Skip to main content

Akamai foils massive DDoS attack in Asia that reached 900Gbps

Akamai has just mitigated a distributed denial of service (DDoS) attack of epic proportions. While it was short-lived, it was very intense, and it most likely could have easily taken the target server offline.

It was the largest-ever DDoS attack launched against a target in the Asia-Pacific region. Despite the scale of the attack, Akamai was able to block it entirely.

An Illustration shows a programmer busy with a laptop and several monitors.
Image used with permission by copyright holder

A DDoS attack consists of hundreds, if not thousands of computers that are used to send fake requests to the target server. When such a large volume of requests hits the server out of nowhere, the websites or applications affected are usually taken offline as a result. Even if they remain online, they’re likely to be very slow to respond. The scale of the problem depends on the size of the attack. Just recently, a massive volumetric attack took place, involving over 30,000 computers.

Recommended Videos

This time, we don’t know how many different IP addresses were used to overwhelm the target server, but we do know that the number of requests per second was record-breaking. According to Bleeping Computer, this was the largest such DDoS attack made against a customer based in the Asia-Pacific region.

Please enable Javascript to view this content

The attack took place on February 23, 2023. It peaked at a massive 900.1Gbps (gigabits per second) and 158.2Mpps (million packets per second). The peak only lasted for about a minute and the whole duration seems to have been around an hour.

Akamai reports that it was able to mitigate the attack completely. Its customer wasn’t impacted at all. To block the attack, Akamai used a scrubbing network, which is a protective network that takes over the incoming traffic in order to defend the target of a DDoS attack. The majority of the traffic ended up in Akamai’s centers located in Tokyo, Osaka, Hong Kong, Singapore, and São Paulo. Ultimately, Akamai used all of its 26 centers to block this unprecedented attack.

While this was the largest attack on a target in the APAC region, there have been plenty of other DDoS attempts that were successfully mitigated in recent months. Akamai itself managed to stop a massive attack on a target in Eastern Europe that reached 659.6Mpps.

Monica J. White
Monica is a computing writer at Digital Trends, focusing on PC hardware. Since joining the team in 2021, Monica has written…
Microsoft stopped the largest DDoS attack ever reported
Nvidia T4 Enterprise Server Wall

Distributed Denial-of-Service (DDoS) attacks have become more common, and Microsoft recently published a blog post looking into the trends for such attacks on its own servers. In that post, the company says that, at one point, it stopped one of the largest-ever-recorded DDoS attacks on a Microsoft Azure server in Asia.

According to Microsoft's data, in November, an unnamed Azure customer in Asia was targeted with a DDoS attack with a throughput of 3.47 Tbps and a packet rate of 340 million packets per second (pps.) The attack came from 10,000 sources from multiple countries across the globe, including China, South Korea, Russia, Iran, and Taiwan. The attack itself lasted 15 minutes. Yet it is not the first one of such scale, as there were two additional attacks, one of 3.25 Tbps and another of 2.55 Tbps in December in Asia.

Read more
Cloudflare reports a massive 175% increase in DDoS attacks
Person using laptop with security graphics in front.

Cloudflare, a web infrastructure and security company, has just released a report titled "DDoS Attack Trends for Q4 2021." According to Cloudflare, 2021 has been a particularly bad year in terms of DDoS attacks.

Ransom distributed denial of service (DDoS) attacks increased by over 175 percent quarter over quarter, highlighting the large scale of the problem described by Cloudflare.

Read more
Blizzard games hit with late-night DDoS attack
Genji slashes a robot in Overwatch 2.

Several Blizzard games suffered outages last night due to a distributed denial of service or DDoS attack. As reported by Dot Esports, players attempting to log in to Battle.net and play Overwatch, Hearthstone, and World of Warcraft were unable to find matches or connect with their friends. The attack was first reported around 10:15 PM EST last night as increased latency and connection issues in Overwatch, where some frustrated players were getting disconnected from competitive matches and suffering leaver penalties. Blizzard technical support officially declared the presence of a DDoS attack around 11 PM, and it lasted until about 3 AM this morning. It's not yet clear who was behind the attack.

After Overwatch players continued to disconnect from ranked matches, frustrated users poured into Blizzard's forums to complain about the issues. Queue times were extended, players were randomly disconnecting from matches, and few could log into Battle.net. I experienced this firsthand, as a friend and I tried to play Overwatch around 11 PM and were unable to see anyone on our Battle.net friends list or even get into a match.

Read more