Particle.news

Download on the App Store

FastNetMon Thwarts 1.5 Gpps DDoS Flood on Western European Scrubbing Provider

Hijacked consumer routers across more than 11,000 networks powered the packet-rate deluge.

Overview

  • FastNetMon says it detected the UDP flood in real time and used the customer's scrubbing infrastructure, including ACLs on edge routers, to prevent a major outage.
  • The target, described as a DDoS scrubbing provider in Western Europe, was not named by FastNetMon.
  • Malicious traffic came from compromised CPE, including IoT devices and MikroTik routers, distributed across more than 11,000 networks worldwide.
  • A FastNetMon spokesperson told The Register the company observed a near-identical ~1.49 Gpps attack on an Eastern European scrubbing vendor that included an extortion email, suggesting the same botnet may be involved.
  • The disclosure follows Cloudflare's report of mitigating an 11.5 Tbps assault peaking at 5.1 Bpps, underscoring escalating DDoS scale across bandwidth and packet-rate fronts as FastNetMon urges ISP-level filtering.