Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Record Breaking 7.3 Tbps DDoS Attack Blasting 37.4 Terabytes in Just 45 Seconds

Posted on June 20, 2025June 21, 2025 By CWS

The most important distributed denial-of-service (DDoS) assault ever documented was efficiently stopped by Cloudflare in mid-Might 2025, with attackers unleashing a devastating 7.3 terabits per second (Tbps) assault that delivered 37.4 terabytes of malicious visitors in simply 45 seconds. 

Abstract
1. Cloudflare blocked a document 7.3 Tbps DDoS assault in mid-Might 2025, delivering 37.4 TB of malicious visitors in 45 seconds.
2. Concentrating on a internet hosting supplier utilizing Cloudflare’s Magic Transit, the assault surpassed the earlier document by 12%. 
3. It used subtle multi-vector strategies, primarily UDP floods (99.996%), with extra amplification assaults.
4. Zero-touch structure with anycast routing and gossip protocol shortly contained the assault, showcasing unparalleled scalability.

This unprecedented cyberattack focused a internet hosting supplier buyer utilizing Cloudflare’s Magic Transit service and represents a 12% enhance over the earlier document, demonstrating the escalating scale and class of recent DDoS campaigns.

Multi-vector DDoS Assault 

The large assault employed a multi-vector method, with 99.996% of the assault visitors consisting of UDP floods focusing on a mean of 21,925 vacation spot ports on a single IP deal with, peaking at 34,517 ports per second. 

The remaining 0.004% utilized subtle reflection and amplification strategies, together with Quote of the Day (QOTD) protocol exploitation on UDP port 17, Echo protocol assaults on UDP/TCP port 7, and Community Time Protocol (NTP) amplification utilizing the monlist command. 

Further assault vectors included Mirai botnet UDP floods, Portmap service exploitation on UDP port 111, and Routing Data Protocol model 1 (RIPv1) assaults on UDP port 520.

The assault demonstrated a outstanding geographical distribution, originating from 122,145 distinctive supply IP addresses spanning 5,433 Autonomous Programs (AS) throughout 161 international locations. 

Brazil and Vietnam emerged as the first assault sources, every contributing roughly 25% of the whole visitors quantity, whereas Taiwan, China, Indonesia, Ukraine, Ecuador, Thailand, the US, and Saudi Arabia collectively accounted for one more third of the malicious visitors. 

Telefonica Brazil (AS27699) led the collaborating networks with 10.5% of assault visitors, adopted carefully by Viettel Group (AS7552), contributing 9.8%.

Autonomous Detection and Mitigation Expertise

Cloudflare’s protection programs leverage superior packet sampling expertise utilizing eXpress Knowledge Path (XDP) and prolonged Berkeley Packet Filter (eBPF) applications inside the Linux kernel to investigate visitors patterns in real-time, in line with the report.

The corporate’s proprietary heuristic engine, dubbed “dosd” (denial of service daemon), mechanically generated a number of fingerprint permutations to establish assault patterns whereas minimizing impression on reliable visitors. 

The assault was detected and mitigated throughout 477 information facilities in 293 world areas utilizing anycast routing, which distributed the assault visitors throughout Cloudflare’s community infrastructure. 

Every information heart maintained localized risk intelligence caches up to date by a gossip protocol, guaranteeing sub-second propagation of rising assault signatures throughout your complete community. 

This built-in autonomous framework achieved zero-touch mitigation for the 7.3 Tbps assault, totally containing the incident inside its 45-second period with out triggering incident response protocols.

Your complete mitigation course of occurred autonomously with out human intervention, alerts, or service incidents, showcasing the effectiveness of recent cloud-based DDoS safety programs in defending towards more and more subtle cyber threats.

Are you from SOC/DFIR Groups! – Work together with malware within the sandbox and discover associated IOCs. – Request 14-day free trial

Cyber Security News Tags:Attack, Blasting, BREAKING, DDoS, Record, Seconds, Tbps, Terabytes

Post navigation

Previous Post: CodeSign Secure v3.02: Future of Code Signing with PQC
Next Post: Beware of Weaponized MSI Installer Mimic as WhatsApp Delivers Modified XWorm RAT

Related Posts

Hundreds of WordPress Websites Hacked By VexTrio Viper Group to Run Massive TDS Services Cyber Security News
Threat Actors Leverage Google Apps Script To Host Phishing Websites Cyber Security News
VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands Cyber Security News
Building a Scalable Cybersecurity Training Program Cyber Security News
Streamlined Patch Management for Endpoint Device Security Cyber Security News
Identity and Access Management Trends Shaping 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Abuse ConnectWise to Hide Malware
  • SonicWall Warns of Trojanized NetExtender Stealing User Information
  • Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games
  • Code Execution Vulnerability Patched in GitHub Enterprise Server
  • Beware the Hidden Risk in Your Entra Environment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Hackers Abuse ConnectWise to Hide Malware
  • SonicWall Warns of Trojanized NetExtender Stealing User Information
  • Pro-Iranian Hacktivist Group Leaks Personal Records from the 2024 Saudi Games
  • Code Execution Vulnerability Patched in GitHub Enterprise Server
  • Beware the Hidden Risk in Your Entra Environment

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News