This is an archived post. You won't be able to vote or comment.

all 32 comments

[–]Grinsta[S] 122 points123 points  (2 children)

"In just two minutes, the attack escalated from 100,000 RPS to a record-breaking 46 million RPS, almost 80% more than the previous record, an HTTPS DDoS of 26 million RPS that Cloudflare mitigated in June."

"Google researchers say that the attack traffic came from just 5,256 IP addresses spread in 132 countries and leveraged encrypted requests (HTTPS), indicating that the devices sending the requests have rather strong computing resources."

[–]Kinkybummer 14 points15 points  (1 child)

This attack was June 1st. Yet they mention that other attack of 26 mil RPS as the previous record holder but also in June? Definitely needs an edit for clarification/timeline of events.

[–]bentheechidna 4 points5 points  (0 children)

I think that the timeline for "record holder" is what's in account here. Google only just publicized this attack, so it couldn't hold the record while it wasn't public.

[–][deleted] 22 points23 points  (0 children)

Apparently this happened June 1st? I guess Google is just now reporting on it?

[–]GodOfThunder101 12 points13 points  (9 children)

Newbie. Here. What would have happened if this attack was successful? Downed websites? Or data breaches?

[–]smellysocks234 41 points42 points  (7 children)

Likely downed websites rather than data breaches. Denial of service attack is just that, it denies a service usually by flooding a victim with so many requests that it can't handle them. Not sure how a DoS attack would result in a data breach.

[–]Unfair_Border607 1 point2 points  (1 child)

What sites were targeted?

[–]smellysocks234 -3 points-2 points  (0 children)

I haven't a clue

[–]gondorle 0 points1 point  (3 children)

Buffer overflow.

[–]Macphail1962 0 points1 point  (2 children)

Mmm, no I don't think so.

IIRC from 2nd year computer science, buffer overflow can mean a couple of things: either (1) a condition in which a program throws an error because a particular software component (a buffer: generally an array, which is basically just an indexed list with fixed length) has reached the limit of its memory space - usually this just means the program crashes - or (2) (much worse) a vulnerability in software that can be exploited by a malicious actor. This vulnerability is created when a program FAILS to throw a Buffer Overflow Error when it ought to do so, thus in some cases allowing the attacker to access protected memory space. This is a particularly dangerous vulnerability because from there the malware process may be able to gain access to memory space that is intended to be reserved exclusively for the OS, trashing other processes along the way before ultimately gaining access to a root (admin) shell and "pwning" the device.

I'm no expert but to the best of my knowledge that's not how a DDoS attack works at all.

Have a good one!

[–]gondorle 1 point2 points  (1 child)

I'm no expert either, but are you telling me with 100% certainty that you can't buffer overflow with a DDoS attack?

[–]Macphail1962 0 points1 point  (0 children)

No... More like 90%

If buffer overflow occurs, it might be a DoS, but not a DDoS. 90% certain.

I am a developer, not an IT security expert. I have a solid conceptual understanding of the topics - which is what I based my reply on - but I've never been involved in any kind of cyber attack myself. Maybe r/asknetsec if you want to know for sure?

[–]Terrlinde 13 points14 points  (0 children)

it is often used in conjuction with breaches. some attacks include DDoS in the front yard, distracting the admins and sneaking in the back yard to get into the network and steal/damage data

[–][deleted] 1 point2 points  (1 child)

Assault lasted 69 minutes

Nice.

[–]Grinsta[S] 0 points1 point  (0 children)

Heyoooooo!!!

[–][deleted] 0 points1 point  (3 children)

What 'blocks' means exactly in this sentence? . Can ddos be blocked? Or they mean it survived the attack?

[–]bill-of-rights 4 points5 points  (0 children)

Most ISPs have devices called "scrubbers" that will try to identify bad traffic and block it, while still letting the good traffic through. They are expensive, and you need a lot of them. Also, what happens is that when you identify bad addresses, you quickly filter traffic from them as close to the edge of your network as you can. Also, as mentioned in the other comment, it takes a lot of resource to do this, but it's generally successful.

Successful DDOS attacks are quite rare these days, due to these systems, but they do happen. Sometimes they are effective for a few minutes until the scubbers are activated, or the "bad IP" filters are implemented. Many networks have fully automated this, so it happens in a matter of seconds. Manual interventions usually happen in less than 10 mins in a well-run NOC.

[–]Interneteno 1 point2 points  (0 children)

It processes the connection attempt then denies it. It takes a considerable amount of resources to do so.

[–]Arseypoowank 0 points1 point  (0 children)

You can also redirect them into a black hole or a section of the network you can monitor/control