Amazon Web Services Fights Off Massive DDoS Attack

Amazon’s Shield protection service says that it successfully defended itself against the biggest Distributed Denial of Service (DDoS) attack ever recorded. Amazon said its AWS Shield service mitigated the largest DDoS attack ever recorded, stopping a 2.3 Tbps attack in mid-February this year. Distributed denial of service (DDoS) attacks are designed to knock a website offline by flooding it with huge amounts of requests until it crashes. 

In a formal report about its DDoS protection service, AWS Shield, the company said the peak of the attack had been 44% larger than anything the service had seen before and resulted in a three-days of "elevated threat" status. Amazon did not identify what website or online service had been targeted by the attack. 

A DDoS attack is when a cyber attacker floods a website with bot traffic so it is overloaded and has to be taken offline.
According to a regular report from Amazon’s AWS Shield division, which is specifically designed to safeguard Amazon cloud customers against DDoS attacks, the effort topped out at 2.3 terabits per second. AWS Shield, the security service that protects applications running on AWS cloud from DDoS attacks, blocked a 2.3TB per second (Tbps) attack in February. According to the BBC, the previous record, set in 2018, was 1.7Tbps.

Details of the attack were published in AWS’s Q1 Threat Report, which said that the attack was “approximately 44% larger than any network volumetric event previously detected on AWS.” It caused 3 days of elevated threat.

DDoS Attacks Surge As A Consequence Of Covid-19
Technology company Neustar has warned of a dramatic rise in DDoS attacks during the Covid-19 pandemic, with the company mitigating more than twice the number of attacks as in first quarter 2019. Non-profit organisations have also been particularly affected.

According to Cloudflare, DDoS attacks against US anti-racism advocacy groups increased 1,120-fold between 26 May and 01 June compared with the last week in April.

As news of AWS’s record breaking DDoS attack emerges, global content delivery network Akami also reported a significant attack. During the first week of June 2020, it mitigated an attack against an internet hosting provider, the largest the company has seen at 1.44Tbps

According to Cloudflare, 92 percent of the DDoS attacks mitigated by the service in the first quarter of 2020 were under 10 Gbps and another 47 percent were evens smaller – under 550 megabits per second.

The previous record for the largest DDoS attack ever recorded was of 1.7 Tbps, mitigated by NETSCOUT Arbor in March 2018 and prior to that, the biggest DDoS attack ever recorded was a 1.3Tbps DDoS attack that hit GitHub, a month before, in February 2018.

Amazon Web Services:       Brinkwire:       Verdict:         ZDNet:          BBC

You Might Also Read

The Future Of Ransomware Is In The Cloud:

 

 

« How Hackers Invade Your Computer
Companies Are Coughing Up Ransom To Recover Their Data »

Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

Illuria Security

Illuria Security

Illuria's fully automated solution detects and sandboxes incoming attacks before they ever reach your servers.

Trustonic

Trustonic

Trustonic is a leader in the device security market. Our mission is to protect apps, secure devices & enable trust.

CyberQ Group

CyberQ Group

CyberQ is an award winning cyber security consultancy and services provider and an innovator in Artificial Intelligence and Automated Cyber Security.

ePlus

ePlus

ePlus designs and delivers effective, integrated cybersecurity programs centered on culture and technology, aimed at mitigating business risk and empowering digital transformation.

Spamhaus

Spamhaus

Spamhaus is the world leader in supplying realtime highly accurate threat intelligence to the Internet's major networks.

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance provides an array of cybersecurity services including cybersecurity policy management, risk assessments and regulatory compliance consulting.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.