Cloudflare Customer Targeted in Record HTTPS DDoS Attack
Security and web performance services provider Cloudflare recently mitigated the largest HTTPS distributed denial-of-service (DDoS) attack it has seen to date.
Peaking at 15.3 million request-per-second (RPS), this was not the largest application-layer DDoS attack ever recorded, but Cloudflare says it was the largest to be carried out over HTTPS.
The new assault, observed by Cloudflare earlier this month, stands out because HTTPS DDoS attacks require significantly higher computational resources due to the costs associated with establishing a secure TLS encrypted connection.
“Therefore it costs the attacker more to launch the attack, and for the victim to mitigate it. We’ve seen very large attacks in the past over (unencrypted) HTTP, but this attack stands out because of the resources it required at its scale,” Cloudflare notes.
The assault targeted an organization operating a crypto launchpad, lasted roughly 15 seconds, and was launched by using a botnet of roughly 6,000 unique bots located in 112 countries. The largest amount of attack traffic came from Indonesia (15%).
“What’s interesting is that the attack mostly came from data centers. We’re seeing a big move from residential network Internet Service Providers (ISPs) to cloud compute ISPs,” Cloudflare says.
The security services provider says it identified over 1,300 different networks that the attack traffic originated from, with top networks including Hetzner from Germany (Autonomous System Number 24940), Azteca Comunicaciones Colombia (ASN 262186), and OVH in France (ASN 16276).