- Fastnetmon detected a recording of 1.5 billion packages per second DDOS attack
- Traffic has come from the diverted IoT devices and mikrotik routers on 11,000 networks
- Fastnetmon prevents FAI filtering is essential to stop future large -scale floods
A distributed denial of service attack targeting a DDOS attenuation provider somewhere in Western Europe was identified and attenuated by Fastnetmon.
The company claims that the attack culminated at 1.5 billion packages per second, making it one of the largest floods with confirmed packages to date.
Fastnetmon says traffic was mainly a flood of the UDP from the leading equipment for compromised customers, including IoT devices and Mikrotik routers.
Part of a dangerous trend
The attack would have resulted in resources of more than 11,000 unique networks worldwide.
The targeted company was not appointed, although Fastnetmon described it as a DDOS washing supplier, a type of service that filters malicious traffic during this type of attack.
“This event is part of a dangerous trend,” said Pavel Osintsov, founder of Fastnetmon. “When tens of thousands of CPE devices can be diverted and used in coordinated packages of this magnitude, the risks for network operators increase exponentially.
The attack was detected and manipulated in real time, fastnetmon systems automatically identifying abnormal traffic in a few seconds.
Attenuation efforts were based on the washing technology for customer installations and involved the deployment of access control lists on routers known to be vulnerable to amplification techniques.
Fastnetmon says its platform is designed to treat events on this scale using C ++ algorithms optimized to provide visibility in network traffic.
The rapid action allowed the attacked company to resist the assault without any visible disturbance of its service.
This announcement follows the recent Cloudflare disclosure of a record volumetric attack which reached 11.5 tops and 5.1 billion packs per second.
“Together, the two incidents highlight an increase in the rate of packets and floods focused on the bandwidth, a trend that puts pressure on the capacity of the world’s mitigation platforms,” said Fastnetmon.
“What makes this affair remarkable is the large number of sources distributed and the abuse of daily networking devices. Without proactive filtering at ISP, the compromised consumption equipment can be armed on a large scale,” warned the company.