AT2k Design BBS Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages!

You are not logged in. Login here for full access privileges.

Previous Message | Next Message | Back to Slashdot  <--  <--- Return to Home Page
   Local Database  Slashdot   [150 / 230] RSS
 From   To   Subject   Date/Time 
Message   VRSS    All   KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS   May 20, 2025
 7:20 PM  

Feed: Slashdot
Feed Link: https://slashdot.org/
---

Title: KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS

Link: https://tech.slashdot.org/story/25/05/20/2215...

KrebsOnSecurity was hit with a near-record 6.3 Tbps DDoS attack, believed to
be a test of the powerful new Aisuru IoT botnet. The attack, lasting under a
minute, was the largest Google has ever mitigated and is linked to a DDoS-for-
hire operation run by a 21-year-old Brazilian known as "Forky." Brian Krebs
writes: [Google Security Engineer Damian Menscher] said the attack on
KrebsOnSecurity lasted less than a minute, hurling large UDP data packets at
random ports at a rate of approximately 585 million data packets per second.
"It was the type of attack normally designed to overwhelm network links,"
Menscher said, referring to the throughput connections between and among
various Internet service providers (ISPs). "For most companies, this size of
attack would kill them." [...] The 6.3 Tbps attack last week caused no
visible disruption to this site, in part because it was so brief -- lasting
approximately 45 seconds. DDoS attacks of such magnitude and brevity
typically are produced when botnet operators wish to test or demonstrate
their firepower for the benefit of potential buyers. Indeed, Google's
Menscher said it is likely that both the May 12 attack and the slightly
larger 6.5 Tbps attack against Cloudflare last month were simply tests of the
same botnet's capabilities. In many ways, the threat posed by the
Aisuru/Airashi botnet is reminiscent of Mirai, an innovative IoT malware
strain that emerged in the summer of 2016 and successfully out-competed
virtually all other IoT malware strains in existence at the time.

Read more of this story at Slashdot.

---
VRSS v2.1.180528
  Show ANSI Codes | Hide BBCodes | Show Color Codes | Hide Encoding | Hide HTML Tags | Show Routing
Previous Message | Next Message | Back to Slashdot  <--  <--- Return to Home Page

VADV-PHP
Execution Time: 0.0146 seconds

If you experience any problems with this website or need help, contact the webmaster.
VADV-PHP Copyright © 2002-2025 Steve Winn, Aspect Technologies. All Rights Reserved.
Virtual Advanced Copyright © 1995-1997 Roland De Graaf.
v2.1.250224