- Landnetmon discovered a record 1.5 billion package per Second ddos -attack
- Traffic came from hijacked IoT units and microtik -routers over 11,000 networks
- Landnetmon warns ISP -level filtration is important to stop future floods on a large scale
A distributed denial of service attacks aimed at a DDOS conjunction provider somewhere in Western Europe has been seen and mitigated by landline.
The company says the attack peaked with a massive 1.5 billion packages per day. Second, which made it one of the biggest floods of the packages confirmed to date.
Landnetmon says traffic was mainly an UDP flood that was made from compromised customer-room equipment, including IoT units and microtic routers.
Part of a dangerous tendency
The attack allegedly drew resources from more than 11,000 unique networks worldwide.
The targeted business was not named, although the landNetmon described it as a DDOS scrubbing provider, a type of service that distributes malicious traffic during this type of attack.
“This event is part of a dangerous trend,” said Pavel Odintsov, founder of Fastnetmon. “When tens of thousands of CPE devices can be hijacked and used in coordinated parcel flooding of this size, the risk of network operators grows exponentially. The industry must trade to implement detection logic at the ISP level to stop outgoing attacks before scaling.”
The attack was discovered and handled in real time, with FastNetmon’s systems automatically identified the abnormal traffic within seconds.
Affordable efforts depended on the scrub bet technology at the customer’s facility and involved implementation of access control lists on routers known to be vulnerable to amplification techniques.
Landnetmon says its platform is designed to treat events on this scale by using optimized C ++ algorithms to provide visibility in network traffic.
The rapid action enabled the attacked company to resist the attack without any visible disturbance of its service.
This message follows CloudFlore’s recent disclosure of a record volumetric attack reaching 11.5 Tbps and 5.1 billion packages per second.
“Overall, the two incidents emphasize an increase in both packing speed and bandwidth-driven floods, a trend that pushes the capacity for mitigation platforms around the world,” Fastnetmon said.
“What makes this case remarkable is the large number of distributed sources and abuse of everyday network units. Without proactive ISP level filtration, compromised consumer hardware can be weapons on a massive scale,” the company warned.



