Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Record-Breaking 15 Tbps DDoS Attack From 500,000+ Devices Hits Azure Network

Record-Breaking 15 Tbps DDoS Attack From 500,000+ Devices Hits Azure Network

Posted on November 18, 2025November 18, 2025 By CWS

Microsoft Azure thwarted what would be the largest distributed denial-of-service (DDoS) assault ever recorded within the cloud on October 24. The assault peaked at 15.72 terabits per second (Tbps) and unleashed almost 3.64 billion packets per second (pps), focusing on a single endpoint in Australia.

Azure’s automated DDoS Safety service sprang into motion, filtering out the malicious flood and guaranteeing zero downtime for the affected buyer workloads.

The assault, which lasted a number of hours, originated with the infamous Aisuru botnet, a variant of the Turbo Mirai-class malware that has change into a staple within the DDoS arsenal.

Aisuru primarily infects weak Web of Issues (IoT) units, corresponding to residence routers and safety cameras, commandeering them into huge zombie armies.

On this case, the botnet mobilized over 500,000 distinctive supply IP addresses spanning residential web service suppliers (ISPs) throughout america and different areas.

The assaults consisted of high-rate Person Datagram Protocol (UDP) floods focusing on a particular public IP deal with, utilizing minimal supply IP spoofing and randomized ports to evade straightforward detection and traceback.

Azure’s response leveraged its globally distributed scrubbing facilities, which scrubbed site visitors in actual time and redirected clear packets to the sufferer. “Our steady monitoring and adaptive mitigation capabilities have been key to neutralizing this unprecedented quantity with out impacting service,” a Microsoft spokesperson acknowledged.

This Azure assault eclipses current record-breakers, highlighting a disturbing development. Simply final month, on September 15, 2025, Cloudflare reported mitigating a 22.5 Tbps assault, fueled by a Mirai spinoff infecting good residence units.

Earlier within the 12 months, in March 2025, Google Cloud defended towards a ten.2 Tbps multi-vector assault originating from Asia-Pacific botnets that mixed SYN floods and DNS amplification.

Going again to 2024, AWS documented an 8.9 Tbps strike on a U.S.-based e-commerce web site, traced to compromised routers in Japanese Europe.

As the vacation purchasing season ramps up, cybersecurity consultants urge organizations to bolster protections for internet-facing functions. “Don’t look ahead to an assault to check your resilience,” advises Sarah Lin, a menace analyst at a number one safety agency.

Common DDoS simulations can expose vulnerabilities in operational readiness, from site visitors routing to failover mechanisms. With botnets like Aisuru rising unchecked, proactive protection stays the one defend towards these digital sieges.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attack, Azure, DDoS, Devices, Hits, Network, RecordBreaking, Tbps

Post navigation

Previous Post: Threat Actors can Use Xanthorox AI Tool to Generate Different Malicious Code Based on Prompts
Next Post: Chrome Type Confusion Zero-Day Vulnerability Actively Exploited in the Wild

Related Posts

Threat Actors Weaponize LNK Files With New REMCOS Variant That Bypasses AV Engines Threat Actors Weaponize LNK Files With New REMCOS Variant That Bypasses AV Engines Cyber Security News
5,219 PLCs at Risk from Iranian Cyber Threats, Censys Reports 5,219 PLCs at Risk from Iranian Cyber Threats, Censys Reports Cyber Security News
Everest Hacking Group Allegedly Claims Breach of Nissan Motors Everest Hacking Group Allegedly Claims Breach of Nissan Motors Cyber Security News
NVIDIA Triton Vulnerability Chain Let Attackers Take Over AI Server Control NVIDIA Triton Vulnerability Chain Let Attackers Take Over AI Server Control Cyber Security News
FBI Shuts Down LeakBase Cybercrime Hub FBI Shuts Down LeakBase Cybercrime Hub Cyber Security News
Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks Stolen Credentials and Valid Account Abuse Fuel the Financially Motivated Attacks Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark