Google blocks world’s largest-ever web distributed DDoS cyber attack


Google has blocked the largest-ever web distributed denial-of-service (DDoS) cyber attack on a customer that peaked at 46 million requests per second (RPS).


This is the largest ‘Layer 7 DDoS’ reported to date — at least 76 per cent larger than the previously reported record, according to the company.


“To give a sense of the scale of the attack, that is like receiving all the daily requests to Wikipedia (one of the top 10 trafficked websites in the world) in just 10 seconds,” Satya Konduru, Technical Lead, Google Cloud, said in a statement late on Friday.


DDoS cyber-attacks are increasing in frequency and growing in size exponentially.


“Our customer’s network security team deployed the Google Cloud Armor-recommended rule into their security policy, and it immediately started blocking the attack traffic,” said Emil Kiner, senior product manager, Cloud Armor.


In the two minutes that followed, the attack began to ramp up, growing from 100,000 RPS to a peak of 46 million RPS.


Since Cloud Armor was already blocking the attack traffic, the target workload continued to operate normally.


“Over the next few minutes, the attack started to decrease in size, ultimately ending 69 minutes later. Presumably the attacker likely determined they were not having the desired impact while incurring significant expenses to execute the attack,” said the company.


The geographic distribution and types of unsecured services leveraged to generate the attack matches the Meris family of attacks.


Known for its massive attacks that have broken DDoS records, the Meris method abuses unsecured proxies to obfuscate the true origin of the attacks, said Google.


The attack was stopped at the edge of Google’s network, with the malicious requests blocked upstream from the customer’s application.


Attack sizes will continue to grow and tactics will continue to evolve.


To be prepared, Google recommended using a defense-in-depth strategy by deploying defenses and controls at multiple layers of your environment and your infrastructure providers’ network “to protect your web applications and services from targeted web attacks”.


–IANS


na/ksk/

(Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)

Dear Reader,

Business Standard has always strived hard to provide up-to-date information and commentary on developments that are of interest to you and have wider political and economic implications for the country and the world. Your encouragement and constant feedback on how to improve our offering have only made our resolve and commitment to these ideals stronger. Even during these difficult times arising out of Covid-19, we continue to remain committed to keeping you informed and updated with credible news, authoritative views and incisive commentary on topical issues of relevance.

We, however, have a request.

As we battle the economic impact of the pandemic, we need your support even more, so that we can continue to offer you more quality content. Our subscription model has seen an encouraging response from many of you, who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of offering you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practise the journalism to which we are committed.

Support quality journalism and subscribe to Business Standard.

Digital Editor


Originally appeared on: TheSpuzz

Scoophot
Logo