Uncategorized

Historic 7.3 Tbps DDoS Attack Delivers 37.4 Terabytes of Data in Just 45 Seconds

The largest distributed denial-of-service (DDoS) attack ever recorded in mid-May 2025, reaching an unprecedented 7.3 terabits per second (Tbps) and delivering 37.4 terabytes of data in just 45 seconds.

This record-breaking cyber assault targeted a hosting provider customer using Cloudflare’s Magic Transit service and represents a 12% increase over the previous record, surpassing recent attacks by Tbps.

New world record: 7.3 Tbps DDoS attack

The attack was autonomously detected and mitigated across 477 data centers in 293 locations worldwide without human intervention, demonstrating the evolving scale and sophistication of modern DDoS threats against critical internet infrastructure.

The 7.3 Tbps attack delivered an staggering volume of data equivalent to flooding a network with over 9,350 full-length HD movies or streaming 7,480 hours of high-definition video in just 45 seconds.

To put this in perspective, the attack volume represents enough data to download 9.35 million songs in under a minute, providing enough music for 57 years of continuous listening.

The attack specifically targeted a single IP address owned by Cloudflare hosting provider customer, carpet-bombing an average of 21,925 destination ports with peaks reaching 34,517 destination ports per second.

The assault originated from a distributed network of over 122,145 source IP addresses spanning 5,433 Autonomous Systems across 161 countries, with Brazil and Vietnam accounting for approximately half of the attack traffic.

Among the top contributing networks, Telefonica Brazil accounted for 10.5% of the total attack traffic, followed closely by Viettel Group with 9.8%.

Other significant contributors included China Unicom, Chunghwa Telecom, and China Telecom, collectively representing substantial portions of the global attack infrastructure.

Technical Analysis and Attack Vectors

The attack employed multiple vectors, with 99.996% consisting of UDP floods while the remaining 0.004% utilized various reflection and amplification techniques.

The detection system employs real-time fingerprinting technology that samples packets directly from the Linux kernel using eXpress Data Path (XDP) and extended Berkeley Packet Filter (eBPF) programs.

These secondary attack methods included QOTD reflection attacks, Echo reflection attacks, NTP reflection attacks, Mirai UDP flood attacks, Portmap floods, and RIPv1 amplification attacks.

The attack vectors other than UDP floods.

The diversity of attack vectors demonstrates the sophisticated nature of modern DDoS campaigns, combining high-volume flooding techniques with protocol-specific exploitation methods.

The use of reflection and amplification attacks allows attackers to multiply their effective attack power by abusing legitimate internet services and protocols.

Mitigations

According to Report, Cloudflare’s autonomous detection and mitigation systems successfully blocked the attack without triggering alerts or causing incidents.

The company’s global anycast network distributed the attack traffic across multiple data centers, using the attack’s distributed nature against itself to enable mitigation close to botnet nodes.

This sophisticated analysis identifies suspicious patterns through Cloudflare’s proprietary heuristic engine called “dosd” (denial of service daemon).

Cloudflare’s DDoS Protection systems

The system generates multiple fingerprint permutations to achieve the highest mitigation efficacy while avoiding impact to legitimate traffic.

When activation thresholds are exceeded, mitigation rules are compiled as eBPF programs to drop matching attack packets, with rules automatically timing out when attacks end.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.

Ethan Brooks

Ethan Brooks is a Senior cybersecurity journalist passionate about threat intelligence and data privacy. His work highlights cyber attacks, hacking, security culture, and cybercrime with The Cyber News.

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago