The last week of August, Microsoft revealed that it had observed a DDoS (distributed denial of service) attack targeting an Azure customer in Europe whose identity is not specified. From just over 04 minutes, the attack experienced three main peaks.
With assaults or short bursts, there was a first peak at 2.4 terabits per second of traffic, 0, 55 Tbps for the second and 1.7 Tbps for the third. The DDoS attack was of the reflection type and based on the UDP transport protocol.
The traffic of the attack originated near 70 000 sources – a botnet – with a location in countries like Malaysia, Vietnam, Taiwan, Japan and China, as well as the United States.
“ this magnitude demonstrates the ability of malicious actors to wreak havoc by flooding targets with gigantic traffic volumes in an attempt to stifle network capacity , “writes Microsoft. In this case, the DDoS attack was successfully mitigated with no impact for Azure.
For the first half 2021 and for Azure, Microsoft had pointed out an increase in the number of DDoS attacks, but a decrease in their intensity to 625 Mbps. This was before the DDoS attack at the end of August.
In February 2020, a DDoS attack managed by the protection service AWS Shield of Amazon had peaked at 2.3 Tbps. In September 2017, Google had mitigated a DDoS attack by up to 2, 54 Tbps.