Skip to content

Top 3 Significantly Impacted DDOS Attacks

    Here are the top three biggest DDOS (Distributed Denial of Service) attacks that have occurred on worldwide computer systems and networks, as of March 24th, 2022.

    The DDOS attacks are represented based on the following attributes: Rank, Attack, Time, Magnitude, Effects, Recovery Efforts, Mitigations.

    RankAttackTimeMagnitudeEffectsRecovery EffortsMitigations
    1Microsoft DDOS attack (January 2022) The attack type was a UDP reflection attack.The attacker uses a spoof source IP address to reflect UDP request and response packets in the local network.The attack came from 10,000 sources around the worldReference Index #1210-15 Minutes3.47 Terabytes per second (Tbps)No impact to any servicesSuccessful mitigation performed by Microsoft Azure DDOS protection Mitigation was successful by MicrosoftAzure DDOS Protection – Dynamically located mitigation resources to locations near the attackers.  The attacks were mitigated in the source countries because Microsoft has the resources to do so. 
    2Microsoft DDOS attack on Azure customers in AsiaThe attack took advantage of the UDP protocol on port 80 and port 443Reference Index #1215 minutes3.25 Terabytes per second (Tbps) No impact to any servicesSuccessful mitigation performed by Microsoft Azure DDOS protection Successful mitigation performed by Microsoft Azure DDOS protection   Azure DDOS Protection – Dynamically located mitigation resources to locations near the attackers.  The attacks were mitigated in the source countries because Microsoft has the resources to do so
    3Google DDOS Attack(September 2017)The attackers used multiple networks and used 180,000 CLDAP, DNS and SMTP servers to launch the attack and sent large requests to Google’s serversReference Index #136 months2.54 Terabytes per second (Tbps)No impact to any servicesSuccessful mitigation performed by the Google Security team Successful mitigation performed by Google DDOS Protection Google uses Machine Learning technology to detect attacks that occur on their network.  This technology can detect application layer activity by looking for abnormalities in the traffic.Reference Index #14

    Sources:

    Reference Index #12 https://www.zdnet.com/article/microsoft-heres-how-we-stopped-the-biggest-ever-ddos-attack/

    Reference Index #13  https://www.pcmag.com/news/google-says-biggest-ddos-attack-on-record-hit-the-company-in-2017

    Reference Index #14 https://www.zdnet.com/article/google-is-using-machine-learning-to-stop-ddos-attacks/

    Reference Index #15 https://www.techtarget.com/searchsecurity/definition/distributed-denial-of-service-attack

    To learn more about protecting your network and devices with cybersecurity prevention methods, email our sales team at sales@nickologic.com or give us a call at +1 (562) 592-1771