Microsoft Azure customer hit by 2.4 Tbps DDoS attack

Microsoft has confirmed to mitigate a massive originated from a botnet comprising 70,000 compromised IoT devices.

Microsoft reported that an unnamed customer of its platform was targeted with a 2.4 Tbps DDoS attack in the last week of August, which the company mitigated.

This attack was around 140% higher than the attack recorded in 2020 as it surpassed the 2.3 Tbps attack detected and stopped by Web Services () back in Feb 2020.

About Reflection Amplification Attack

The senior program manager for Azure Networking, Amir Dahan, called its UDP reflection for around ten minutes. “This is 140 percent higher than 2020’s 1 Tbps attack and higher than any network volumetric event previously detected on Azure,” Dahan noted.

SEE: Yandex hit by largest DDoS attack involving 200,000 hacked devices

Reflected Amplification attacks are also a type of denial of service (DoS) attacks. An attacker exploits the connectionless property of UDP protocol with fake requests to overwhelm a targeted network/server with a flood of pockets. This disrupts the network’s activities or renders the server unavailable.

Attack’s Origin and Details

The recent DDoS attack against an Azure customer originated from a botnet comprising at

Read More: https://www.hackread.com/microsoft-azure-customer-2-4-tbps-ddos-attack/