Every organization with internet-exposed workloads is vulnerable to distributed denial-of-service (DDoS) attacks, especially those who are adopting cloud services in the wake of the pandemic. Bad actors will look for ways to take applications offline.
The last week of August, Microsoft observed 2.4 terabits per second (Tbps) of DDoS attacks targeting Azure customers in Europe.
Compared to last year this is “140% higher than any other network volumetric event previously detected on Azure,” according to Microsoft in a blog post.
Microsoft says the attack originated from approximately 70,000 sources and from multiple countries in the Asia Pacific region, such as Malaysia, Vietnam, Taiwan, Japan, and China, as well as from the United States.
Attacks like this demonstrate the ability of bad actors to wreak havoc by flooding targets with gigantic traffic volumes trying to choke network capacity.
Related: Report: DDoS Attacks Increasing As Record-Setting Year Is Anticipated
Azure’s DDoS protection platform can absorb tens of terabits of DDoS attack, leaving its customers unscathed.
“Azure’s DDoS mitigation employs fast detection and mitigation of large attacks by continuously monitoring our infrastructure at many points across the network,” says Microsoft.
“When deviations from baselines are extremely large, our DDoS control plane logic cuts through normal detection steps, needed for lower-volume floods, to immediately kick-in mitigation. This ensures the fastest time-to-mitigation and prevents collateral damage from such large attacks,” the company says.
If customer’s has been running their own datacenter, they would probably have incurred financial damage and intangible costs.
For IT managers, make sure your organization has a robust DDoS response strategy to protect all public IP addresses in virtual networks.
If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!
Leave a Reply