{"id":130149,"date":"2021-11-06T21:22:56","date_gmt":"2021-11-07T04:22:56","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2021\/11\/microsoft-fends-off-2-4tbps-ddos-attack-second-largest-on-record"},"modified":"2021-11-06T21:22:56","modified_gmt":"2021-11-07T04:22:56","slug":"microsoft-fends-off-2-4tbps-ddos-attack-second-largest-on-record","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2021\/11\/microsoft-fends-off-2-4tbps-ddos-attack-second-largest-on-record","title":{"rendered":"Microsoft Fends Off 2.4Tbps DDoS Attack, Second Largest on Record"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/microsoft-fends-off-2-4tbps-ddos-attack-second-largest-on-record2.jpg\"><\/a><\/p>\n<p>A DDoS attack essentially tries to down a website or internet service by bombarding the system with a flood of data traffic. To do so, the hacker can sometimes harness botnets, or armies of malware-infected computers, to generate the traffic.<\/p>\n<p>In this case, the attack originated from \u201c70,000 sources\u201d based in countries across Asia and the US, Microsoft says. Whether the hacker used a botnet was left unsaid. But the <a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/TA14-017A\" target=\"_blank\">UDP protocol<\/a> was exploited in what\u2019s known as a \u201creflection attack\u201d to amplify the data traffic to 2.4Tbps.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A DDoS attack essentially tries to down a website or internet service by bombarding the system with a flood of data traffic. To do so, the hacker can sometimes harness botnets, or armies of malware-infected computers, to generate the traffic. In this case, the attack originated from \u201c70,000 sources\u201d based in countries across Asia and [\u2026]<\/p>\n","protected":false},"author":662,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,418],"tags":[],"class_list":["post-130149","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-internet"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/130149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/662"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=130149"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/130149\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=130149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=130149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=130149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}