In October 2024, Link11 was confronted with one of the largest DDoS attacks ever registered on the Link11 network. The attack reached peak values of 1.4 terabits per second (Tbps) and 120 million packets per second (Mpps). It was not based on sophisticated attack techniques, but on sheer volume. Despite the enormous load, the attack was successfully repelled in its entirety, and the customer’s services were maintained without interruption.
DDoS attacks in Europe are becoming more frequent. Attacks of this size raise the question of how Europe can defend itself against DDoS attacks. As overall network capacity continues to grow, volumetric attacks remain popular to leverage this capacity.
A 1.4Tbps attack is the equivalent of streaming more than 300,000 HD videos simultaneously. Such a data flow overloads the network and server CPUs. Today, DDoS protection must be designed to be automatic and agile, as real-time responses are necessary and manual intervention or pure filter solutions are no longer sufficient for large amounts of data.
The DDoS attack used a variety of attack vectors, making the defense measures significantly more difficult. The attack source had a total of 859,756 unique IP addresses, indicating a high degree of distribution among attack sources. It can be assumed that many compromised devices worldwide were involved in the attack. This distribution is typical for modern DDoS attacks, in which cybercriminals often use botnets of IoT devices or insecure home routers. Here, the US was the main source of traffic, followed by China.
Traffic split by countries
Attack Traffic in Mbps
The dynamics of the attack strategies were particularly noteworthy. After about four minutes, the packet size of the attacks was significantly reduced. This is a tactical variation that cybercriminals often use to circumvent defenses. The subsequent increase in packet size for the TCP and UDP vectors and the moderate adjustment for GRE prove that the attackers are adapting their strategies in real time to the defenses of Link11.
Such a complex attack scenario can inevitably overload the target’s network capacity and server CPU. A successful attack would have brought digital business operations to a complete standstill. This would have had catastrophic consequences for many companies. The course of the attack clearly shows that DDoS defense strategies must be continuously optimized and adapted to changing threats.
The simplicity of the methods used – illegitimate web-based traffic connections – proves that attackers still frequently target the most widely used Internet service protocols and ports. These types of attacks remain popular among cybercriminals despite more advanced methods, because they are easy to generate. The attackers know full well that many target systems do not have the necessary capacity to deal with such attacks.
The strategic targeting of home ISP providers and the associated access/eyeball networks also shows how attackers exploit vulnerabilities on the internet. By infiltrating such networks, they can generate mass traffic that is usually difficult to identify and block.
The increasing networking of devices and the Internet of Things (IoT) have changed the threat landscape.
Many devices are vulnerable to attacks because they operate without security measures. The attacks prove that we need to improve security standards. The recently discovered vulnerability CVE-2024-3080 illustrates the need to improve security standards in the IoT industry.
It occurs in certain ASUS router models. The “authentication bypass” vulnerability allows attackers to gain access to routers without entering valid credentials. Normally, access to a router’s configuration interface requires entering a username and password. However, this vulnerability allows attackers to bypass the authentication process. A compromised router becomes part of a botnet and is used to carry out DDoS attacks. This highlights the dangers associated with unsecured IoT devices.
To counter such an attack, flexible defense mechanisms are essential. Link11 was able to fend off the attack thanks to its global network.
Each scrubbing center was able to analyze data streams and filter out malicious data. The scrubbing centers in Europe took on a large part. Distributing the data across different locations effectively spread the load. Link11’s automated filters and adaptive algorithms were key. Thanks to AI, we were able to block illegitimate traffic while continuing to process legitimate requests. This allowed us to carry out the defense without human intervention and without affecting the customer’s systems.
In an era when the threat of cyberattacks is constantly growing, organizations should implement robust, scalable, automated DDoS defenses to protect themselves from cyberthreats.
Automated systems are essential to detect and neutralize attacks in real time. The complexity and dynamics of today’s attacks require intelligent solutions based on machine learning that can adapt to new threats.
Employees and users must be trained in the use of IoT devices and made aware of the dangers. In addition, best security practices and regular updates are essential to close vulnerabilities and reduce attack vectors. Companies need to take action and arm themselves against the growing threats in cyberspace.