Here are the top three biggest DDOS (Distributed Denial of Service) attacks that have occurred on worldwide computer systems and networks, as of March 24th, 2022.
The DDOS attacks are represented based on the following attributes: Rank, Attack, Time, Magnitude, Effects, Recovery Efforts, Mitigations.
Rank | Attack | Time | Magnitude | Effects | Recovery Efforts | Mitigations |
1 | Microsoft DDOS attack (January 2022) The attack type was a UDP reflection attack.The attacker uses a spoof source IP address to reflect UDP request and response packets in the local network.The attack came from 10,000 sources around the worldReference Index #12 | 10-15 Minutes | 3.47 Terabytes per second (Tbps) | No impact to any services | Successful mitigation performed by Microsoft Azure DDOS protection | Mitigation was successful by MicrosoftAzure DDOS Protection – Dynamically located mitigation resources to locations near the attackers. The attacks were mitigated in the source countries because Microsoft has the resources to do so. |
2 | Microsoft DDOS attack on Azure customers in AsiaThe attack took advantage of the UDP protocol on port 80 and port 443Reference Index #12 | 15 minutes | 3.25 Terabytes per second (Tbps) | No impact to any services | Successful mitigation performed by Microsoft Azure DDOS protection | Successful mitigation performed by Microsoft Azure DDOS protection Azure DDOS Protection – Dynamically located mitigation resources to locations near the attackers. The attacks were mitigated in the source countries because Microsoft has the resources to do so |
3 | Google DDOS Attack(September 2017)The attackers used multiple networks and used 180,000 CLDAP, DNS and SMTP servers to launch the attack and sent large requests to Google’s serversReference Index #13 | 6 months | 2.54 Terabytes per second (Tbps) | No impact to any services | Successful mitigation performed by the Google Security team | Successful mitigation performed by Google DDOS Protection Google uses Machine Learning technology to detect attacks that occur on their network. This technology can detect application layer activity by looking for abnormalities in the traffic.Reference Index #14 |
Sources:
Reference Index #12 https://www.zdnet.com/article/microsoft-heres-how-we-stopped-the-biggest-ever-ddos-attack/
Reference Index #13 https://www.pcmag.com/news/google-says-biggest-ddos-attack-on-record-hit-the-company-in-2017
Reference Index #14 https://www.zdnet.com/article/google-is-using-machine-learning-to-stop-ddos-attacks/
Reference Index #15 https://www.techtarget.com/searchsecurity/definition/distributed-denial-of-service-attack
To learn more about protecting your network and devices with cybersecurity prevention methods, email our sales team at sales@nickologic.com or give us a call at +1 (562) 592-1771