NSFOCUS Cloud DDoS Protection Service (Cloud DPS) Detected and Mitigated an 800G+ DDoS Attack towards a Critical Infrastructure Operator
Incident SummaryOn October 2 2025-11-17 03:42:57 Author: securityboulevard.com(查看原文) 阅读量:14 收藏

Incident Summary

On October 21, 2025, NSFOCUS Cloud DDoS Protection Service (Cloud DPS) detected and mitigated an 800G+ DDoS attack towards a critical infrastructure operator.

The target network sustained a multi-vector volumetric DDoS attack peaking at 843.4 Gbps and 73.6 Mpps. The assault combined UDP-based floods (dominant) with amplification and reflection techniques.

Cruise Con 2025

NSFOCUS Cloud DPS and Managed Security Service (MSS) team successfully activated real-time mitigation and dropped over 99.9% of malicious traffic. The clean traffic during the whole incident remains below 700 Mbps.

Fig. 1 DDoS attack peaking at 843.4 Gbps

Fig. 2 DDoS attack peaking at 73.6 Mpps

Attack Overview

1. Attack Type Distribution (Top 3 Vectors)

Rank Attack Type Volume % of Total
1 UDP Flood ~609G 70.7%
2 Manual Strategy ~30G 3.6%
3 Carpet Bombing Attack ~2.9G 0.34%

Fig. 3 Attack Type Distribution

Key Insight 1: UDP Flood is very likely to reach high volume, which requires mitigation service provider to have dedicated bandwidth and sufficient mitigation gear to absorb the DDoS traffic.

2. Traffic Trend (bps) – Peak Mitigation

Metric Value
Inbound Traffic Peak 843.4 Gbps
Attack Traffic Peak (Dropped) 842.8 Gbps
Passed Traffic Peak 710.9 Mbps (0.08% of inbound)
Dropped Ratio 99.92%

Key Insight 2: Managed Security Service (MSS) with mitigation effect SLA can be valuable, an experienced, responsive MSS team can do real-time policy tuning to maintain clean traffic at very low level (<0.08%), which is critical to keep the service alive.

3. Attack Timeline

Time Event
12:00 Baseline traffic normal (~100 Mbps)
12:05 First spike detected – UDP Flood initiation
12:15 Traffic ramped to 600+ Gbps
13:00 Peak: 843.4 Gbps / 73.6 Mpps
14:00 Attack intensity declined
14:16 Traffic returned to baseline

Key Insight 3: Attackers now have adequate resources to peak the traffic in short time and capable of maintaining a peak traffic level of 600G-800G for 30 minutes or more. Modern mitigation service has to support always-on to ensure the minimum Time-to-Mitigate, while traditional service may take 30 mins just to initiate the mitigation.

4. Attack Source IP Geo Distribution

Fig. 4 Attack Source IP Geo Distribution

The US, Singapore and China were top 3 source countries while the Netherlands and Romania also composed a significant part due to their rich datacenter resources.

Key Insight 4: Mitigation service providers need to cover geographical hotspots include US, China, APAC and Europe. In-depth Threat Intelligence including botnet, command & control, IP gang from above regions is appreciated to bring optimum mitigation effect.

Conclusion & Recommendations

NSFOCUS Cloud DPS demonstrated carrier-grade resilience against a terabit-scale, multi-vector DDoS assault.

Key strengths:

  • Sub-second detection and mitigation
  • AI-driven proactive baseline learning
  • Near-perfect mitigation accuracy (99.92% drop)
  • Global scrubbing capacity covering hotspots
  • Rich rule engine handling multiple concurrent vectors

The post NSFOCUS Cloud DDoS Protection Service (Cloud DPS) Detected and Mitigated an 800G+ DDoS Attack towards a Critical Infrastructure Operator appeared first on NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks..

*** This is a Security Bloggers Network syndicated blog from NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. authored by NSFOCUS. Read the original post at: https://nsfocusglobal.com/nsfocus-cloud-ddos-protection-service-cloud-dps-detected-and-mitigated-an-800g-ddos-attack-towards-a-critical-infrastructure-operator/


文章来源: https://securityboulevard.com/2025/11/nsfocus-cloud-ddos-protection-service-cloud-dps-detected-and-mitigated-an-800g-ddos-attack-towards-a-critical-infrastructure-operator/
如有侵权请联系:admin#unsafe.sh