{"id":11843,"date":"2024-10-05T18:08:47","date_gmt":"2024-10-05T12:38:47","guid":{"rendered":"https:\/\/reconcybersecurity.com\/blogs\/?p=11843"},"modified":"2024-10-08T22:17:18","modified_gmt":"2024-10-08T16:47:18","slug":"cloudflare-blocks-record-3-8-tbps-ddos-attack-on-global-industries","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/cloudflare-blocks-record-3-8-tbps-ddos-attack-on-global-industries\/","title":{"rendered":"Cloudflare Blocks Record 3.8 Tbps DDoS Attack on Global Industries"},"content":{"rendered":"\n<p><strong>Cloudflare Blocks Record-Breaking DDoS Attack Reaching 3.8 Tbps<\/strong><\/p>\n\n\n\n<p>Cloudflare has revealed that it successfully blocked a massive distributed denial-of-service (DDoS) attack that peaked at 3.8 terabits per second (Tbps) and lasted for 65 seconds.<\/p>\n\n\n\n<p>The company reported that it defended against more than 100 large-scale <a href=\"https:\/\/www.cloudflare.com\/en-in\/learning\/ddos\/layer-3-ddos-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">Layer 3\/4 DDoS attacks<\/a> throughout the past month. Many of these attacks exceeded 2 billion packets per second (Bpps) and 3 Tbps. These attacks, ongoing since early September 2024, targeted several customers in the financial, internet, and telecom sectors. No specific group has been blamed for the attacks.<\/p>\n\n\n\n<p>The previous record for the largest DDoS attack was 3.47 Tbps in November 2021, which targeted a Microsoft Azure customer in Asia.<\/p>\n\n\n\n<p>The recent attacks used the User Datagram Protocol (UDP) on a fixed port, with the packet floods coming from countries like Vietnam, Russia, Brazil, Spain, and the U.S. The attackers used compromised devices such as MikroTik routers, DVRs, and web servers.<\/p>\n\n\n\n<p>Cloudflare suspects these high-speed attacks are powered by a large botnet of infected ASUS home routers, which were compromised by a critical flaw (CVE-2024-3080) with a CVSS score of 9.8. According to Censys, over 157,000 ASUS routers were potentially affected by this flaw as of June 2024, with many located in the U.S., Hong Kong, and China.<\/p>\n\n\n\n<h3 id=\"attack-goals-and-defense\" class=\"wp-block-heading\">Attack Goals and Defense<\/h3>\n\n\n\n<p>Cloudflare explained that the goal of these DDoS attacks is to overwhelm the target\u2019s network bandwidth and CPU resources, making it difficult for legitimate users to access the service.<\/p>\n\n\n\n<p>\u201cTo protect against high packet rate attacks, it\u2019s crucial to inspect and discard bad packets quickly, using minimal CPU resources, so that the good packets can be processed,\u201d the company said.<\/p>\n\n\n\n<p>They also noted that many cloud services and on-premise equipment don\u2019t have enough capacity to defend against attacks of this scale. High bandwidth usage can clog internet connections, while high packet rates can crash in-line devices.<\/p>\n\n\n\n<h3 id=\"ddos-attacks-on-the-rise\" class=\"wp-block-heading\">DDoS Attacks on the Rise<\/h3>\n\n\n\n<p>Banking, financial services, and public utilities have been increasingly targeted by DDoS attacks, with a 55% increase over the last four years, according to NETSCOUT. In the first half of 2024 alone, there has been a 30% rise in volumetric attacks.<\/p>\n\n\n\n<p>The rise in DDoS attacks is largely driven by hacktivist groups targeting global organizations. These attacks are also becoming harder to detect, as hackers use <a href=\"https:\/\/developers.cloudflare.com\/1.1.1.1\/encryption\/dns-over-https\/\" target=\"_blank\" rel=\"noreferrer noopener\">DNS-over-HTTPS<\/a> (DoH) to hide command-and-control (C2) traffic.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"936\" height=\"394\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/10\/DNS-over-HTTPS.png\" alt=\"Cloudflare\" class=\"wp-image-11844\" srcset=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/10\/DNS-over-HTTPS.png 936w, https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/10\/DNS-over-HTTPS-300x126.png 300w, https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/10\/DNS-over-HTTPS-768x323.png 768w, https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/10\/DNS-over-HTTPS-380x160.png 380w, https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/10\/DNS-over-HTTPS-800x337.png 800w, https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2024\/10\/DNS-over-HTTPS-150x63.png 150w\" sizes=\"auto, (max-width: 936px) 100vw, 936px\" \/><\/figure>\n\n\n\n<p>NETSCOUT added that attackers are using distributed botnet C2 infrastructures, making defense harder. This is because both inbound DDoS traffic and outbound traffic from infected bots need to be blocked.<\/p>\n\n\n\n<h3 id=\"new-threats-from-cups-vulnerabilities\" class=\"wp-block-heading\">New Threats from CUPS Vulnerabilities<\/h3>\n\n\n\n<p>Akamai recently warned that vulnerabilities in the <a href=\"https:\/\/censys.com\/common-unix-printing-service-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\">Common UNIX Printing System<\/a> (CUPS) in Linux could be exploited for DDoS attacks with a 600x amplification factor. More than 58,000 devices connected to the public internet are potentially at risk.<\/p>\n\n\n\n<p>Researchers explained that attackers can send a specially crafted packet that tricks the CUPS server into sending larger requests to the target. This not only affects the target but also the CUPS server, consuming its bandwidth and CPU resources.<\/p>\n\n\n\n<p>Censys estimated that around 7,171 hosts with CUPS services exposed over TCP are vulnerable to the <a href=\"https:\/\/www.elastic.co\/security-labs\/cups-overflow\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-47176<\/a> flaw, but the actual number may be higher since more CUPS services are accessible over UDP than TCP.<\/p>\n\n\n\n<h3 id=\"recommendations-for-organizations\" class=\"wp-block-heading\">Recommendations for Organizations<\/h3>\n\n\n\n<p>To protect against these threats, organizations are advised to remove CUPS if it\u2019s not necessary. If CUPS services are needed, it\u2019s important to firewall the service ports (UDP\/631) to prevent access from the broader internet.<\/p>\n","protected":false},"excerpt":{"rendered":"Cloudflare Blocks Record-Breaking DDoS Attack Reaching 3.8 Tbps Cloudflare has revealed that it successfully blocked a massive distributed&hellip;\n","protected":false},"author":1,"featured_media":11846,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[241,1083],"tags":[],"class_list":{"0":"post-11843","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-it-knowledge","8":"category-latest-news"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/11843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=11843"}],"version-history":[{"count":1,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/11843\/revisions"}],"predecessor-version":[{"id":11845,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/11843\/revisions\/11845"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/11846"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=11843"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=11843"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=11843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}