US firm fends off the largest DDoS attack ever recorded
Record-breaking attack comes only five days after GitHub was taken offline
Security researchers have revealed a 1.7Tbps distributed denial of service (DDoS) attack on an unidentified US service provider, only five days after the 1.3Tbps attack on GitHub.
The attack was based on the attack vector that brought down GitHub temporarily last week, according to Carlos Morales, VP of sales, engineering and operations at Netscout Arbor.
In a blog post, he said: "Netscout Arbor can confirm a 1.7Tbps reflection/amplification attack targeted at a customer of a US-based service provider has been recorded by our ATLAS global traffic and DDoS threat data system.
"It's a testament to the defense capabilities that this service provider had in place to defend against an attack of this nature that no outages were reported because of this."
Netscout Arbor noted that the DDoS attack used the same memcached reflection/amplification as the attack on GitHub, and Morales warned that this will hardly be the last attack to use this technique.
"While the internet community is coming together to shut down access to the many open mecached servers out there, the sheer number of servers running memcached openly will make this a lasting vulnerability that attackers will exploit," he said.
The attack on GitHub stopped after just eight minutes, which has led to speculation that the hackers were merely testing their capabilities.
"Until the internet community is able to adjust and make significant progress on memcached servers, we should expect terabit attacks to continue," Morales added.
Ashley Stephenson, CEO of Corero Nework Security, said that he has seen a steady ramp in the past few days of memcached-based attacks on the wider community.
"The terabit attack will grab the 'biggest and baddest' headlines casting a shadow that will obscure the thousands of businesses worldwide that have been hit with smaller but equally disruptive DDoS attacks leveraging the memcached vector during the past week," he said.
The complete guide to changing your phone system provider
Optimise your phone system for better business resultsDownload now
Simplify cluster security at scale
Centralised secrets management across hybrid, multi-cloud environmentsDownload now
The endpoint as a key element of your security infrastructure
Threats to endpoints in a world of remote workingDownload now
2021 state of IT asset management report
The role of IT asset management for maximising technology investmentsDownload now