Overview
- Cloudflare says its automated systems blocked a hyper‑volumetric attack peaking at 22.2 Tbps and 10.6 billion packets per second that lasted roughly 40 seconds.
- The barrage targeted a single IP address belonging to an unnamed European network infrastructure company, according to details shared with SecurityWeek.
- Telemetry cited by Cloudflare points to more than 404,000 unique source IPs across over 14 ASNs, with non‑spoofed traffic in a UDP carpet‑bomb pattern hitting tens of thousands of destination ports per second.
- Cloudflare has not confirmed attribution and says the Aisuru botnet may have powered the attack, echoing research that linked earlier large‑scale events to compromised IoT and CPE devices.
- The peak roughly doubles a record disclosed three weeks ago at 11.5 Tbps, underscoring a rapid rise in attack scale and raising concerns about whether providers without automated scrubbing can withstand such loads.