Skip to main content

Hackers used 30,000 computers for record-breaking DDoS attack

Hackers launched a record-breaking distributed denial of service (DDoS) attack over the weekend, employing a network of botnets to make requests from over 30,000 IP addresses.

While that isn’t a big network of computers, the onslaught was able to exceed 71 million requests per second (rps), surpassing the previous record of 46 million rps set in June 2022 by 35%. This is what’s known as a volumetric attack that consumes the target website’s bandwidth by sending large amounts of data from multiple sources at once.

Recommended Videos

Last year’s DDoS attack persisted for over an hour, and Google Cloud Armor identified more than 5,000 IP addresses from 132 countries. The attack reported by CloudFlare was similar in that a small number of IP addresses pushed a massive number of requests to servers ranging from 50 million to 71 million rps.

An illustration of a grid of devices with one in red, infected device highlighted.
Image used with permission by copyright holder

The targets of the attacks were not named but generally identified as popular gaming, cryptocurrency, hosting, and cloud computing websites. CloudFlare notes that DDoS attacks are relatively inexpensive and easy to arrange, with DDoS-as-a-service platforms priced as low as $30 per month.

Please enable Javascript to view this content

With readily available hacking services becoming cheap and accessible, the pressure is on to meet this challenge with stronger protections. HTTP DDoS attacks have increased by 79% year-over-year and volumetric attacks such as the recent record-setting barrage has grown by 67% in the last quarter.

Massive content delivery networks like CloudFlare are well aware of the issue and are constantly on guard to keep major websites running and critical infrastructure safe. As hacking efforts ramp up, protecting the internet will become more difficult.

As consumers, there is something that we can do to help prevent this problem. By keeping your computer’s operating system updated, as well as being wary of shady websites and cracked software, you can reduce the likelihood of getting a computer virus that might add your computer to a botnet.

Alan Truly
Alan Truly is a Writer at Digital Trends, covering computers, laptops, hardware, software, and accessories that stand out as…
Microsoft stopped the largest DDoS attack ever reported
Nvidia T4 Enterprise Server Wall

Distributed Denial-of-Service (DDoS) attacks have become more common, and Microsoft recently published a blog post looking into the trends for such attacks on its own servers. In that post, the company says that, at one point, it stopped one of the largest-ever-recorded DDoS attacks on a Microsoft Azure server in Asia.

According to Microsoft's data, in November, an unnamed Azure customer in Asia was targeted with a DDoS attack with a throughput of 3.47 Tbps and a packet rate of 340 million packets per second (pps.) The attack came from 10,000 sources from multiple countries across the globe, including China, South Korea, Russia, Iran, and Taiwan. The attack itself lasted 15 minutes. Yet it is not the first one of such scale, as there were two additional attacks, one of 3.25 Tbps and another of 2.55 Tbps in December in Asia.

Read more
Cloudflare reports a massive 175% increase in DDoS attacks
Person using laptop with security graphics in front.

Cloudflare, a web infrastructure and security company, has just released a report titled "DDoS Attack Trends for Q4 2021." According to Cloudflare, 2021 has been a particularly bad year in terms of DDoS attacks.

Ransom distributed denial of service (DDoS) attacks increased by over 175 percent quarter over quarter, highlighting the large scale of the problem described by Cloudflare.

Read more
OpenAI opens up developer access to the full o1 reasoning model
The openAI o1 logo

On the ninth day of OpenAI's holiday press blitz, the company announced that it is releasing the full version of its o1 reasoning model to select developers through the company's API. Until Tuesday's news, devs could only access the less-capable o1-preview model.

According to the company, the full o1 model will begin rolling out to folks in OpenAI's "Tier 5" developer category. Those are users that have had an account for more than a month and who spend at least $1,000 with the company. The new service is especially pricey for users (on account of the added compute resources o1 requires), costing $15 for every (roughly) 750,000 words analyzed and $60 for every (roughly) 750,000 words generated by the model. That's three to four times the cost of performing the same tasks with GPT-4o.

Read more