Articles tagged "DDoS"

Found 33 articles

13.5M Device Botnet Drives 2 Tbps DDoS Attacks on FinTech, Qrator Finds

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A recent report from Qrator Labs indicates that the largest known DDoS botnet has expanded to encompass 13.5 million devices. This massive botnet is capable of launching Distributed Denial of Service (DDoS) attacks reaching up to 2 terabits per second. The primary target of these attacks has been the financial technology sector, raising concerns for companies in that space. With such a vast number of devices potentially under the control of attackers, the threat to both service availability and data security is significant. Companies in the FinTech sector, as well as other industries relying on online services, need to bolster their defenses to mitigate the risks associated with these powerful DDoS attacks.

Impact: FinTech companies and online services reliant on uninterrupted access.
Remediation: Companies should implement advanced DDoS protection measures and traffic filtering solutions.
Read Original
Alleged German DDoS-for-Hire Kingpin Behind Fluxstress Caught in Thailand

Hackread – Cybersecurity News, Data Breaches, AI and More

A German national, suspected of being a key figure in the DDoS-for-hire scene, was arrested in Thailand. This individual is believed to be the mastermind behind services like Fluxstress and Neldowner, which have been used to launch distributed denial-of-service (DDoS) attacks globally. His arrest marks a significant step in combating online cybercrime, particularly as DDoS attacks continue to disrupt businesses and services across various sectors. The operation he led allowed users to pay for attacks that could overwhelm targets, causing significant downtime and financial losses. His capture may deter others from engaging in similar illegal activities and could lead to further investigations into the networks supporting these services.

Impact: N/A
Remediation: N/A
Read Original

The Masjesu botnet, also referred to as XorBot, has emerged as a stealthy DDoS-for-hire service that primarily targets Internet of Things (IoT) devices. Unlike many other botnets, Masjesu avoids high-profile targets, such as Department of Defense IP addresses, opting instead for less conspicuous victims. This botnet employs XOR encryption to maintain low visibility and ensure its persistence within compromised systems. As the use of IoT devices continues to rise, the potential for such botnets to disrupt services and cause damage increases, making it crucial for users and organizations to secure their devices against such threats. The activity of Masjesu raises concerns about the growing sophistication of DDoS services that are accessible for hire, which can have widespread implications for network stability and security.

Impact: IoT devices, specifically those vulnerable to DDoS attacks
Remediation: Users should regularly update their IoT devices, change default passwords, and implement network security measures to protect against unauthorized access.
Read Original

Rostelecom, a major state-run telecommunications company in Russia, reported a significant distributed denial-of-service (DDoS) attack on Monday. This incident disrupted internet access, government services, and online banking for users in 30 cities across the country. The attackers behind the DDoS attack have not yet been identified. This incident is concerning as it affects essential services, highlighting vulnerabilities in critical infrastructure that could have broader implications for national security and public safety. The scale of the attack raises questions about the resilience of state-run systems against cyber threats.

Impact: Internet access, government services, online banking in 30 cities across Russia.
Remediation: N/A
Read Original

The U.S. Justice Department, in collaboration with international law enforcement agencies, has successfully disrupted four Internet of Things (IoT) botnets responsible for massive distributed denial-of-service (DDoS) attacks. These attacks peaked at an astonishing 30 terabits per second, marking them as some of the largest ever recorded. The coordinated effort involved shutting down the infrastructure that allowed these botnets to operate, which had been harnessing compromised IoT devices to flood networks with traffic. This disruption is significant as it not only diminishes the threat of future attacks from these specific botnets but also sends a strong message about the vulnerabilities present in IoT devices. Users and manufacturers alike are reminded of the importance of securing their devices against potential exploitation.

Impact: IoT devices, including smart home appliances and security cameras
Remediation: Users should secure their IoT devices by changing default passwords, keeping firmware updated, and disabling unnecessary features.
Read Original

Akamai's latest security report reveals that internet-facing systems are facing increasing levels of malicious traffic, particularly targeting APIs, web applications, and DDoS channels. From January 2024 to December 2025, the number of web attacks aimed at applications and APIs has steadily risen, indicating a growing threat to organizations that rely on these technologies. This uptick in malicious activity suggests that attackers are honing their skills and strategies, making it crucial for companies to enhance their security measures. As APIs become more integral to business operations, understanding and mitigating these risks is essential for protecting sensitive data and maintaining service availability. Organizations should prioritize monitoring and defending their API infrastructures to counter these persistent threats.

Impact: APIs, web applications
Remediation: Organizations should enhance security measures for APIs and web applications, including monitoring traffic and implementing robust security protocols.
Read Original

Security researchers have identified two new malware strains specifically targeting Linux-based network devices. These malicious programs are being used by financially motivated cybercriminals, marking a shift from their previous association with nation-state espionage. The malware can facilitate distributed denial-of-service (DDoS) attacks and enable unauthorized cryptocurrency mining. This development is concerning as it indicates that attackers are now exploiting vulnerabilities that were once primarily used for geopolitical purposes. Organizations using Linux network devices need to be vigilant and enhance their security measures to protect against these evolving threats.

Impact: Linux-based network devices
Remediation: Organizations should enhance security measures on Linux network devices, including regular updates and monitoring for unusual activity.
Read Original

Akamai has issued a warning about a new wave of cyberattacks that combine Layer 7 DDoS attacks, API abuse, and AI-driven tactics. These coordinated assaults are becoming more sophisticated and are increasingly difficult for organizations to detect and defend against. The blending of these attack vectors means that traditional defenses may not be sufficient, putting many companies at risk. As attackers enhance their methods, it's crucial for businesses to stay informed and adapt their security strategies accordingly. This trend could affect a wide range of industries, making it essential for companies to prioritize their cybersecurity measures.

Impact: Layer 7 DDoS attacks, API services
Remediation: Companies should enhance their monitoring and detection capabilities, implement rate limiting for APIs, and regularly update their security protocols to address evolving threats.
Read Original

In November 2025, a massive DDoS attack reached a peak of 31.4 terabits per second, making it one of the largest ever recorded. The attack was executed by the AISURU/Kimwolf botnet and lasted for just 35 seconds. Fortunately, Cloudflare's security systems were able to automatically detect and block the attack before it could cause significant disruption. This incident is part of a worrying trend of increasingly powerful and brief DDoS attacks that can overwhelm even the most robust defenses. Organizations must remain vigilant as such attacks not only threaten individual services but also have the potential to disrupt broader internet infrastructure.

Impact: Cloudflare services, AISURU/Kimwolf botnet
Remediation: N/A
Read Original

The AISURU/Kimwolf botnet has launched a massive DDoS attack that peaked at an astonishing 31.4 Terabits per second, lasting just 35 seconds. This attack is part of a growing trend of extremely high-volume HTTP DDoS assaults that the botnet has been executing throughout the fourth quarter of 2025. Cloudflare, a cybersecurity company that monitors these incidents, successfully detected and mitigated the attack, preventing potential disruptions to online services. Such high-capacity attacks pose significant risks to internet infrastructure and can overwhelm even the most fortified systems, affecting businesses and users alike. As these types of attacks become more common, organizations need to bolster their defenses against DDoS threats.

Impact: Web services, online businesses, internet infrastructure
Remediation: Implement DDoS mitigation strategies, enhance network security measures, and utilize traffic filtering solutions.
Read Original

Italy's Foreign Minister Antonio Tajani announced that the country successfully thwarted a series of cyberattacks linked to a pro-Russian group known as Noname057(16). These attacks targeted various entities, including the Foreign Ministry offices, with one affecting operations in Washington, D.C. Additionally, the group aimed at disrupting websites and hotels associated with the upcoming Milano Cortina 2026 Winter Olympics. This incident highlights ongoing cybersecurity concerns related to geopolitical tensions, particularly as major international events approach. The Italian government’s proactive measures demonstrate the importance of safeguarding critical infrastructure and national security against external threats.

Impact: Websites and hotels related to the Milano Cortina 2026 Winter Olympics, Foreign Ministry offices in Italy and Washington, D.C.
Remediation: N/A
Read Original

Poland's Central Bureau for Combating Cybercrime has arrested a 20-year-old man believed to be behind a series of global DDoS attacks that targeted important websites. The suspect faces six charges, including disrupting IT systems and using specialized software to execute cyberattacks. He has reportedly confessed to many of the allegations against him. If found guilty, he could face up to five years in prison. This operation underscores the ongoing challenges of combating cybercrime, particularly as such attacks can significantly disrupt online services and affect many organizations worldwide.

Impact: High-profile websites, strategically important online services
Remediation: N/A
Read Original

A massive distributed denial-of-service (DDoS) attack has reached a staggering 31.4 terabits per second, setting new records for online attacks. This incident is attributed to a powerful botnet known as the 'apex' botnet, which has been exploiting consumer devices, such as routers and smart home gadgets, to amplify its attack capabilities. As attackers increasingly turn ordinary home devices into tools for cyber warfare, businesses and individuals alike are at risk of service disruptions. The scale of this attack serves as a wake-up call for users to secure their connected devices and for companies to enhance their defenses against such overwhelming assaults. The implications are serious, as these attacks can cripple online services and affect a vast number of users worldwide.

Impact: Consumer devices, routers, smart home gadgets
Remediation: Users should secure their devices by changing default passwords, updating firmware regularly, and disabling unnecessary services. Companies need to implement stronger network defenses and monitor traffic for unusual patterns.
Read Original

In December, Cloudflare successfully thwarted a massive distributed denial-of-service (DDoS) attack orchestrated by the Aisuru botnet. The attack peaked at a staggering 31.4 terabits per second, breaking Aisuru's previous record of 29.7 Tbps. Such high levels of attack traffic can overwhelm servers, disrupting services for many online users and businesses. While specific companies targeted in this incident haven't been disclosed, the scale of the attack raises concerns about the evolving capabilities of botnets and their potential to cause significant disruptions. This incident serves as a reminder for organizations to bolster their defenses against increasingly sophisticated DDoS attacks.

Impact: N/A
Remediation: Organizations should enhance their DDoS protection measures and consider using services like Cloudflare to mitigate the impact of such large-scale attacks.
Read Original

In December 2025, the Aisuru/Kimwolf botnet executed a record-breaking distributed denial of service (DDoS) attack, reaching a staggering peak of 31.4 terabits per second and generating 200 million requests per second. This incident marks one of the largest DDoS attacks recorded to date, raising concerns for internet stability and security. Organizations that rely on online services, including e-commerce and cloud providers, may experience significant disruptions. The attack showcases the growing capabilities of botnets and the need for enhanced defenses against such aggressive tactics. As attackers continue to evolve their methods, companies must prioritize their cybersecurity measures to mitigate the impact of similar threats in the future.

Impact: Internet service providers, e-commerce platforms, cloud services
Remediation: Organizations should implement DDoS mitigation strategies, including traffic filtering and rate limiting, to protect against future attacks.
Read Original
Page 1 of 3Next