Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    You don’t have to explain everything to Claude anymore – it’s finally in your apps

    UK launches vulnerability research program for external experts

    Interlock ransomware adopts FileFix method to deliver malware

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      AI chatbot Grok issues apology for antisemitic posts

      July 13, 2025

      Apple sued by shareholders for allegedly overstating AI progress

      June 22, 2025

      How far will AI go to defend its own survival?

      June 2, 2025

      The internet thinks this video from Gaza is AI. Here’s how we proved it isn’t.

      May 30, 2025

      Nvidia CEO hails Trump’s plan to rescind some export curbs on AI chips to China

      May 22, 2025
    • Business

      Cloudflare open-sources Orange Meets with End-to-End encryption

      June 29, 2025

      Google links massive cloud outage to API management issue

      June 13, 2025

      The EU challenges Google and Cloudflare with its very own DNS resolver that can filter dangerous traffic

      June 11, 2025

      These two Ivanti bugs are allowing hackers to target cloud instances

      May 21, 2025

      How cloud and AI transform and improve customer experiences

      May 10, 2025
    • Crypto

      3 LetsBONK.fun Ecosystem Tokens To Watch For the Third Week of July

      July 14, 2025

      Bank of England Chief Sounds Alarm on Big Bank Stablecoin Issuance

      July 14, 2025

      XRP Rally Is Being Driven By South Korean Traders

      July 14, 2025

      Analyst Says MicroStrategy Could Trigger a Bitcoin Cascade Worse Than Mt. Gox or 3AC

      July 14, 2025

      Pudgy Penguins (PENGU) Skyrockets as Justin Sun Joins the Huddle

      July 14, 2025
    • Technology

      You don’t have to explain everything to Claude anymore – it’s finally in your apps

      July 15, 2025

      UK launches vulnerability research program for external experts

      July 15, 2025

      Interlock ransomware adopts FileFix method to deliver malware

      July 15, 2025

      Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot

      July 15, 2025

      Malicious VSCode extension in Cursor IDE led to $500K crypto theft

      July 15, 2025
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Shop Now
    Tech AI Verse
    You are at:Home»Technology»Record DDoS pummels site with once-unimaginable 7.3Tbps of junk traffic
    Technology

    Record DDoS pummels site with once-unimaginable 7.3Tbps of junk traffic

    TechAiVerseBy TechAiVerseJune 21, 2025No Comments2 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Record DDoS pummels site with once-unimaginable 7.3Tbps of junk traffic
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Record DDoS pummels site with once-unimaginable 7.3Tbps of junk traffic

    Large-scale attacks designed to bring down Internet services by sending them more traffic than they can process keep getting bigger, with the largest one yet, measured at 7.3 terabits per second, being reported Friday by Internet security and performance provider Cloudflare.

    The 7.3Tbps attack amounted to 37.4 terabytes of junk traffic that hit the target in just 45 seconds. That’s an almost incomprehensible amount of data, equivalent to more than 9,300 full-length HD movies or 7,500 hours of HD streaming content in well under a minute.

    Indiscriminate target bombing

    Cloudflare said the attackers “carpet bombed” an average of nearly 22,000 destination ports of a single IP address belonging to the target, identified only as a Cloudflare customer. A total of 34,500 ports were targeted, indicating the thoroughness and well-engineered nature of the attack.

    The vast majority of the attack was delivered in the form of User Datagram Protocol packets. Legitimate UDP-based transmissions are used in especially time-sensitive communications, such as those for video playback, gaming applications, and DNS lookups. It speeds up communications by not formally establishing a connection before data is transferred. Unlike the more common Transmission Control Protocol, UDP doesn’t wait for a connection between two computers to be established through a handshake and doesn’t check whether data is properly received by the other party. Instead, it immediately sends data from one machine to another.

    UDP flood attacks send extremely high volumes of packets to random or specific ports on the target IP. Such floods can saturate the target’s Internet link or overwhelm internal resources with more packets than they can handle.

    Since UDP doesn’t require a handshake, attackers can use it to flood a targeted server with torrents of traffic without first obtaining the server’s permission to begin the transmission. UDP floods typically send large numbers of datagrams to multiple ports on the target system. The target system, in turn, must send an equal number of data packets back to indicate the ports aren’t reachable. Eventually, the target system buckles under the strain, resulting in legitimate traffic being denied.

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleXiaomi Launches Redmi Note 14 Pro 5G BamBam Limited Edition in Malaysia
    Next Article A shark scientist reflects on Jaws at 50
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    You don’t have to explain everything to Claude anymore – it’s finally in your apps

    July 15, 2025

    UK launches vulnerability research program for external experts

    July 15, 2025

    Interlock ransomware adopts FileFix method to deliver malware

    July 15, 2025
    Leave A Reply Cancel Reply

    Top Posts

    New Akira ransomware decryptor cracks encryptions keys using GPUs

    March 16, 202528 Views

    OpenAI details ChatGPT-o3, o4-mini, o4-mini-high usage limits

    April 19, 202522 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 202520 Views

    Rsync replaced with openrsync on macOS Sequoia

    April 7, 202520 Views
    Don't Miss
    Technology July 15, 2025

    You don’t have to explain everything to Claude anymore – it’s finally in your apps

    You don’t have to explain everything to Claude anymore – it’s finally in your apps…

    UK launches vulnerability research program for external experts

    Interlock ransomware adopts FileFix method to deliver malware

    Gigabyte motherboards vulnerable to UEFI malware bypassing Secure Boot

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    You don’t have to explain everything to Claude anymore – it’s finally in your apps

    July 15, 20252 Views

    UK launches vulnerability research program for external experts

    July 15, 20252 Views

    Interlock ransomware adopts FileFix method to deliver malware

    July 15, 20252 Views
    Most Popular

    Xiaomi 15 Ultra Officially Launched in China, Malaysia launch to follow after global event

    March 12, 20250 Views

    Apple thinks people won’t use MagSafe on iPhone 16e

    March 12, 20250 Views

    French Apex Legends voice cast refuses contracts over “unacceptable” AI clause

    March 12, 20250 Views
    © 2025 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.