Huge DDoS Attack Launched Against Cloudflare in Late June

The 754 million packets-per-second peak was part of a four-day attack involving more than 316,000 sending addresses.

Dark Reading Staff, Dark Reading

July 10, 2020

1 Min Read
Dark Reading logo in a gray background | Dark Reading

Cloudflare revealed this week that on June 21 it detected and mitigated a packet-based volumetric DDoS attack that peaked at 754 million packets-per-second. According to researchers, that peak was part of a four-day attack from June 18-21 that saw traffic from more than 316,000 different IP addresses directed at a single Cloudflare address.

In a blog post, Cloudflare researchers reported that the attack used a combination of three TCP attack vectors: SYN floods, ACK floods, and SYN-ACK floods. Over the four-day period, the attack sustained rates exceeding 400-to 600 million packets-per-second for hours at a time, and peaked above 700 million packets-per-second multiple times.

The packet-based attack attempted to overwhelm Cloudflare's routers and data center appliances rather than flood the in-bound data connections. The company says that these huge attacks persist despite a general decrease in the size and duration of DDoS attacks during the last year.

For more, read here.

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights