Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cloudflare Blocks Record-Breaking 11.5 Tbps DDoS Attack

Posted on September 3, 2025September 3, 2025 By CWS

Sep 03, 2025Ravie LakshmananThreat Intelligence / Community Safety
Cloudflare on Tuesday mentioned it mechanically mitigated a record-setting volumetric distributed denial-of-service (DDoS) assault that peaked at 11.5 terabits per second (Tbps).
“Over the previous few weeks, we have autonomously blocked lots of of hyper-volumetric DDoS assaults, with the biggest reaching peaks of 5.1 Bpps and 11.5 Tbps,” the net infrastructure and safety firm mentioned in a publish on X. “The 11.5 Tbps assault was a UDP flood that primarily got here from Google Cloud.”
Your complete assault lasted solely about 35 seconds, with the corporate stating its “defenses have been working additional time.”
Volumetric DDoS assaults are designed to overwhelm a goal with a tsunami of site visitors, inflicting the server to decelerate and even fail. These assaults sometimes lead to community congestion, packet loss, and repair disruptions.
Such assaults are sometimes performed by sending the requests from botnets which might be already beneath the management of the menace actors after having contaminated the gadgets, be it computer systems, IoT gadgets, and different machines, with malware.

“The preliminary affect of a volumetric assault is to create congestion that degrades the efficiency of community connections to the web, servers, and protocols, doubtlessly inflicting outages,” Akamai says in an explanatory word.
“Nevertheless, attackers can also use volumetric assaults as a canopy for extra subtle exploits, which we consult with as ‘smoke display’ assaults. As safety groups work diligently to mitigate the volumetric assault, attackers might launch extra assaults (multi-vector) that permit them to surreptitiously penetrate community defenses to steal knowledge, switch funds, entry high-value accounts, or trigger additional exploitation.”
The event comes a little bit over two months after Cloudflare mentioned it blocked in mid-Might 2025 a DDoS assault that hit a peak of seven.3 Tbps concentrating on an unnamed internet hosting supplier.
In July 2025, the corporate additionally mentioned hyper-volumetric DDoS assaults – L3/4 DDoS assaults exceeding 1 billion packets per second (Bpps) or 1 Tbps – skyrocketed within the second quarter of 2025, scaling a brand new excessive of 6,500 compared to 700 hyper-volumetric DDoS assaults in Q1 2025.
The event comes as Bitsight detailed the RapperBot kill chain, which targets community video recorders (NVRs) and different IoT gadgets for functions of enlisting them right into a botnet able to finishing up DDoS assaults. The botnet infrastructure was taken down final month as a part of a regulation enforcement operation.
Within the assault documented by the cybersecurity firm, the menace actors are mentioned to have exploited safety flaws in NVRs to realize preliminary entry and obtain the next-stage RapperBot payload by mounting a distant NFS file system (“104.194.9[.]127”) and executing it.

That is achieved by way of a path traversal flaw within the net server to leak the legitimate administrator credentials, after which use it to push a faux firmware replace that runs a set of bash instructions to mount the share and run the RapperBot binary primarily based on the system structure.
“No surprise the attackers select to make use of NFS mount and execute from that share, this NVR firmware is extraordinarily restricted, so mounting NFS is definitely a really intelligent alternative,” safety researcher Pedro Umbelino mentioned. “After all, this implies the attackers needed to completely analysis this model and mannequin and design an exploit that might work beneath these restricted situations.”

The malware subsequently obtains the DNS TXT information related to a set of hard-coded domains (“iranistrash[.]libre” and “pool.rentcheapcars[.]sbs” with a view to get the precise listing of precise command-and-control (C2) server IP addresses.
The C2 IP addresses, in flip, are mapped to a C2 area whose totally certified area identify (FQDN) is generated utilizing a simplified area technology algorithm (DGA) that consists of a mix of 4 domains, 4 subdomains, and two top-level domains (TLDs). The FQDNs are resolved utilizing hard-coded DNS servers.
RapperBot finally ends up establishing an encrypted connection to the C2 area with a sound DNS TXT file description, from the place it obtained the instructions essential to launch DDoS assaults. The malware will also be commandeered to scan the web for open ports to additional propagate the an infection.
“Their methodology is straightforward: scan the Web for outdated edge gadgets (like DVRs and routers), brute-force or exploit and make them execute the botnet malware,” Bitsight mentioned. “No persistence is definitely wanted, simply scan and infect, time and again. As a result of the susceptible gadgets proceed to be uncovered on the market and they’re simpler to seek out than ever earlier than.”

The Hacker News Tags:Attack, Blocks, Cloudflare, DDoS, RecordBreaking, Tbps

Post navigation

Previous Post: Hackers Leverage Hexstrike-AI Tool to Exploit Zero Day Vulnerabilities Within 10 Minutes
Next Post: CISA Warns of WhatsApp 0-Day Vulnerability Exploited in Attacks

Related Posts

Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support The Hacker News
Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion The Hacker News
New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station The Hacker News
Cisco Patches CVE-2025-20188 (10.0 CVSS) in IOS XE That Enables Root Exploits via JWT The Hacker News
New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy The Hacker News
OttoKit WordPress Plugin with 100K+ Installs Hit by Exploits Targeting Multiple Flaws The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Pennsylvania Attorney General Confirms Ransomware Behind Weeks-Long Outage
  • Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats
  • Chrome 140 Released With Fix For Six Vulnerabilities that Enable Remote Code Execution Attacks
  • Jaguar Land Rover Operations ‘Severely Disrupted’ by Cyberattack
  • Android Security Update – Patch for 0-Day Vulnerabilities Actively Exploited in Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Pennsylvania Attorney General Confirms Ransomware Behind Weeks-Long Outage
  • Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats
  • Chrome 140 Released With Fix For Six Vulnerabilities that Enable Remote Code Execution Attacks
  • Jaguar Land Rover Operations ‘Severely Disrupted’ by Cyberattack
  • Android Security Update – Patch for 0-Day Vulnerabilities Actively Exploited in Attack

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News