ddos attack banner

Cloudflare Failed Hyper-Volumetric DDoS Attacks Exploiting HTTP/2 Rapid Reset

3 Mins Read

PureVPNNewsCloudflare Failed Hyper-Volumetric DDoS Attacks Exploiting HTTP/2 Rapid Reset

Cloudflare has successfully defended against a significant wave of hyper-volumetric HTTP distributed denial-of-service (DDoS) attacks, many of which leveraged a recently disclosed vulnerability known as HTTP/2 Rapid Reset. 

Eighty-nine of these attacks exceeded 100 million requests per second (RPS).

Illustration of an HTTP DDoS attack

Details about the Campaign

This campaign led to a substantial 65% increase in HTTP DDoS attack traffic during Q3 compared to the preceding quarter. 

There was a 14% rise in L3/4 DDoS attacks. In the third quarter, the total number of HTTP DDoS attack requests surged to 8.9 trillion, up from 5.4 trillion in Q2 2023 and 4.7 trillion in Q1 2023, surpassing the Q4 2022 count of 6.5 trillion.

HTTP/2 Flaw

The flaw in question, HTTP/2 Rapid Reset (CVE-2023-44487), was unveiled this month due to an industry-wide coordinated disclosure. 

It exposed DDoS attacks perpetrated by an unidentified actor who harnessed this vulnerability to target significant providers like Amazon Web Services (AWS), Cloudflare, and Google Cloud. 

Fastly, revealed countering a similar attack, which peaked at around 250 million RPS and lasted approximately three minutes.

Cloudflare emphasized that botnets utilizing cloud computing platforms and exploiting HTTP/2 could generate up to 5,000 times more power per botnet node. 

This capability enabled them to launch hyper-volumetric DDoS attacks even with relatively small botnets, typically comprising 5-20 thousand nodes.

Who’s the Main Target?

The sectors most frequently targeted by HTTP DDoS attacks are gaming, IT, cryptocurrency, computer software, and telecom. 

The nations primarily responsible for application layer (L7) DDoS attacks were identified as the United States, China, Brazil, Germany, and Indonesia. 

The United States, Singapore, China, Vietnam, and Canada were the principal targets of HTTP DDoS attacks.

DNS-based DDoS attacks retained their status as the most prevalent attack type for the second consecutive quarter, representing almost 47% of all attacks. 

There was a 44% increase compared to the previous quarter. SYN floods held the second position, followed by RST floods, UDP floods, and Mirai attacks.

What’s the good news? Ransom DDoS attacks exhibited a decline. Cloudflare attributed this trend to the realization among threat actors that organizations are becoming less inclined to pay ransoms.

Securing Against DDoS Attacks in the Future

The future will likely witness further innovations in DDoS attack techniques and tools. 

Threat actors will persist in their attempts to exploit emerging vulnerabilities, making it crucial for cybersecurity professionals to remain vigilant and continually update their defense strategies. 

The declining trend in ransom DDoS attacks indicates that organizations are becoming less susceptible to extortion, but it also highlights the need for more concerted efforts to deter malicious actors.

author

Anas Hasan

date

October 27, 2023

time

2 years ago

Anas Hassan is a tech geek and cybersecurity enthusiast. He has a vast experience in the field of digital transformation industry. When Anas isn’t blogging, he watches the football games.

Have Your Say!!