Microsoft Fends Off Record-Breaking 3.47Tbps DDoS Attack (arstechnica.com) 56
Microsoft's Azure DDoS Protection team said that in November, it fended off what industry experts say is likely the biggest distributed denial-of-service attack ever: a torrent of junk data with a throughput of 3.47 terabits per second. Ars Technica reports: The record DDoS came from more than 10,000 sources located in at least 10 countries around the world. The DDoS targeted an unidentified Azure customer in Asia and lasted for about two minutes. The following month, Microsoft said, Azure warded off two other monster DDoSes. Weighing in at 3.25Tbps, the first one came in four bursts and lasted about 15 minutes. The second December DDoS reached a peak of 2.54Tbps and lasted about five minutes.
The record beats a 2.5Tbps attack that Microsoft mitigated in the first half of 2021. Previously, one of the biggest attacks was 2.37Tbps in size, a 35 percent increase over a record set in 2018. A separate DDoS in 2020 generated 809 million packets per second, which was also a record at the time. Packet-per-second DDoSes work by exhausting the computing resources of a server. More traditional volumetric attacks, by contrast, consume available bandwidth either inside the targeted network or service or get between the target and the rest of the Internet. The 3.7Tbps attack delivered roughly 340 million packets per second.
The record beats a 2.5Tbps attack that Microsoft mitigated in the first half of 2021. Previously, one of the biggest attacks was 2.37Tbps in size, a 35 percent increase over a record set in 2018. A separate DDoS in 2020 generated 809 million packets per second, which was also a record at the time. Packet-per-second DDoSes work by exhausting the computing resources of a server. More traditional volumetric attacks, by contrast, consume available bandwidth either inside the targeted network or service or get between the target and the rest of the Internet. The 3.7Tbps attack delivered roughly 340 million packets per second.
I wonder (Score:2)
is the data coming from "pwned" Windows boxes, or is there a more modern way to direct that amount of data at MS?
Re: I wonder (Score:5, Interesting)
Re: I wonder (Score:1)
Re: (Score:2)
Then, default passwords would be changed, firmwares would be validated, and this shit would stop.
Re: (Score:1)
Re: I wonder (Score:4, Insightful)
You are not grasping how difficult of a problem a real DDOSing is. You, as the target, are not going to be reporting anything. Your system is going to be completely dead at DDOS traffic levels. They can only be detected and mitigated thru carrier-grade infrastructure.
Re: I wonder (Score:2)
Or, y'know, a phone call?
Re: (Score:1)
"Automated".
Re: (Score:2)
That's right, I've never heard of or received automated phone calls.
Someone needs to invent that.
Re: I wonder (Score:2)
Re: (Score:2)
Basically something like this:
1. Attacker sends a lot of traffic to victim.
2. Victim sees junk data, and traces back to attacker.
3. Victim notifies fu
Re: (Score:3)
So how many IoT devices have to be owned to generate 340 million packets per second? Keeping in mind most IoT's are low-powered devices.
Re: (Score:3)
Probably "Internet of Trash" IoT stuff. Also probably time to look at this as a form of terrorism.
Re: I wonder (Score:2)
You are apparently easily terrorized.
Re: (Score:2)
You are apparently easily terrorized.
Nope. But I think attacks on increasingly critical infrastructure should be classified as terrorism. These people have yet to verifiable kill anybody, but they are getting closer and closer.
Re: (Score:3)
is the data coming from "pwned" Windows boxes, or is there a more modern way to direct that amount of data at MS?
Maybe people are just trying to return their Windows 11 "upgrades" ... :-)
Re:I wonder (Score:4, Informative)
is the data coming from "pwned" Windows boxes
Wonder no more. I don't know about the latest attacks, but the 2.4 Tbps attack last August was coming from "pwned" Linux boxes, more specifically Microtik routers - which are also the components of the Meris [wikipedia.org] botnet, consisting of hundred of thousands of compromised machines. The botnet was also used to attack Krebs on Security [krebsonsecurity.com], Yandex [netgate.com] and others.
Note that multiple [tenable.com] vulnerabilities in those Linux routers have been known for years but, as you see, the exploits keep coming...
Fended? (Score:2)
Re: (Score:2)
MS block it in their firewall somewhere.
Re: (Score:3)
Also it is possible for them to signal to their upstream networks to black-hole traffic to particular IP addresses, so it is dropped by the upstream network before it even gets to Microsoft. See rfc7999 [ietf.org] and rfc5635 [ietf.org]:
When a network is under DDoS duress, it MAY announce an IP prefix covering the victim's IP address(es) for the purpose of signaling to neighboring networks that any traffic destined for these IP address(es) should be discarded. In such a scenario, the network operator SHOULD attach the BLACKHOLE community.
This is done via BGP [wikipedia.org] sessions with the upstreams.
Re: (Score:1)
Re: (Score:2)
During the time of the attack it probably does disrupt legitimate traffic from the IPs with the same prefix (assuming they are blocking a range of IPs and not just individual IPs) but that is only temporary and is a lot better than blocking all legitimate traffic from all IPs (which an unfiltered DDoS attack would result in).
Re: (Score:3)
It's black-holing only to the destination address - i.e. the IP address of Microsoft's server (if they were to send these communities) - so it is a bit of a nuclear option, as per the GP's post.
Big content delivery companies like Microsoft have a huge number of peering points with other networks, so they can have devices at those points which can take a flood of incoming traffic and discard the "bad" stuff based on source address, port, etc. Then the remaining traffic is forwarded to their data centers. So
Re: (Score:1)
Routing design is sound. It was engineered to define trust relationships on a bit level and all telecommunications assumes as much. One flaw though is how say a routing loop or a simple resend can just as likely be the fault of the receiving domain as it can be any domain upstream. Trust relationships do not simply allow a domain to be broken down in to layer upper layer well, brokenness since the higher up the stack the more that layer assumes all trust is a given.
Re: (Score:2)
DDoS Protection (Score:4, Interesting)
Can someone explain to the uninitiated what happens during these events? Does Microsoft (or whoever) phone the source ISPs and tell them to disconnect their customer(s) until everyone can figure out what to do/who's at fault?
Here is some information from Microsoft about their DDoS Protection [microsoft.com].
If you're just a little guy on the receiving end of a DDoS attack, there's not much you can do. I think only big players like Cloudflare [cloudflare.com] and the like have the resources to handle these things.
Re: Fended? (Score:5, Informative)
Re: (Score:3)
What then? (Score:2)
Re:What then? (Score:5, Funny)
What happens when the entire Internet becomes a DDoS?
Then, people will suddenly remember that there is a Layer 2
Re: (Score:2)
Wish I could mod this up funny. This is the best I can do for now.
Re: (Score:2)
Never underestimate the bandwidth of a station wagon full of tapes hurtling down the highway.
–Andrew Tanenbaum, 1981
New Internet Architecture Anyone??? (Score:4, Insightful)
As an engineer who stopped programming @ Fortran, I still wonder why after all this time that new core elements for sane internet use have not been implemented in the real world to stop all sort of these nefarious actions.
Yeah, I know some things are hard, but they are worth working on. As IOT devices balloon in volume, I would imagine they could add to the arsenal of the crazies.
Who should be coordinating the change to internet protocols to fix it?
Re: (Score:2)
More like service providers should be obliged to push security updates to the routers/modems they install -- many of them are simply given to new customers as part of the installation process, and most customers just live off the builtin wifi, so they never log into them even once, let alone bother to update them.
Perhaps if we started making ISPs somehow financially liable for the damages caused by their fleets of unpatched edge devices...
But before we bother asking the FCC to undertake yet another wet dog
Re: (Score:3)
I still wonder why after all this time that new core elements for sane internet use have not been implemented in the real world to stop all sort of these nefarious actions.
What do you propose that doesn't somehow cause major vested interests to become gatekeepers of who has a right to transit a network? The internet was founded on the natural routing of data between points without a care as to the source or to the purpose. Any intrinsic "fix" to any nefarious activity invariably results in a core element that has to by its nature discriminate against either the purpose or the source of traffic. Neither is good.
Much better to sit and wait and if some nefarious activity is dete
Re: (Score:2)
Who should be coordinating the change to internet protocols to fix it?
Not going to be fixed, most of the problem is companies forcing client-server apps because the average member of the public s stupid. That's why we lost PC games ability to host basic multiplayer when they started stealing PC RPG's and rebranding them mmo's. They've been on a back end every app on the planet to remove local apps to prevent piracy spree over the last 23+ years once they figured out the little Omers's of the world were dumb as fuck at PC's.,
https://twitter.com/remotayx [twitter.com]
The last 23+ years ha
Need more sources. (Score:2)
I understand using amplification to make a larger impact but a puny 10K sources is pathetic. Hit 'em with 10M sources and we'll see the paint start to peel off their datacenters. :)
That ain't no DDos (Score:3, Funny)
A competition you can always claim records on (Score:1, Troll)
There is a reason why even the lowly "Guiness book of records" has some standards on what constitutes a record worth keeping note of.
Re: A competition you can always claim records on (Score:1)
Should be easy for them (Score:1, Troll)
They handle telemetry from 100s of millions of Windows installations with no problem.
Why? (Score:2)
At this point, DDoS attacks and traffic patterns are pretty well known. Anyone conducting a DDoS attack isn't going to get very far.
Re: (Score:2)
i did too (Score:3)
Interesting "angle". (Score:2)
Re: (Score:3)
Microsoft doesn't want to publicly admit they're protecting them?
The victim is a customer of their cloud offer, of course they are protecting them and not going to disclose their name. They are doing their job as infrastructure supplier and want to keep their customers. Maybe the victim is a government agency of a State that has their cloud with Microsoft, and the details of this cyberattack is treated as State secret. Though they had to talk about the attack in general terms, to avoid that security researchers discover it and publish details, creating more damage to the
Re: Interesting "angle". (Score:2)
Re: (Score:2)