Amazon Web Services Fights Off Massive DDoS Attack

Amazon’s Shield protection service says that it successfully defended itself against the biggest Distributed Denial of Service (DDoS) attack ever recorded. Amazon said its AWS Shield service mitigated the largest DDoS attack ever recorded, stopping a 2.3 Tbps attack in mid-February this year. Distributed denial of service (DDoS) attacks are designed to knock a website offline by flooding it with huge amounts of requests until it crashes. 

In a formal report about its DDoS protection service, AWS Shield, the company said the peak of the attack had been 44% larger than anything the service had seen before and resulted in a three-days of "elevated threat" status. Amazon did not identify what website or online service had been targeted by the attack. 

A DDoS attack is when a cyber attacker floods a website with bot traffic so it is overloaded and has to be taken offline.
According to a regular report from Amazon’s AWS Shield division, which is specifically designed to safeguard Amazon cloud customers against DDoS attacks, the effort topped out at 2.3 terabits per second. AWS Shield, the security service that protects applications running on AWS cloud from DDoS attacks, blocked a 2.3TB per second (Tbps) attack in February. According to the BBC, the previous record, set in 2018, was 1.7Tbps.

Details of the attack were published in AWS’s Q1 Threat Report, which said that the attack was “approximately 44% larger than any network volumetric event previously detected on AWS.” It caused 3 days of elevated threat.

DDoS Attacks Surge As A Consequence Of Covid-19
Technology company Neustar has warned of a dramatic rise in DDoS attacks during the Covid-19 pandemic, with the company mitigating more than twice the number of attacks as in first quarter 2019. Non-profit organisations have also been particularly affected.

According to Cloudflare, DDoS attacks against US anti-racism advocacy groups increased 1,120-fold between 26 May and 01 June compared with the last week in April.

As news of AWS’s record breaking DDoS attack emerges, global content delivery network Akami also reported a significant attack. During the first week of June 2020, it mitigated an attack against an internet hosting provider, the largest the company has seen at 1.44Tbps

According to Cloudflare, 92 percent of the DDoS attacks mitigated by the service in the first quarter of 2020 were under 10 Gbps and another 47 percent were evens smaller – under 550 megabits per second.

The previous record for the largest DDoS attack ever recorded was of 1.7 Tbps, mitigated by NETSCOUT Arbor in March 2018 and prior to that, the biggest DDoS attack ever recorded was a 1.3Tbps DDoS attack that hit GitHub, a month before, in February 2018.

Amazon Web Services:       Brinkwire:       Verdict:         ZDNet:          BBC

You Might Also Read

The Future Of Ransomware Is In The Cloud:

 

 

« How Hackers Invade Your Computer
Companies Are Coughing Up Ransom To Recover Their Data »

Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Sapphire

Sapphire

Sapphire, a trusted security integrator, provides solutions designed to protect your infrastructures, assets, data and users against current and emerging threats.

Get Cyber Safe

Get Cyber Safe

Get Cyber Safe is a national public awareness campaign created to educate Canadians about Internet security and the simple steps they can take to protect themselves online.

ESTsoft

ESTsoft

ESTsoft Securedisk is an enterprise-wide file security solution that stores and manages all data in a central file server.

NetFort

NetFort

NetFort provides software products to monitor activity on virtual and physical networks.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

PhishBase

PhishBase

PhishBase is an antelligent mail analyzer utilizing fuzzy logic to prevent phishing attacks, data leakage and more.

Meditology

Meditology

Meditology Services is a top-ranked provider of information risk management, cybersecurity, privacy, and regulatory compliance consulting services exclusively for healthcare organizations.

CY4GATE

CY4GATE

CY4GATE was conceived to design, develop and produce technologies and products that are able to meet the most stringent and modern requirements of Cyber Intelligence & Cyber Security.