Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cloudflare Confirms Recent 1.1.1.1 DNS Outage Caused by BGP Attack or Hijack

Posted on July 17, 2025July 17, 2025 By CWS

Cloudflare’s extensively used 1.1.1.1 DNS resolver service skilled a big 62-minute world outage on July 14, 2025, affecting tens of millions of customers worldwide from 21:52 UTC to 22:54 UTC. 

Opposite to preliminary hypothesis, the corporate has confirmed that the outage was brought on by an inner configuration error reasonably than a BGP assault, although a coincidental BGP hijack by Tata Communications India (AS4755) was noticed throughout the incident.

Key Takeaways1. Cloudflare’s DNS service skilled a 62-minute world outage on July 14, 2025, impacting tens of millions of customers.2. The outage was brought on by a misconfigured system replace from June 6, not a BGP assault.3. Service was restored by reverting configurations; Cloudflare will improve legacy programs to stop recurrence.

Cloudflare Latest 1.1.1.1 Outage

The basis explanation for the outage was traced again to a configuration change made on June 6, 2025, throughout preparations for a Information Localization Suite (DLS) service. 

Throughout this launch, prefixes related to the 1.1.1.1 Resolver service had been inadvertently included alongside prefixes supposed for the brand new DLS service. 

This misconfiguration remained dormant within the manufacturing community till July 14, when a second configuration change was made to connect a take a look at location to the non-production service, triggering a worldwide refresh of community configuration.

The error prompted the 1.1.1.1 Resolver prefixes to be withdrawn from manufacturing Cloudflare information facilities globally, successfully making the service unreachable. 

The affected IP ranges included essential addresses reminiscent of 1.1.1.0/24, 1.0.0.0/24, 2606:4700:4700::/48, and several other different IPv4 and IPv6 prefixes. 

Affected IP addresses

DNS visitors over UDP, TCP, and DNS over TLS (DoT) dropped instantly, whereas DNS-over-HTTPS (DoH) visitors remained comparatively secure because it makes use of the area cloudflare-dns.com reasonably than IP addresses.

Coincidental BGP Hijack

Throughout the outage investigation, Cloudflare found that Tata Communications India (AS4755) had began promoting the 1.1.1.0/24 prefix, creating what seemed to be a BGP hijack state of affairs. 

Timeline for BGP withdrawal and re-announcement of 1.1.1.0/24 globally

Nonetheless, firm engineers emphasised that this hijack was not the reason for the outage however reasonably an unrelated problem that turned seen when Cloudflare withdrew its routes. 

The BGP hijack occurred at 21:54 UTC, two minutes after the DNS visitors started dropping globally.

This incident highlighted the complexity of managing anycast routing, the tactic Cloudflare makes use of to distribute visitors throughout a number of world places for improved efficiency and capability. 

When issues happen with tackle area ads, they may end up in world outages affecting all customers concurrently.

Prevention Measures

Cloudflare initiated a revert to the earlier configuration at 22:20 UTC, which restored visitors ranges to roughly 77% of regular capability. 

Visitors Restoration

The remaining 23% of edge servers required reconfiguration by means of the corporate’s change administration system, which was accelerated given the incident’s severity. 22:54 UTC achieved full service restoration.

To forestall related incidents, Cloudflare introduced plans to deprecate legacy programs that lack progressive deployment methodologies and implement staged addressing deployments with well being monitoring capabilities.

Examine stay malware conduct, hint each step of an assault, and make sooner, smarter safety selections -> Attempt ANY.RUN now 

Cyber Security News Tags:1.1.1.1, Attack, BGP, Caused, Cloudflare, Confirms, DNS, Hijack, Outage

Post navigation

Previous Post: Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code
Next Post: Lenovo Vantage Vulnerabilities Allow Attackers to Escalate Privileges as SYSTEM User

Related Posts

FortiVoice 0-day Vulnerability Exploited in the Wild to Execute Arbitrary Code Cyber Security News
Zoomcar Hacked – 8.4 Million Users Sensitive Details Exposed Cyber Security News
New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting RDP Cyber Security News
Fortinet FortiWeb Fabric Connector Vulnerability Exploited to Execute Remote Code Cyber Security News
AI Crawlers Reshape The Internet With Over 30% of Global Web Traffic Cyber Security News
IT Giant Ingram Micro Restores Operations Following Ransomware Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier
  • Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
  • Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
  • H2Miner Attacking Linux, Windows, and Containers to Mine Monero
  • Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier
  • Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
  • Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
  • H2Miner Attacking Linux, Windows, and Containers to Mine Monero
  • Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News