{"id":18906,"date":"2022-04-30T10:45:16","date_gmt":"2022-04-30T18:45:16","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/04\/30\/news-12639\/"},"modified":"2022-04-30T10:45:16","modified_gmt":"2022-04-30T18:45:16","slug":"news-12639","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/04\/30\/news-12639\/","title":{"rendered":"One of the Most Powerful DDoS Attacks Ever Hits a Crypto Platform"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/626c1e5a9dd12de412826781\/master\/pass\/DDoS-Cryptocurrency-Platform-Security-163816698.jpg\"\/><\/p>\n<p><strong>Credit to Author: Dan Goodin, Ars Technica| Date: Sat, 30 Apr 2022 13:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/dan-goodin-ars-technica\">Dan Goodin, Ars Technica<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">A cryptocurrency platform<\/span> was recently on the receiving end of one of the biggest distributed denial of service attacks ever recorded, after threat actors bombarded it with 15.3 million requests, the content-delivery network <a href=\"https:\/\/www.wired.com\/tag\/cloudflare\/\">Cloudflare<\/a> said.<\/p>\n<p class=\"paywall\">This story originally appeared on <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2022\/04\/one-of-the-most-powerful-ddoses-ever-targets-cryptocurrency-platform\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2022\/04\/one-of-the-most-powerful-ddoses-ever-targets-cryptocurrency-platform\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/04\/one-of-the-most-powerful-ddoses-ever-targets-cryptocurrency-platform\/\" rel=\"nofollow noopener\" target=\"_blank\">Ars Technica<\/a>, a trusted source for technology news, tech policy analysis, reviews, and more. Ars is owned by WIRED&#x27;s parent company, Cond\u00e9 Nast.<\/p>\n<p class=\"paywall\"><a href=\"https:\/\/www.wired.com\/tag\/ddos\/\">DDoS attacks<\/a> can be measured in several ways, including by the volume of data, the number of packets, or the number of requests sent each second. The current records are <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2022\/01\/microsoft-fends-off-record-breaking-3-47-tbps-ddos-attack\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2022\/01\/microsoft-fends-off-record-breaking-3-47-tbps-ddos-attack\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/01\/microsoft-fends-off-record-breaking-3-47-tbps-ddos-attack\/\" rel=\"nofollow noopener\" target=\"_blank\">3.4 terabits per second<\/a> for volumetric DDoS&#x27;s\u2014which attempt to consume all bandwidth available to the target\u2014and <a data-offer-url=\"https:\/\/blogs.akamai.com\/2020\/06\/largest-ever-recorded-packet-per-secondbased-ddos-attack-mitigated-by-akamai.html\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/blogs.akamai.com\/2020\/06\/largest-ever-recorded-packet-per-secondbased-ddos-attack-mitigated-by-akamai.html&quot;}\" href=\"https:\/\/blogs.akamai.com\/2020\/06\/largest-ever-recorded-packet-per-secondbased-ddos-attack-mitigated-by-akamai.html\" rel=\"nofollow noopener\" target=\"_blank\">809 million packets per second<\/a>, and <a data-offer-url=\"https:\/\/blog.cloudflare.com\/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/blog.cloudflare.com\/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported\/&quot;}\" href=\"https:\/\/blog.cloudflare.com\/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported\/\" rel=\"nofollow noopener\" target=\"_blank\">17.2 million requests per second<\/a>. The latter two records measure the power of application-layer attacks, which attempt to exhaust the computing resources of a target\u2019s infrastructure.<\/p>\n<p class=\"paywall\">Cloudflare&#x27;s recent DDoS mitigation peaked at 15.3 million requests per second. While short of the record, the attack may have been more powerful, because it was delivered through HTTPS requests rather than the HTTP requests used in the record. Because HTTPS requests are much more compute-intensive, this new attack had the potential to put much more strain on the target.<\/p>\n<p class=\"paywall\">The resources required to deliver the HTTPS request flood were also greater, indicating that DDoSers are growing increasingly powerful. Cloudflare said that the <a href=\"https:\/\/www.wired.com\/tag\/botnets\/\">botnet<\/a> responsible, comprising about 6,000 bots, has delivered payloads as high as 10 million requests per second. The attack originated from 112 countries, with about 15 percent of the firepower from Indonesia, followed by Russia, Brazil, India, Colombia, and the United States.<\/p>\n<p class=\"paywall\">\u201cWithin those countries, the attack originated from over 1,300 different networks,\u201d Cloudflare researchers Omer Yoachimik and Julien Desgats <a data-offer-url=\"https:\/\/blog.cloudflare.com\/15m-rps-ddos-attack\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/blog.cloudflare.com\/15m-rps-ddos-attack\/&quot;}\" href=\"https:\/\/blog.cloudflare.com\/15m-rps-ddos-attack\/\" rel=\"nofollow noopener\" target=\"_blank\">wrote<\/a>. They said that the flood of traffic mainly came from data centers, as DDoSers move away from residential network ISPs to cloud computing ISPs. Top data center networks involved included the German provider Hetzner Online (Autonomous System Number 24940), Azteca Comunicaciones Colombia (ASN 262186), and OVH in France (ASN 16276). Other sources included home and small office routers.<\/p>\n<p class=\"paywall\">\u201cIn this case, the attacker was using compromised servers on cloud hosting providers, some of which appear to be running Java-based applications. This is notable because of the recent discovery of a vulnerability (<a data-offer-url=\"https:\/\/neilmadden.blog\/2022\/04\/19\/psychic-signatures-in-java\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/neilmadden.blog\/2022\/04\/19\/psychic-signatures-in-java\/&quot;}\" href=\"https:\/\/neilmadden.blog\/2022\/04\/19\/psychic-signatures-in-java\/\" rel=\"nofollow noopener\" target=\"_blank\">CVE-2022-21449<\/a>) that can be used for authentication bypass in a wide range of Java-based applications,\u201d Patrick Donahue, Cloudflare&#x27;s VP of product, wrote in an email. \u201cWe also saw a significant number of MikroTik routers used in the attack, likely exploiting the same vulnerability that <a data-offer-url=\"https:\/\/blog.cloudflare.com\/meris-botnet\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/blog.cloudflare.com\/meris-botnet\/&quot;}\" href=\"https:\/\/blog.cloudflare.com\/meris-botnet\/\" rel=\"nofollow noopener\" target=\"_blank\">the Meris botnet did<\/a>.\u201d<\/p>\n<p class=\"paywall\">The attack lasted about 15 seconds. Cloudflare mitigated it using systems in its network of data centers that automatically detect traffic spikes and quickly filter out the sources. Cloudflare didn\u2019t identify the target except to say that it operated a crypto launchpad, a platform used to help fund decentralized finance projects.<\/p>\n<p class=\"paywall\">The numbers underscore the arms race between attackers and defenders as each attempts to outdo the other. It won\u2019t be surprising if a new record is set in the coming months.<\/p>\n<p class=\"paywall\"><em>This story originally appeared on<\/em> <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2022\/04\/one-of-the-most-powerful-ddoses-ever-targets-cryptocurrency-platform\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2022\/04\/one-of-the-most-powerful-ddoses-ever-targets-cryptocurrency-platform\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/04\/one-of-the-most-powerful-ddoses-ever-targets-cryptocurrency-platform\/\" rel=\"nofollow noopener\" target=\"_blank\"><em>Ars Technica<\/em><\/a><em>.<\/em><\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/ddos-attack-botnet-crypto-platform\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/626c1e5a9dd12de412826781\/master\/pass\/DDoS-Cryptocurrency-Platform-Security-163816698.jpg\"\/><\/p>\n<p><strong>Credit to Author: Dan Goodin, Ars Technica| Date: Sat, 30 Apr 2022 13:00:00 +0000<\/strong><\/p>\n<p>The onslaught was delivered through HTTPS, which puts more strain on a target, and it suggests that attackers are getting more powerful.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-18906","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18906"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18906\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18906"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18906"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}