21 September 2022

Record DDoS attack with 25.3 billion requests used HTTP/2 multiplexing


Record DDoS attack with 25.3 billion requests used HTTP/2 multiplexing

Cybersecurity company Imperva said it stopped a distributed denial-of-service (DDoS) attack with a total of over 25.3 billion requests on June 27, 2022.

The attack targeted an unnamed Chinese telecommunications company and lasted over four hours, which is notable, as only 10.5% of attacks last between one and six hours, and most last under fifteen minutes.

“Attackers used HTTP/2 multiplexing, or combining multiple packets into one, to send multiple requests at once over individual connections. This technique can bring servers down using a limited number of resources, and such attacks are extremely difficult to detect. Since our automated mitigation solution is guaranteed to block DDoS in under three seconds, we estimate that the attack could have reached a much greater rate than our tracked peak of 3.9 million RPS,” the company explained.

The DDoS attack came from a massive botnet that comprised nearly 170,000 IP addresses including routers, security cameras and compromised servers located in over 180 countries, with most of them based in the US, Indonesia, and Brazil.

The news comes after Akamai revealed that it mitigated a record-breaking distributed denial-of-service (DDoS) attacks on September 12 aimed at one of its customers in Eastern Europe. The attacks reached unprecedented levels when the “garbage” traffic sent to the target network peaked at 704.8 Mpps, nearly 7% higher than the previous record-setting DDoS attack recorded in July 2022 (659.6 Mpps).

Back to the list

Latest Posts

Cyber Security week in review: December 2, 2022

Cyber Security week in review: December 2, 2022

The world in brief: Samsung, LG, Mediatek certificates used to sign Android malware, researchers detail new exploit framework, and more.
2 December 2022
Security researchers unintentionally crash KmsdBot botnet

Security researchers unintentionally crash KmsdBot botnet

The malware lacked an error-checking mechanism, which allowed the researchers to deactivate it.
1 December 2022
New Heliconia framework exploits n-day flaws in Chrome, Firefox and Microsoft Defender

New Heliconia framework exploits n-day flaws in Chrome, Firefox and Microsoft Defender

The researchers have linked the framework to a Spain-based software company.
1 December 2022