DDoS Attacks Peaked at 800Gbps Targets Gambling and Video Games Industry

According to security services provider Akamai, Distributed Denial of Service (DDoS) attacks are growing bigger in volume, and they have also become more targeted and increasingly persistent.

Akamai observed the largest DDoS extortion campaign, which impacted thousands of companies globally. In 2021 alone, more attacks over 50 Gbps than in all of 2019. The attacks of this scale can take almost anyone offline.

The largest of these were 800+ Gbps assaults: one at 824 Gbps, the other at 812 Gbps, both during the same day, February 24. Akamai also observed a 594 Gbps attack on March 5.

Threat actors continue to Expand their Sights

The number of customer attacks per month has continued at near-record volume, and have continued to see diversification of attacks across geographies and industries.

A recent analysis showed a 57% increase in the number of different customers attacked year over year.

Top DDoS Gbps Recorded/Mitigated Attacks

The most recent extortion attack — peaking at more than 800 Gbps and targeting a European gambling company — was the biggest and most complex seen since the widespread return of extortion attacks that kicked off in mid-August 2020.

Since the start of the campaign, show-of-force attacks have grown from 200+ Gbps in August to 500+ Gbps by mid-September, then ballooned to 800+ Gbps by February 2021.

Likely DDoS extortion attacks. Bubble size = Mpps; color = extortion attack profile.

As reported by Akamai Security Intelligence Response Team’s threat advisory released March 23, 2021, the criminal actors used a previously unseen DDoS attack vector that leveraged a networking protocol known as protocol 33, or Datagram Congestion Control Protocol (DCCP).

This attack is akin to a SYN flood in DCCP, but in this case, is volumetric. Threat actors abuse protocol 33 in an attempt to bypass defenses focused on traditional Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) traffic flows.

The new DCCP DDoS attack vector is just the latest example of protocol abuse discoveries made by the Akamai SIRT.

The 2021 DDoS campaigns have become more targeted and much more persistent. The attackers were persistently looking for weaknesses in defenses to exploit, as well as trying different attack vector combinations. In one attack, the threat actors targeted nearly a dozen IPs and rotated through multiple DDoS attack vectors trying to increase the likelihood of disrupting the back-end environments.

DDoS attack Forecast Continues to Anticipate Attack Growth on Four Fronts:

  • Number of DDoS attacks
  • Number of large DDoS attacks (> 50 Gbps)
  • Number of industries targeted with DDoS
  • Number of organizations targeted with DDoS

Gurubaran is a Security Consultant, Security Editor & Co-Founder of Cyber Security News & GBHackers On Security.

Recent Posts

SSNDOB Marketplace Admin Jailed for Selling millions of Americans Data

In a resounding triumph for justice, U.S. District Judge Kathryn Kimball Mizelle has sentenced Vitalii…

51 mins ago

Is Your Online Store Hacked in a Carding Attack? Here’s an Action Plan to Protect

Hackers are plotting to benefit from the generosity of Halloween, Thanksgiving, and Christmas shoppers using…

4 hours ago

Google Researchers Find Out How ChatGPT Queries Can Collect Personal Data

The LLMs (Large Language Models) are evolving rapidly with continuous advancements in their research and…

5 hours ago

New Android Malware Employs Various Tactics to Deceive Malware Analyst

In the dynamic realm of mobile application security, cybercriminals employ ever more sophisticated forms of…

6 hours ago

DJvu Ransomware Mimic as Cracked Software to Compromise Computers

A recent campaign has been observed to be delivering DJvu ransomware through a loader that…

7 hours ago

Okta Hack: Threat Actors Downloaded all Customer Support System Users’ Data

In a pivotal update to the Okta security incident divulged in October 2023, Okta Security…

8 hours ago