Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Saturday January 29 2022, @12:55PM   Printer-friendly

Microsoft Azure customer hit by largest 3.47 Tbps DDoS attack:

A Microsoft Azure cloud computing customer in Asia was a victim of a massive 3.47 Tbps DDoS attack (distributed denial of service attack) in November 2021, the software and technology giant Microsoft revealed on January 25, 2022.

The DDoS attack lasted approximately 15 minutes and included a botnet of more than 10,000 compromised IoT (Internet of Things) devices from countries across the globe. These included Iran, India, China, Russia, Taiwan, Vietnam, Thailand, Indonesia, South Korea, and the United States.

Attack vectors were UDP reflection on port 80 using Simple Service Discovery Protocol (SSDP), Connection-less Lightweight Directory Access Protocol (CLDAP), Domain Name System (DNS), and Network Time Protocol (NTP) comprising one single peak.

Alethea Toh Product Manager, Azure Networking

Microsoft's report further disclosed that there has been a surge in DDoS attacks with the United States and India being prime targets. The company noted that Hong Kong has also become a popular hotspot for attackers however there has been a decrease in DDoS activity in Europe.

[...] A DDoS attack involves sending a huge amount of illegal traffic from compromised machines to the intended target and therefore disrupting them completely. The system can crash and lead to a massive loss of data, particularly, in the case of companies that host a significant amount of information regarding their clients and customers.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Touché) by EvilSS on Saturday January 29 2022, @08:22PM (1 child)

    by EvilSS (1456) Subscriber Badge on Saturday January 29 2022, @08:22PM (#1216769)
    OK, then put your ass where your mouth is, so to speak. Here is a google search of some DDOS IP stresser services. Go buy some time, point it at something (government website, corporate website, whatever), then, under your real name on social media, brag to the entity you pointed it at that you are the one doing it. If what you say is true, then you've done nothing illegal and no problem, right? So, how confident are you in what you are spouting? https://www.google.com/search?q=ip+stresser [google.com]
    Starting Score:    1  point
    Moderation   +1  
       Touché=1, Total=1
    Extra 'Touché' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 2) by darkfeline on Sunday January 30 2022, @10:19AM

    by darkfeline (1030) on Sunday January 30 2022, @10:19AM (#1216923) Homepage

    Just because something is legal doesn't mean someone would be willing to do it to prove it is legal. Walking in a sketchy neighborhood at night is legal, but I wouldn't do it.

    --
    Join the SDF Public Access UNIX System today!