You can Follow Us on Google News | Telegram | WhatsApp Channel

World largest DDos attack of 400Gbps hit to Cloudfare Europe Server

World largest DDos attack of 400Gbps hit to Cloudfare Europe Server, biggest DDos attack, ddos the server, taking down the server hot, attacking the host machine, 400Gbps of DDos, largest Ddos attack, Internet broke down, Attack cloudfare, hacking cloudfare, attacks on cloudfare
This is another big piece of news to the cyber world that, the DDos attack the most common and popular attack used by hackers to shut down the service of a host connected to the Internet has reached a higher attacking speed by breaking the earlier biggest DDos attack of 300 Gbps that was recorded in the Spamhaus DDoS attack, which almost the broke the internet.

To boost the attacking speed of Distributed Denial of Service attack (DDos) sizes hackers use new tricks called "Amplification Attacks" which were named in 2013 over last year's biggest DDoS attack of 300Gbps.

Yesterday, hacker have succeeded in achieving the highest peak of DDos attacking speed of more than 400Gbps by applying the same method targeting the content-delivery and anti-DDoS protection firm Cloudflare data-server of Europe. Amplification attacks provide the benefit of obscuring the source of the attack while enabling the bandwidth to be used to multiply the size of the attack.

Cloudflare CEO Matthew Price says that,
“Very big NTP reflection attack hitting us right now. Appears to be bigger than the #Spamhaus attack from last year. Mitigating,”
“Someone’s got a big, new cannon. Start of ugly things to come,”
  The attacker found a vulnerability in one of the protocols of cloud Network Time Protocol (NTP) which synchronize computer clocks. Hackers have leveraged the NTP servers by sending small spoofed 8-byte UDP packets to the vulnerable server that requests a large amount of data to be sent to the DDoS's target IP Address.

The company says that all the versions of the ntpd before 4.2.7 are vulnerable and are recommended to upgrade it to the latest version. It also mentions that, Until all the misconfigured NTP servers are cleaned up, attacks of this nature will continue.
You May Also Like This

Join the conversation