.</p><p>These combined factors significantly reduce the likelihood of a denial of service event due to link saturation or appliances being overwhelmed -- and as seen in this attack, no link saturation occurred.</p><h2>Detecting &amp; Mitigating DDoS attacks</h2><p>Once traffic arrives at our edge, it encounters our three software-defined <a href="https://www.cloudflare.com/ddos/">DDoS protection</a> systems:</p><ol><li><p><a href="/meet-gatebot-a-bot-that-allows-us-to-sleep/">Gatebot</a> - Cloudflare’s centralized DDoS protection systems for detecting and mitigating globally distributed volumetric DDoS attacks. Gatebot runs in our network’s core data center. It receives samples from every one of our edge data centers, analyzes them, and automatically sends mitigation instructions when attacks are detected. Gatebot is also synchronized to each of our customers’ web servers to identify its health and triggers mitigation accordingly.</p></li><li><p><a href="/rolling-with-the-punches-shifting-attack-tactics-dropping-packets-faster-cheaper-at-the-edge/">dosd</a> (denial of service daemon) - Cloudflare’s decentralized DDoS protection systems. dosd runs autonomously in each server in every Cloudflare data center around the world, analyzing traffic and applying local mitigation rules when needed. Besides being able to detect and mitigate attacks at super-fast speeds, dosd significantly improves our network resilience by delegating the detection and mitigation capabilities to the edge.</p></li><li><p><a href="/announcing-flowtrackd/">flowtrackd</a> (flow tracking daemon) - Cloudflare’s TCP state tracking machine for detecting and mitigating the most randomized and sophisticated TCP-based DDoS attacks in unidirectional routing topologies (such as the case for <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a>). flowtrackd is able to identify the state of a TCP connection and then drops, challenges, or rate-limits packets that don’t belong to a legitimate connection.</p></li></ol>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/78iByRWxPrVk9LKN9jJede/e4fb1f012c8e781fe35a2b9c41f4c175/image1-9.png" />
            
            </figure><p>Cloudflare DDoS Protection Lifecycle</p><p>The three DDoS protection systems collect traffic samples in order to detect DDoS attacks. The types of traffic data that they sample include:</p><ol><li><p><b>Packet fields</b> such as the source IP, source port, destination IP, destination port, protocol, TCP flags, sequence number, options, and packet rate.</p></li><li><p><b>HTTP request metadata</b> such as HTTP headers, user agent, query-string, path, host, HTTP method, HTTP version, TLS cipher version, and request rate.</p></li><li><p><b>HTTP response metrics</b> such as error codes returned by customers’ origin servers and their rates.</p></li></ol><p>Our systems then crunch these sample data points together to form a real-time view of our network’s security posture and our customer’s origin server health. They look for attack patterns and traffic anomalies. When found, a mitigation rule with a dynamically crafted attack signature is generated in real-time. Rules are propagated to the most optimal place for cost-effective mitigation. For example, an L7 HTTP flood might be dropped at L4 to reduce the CPU consumption.</p><p>Rules that are generated by dosd and flowtrackd are propagated within a single data center for rapid mitigation. Gatebot’s rules are propagated to all of the edge data centers which then take priority over dosd’s rules for an even and optimal mitigation. Even if the attack is detected in a subset of edge data centers, Gatebot propagates the mitigation instructions to all of Cloudflare’s edge data centers -- effectively sharing the threat intelligence across our network as a form of proactive protection.</p><p>In the case of this attack, in each edge data center, dosd generated rules to mitigate the attack promptly. Then as Gatebot received and analyzed samples from the edge, it determined that this was a globally distributed attack. Gatebot propagated unified mitigation instructions to the edge, which prepared each and every one of our 200+ data centers to tackle the attack as the attack traffic may shift to a different data center due to Anycast or traffic engineering.</p>
    <div>
      <h3>No inflated bills</h3>
      <a href="#no-inflated-bills">
        
      </a>
    </div>
    <p>DDoS attacks obviously pose the risk of an outage and service disruption. But there is another risk to consider -- the cost of mitigation. During these ten days, more than 65 Terabytes of attack traffic were generated by the botnet. However, as part of Cloudflare’s <a href="/unmetered-mitigation/">unmetered DDoS protection</a> guarantee, Cloudflare mitigated and absorbed the attack traffic without billing the customer. The customer doesn't need to submit a retroactive credit request. Attack traffic is automatically excluded from our billing system. We eliminated the financial risk.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Mirai]]></category>
            <category><![CDATA[Gatebot]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Bots]]></category>
            <category><![CDATA[Attacks]]></category>
            <guid isPermaLink="false">4LiHZDtLcYX0cts6SvjaUj</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Inside the infamous Mirai IoT Botnet: A Retrospective Analysis]]></title>
            <link>https://blog.cloudflare.com/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis/</link>
            <pubDate>Thu, 14 Dec 2017 19:41:49 GMT</pubDate>
            <description><![CDATA[ This post offers a retrospective on Mirai, the infamous IoT botnet that disrupted major websites with massive DDoS attacks, leveraging hundreds of thousands of compromised Internet-of-Things devices. ]]></description>
            <content:encoded><![CDATA[ <p></p><p><i>This is a guest post by Elie Bursztein who writes about security and anti-abuse research. It was first published on </i><a href="http://web.archive.org/web/20180104210057/https://elie.net/blog/security/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis"><i>his blog</i></a><i> and has been lightly edited.</i></p><p>This post provides a retrospective analysis of Mirai — the infamous Internet-of-Things botnet that took down major websites via massive distributed denial-of-service using hundreds of thousands of compromised Internet-Of-Things devices. This research was conducted by a team of researchers from Cloudflare (Jaime Cochran, Nick Sullivan), Georgia Tech, Google, Akamai, the University of Illinois, the University of Michigan, and Merit Network and resulted in <a href="http://web.archive.org/web/20180104210057/https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-antonakakis.pdf">a paper published at USENIX Security 2017</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/lLZbSL8SEkofCrJXVyrg2/5c2e54715318491e944719920294fd82/the-guardian-mirai-largest-in-history.jpg" />
            
            </figure><p>At its peak in September 2016, Mirai temporarily crippled several high-profile services such as <a href="http://web.archive.org/web/20180104210057/https://www.ovh.com/us/">OVH</a>, <a href="http://web.archive.org/web/20180104210057/https://dyn.com/">Dyn</a>, and <a href="http://web.archive.org/web/20180104210057/https://krebsonsecurity.com/">Krebs on Security</a> via massive distributed <a href="http://web.archive.org/web/20180104210057/https://en.wikipedia.org/wiki/Denial-of-service_attack#Distributed_DoS">Denial of service attacks (DDoS)</a>. <a href="http://web.archive.org/web/20180104210057/https://www.ovh.com/us/news/articles/a2367.the-ddos-that-didnt-break-the-camels-vac">OVH reported</a> that these attacks exceeded 1 Tbps—the largest on public record.</p><p>What’s remarkable about these record-breaking attacks is they were carried out via small, innocuous Internet-of-Things (IoT) devices like home routers, air-quality monitors, and personal surveillance cameras. At its peak, Mirai infected over 600,000 vulnerable IoT devices, according to our measurements.</p>
            <figure>
            <a href="http://staging.blog.mrk.cfdata.org/content/images/2017/12/mirai-major-events-timeline.png">
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Pf3BnahqRTCDrJRMNvGAw/e899a4fb18b6c491ba7ad082e732289c/mirai-major-events-timeline.png" />
            </a>
            </figure><ul><li><p><a href="#toc-1">Mirai Genesis</a>: Discusses Mirai’s early days and provides a brief technical overview of how Mirai works and propagates.</p></li><li><p><a href="#toc-k">Krebs on Security attack</a>: Recounts how Mirai briefly silenced Brian Krebs website.</p></li><li><p><a href="#toc-2">OVH DDoS attack</a>: Examines the Mirai author’s attempt to take down one of the world’s largest hosting providers.</p></li><li><p><a href="#toc-c">The rise of copycats</a>: Covers the Mirai code release and how multiple hacking groups end-up reusing the code. This section also describes the techniques we used to track down the many variants of Mirai that arose after the release. Finally, this section discusses the targets and the motive behind each major variants.</p></li><li><p><a href="#toc-3">Mirai's takedown of the Internet</a>: Tells the insider story behind Dyn attacks including the fact that the major sites (e.g., Amazon) taken down were just massive collateral damage.</p></li><li><p><a href="#toc-4">Mirai’s attempted takedown of an entire country</a>: Looks at the multiple attacks carried out against Lonestar, Liberia’s largest operator.</p></li><li><p><a href="#toc-d">Deutsche Telekom goes dark</a>: Discusses how the addition of a router exploit to one of the Mirai variant brought a major German Internet provider to its knees.</p></li><li><p><a href="#toc-5">Mirai original author outed?</a>: Details Brian Krebs’ in-depth investigation into uncovering Mirai’s author.</p></li><li><p><a href="#toc-6">Deutsche Telekom attacker arrested</a>: Recounts the arrest of the hacker who took down Deutsche Telekom and what we learned from his trial.</p></li></ul>
    <div>
      <h3>Mirai Genesis</h3>
      <a href="#mirai-genesis">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4DTQat2LJQ8Y2JOJ3rY7T7/18778fa29eecdb09653f5e0b54f98e31/mirai-intial-report.png" />
            
            </figure><p>The first public report of Mirai late <a href="http://blog.malwaremustdie.org/2016/08/mmd-0056-2016-linuxmirai-just.html">August 2016</a> generated little notice, and Mirai mostly remained in the shadows until mid-September. At that time, It was propelled in the spotlight when it was used to carry massive DDoS attacks against <a href="https://krebsonsecurity.com/2016/09/krebsonsecurity-hit-with-record-ddos/">Krebs on Security</a> the blog of a famous security journalist and <a href="https://www.ovh.com/us/news/articles/a2367.the-ddos-that-didnt-break-the-camels-vac">OVH</a>, one of the largest web hosting provider in the world.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7tutmPQu7lod0Q5CrfJgyl/2f265d8da79fb91634a63c530a75d30f/mirai-initial-day-scanning-ips.png" />
            
            </figure><p>While the world did not learn about Mirai until at the end of August, our telemetry reveals that it became active August 1st when the infection started out from a single bulletproof hosting IP. From thereon, Mirai spread quickly, doubling its size every 76 minutes in those early hours.</p><p>By the end of its first day, Mirai had infected over 65,000 IoT devices. By its second day, Mirai already accounted for half of all Internet telnet scans observed by our collective set of honeypots, as shown in the figure above. At its peak in November 2016 Mirai had infected over 600,000 IoT devices.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1sA3idN9tsCnTEibksrFx1/1c8c27d014d94cc2b2c89e8c81ff8517/mirai-devices-breakdown.png" />
            
            </figure><p>Retroactively looking at the infected device services banners using <a href="https://censys.io/">Censys'</a> Internet-wide scanning reveals that most of the devices appear to be routers and cameras as reported in the chart above. Each type of banner is represented separately as the identification process was different for each, so it might be that a device is counted multiple times. Mirai was actively removing any banner identification which partially explains why we were unable to identify most of the devices.</p><p>Before delving further into Mirai’s story, let’s briefly look at how Mirai works, specifically how it propagates and its offensive capabilities.</p>
    <div>
      <h3>How Mirai works</h3>
      <a href="#how-mirai-works">
        
      </a>
    </div>
    <p>At its core, Mirai is a <a href="https://en.wikipedia.org/wiki/Computer_worm">self-propagating worm</a>, that is, it’s a malicious program that replicates itself by finding, attacking and infecting vulnerable IoT devices. It is also considered a botnet because the infected devices are controlled via a central set of command and control (C&amp;C) servers. These servers tell the infected devices which sites to attack next. Overall, Mirai is made of two key components: a replication module and an attack module.</p>
    <div>
      <h3>Replication module</h3>
      <a href="#replication-module">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7MPhfLTL6E6WUAS4xdlaJK/df41e701b5a6a815da33b075dbe96d96/mirai-infection-process.png" />
            
            </figure><p>The replication module is responsible for growing the botnet size by enslaving as many vulnerable IoT devices as possible. It accomplishes this by (randomly) scanning the entire Internet for viable targets and attacking. Once it compromises a vulnerable device, the module reports it to the C&amp;C servers, so it can be infected with the latest Mirai payload, as the diagram above illustrates.</p><p>To compromise devices, the initial version of Mirai relied exclusively on a fixed set of 64 well-known default login/password combinations commonly used by IoT devices. While this attack was very low tech, it proved extremely effective and led to the compromise of over 600,000 devices. For more information about DDoS techniques, read this <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Cloudflare primer</a>.</p>
    <div>
      <h3>Attack module</h3>
      <a href="#attack-module">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1CXRDsQBru2mC2SRjMEKmA/d4c18b04ebdecc7813831f95702b2819/mirai-attack-module.png" />
            
            </figure><p>The attack module is responsible for carrying out DDoS attacks against the targets specified by the C&amp;C servers. This module implements most of the code DDoS techniques such as HTTP flooding, UDP flooding, and all TCP flooding options. This wide range of methods allowed Mirai to perform volumetric attacks, application-layer attacks, and TCP state-exhaustion attacks.</p>
    <div>
      <h3>Krebs on Security attack</h3>
      <a href="#krebs-on-security-attack">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2QDBF6lY3eznSnre1Tllhn/bc842612f4050a94a5a1ae151845c170/krebs-on-security-timeline.png" />
            
            </figure><p><a href="https://krebsonsecurity.com/">Krebs on Security</a> is Brian Krebs’ blog. Krebs is a widely known independent journalist who specializes in cyber-crime. Given Brian’s line of work, his blog has been targeted, unsurprisingly, by many DDoS attacks launched by the cyber-criminals he exposes. According to his telemetry (thanks for sharing, Brian!), his blog suffered 269 DDoS attacks between July 2012 and September 2016. As seen in the chart above, the Mirai assault was by far the largest, topping out at 623 Gbps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Kh8i6bd0zsu6DiCbd2J13/b44383857ee07cbb5c36baa519774a32/mirai-top-countries.png" />
            
            </figure><p>Looking at the geolocation of the IPs that targeted Brian’s site reveals that a disproportionate number of the devices involved in the attack are coming from South American and South-east Asia. As reported in the chart above Brazil, Vietnam and Columbia appear to be the main sources of compromised devices.</p><p>One dire consequence of this massive attack against Krebs was that Akamai, the CDN service that provided Brian’s DDoS protection, had to withdraw its support. This forced <a href="https://www.csoonline.com/article/3123806/security/krebsonsecurity-moves-to-project-shield-for-protection-against-ddos-attack-censorship.html">Brian to move his site to Project Shield</a>. As he discussed in depth in <a href="https://krebsonsecurity.com/2016/09/the-democratization-of-censorship/">a blog post</a>, this incident highlights how DDoS attacks have become a common and cheap way to censor people.</p>
    <div>
      <h3>OVH attack</h3>
      <a href="#ovh-attack">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5CQ1HTPbEW8L92x2rbvHXV/189496f1b774d9e429b65d68e9e1f8c1/ovh-record-breaking-ddos-attack-ars-technica.jpg" />
            
            </figure><p>Brian was not Mirai’s first high-profile victim. A few days before he was struck, Mirai attacked <a href="https://en.wikipedia.org/wiki/OVH">OVH</a>, one of the largest European hosting providers. According to their <a href="https://www.ovh.com/us/news/articles/a2367.the-ddos-that-didnt-break-the-camels-vac">official numbers</a>, OVH hosts roughly 18 million applications for over one million clients, <a href="https://wikileaks.org/">Wikileaks</a> being one of their most famous and <a href="http://www.datacenterdynamics.com/content-tracks/security-risk/british-spies-monitored-ceo-of-ovh/97461.fullarticle">controversial</a>.</p><p>We know little about that attack as OVH did not participate in our joint study. As a result, the best information about it comes from a blog post OVH released after the event. From this post, it seems that the attack lasted about a week and involved large, intermittent bursts of DDoS traffic that targeted one undisclosed OVH customer.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4EGBcm6AzLQYAbpOMIV9ty/49afbdc85d44558f83418e6f60d68040/octave-klaba-ovh-ceo-tweet-about-mirai-attack.jpg" />
            
            </figure><p>Octave Klaba, OVH’s founder, reported on Twitter that the attacks were targeting Minecraft servers. As we will see through this post, Mirai has been extensively used in gamer wars and is likely the reason why it was created in the first place.</p><p>According to OVH telemetry, the attack peaked at 1TBs and was carried out using 145,000 IoT devices. While the number of IoT devices is consistent with what we observed, the volume of the attack reported is significantly higher than what we observed with other attacks. For example, as mentioned earlier, Brian’s one topped out at 623 Gbps.</p><p>Regardless of the exact size, the Mirai attacks are clearly the largest ever recorded. They dwarf the previous public record holder, an attack against Cloudflare that topped out at <a href="/technical-details-behind-a-400gbps-ntp-amplification-ddos-attack/">~400Gpbs</a>.</p>
    <div>
      <h3>The rise of copycats</h3>
      <a href="#the-rise-of-copycats">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/xH2mtNePk44v5s9FQA2Yq/f842456fab6dab7041d03b496631bb4d/mirai-code-leaked-on-blackmarket-forums.png" />
            
            </figure><p>In an unexpected development, on September 30, 2017, Anna-senpai, Mirai’s alleged author, <a href="https://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/">released the Mirai source code</a> via an infamous hacking forum. He also wrote a forum post, shown in the screenshot above, announcing his retirement.</p><p>This code release sparked a proliferation of copycat hackers who started to run their own Mirai botnets. From that point forward, the Mirai attacks were not tied to a single actor or infrastructure but to multiple groups, which made attributing the attacks and discerning the motive behind them significantly harder.</p>
    <div>
      <h3>Clustering Mirai infrastructure</h3>
      <a href="#clustering-mirai-infrastructure">
        
      </a>
    </div>
    <p>To keep up with the Mirai variants proliferation and track the various hacking groups behind them, we turned to infrastructure clustering. Reverse engineering all the Mirai versions we can find allowed us to extract the IP addresses and domains used as C&amp;C by the various hacking groups than ran their own Mirai variant. In total, we recovered two IP addresses and 66 distinct domains.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1faeNrvBOwlBs5NidT4BFN/1d5f2ac063d174b4968adac17cdec3ff/mirai-botnet-graph-labels.png" />
            
            </figure><p>Applying DNS expansion on the extracted domains and clustering them led us to identify 33 independent C&amp;C clusters that had no shared infrastructure. The smallest of these clusters used a single IP as C&amp;C. The largest sported 112 domains and 92 IP address. The figure above depicts the six largest clusters we found.</p><p>These top clusters used very different naming schemes for their domain names: for example, “cluster 23” favors domains related to animals such as 33kitensspecial.pw, while “cluster 1” has many domains related to e-currencies such as walletzone.ru. The existence of many distinct infrastructures with different characteristics confirms that multiple groups ran Mirai independently after the source code was leaked.</p>
    <div>
      <h3>Clusters over time</h3>
      <a href="#clusters-over-time">
        
      </a>
    </div>
    <p>Looking at how many DNS lookups were made to their respective C&amp;C infrastructures allowed us to reconstruct the timeline of each individual cluster and estimate its relative size. This accounting is possible because each bot must regularly perform a DNS lookup to know which IP address its C&amp;C domains resolves to.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4SNKlCPLxxYJh5EDwXxp9f/3a6a057b498bd0b0eaa65c45f94744bd/mirai-variants-dns-lookup-overtime-splitted-graph.png" />
            
            </figure><p>The chart above reports the number of DNS lookups over time for some of the largest clusters. It highlights the fact that many were active at the same time. Having multiple variants active simultaneously once again emphasizes that multiple actors with different motives were competing to infect vulnerable IoT devices to carry out their DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7GU3BOCTyKr6zh8L1baXLn/13301e42e67cd4837449ebcaeea1936a/mirai-variants-dns-lookup-overtime.png" />
            
            </figure><p>Plotting all the variants in the graph clearly shows that the ranges of IoT devices infect by each variant differ widely. As the graph above reveals, while there were many Mirai variants, very few succeeded at growing a botnet large enough to take down major websites.</p>
    <div>
      <h3>From cluster to motive</h3>
      <a href="#from-cluster-to-motive">
        
      </a>
    </div>
    <p>Notable clusters</p><table><tr><td><p><b>Cluster</b></p></td><td><p><b>Notes</b></p></td></tr><tr><td><p>6</p></td><td><p>Attacked Dyn and gaming related targets</p></td></tr><tr><td><p>1</p></td><td><p>Original botnet. Attacked Krebs and OVH</p></td></tr><tr><td><p>2</p></td><td><p>Attacked Lonestar Cell</p></td></tr></table><p>Looking at which sites were targeted by the largest clusters illuminates the specific motives behind those variants. For instance, as reported in the table above, the original Mirai botnet (cluster 1) targeted OVH and Krebs, whereas Mirai’s largest instance (cluster 6) targeted DYN and other gaming-related sites. Mirai’s third-largest variant (cluster 2), in contrast, went after African telecom operators, as recounted later in this post.</p><table><tr><td><p><b>Target</b></p></td><td><p><b>Attacks</b></p></td><td><p><b>Clusters</b></p></td><td><p><b>Notes</b></p></td></tr><tr><td><p>Lonestar Cell</p></td><td><p>616</p></td><td><p>2</p></td><td><p>Liberian telecom targeted by 102 reflection attacks</p></td></tr><tr><td><p>Sky Network</p></td><td><p>318</p></td><td><p>15, 26, 6</p></td><td><p>Brazilian Minecraft servers hosted in Psychz Networks data centers</p></td></tr><tr><td><p>104.85.165.1</p></td><td><p>192</p></td><td><p>1, 2, 6, 8, 11, 15 ...</p></td><td><p>Unknown router in Akamai’s network</p></td></tr><tr><td><p>feseli.com</p></td><td><p>157</p></td><td><p>7</p></td><td><p>Russian cooking blog</p></td></tr><tr><td><p>Minomortaruolo.it</p></td><td><p>157</p></td><td><p>7</p></td><td><p>Italian politician site</p></td></tr><tr><td><p>Voxility hosted C2</p></td><td><p>106</p></td><td><p>1, 2, 6, 7, 15 ...</p></td><td><p>Known decoy target</p></td></tr><tr><td><p>Tuidang websites</p></td><td><p>100</p></td><td><p>--</p></td><td><p>HTTP attacks on two Chinese political dissidence sites</p></td></tr><tr><td><p>execrypt.com</p></td><td><p>96</p></td><td><p>-0-</p></td><td><p>Binary obfuscation service</p></td></tr><tr><td><p>Auktionshilfe.info</p></td><td><p>85</p></td><td><p>2, 13</p></td><td><p>Russian auction site</p></td></tr><tr><td><p>houtai.longqikeji.com</p></td><td><p>85</p></td><td><p>25</p></td><td><p>SYN attacks on a former game commerce site</p></td></tr><tr><td><p>Runescape</p></td><td><p>73</p></td><td><p>—</p></td><td><p>World 26th of a popular online game</p></td></tr><tr><td><p>184.84.240.54</p></td><td><p>72</p></td><td><p>1, 10, 11, 15 ...</p></td><td><p>Unknown target hosted at Akamai</p></td></tr><tr><td><p>antiddos.solutions</p></td><td><p>71</p></td><td><p>—</p></td><td><p>AntiDDoS service offered at react.su.</p></td></tr></table><p>Looking at the most attacked services across all Mirai variants reveals the following:</p><ol><li><p><b>Booter services monetized Mirai</b>: The wide diversity of targets shows that booter services ran at least some of the largest clusters. A booter service is a service provided by cyber criminals that offers on-demand DDoS attack capabilities to paying customers.</p></li><li><p><b>There are fewer actors than clusters</b>: Some clusters have strong overlapping targets, which tends to indicate that they were run by the same actors. For example, clusters 15, 26, and 6 were used to target specific Minecraft servers.</p></li></ol>
    <div>
      <h3>Mirai’s takedown of the Internet</h3>
      <a href="#mirais-takedown-of-the-internet">
        
      </a>
    </div>
    <p>On October 21, a <a href="http://money.cnn.com/2016/10/21/technology/ddos-attack-popular-sites/index.html">Mirai attack</a> targeted the popular DNS provider DYN. This event prevented Internet users from <a href="https://en.wikipedia.org/wiki/2016_Dyn_cyberattack">accessing many popular websites</a>, including AirBnB, Amazon, GitHub, HBO, Netflix, PayPal, Reddit, and Twitter, by disturbing the DYN name-resolution service.</p><p>We believe this attack was not meant to “take down the Internet,” as it was painted by the press, but rather was linked to a larger set of attacks against gaming platforms.</p><p>We reached this conclusion by looking at the other targets of the DYN variant (cluster 6). They are all gaming related. Additionally, this is also consistent with the OVH attack as it was also targeted because it hosted specific game servers as discussed earlier. As sad as it seems, all the prominent sites affected by the DYN attack were apparently just the spectacular collateral damage to a war between gamers.</p>
    <div>
      <h3>Mirai’s attempted takedown of an entire country's network? October 31</h3>
      <a href="#mirais-attempted-takedown-of-an-entire-countrys-network-october-31">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/RuhwBi0AWQgL2q82OCE7s/50a53ca7f0aa658a378ac543f51a3279/mirai-shutdown-internet-in-liberia-hackernews.jpg" />
            
            </figure><p>Lonestar Cell, one of the largest Liberian telecom operators started to be targeted by Mirai on October 31. Over the next few months, it suffered 616 attacks, the most of any Mirai victim.</p><p>The fact that the Mirai cluster responsible for these attack has no common infrastructure with the original Mirai or the DYN variant indicate that they were orchestrated by a totally different actor than the original author.</p><p>A few weeks after our study was published, this assessment was confirmed when the author of one of the most aggressive Mirai variant <a href="https://www.bleepingcomputer.com/news/security/hacker-bestbuy-admits-to-hijacking-deutsche-telekom-routers-with-mirai-malware/">confessed during his trial</a> that he was paid to takedown Lonestar. He acknowledged that an unnamed Liberia’s ISP paid him $10,000 to take out its competitors. This validated that our clustering approach is able to accurately track and attribute Mirai’s attacks.</p>
    <div>
      <h3>Deutsche Telekom going dark</h3>
      <a href="#deutsche-telekom-going-dark">
        
      </a>
    </div>
    <p>On November 26, 2016, one of the largest German Internet provider Deutsche Telekom suffered a <a href="https://www.csoonline.com/article/3144197/security/upgraded-mirai-botnet-disrupts-deutsche-telekom-by-infecting-routers.html">massive outage</a> after 900,000 of its routers were compromised.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/56okNq2XipDTr1CAZ2oHjZ/5d4295fbbdc6aa4fbe7447542ddffd29/mira-german-outage-failed-attempt-reuters.jpg" />
            
            </figure><p>Ironically, this outage was not due to yet another Mirai DDoS attack but instead due to a particularly innovative and buggy version of Mirai that knocked these devices offline while attempting to compromise them. This variant also affected thousands of <a href="https://motherboard.vice.com/en_us/article/nz7ky7/hackers-say-knocking-thousands-of-brits-offline-was-an-accident-mirai">TalkTalk routers</a>.</p><p>What allowed this variant to infect so many routers was the addition to its replication module of a router exploit targeting at the <a href="https://en.wikipedia.org/wiki/TR-069">CPE WAN Management Protocol (CWMP)</a>. The CWMP protocol is an HTTP-based protocol used by many Internet providers to autoconfigure and remotely manage home routers, modems, and other customer-on-premises (CPE) equipment.</p><p>Beside its scale, this incident is significant because it demonstrates how the weaponizations of more complex IoT vulnerabilities by hackers can lead to very potent botnets. We hope the Deutsche Telekom event acts as a wake-up call and push toward making IoT auto-update mandatory. This is much needed to curb the significant risk posed by vulnerable IoT device given the poor track record of Internet users manually patching their IoT devices.</p>
    <div>
      <h3>Mirai original author outed?</h3>
      <a href="#mirai-original-author-outed">
        
      </a>
    </div>
    <p>In the months following his website being taken offline, Brian Krebs devoted hundreds of hours to investigating Anna-Senpai, the infamous Mirai author. In early January 2017, Brian announced that he <a href="https://krebsonsecurity.com/2017/01/who-is-anna-senpai-the-mirai-worm-author/">believes</a> Anna-senpai to be Paras Jha, a Rutgers student who apparently has been involved in previous game-hacking related schemes. Brian also identified Josia White as a person of interest. After being outed, Paras Jha and Josia White and another individual were questioned by authorities and <a href="https://krebsonsecurity.com/2017/12/mirai-iot-botnet-co-authors-plead-guilty/">plead guilty</a> in federal court to a variety of charges, some including their activity related to Mirai.</p>
    <div>
      <h3>Deutsche Telekom attacker arrested</h3>
      <a href="#deutsche-telekom-attacker-arrested">
        
      </a>
    </div>
    <p>In November 2016, Daniel Kaye (aka BestBuy) the author of the Mirai botnet variant that brought down Deutsche Telekom was arrested at the <a href="http://www.bbc.com/news/technology-37510502">Luton airport</a>. Prior to Mirai, a 29-year-old British citizen was infamous for selling his hacking services on various dark web markets.</p><p>In July 2017 a few months after being extradited to Germany Daniel Kaye <a href="https://www.bleepingcomputer.com/news/security/hacker-bestbuy-admits-to-hijacking-deutsche-telekom-routers-with-mirai-malware/">plead guilty</a> and was sentenced to a one year and a half imprisonment with suspension. During the trial, Daniel admitted that he never intended for the routers to cease functioning. He only wanted to silently control them, so he can use them as part of a DDoS botnet to increase his botnet firepower. As discussed earlier he also confessed being paid by competitors to takedown Lonestar.</p><p>In Aug 2017 Daniel was <a href="https://www.theguardian.com/uk-news/2017/aug/30/alleged-mastermind-daniel-kaye-lloyds-bank-cyber-attacks-extradited-uk">extradited back to the UK to face extortion charges</a> after attempting to blackmail Lloyds and Barclays banks. According to press reports, he asked the Lloyds to pay about £75,000 in bitcoins for the attack to be called off.</p>
    <div>
      <h3>Takeaways</h3>
      <a href="#takeaways">
        
      </a>
    </div>
    <p>The prevalence of insecure IoT devices on the Internet makes it very likely that, for the foreseeable future, they will be the main source of DDoS attacks.</p><p>Mirai and subsequent IoT botnets can be averted if IoT vendors start to follow basic security best practices. In particular, we recommend that the following should be required of all IoT device makers:</p><ul><li><p><b>Eliminate default credentials</b>: This will prevent hackers from constructing a credential main list that allows them to compromise a myriad of devices as MIRAI did.</p></li><li><p><b>Make auto-patching mandatory</b>: IoT devices are meant to be “set and forget,” which makes manual patching unlikely. Having them auto-patch is the only reasonable option to ensure that no widespread vulnerability like the Deutsche Telekom one can be exploited to take down a large chunk of the Internet.</p></li><li><p><b>Implement rate limiting</b>: Enforcing login rate limiting to prevent brute-force attack is a good way to mitigate the tendency of people to use weak passwords. Another alternative would be using a captcha or a proof or work.</p></li></ul><p>Thank you for reading this post until the end!</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Bots]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Mirai]]></category>
            <category><![CDATA[Research]]></category>
            <guid isPermaLink="false">6CJR6Rgp1guSO8oWPfPYOv</guid>
            <dc:creator>Guest Author</dc:creator>
        </item>
    </channel>
</rss>