<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>DDoS Archives - OVHcloud Blog</title>
	<atom:link href="https://blog.ovhcloud.com/tag/ddos/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.ovhcloud.com/tag/ddos/</link>
	<description>Innovation for Freedom</description>
	<lastBuildDate>Wed, 02 Apr 2025 08:16:32 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://blog.ovhcloud.com/wp-content/uploads/2019/07/cropped-cropped-nouveau-logo-ovh-rebranding-32x32.gif</url>
	<title>DDoS Archives - OVHcloud Blog</title>
	<link>https://blog.ovhcloud.com/tag/ddos/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>A brief retrospective of network-layer DDoS attacks in 2024 at OVHcloud</title>
		<link>https://blog.ovhcloud.com/a-brief-retrospective-of-network-layer-ddos-attacks-in-2024-at-ovhcloud/</link>
		
		<dc:creator><![CDATA[Christophe Bacara]]></dc:creator>
		<pubDate>Wed, 02 Apr 2025 08:16:31 +0000</pubDate>
				<category><![CDATA[OVHcloud Engineering]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=28376</guid>

					<description><![CDATA[[15 min read] This article is primarily intended for an international audience of networks professionals, information security specialists, security researchers and technical stakeholders. Whether or not you belong to the target audience, but particularly if you do not, please be mindful of your conclusions. Table of Contents 1. Introduction Welcome to this brief retrospective about [&#8230;]<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fa-brief-retrospective-of-network-layer-ddos-attacks-in-2024-at-ovhcloud%2F&amp;action_name=A%20brief%20retrospective%20of%20network-layer%20DDoS%20attacks%20in%202024%20at%20OVHcloud&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<p><em>[15 min read]</em></p>



<p class="has-text-align-left"><em>This article is primarily intended for an international audience of networks</em> <em>professionals, information security specialists, security researchers and</em> <em>technical stakeholders. Whether or not you belong to the target audience, but</em> <em>particularly if you do not, please be mindful of your conclusions.</em></p>



<h2 class="wp-block-heading">Table of Contents</h2>



<ul class="wp-block-list">
<li>1. <a href="#org3aa88af">Introduction</a></li>



<li>2. <a href="#carpetbombing">Carpet-bombing is more popular than ever</a></li>



<li>3. <a href="#orgef485c3">The rise of packet rate attacks: billion(s) of packets per second</a></li>



<li>4. <a href="#org9acd697">Ever-growing hyper-volumetric attacks: 4 Tbps reached</a></li>



<li>5. <a href="#orga8961f4">Institutional and residential ISPs spoofing</a></li>



<li>6. <a href="#orge720bcc">Operation PowerOFF and consequences</a></li>



<li>7. <a href="#org940b1ab">Conclusion and closing words</a></li>
</ul>



<h2 class="wp-block-heading" id="org3aa88af">1. Introduction</h2>



<p>Welcome to this brief retrospective about the DDoS attack landscape in 2024, as seen from OVHcloud&#8217;s vantage point.</p>



<p class="has-text-align-left">Like any other cloud provider, we deal with DDoS attacks on a daily basis, automatically detecting and mitigating hundreds of attacks each and every day. We operate our own worldwide anti-DDoS infrastructure, built from systems designed and developped internally. To date, we have more than 50 Tbps of total mitigation capacity, located at the edge of our network as well as in dedicated scrubbing centers, for which we keep adding more capacity each year to keep up the pace.</p>



<p>Thanks to our global backbone and numerous points of presence, we do have a sensible view of Internet traffic and trends, especially when speaking about network-layer DDoS attacks. That&#8217;s why we wanted to expose and discuss several topics we encountered during the year, in the hope you may learn something or find it useful for your own sake.</p>



<p>Context aside, let&#8217;s dive into this retrospective: what a year! 2024 was definitely an important turning point in DDoS history, at least from our point of view. From good&#8217;ol DDoS techniques coming back at scale, to several record-breaking attacks, we&#8217;ve seen quite a lot, and no one doubts that 2024 events will be the main driving factor for anti-DDoS infrastructure planning in the coming years.</p>



<h2 class="wp-block-heading" id="carpetbombing">2. Carpet-bombing is more popular than ever</h2>



<p>During the year 2024, we observed a sudden increase of attacks leveraging a technique known as &#8220;carpet-bombing&#8221;. This attack technique is named after a brutal warfare method which consists in methodically bombing every bit of surface of a large area. Similarly, &#8220;carpet-bombing&#8221; in our context refers to attacks targeting many more IP addresses than those servicing the actual target.</p>



<p>Carpet-bomb attacks are used in an attempt to evade anti-DDoS systems. This is because they are much harder to detect and mitigate automatically: by sending a few hundreds megabits per second per IP, attacker can reach huge volumes while evading (at least partially) detection heuristics and possible mitigation actions. Simply put, instead of trying hard to bomb a target, just bomb the whole area around it.</p>



<figure class="wp-block-image aligncenter size-large"><img fetchpriority="high" decoding="async" width="1024" height="280" src="https://blog.ovhcloud.com/wp-content/uploads/2025/03/classic_vs_carpet-bomb_attacks-1024x280.png" alt="" class="wp-image-28497" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/03/classic_vs_carpet-bomb_attacks-1024x280.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/classic_vs_carpet-bomb_attacks-300x82.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/classic_vs_carpet-bomb_attacks-768x210.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/classic_vs_carpet-bomb_attacks.png 1519w" sizes="(max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Figure 1: <em>Carpet-bomb attacks spread traffic over many IPs by virtually targeting a larger prefix</em></figcaption></figure>



<p>By targeting a large number of closely-related IPs (<em>e.g.</em>, belonging to a larger prefix), attackers rely on common design characteristics of many networking infrastructures: you generally want to assign an address range to a physical or logical part of your infrastructure for several reasons. Briefly, this is often required because of technical limitations on networking devices and appliances, as well as what is humanly possible to understand and manage: whether for hardware or humans, you cannot store millions to billions entries in routing table, access control lists, etc. At some point, you must aggregate your resources.</p>



<p>Back to the main topic, carpet-bomb attacks are a double-edged sword: the part of the attack possibly reaching your final target will probably not be powerful enough to take it down, but you take a better chance at evading defenses. This is because it&#8217;s much more difficult to identify with confidence what is legitimate from what is not, but also to scrub traffic without impacting legitimate users. In the end, the total attack traffic leaking defenses may impact a significant chunk of the hosting infrastructure, even if traffic to any single destination IP would not have been enough to take it down.</p>



<p>2024 has been a turning point in carpet-bomb trends from our point of view. Attackers started to leverage this technique more and more often, with mixed results, and led us to rethink how to deal with such attacks. For some times now, we are testing and calibrating our solution to the issue, but need to treat carefully: facing such a radical threat may lead to actions which could be impactful for other customers. There&#8217;s a difficult balance between sensitivity (<em>i.e.</em>, make sure you don&#8217;t detect or mitigate too much) versus specificity (<em>i.e.</em>, make sure you don&#8217;t miss anything notable). We will keep working hard to address the matter and minimize disruption.</p>



<h2 class="wp-block-heading" id="orgef485c3">3. The rise of packet rate attacks: billion(s) of packets per second</h2>



<p>In June 2024, we published a blog article titled <em>&#8220;The Rise of Packet Rate Attacks: When Core Routers Turn Evil&#8221;</em>.<sup data-fn="956b42b5-26ed-4005-aace-cb55eb1d842f" class="fn"><a href="#956b42b5-26ed-4005-aace-cb55eb1d842f" id="956b42b5-26ed-4005-aace-cb55eb1d842f-link">1</a></sup> This article was presenting our findings related to small core routers participating in DDoS attacks, and was a byproduct of our investigations about a concerning trend with packet rate attacks. Readers should refer to the cited article to have a detailed explanation of how they work, and why these attacks remain a longstanding threat.</p>



<p>Since the end of 2023 and beginning of 2024, we noticed a large increase of packet rate attacks both in frequency and intensity, with intensity reaching an all-time high at the end of summer.</p>



<figure class="wp-block-image aligncenter size-full"><img decoding="async" width="1019" height="465" src="https://blog.ovhcloud.com/wp-content/uploads/2025/03/pps_distribution_per_month_jul23_dec24.png" alt="" class="wp-image-28413" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/03/pps_distribution_per_month_jul23_dec24.png 1019w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/pps_distribution_per_month_jul23_dec24-300x137.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/pps_distribution_per_month_jul23_dec24-768x350.png 768w" sizes="(max-width: 1019px) 100vw, 1019px" /><figcaption class="wp-element-caption">Figure 2: <em>Steadily growing trend of packet rate attacks frequency and intensity</em></figcaption></figure>



<p>During August, we dealt with more than 50 packet-rate attacks rating over one billion packets per second. Note that the highest publicly known packet rate attack at this time was the 840 Mpps attack we mitigated in April of the same year.</p>



<p>However, this attack campaign not only reached the billion packets per second milestone, but actually went much higher with packet rates up to 1.9 billions packets per second. Such a rate was mind-blowing for our teams, and rightly so! A symbolic threshold was not only reached, but largely exceeded. Since then, several organizations reported observing 1+ Gpps attacks and more: for instance, Cloudflare reported rates greater than 2 billions packets per second <sup data-fn="6242b4f8-d391-4fcd-8e5d-56cc46ecaa5d" class="fn"><a href="#6242b4f8-d391-4fcd-8e5d-56cc46ecaa5d" id="6242b4f8-d391-4fcd-8e5d-56cc46ecaa5d-link">2</a></sup> in an attack campaign which occurred just a few days after the attack campaign targeting OVHcloud and its customers, while Global Secure Layer reported a single 3.15 billions packets per second attack at the same time.<sup data-fn="8c211be4-e789-4c4d-8eec-4c6deb922374" class="fn"><a href="#8c211be4-e789-4c4d-8eec-4c6deb922374" id="8c211be4-e789-4c4d-8eec-4c6deb922374-link">3</a></sup></p>



<figure class="wp-block-image aligncenter size-full"><img decoding="async" width="826" height="268" src="https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_1900Mpps.png" alt="" class="wp-image-28501" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_1900Mpps.png 826w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_1900Mpps-300x97.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_1900Mpps-768x249.png 768w" sizes="(max-width: 826px) 100vw, 826px" /><figcaption class="wp-element-caption">Figure 3: <em>Biggest packet-rate attack observed in 2024 (up to 1.9 Gpps at peak, attacks in red)</em></figcaption></figure>



<p>Before moving on to the next topic, a notable fact related to this attack campaign is that it was heavily leveraging carpet-bombing techniques targeting up to thousands of IPs over hundreds of customers. Attackers are definitely not scared about trying to impact a lot of people in an attempt to take down a specific service, despite the increased attention this kind of attack generates.</p>



<h2 class="wp-block-heading" id="org9acd697">4. Ever-growing hyper-volumetric attacks: 4 Tbps reached</h2>



<p>During the month of September, we were thrilled to mitigate our very first 3+ Tbps attack ever. However, it was just a warning shot for what was to come: another massive attack campaign during October. Although we had only seen a handful of 2+ Tbps attacks in OVHcloud history, this two weeks campaign led to more than 40 attacks ranging from 2 Tbps up to a record-breaking (at the time) 4.2 Tbps attack.</p>



<figure class="wp-block-image aligncenter size-full"><img loading="lazy" decoding="async" width="832" height="267" src="https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_4200Gbps.png" alt="" class="wp-image-28503" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_4200Gbps.png 832w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_4200Gbps-300x96.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_4200Gbps-768x246.png 768w" sizes="auto, (max-width: 832px) 100vw, 832px" /><figcaption class="wp-element-caption">Figure 4: <em>Biggest bit-rate attack observed in 2024 (up to 4.2 Tbps at peak, attack in red)</em></figcaption></figure>



<p>Since most attacks exhibited similar characteristics, we will focus on the biggest one. At the time it happened, this attack was the largest bit rate attack ever (compared to previous publicly known records). It leveraged multiple attack vectors at once : TCP ACK flood accounted for ~60% of the total traffic, direct-path UDP flood accounted for 20%, while the remaining 20% was performed with various UDP reflections (mostly DNS).</p>



<p>We identified approximately 150,000 source IPs, mostly owned by residential ISPs from Europe and North America. For the most part, attackers did not seem to leverage source spoofing, since our data shows that traffic from IPs belonging to an ISP came from direct peering with said ISP or a related exchange/transit provider. However, the surprising amount of unique source IPs and the significant volume going through exchange/transit suggest there is possibly some undetected spoofing. Total count of unique source IPs should thus be considered with a lot of salt.</p>



<p>One notable thing also is that few tens of attacking IPs were sending 1+ Gbps each, which suggests high-grade residential connections with lot of upload bandwidth. Moreover, according to our analysis, all the direct-path attack traffic (approximately 80% of total) was originating from a Mirai-based botnet.</p>



<p>All these findings are in-line with conclusions from various cloud providers and analysts, showing the continuously growing threat of compromised IoT devices and home routers. 8 years after the initial release of Mirai code, this botnet family is still actively used to attempt disrupting the online economy.</p>



<p>Readers should note that since the 4.2 Tbps attack we just discussed, several actors reported even higher rates such as the 5.6 Tbps at Cloudflare in late 2024 <sup data-fn="3dbbae49-e228-4557-aeca-54ff02145c05" class="fn"><a href="#3dbbae49-e228-4557-aeca-54ff02145c05" id="3dbbae49-e228-4557-aeca-54ff02145c05-link">4</a></sup>, or the more recent 6.5 Tbps attack reported by Nokia in February 2025.<sup data-fn="3e7cf4bd-8aeb-4595-88d4-105c5ececa9f" class="fn"><a href="#3e7cf4bd-8aeb-4595-88d4-105c5ececa9f" id="3e7cf4bd-8aeb-4595-88d4-105c5ececa9f-link">5</a></sup></p>



<h2 class="wp-block-heading" id="orga8961f4">5. Institutional and residential ISPs spoofing</h2>



<p>Last but not least, we also observed another growing trend during the year: the large-scale spoofing of major residential ISPs.</p>



<p>We are used seeing many IPs belonging to residential ISPs participating in attacks, as a lot of compromised devices are located within those networks (&#8220;<em>I see you.. Internet of Things!</em>&#8220;). However we observed a growing number of attacks using those IPs, but originating from far abroad: for instance, we found traffic using IPs of major French ISPs (Orange, SFR, Bouygues, Free) but originating from the US west coast or Asia-Pacific, and coming through unrelated peering partners (despite us directly peering with said ISPs!). In this situation, source IPs are obviously spoofed.</p>



<figure class="wp-block-image aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="593" src="https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_entry_distribution-spoofedAS-1024x593.png" alt="" class="wp-image-28416" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_entry_distribution-spoofedAS-1024x593.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_entry_distribution-spoofedAS-300x174.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_entry_distribution-spoofedAS-768x445.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/inbound_entry_distribution-spoofedAS.png 1437w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Figure 5: <em>Typical entry distribution of an attack with spoofed sources</em></figcaption></figure>



<p>We also observed the same technique being used by spoofing large institutional actors, such as state actors or government-backed organizations which own several Internet prefixes.</p>



<p>An explanation about these attacks is that attackers are trying to leverage hypothetical bypasses in defense layers such as lax rate control, allow/forward rules, and others. This makes sense because, as a major european actor based in France (with a significant business in France), we could have considered being less strict with French IPs. It&#8217;s also much harder to react against an attack that could lead to actions shutting down legitimate traffic as well, which will be the case if one decides to deny entire ranges against such attacks (we don&#8217;t do that!).</p>



<p>Moreover, we sometimes have customers asking us to disable any DDoS protections for their IPs, because &#8220;we can trust them&#8221;. But that&#8217;s not how the Internet works. As a provider, protecting yourself against external spoofing is maybe doable on paper, but in reality, it&#8217;s close to impossible. That&#8217;s why we have security measures, and bypassing them even with the best intent will often prove itself as a bad decision, not only for the requesting customers but also for any other services which could be impacted because of this.</p>



<p>Finally, this issue highlights a crucial need for DDoS attacks remediation: all network operators have a part to play in preventing IP spoofing. This shall be done at two levels: at server/switch level by locally preventing IP spoofing from a specific host, and at the network level by preventing outbound traffic with source IPs not owned by the network operator.</p>



<h2 class="wp-block-heading" id="orge720bcc">6. Operation PowerOFF and consequences</h2>



<p>Operation PowerOFF is an ongoing joint operation by several law enforcement agencies around the world, specifically aimed at shutting down DDoS-for-hire operations. At the beginning of November 2024, they closed the infamous dstatc.cc platform, which provided means for attackers to benchmark the capabilities and effectiveness of DDoS attacks. Along with this closure, multiple DDoS-for-hire websites were closed, botnets dismantled, and cybercriminals arrested.<sup data-fn="02fba98e-e0ee-46dc-9581-322c4edc37d5" class="fn"><a href="#02fba98e-e0ee-46dc-9581-322c4edc37d5" id="02fba98e-e0ee-46dc-9581-322c4edc37d5-link">6</a></sup></p>



<figure class="wp-block-image aligncenter size-large"><img loading="lazy" decoding="async" width="1024" height="550" src="https://blog.ovhcloud.com/wp-content/uploads/2025/03/poweroff_dstat_homepage-1024x550.png" alt="" class="wp-image-28417" srcset="https://blog.ovhcloud.com/wp-content/uploads/2025/03/poweroff_dstat_homepage-1024x550.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/poweroff_dstat_homepage-300x161.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/poweroff_dstat_homepage-768x412.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/poweroff_dstat_homepage-1536x825.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2025/03/poweroff_dstat_homepage.png 1706w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Figure 6: <em>Homepage of dstat.cc since November 2024</em></figcaption></figure>



<p>This event led to a huge decline in frequency and intensity of network-layer DDoS attacks targeting OVHcloud infrastructures and customers. For some time, our attack statistics were quite below their usual levels of the past two years. This fact proves the effectiveness of global coordinated actions to take down botnets, and should call for more.</p>



<h2 class="wp-block-heading" id="org940b1ab">7. Conclusion and closing words</h2>



<p>In the past, network-layer DDoS attacks were often dismissed as a minor inconvenience, or even a solved problem. However, as year 2024 proved, they still represent a growing and longstanding threat which must be addressed seriously. That&#8217;s one reason why DDoS attacks are often stated in threat reports emanating from various actors, such as a recent threat report published by the French national information security agency (ANSSI) in February 2025.<sup data-fn="20e08343-9d6a-4511-a7a7-5578007f1bec" class="fn"><a href="#20e08343-9d6a-4511-a7a7-5578007f1bec" id="20e08343-9d6a-4511-a7a7-5578007f1bec-link">7</a></sup></p>



<p>Although application-layer attacks (especially HTTPS) are more popular nowadays for several reasons, no one should dismiss network-layer attacks as an unsignificant risk. If dealing successfully with billions of packets per second or several terabits of traffic may seem like an achievement for a few of us, it is a very difficult challenge for many. Be prepared!</p>



<p>Fighting against these threats must be done at both an individual and a global level. Coordinated efforts are a necessity in today&#8217;s DDoS landscape and will probably be even more important in years to come. It may sound scary, but remember it actually has a positive impact as demonstrated once again by Operation PowerOFF.</p>



<p>Thanks for reading.</p>


<ol class="wp-block-footnotes"><li id="956b42b5-26ed-4005-aace-cb55eb1d842f"><a href="https://blog.ovhcloud.com/the-rise-of-packet-rate-attacks-when-core-routers-turn-evil/" data-wpel-link="internal">https://blog.ovhcloud.com/the-rise-of-packet-rate-attacks-when-core-routers-turn-evil/</a> <a href="#956b42b5-26ed-4005-aace-cb55eb1d842f-link" aria-label="Jump to footnote reference 1">↩︎</a></li><li id="6242b4f8-d391-4fcd-8e5d-56cc46ecaa5d"><a href="https://blog.cloudflare.com/ddos-threat-report-for-2024-q3/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://blog.cloudflare.com/ddos-threat-report-for-2024-q3/</a> <a href="#6242b4f8-d391-4fcd-8e5d-56cc46ecaa5d-link" aria-label="Jump to footnote reference 2">↩︎</a></li><li id="8c211be4-e789-4c4d-8eec-4c6deb922374"><a href="https://globalsecurelayer.com/blog/unprecedented-3-15-billion-packet-rate-ddos-attack" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://globalsecurelayer.com/blog/unprecedented-3-15-billion-packet-rate-ddos-attack</a> <a href="#8c211be4-e789-4c4d-8eec-4c6deb922374-link" aria-label="Jump to footnote reference 3">↩︎</a></li><li id="3dbbae49-e228-4557-aeca-54ff02145c05"><a href="https://blog.cloudflare.com/ddos-threat-report-for-2024-q4/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://blog.cloudflare.com/ddos-threat-report-for-2024-q4/</a> <a href="#3dbbae49-e228-4557-aeca-54ff02145c05-link" aria-label="Jump to footnote reference 4">↩︎</a></li><li id="3e7cf4bd-8aeb-4595-88d4-105c5ececa9f"><a href="https://arstechnica.com/security/2025/03/massive-botnet-that-appeared-overnight-is-delivering-record-size-ddoses/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://arstechnica.com/security/2025/03/massive-botnet-that-appeared-overnight-is-delivering-record-size-ddoses/</a> <a href="#3e7cf4bd-8aeb-4595-88d4-105c5ececa9f-link" aria-label="Jump to footnote reference 5">↩︎</a></li><li id="02fba98e-e0ee-46dc-9581-322c4edc37d5"><a href="https://www.europol.europa.eu/media-press/newsroom/news/law-enforcement-shuts-down-27-ddos-booters-ahead-of-annual-christmas-attacks" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.europol.europa.eu/media-press/newsroom/news/law-enforcement-shuts-down-27-ddos-booters-ahead-of-annual-christmas-attacks</a> <a href="#02fba98e-e0ee-46dc-9581-322c4edc37d5-link" aria-label="Jump to footnote reference 6">↩︎</a></li><li id="20e08343-9d6a-4511-a7a7-5578007f1bec"><a href="https://www.cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-001/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">https://www.cert.ssi.gouv.fr/cti/CERTFR-2025-CTI-001/</a> <a href="#20e08343-9d6a-4511-a7a7-5578007f1bec-link" aria-label="Jump to footnote reference 7">↩︎</a></li></ol><img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fa-brief-retrospective-of-network-layer-ddos-attacks-in-2024-at-ovhcloud%2F&amp;action_name=A%20brief%20retrospective%20of%20network-layer%20DDoS%20attacks%20in%202024%20at%20OVHcloud&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Rise of Packet Rate Attacks: When Core Routers Turn Evil</title>
		<link>https://blog.ovhcloud.com/the-rise-of-packet-rate-attacks-when-core-routers-turn-evil/</link>
		
		<dc:creator><![CDATA[Sebastien Meriot&nbsp;and&nbsp;Christophe Bacara]]></dc:creator>
		<pubDate>Tue, 02 Jul 2024 10:00:25 +0000</pubDate>
				<category><![CDATA[OVHcloud Engineering]]></category>
		<category><![CDATA[DDoS]]></category>
		<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://blog.ovhcloud.com/?p=26942</guid>

					<description><![CDATA[A sharp increase of DDoS attacks have been observed since the beginning of 2023. A new trend is to send high packet rate attacks though. This article introduces the findings of our teams in order to bring new insights regarding this threat.<img src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fthe-rise-of-packet-rate-attacks-when-core-routers-turn-evil%2F&amp;action_name=The%20Rise%20of%20Packet%20Rate%20Attacks%3A%20When%20Core%20Routers%20Turn%20Evil&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></description>
										<content:encoded><![CDATA[
<p><em>This article assumes a base understanding of Internet and networking concepts.</em></p>



<p><em>2024-07-04 &#8211; Edit: We are currently working with </em>MikroTik</p>



<p><em>A sharp increase of DDoS attacks have been observed since the beginning of 2023. A new trend is to send high packet rate attacks though. This article introduces the findings of our teams in order to bring new insights regarding this threat.</em></p>



<h2 class="wp-block-heading">Introduction</h2>



<p><a href="https://www.ovhcloud.com/en/security/anti-ddos/ddos-definition/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Distributed Denial of Services attacks (DDoS)</a> are a longstanding issue which remains an effective way to impact the availability of an online service. Over the past decade, several actors demonstrated how easily they could raise an army of zombie devices with their botnet using a wide range of techniques, from using phishing to install malware on a desktop host up to leveraging different kind of vulnerabilities affecting IoT devices, CCTV, or residential routers.</p>



<p>These botnets have been largely used to send DDoS attacks using tens of thousands of compromised devices all around the world. The patterns of attack were often the same: just craft as many packets as you can in an attempt to reach the highest possible bit rate (or packet rate) to cripple your target&#8217;s networking capabilities. This is what happened with the <a href="https://blog.ovhcloud.com/la-goutte-ddos-na-pas-fait-deborder-le-vac/" data-wpel-link="internal">Mirai botnet</a> back in 2016 which has been the first one to generate more than 1 Tbps (Terabit per second). Since then, several botnets have far surpassed the original Mirai up to&nbsp;3.47 Tbps in 2021. However, 1+ Tbps attacks remained quite rare&#8230; until recently.</p>



<p>Since the beginning of 2023, we noticed a sharp increase of DDoS attacks, both in frequency and intensity. Moreover, starting from November of the same year, a significant acceleration of the trend has been observed by our teams at OVHcloud: while DDoS reaching 1 Tbps or above were occasional, they aren&#8217;t anymore. In the past 18 months, we went from 1+ Tbps attacks being quite rare, then weekly, to almost daily (averaged out over one week). The highest bit rate we observed during that period was ~2.5 Tbps.</p>



<figure data-wp-context="{&quot;imageId&quot;:&quot;69dfca77798f8&quot;}" data-wp-interactive="core/image" data-wp-key="69dfca77798f8" class="wp-block-image size-full is-style-default wp-lightbox-container"><img loading="lazy" decoding="async" width="1678" height="310" data-wp-class--hide="state.isContentHidden" data-wp-class--show="state.isContentVisible" data-wp-init="callbacks.setButtonStyles" data-wp-on--click="actions.showLightbox" data-wp-on--load="callbacks.setButtonStyles" data-wp-on-window--resize="callbacks.setButtonStyles" src="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image.png" alt="" class="wp-image-26945" srcset="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image.png 1678w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-300x55.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-1024x189.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-768x142.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-1536x284.png 1536w" sizes="auto, (max-width: 1678px) 100vw, 1678px" /><button
			class="lightbox-trigger"
			type="button"
			aria-haspopup="dialog"
			aria-label="Enlarge"
			data-wp-init="callbacks.initTriggerButton"
			data-wp-on--click="actions.showLightbox"
			data-wp-style--right="state.imageButtonRight"
			data-wp-style--top="state.imageButtonTop"
		>
			<svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" fill="none" viewBox="0 0 12 12">
				<path fill="#fff" d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z" />
			</svg>
		</button><figcaption class="wp-element-caption"><em><strong>Figure 1</strong>: on May, 25<sup>th</sup>. 2024, a 1.5 Tbps attack directly followed by the biggest bit rate ever recorded at OVHcloud, 2.5 Tbps at peak.</em></figcaption></figure>



<p>Interestingly, the recent <a href="https://www.justice.gov/opa/pr/911-s5-botnet-dismantled-and-its-administrator-arrested-coordinated-international-operation" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">announcement of the 911 S5 Botnet dismantling</a> between May 25<sup>th</sup>&nbsp;and May, 30<sup>th</sup>&nbsp;2024 loosely coincides with a significant decline of DDoS attacks, which started by mid of May. However, we cannot affirm with certainty these events are linked together.</p>



<p>While attacks frequency is seemingly back to normal, we are still observing a large amount of DDoS attacks involving packet rates greater than 100 Mpps (Millions packets per second).</p>



<h2 class="wp-block-heading">What about packet rate attacks?</h2>



<p>Usually, most DDoS attacks rely on sending a lot of garbage data to sature the bandwidth (network-layer attacks) or sending a lot of application requests to cause excessive CPU or memory usage (application-layer attacks). Of course there are other methods to leverage: among those are packet rate attacks or packets per second based attacks.</p>



<p>Packet rate attacks objective is to overload the packet processing engines of networking devices close to the destination, instead of starving the available bandwidth. The general idea is to cripple the infrastructures in front of the targeted service (e.g., load-balancers, anti-DDoS systems, &#8230;), thus possibly impacting a large infrastructure as collateral damage. Simply put: instead of trying to find holes in anti-DDoS systems, just take them down!</p>



<p>Packet rate attacks are quite effective since dealing with&nbsp;<strong>a lot</strong>&nbsp;of small packets is usually harder than dealing with bigger but less numerous packets. This is because the computing cost is generally higher. For instance, if you&#8217;re using software to process packets, each packet means one memory access at the very least (excluding possible copy, access to stored data such as connection tables, &#8230;), instead of simply iterating over more bytes. If you&#8217;re using hardware, while packet processing performances are not necessarily affected by the packet rate, the processing pipeline probably depends on other components, such as memory (again!), which could be stressed a lot by high packet rates. In those conditions, you may reach some limits due to the very high rate or just because you don&#8217;t have enough buffers to store it all, which will probably induce latency or performance losses. We can summarize this problem into a single sentence: if your job is to deal mostly with payloads, bandwidth may be the hard limit ; but if your job is to deal mostly with packet headers, packet rate is the hard limit.</p>



<p>That&#8217;s why in most conditions, dealing with small packets is harder than dealing with big packets. In a nutshell, a 10 Gbps DDoS attack with big packets (1480 bytes) yields ~0.85 Mpps: in comparison, 10 Gbps with the smallest packets (84 bytes on wire for Ethernet) yields a massive ~14.88 Mpps.</p>



<p>In the context of standard Internet MTU (1500), you can fit 17 times more packets on wire when generating only the smallest packets possible, compared to big packets. To give an idea of the computing capabilities needed in the context of DDoS mitigation, consider a 100 Gbps link will fit ~149 Mpps line-rate: this allows up to 6 nanoseconds of processing time per&nbsp;packet, or 18 cycles for a single compute pipeline running at 3 GHz clock speed. Saying it otherwise: even with tens of parallel pipelines, you don&#8217;t have many cycles available, especially if you need to <a href="https://gist.github.com/jboner/2841832" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">access some memory</a>.</p>



<p>As a side note, this is one of the reason why OVHcloud is building its own networking appliances for DDoS infrastructures. We use a combination of FPGA and userland software (DPDK) to build appliances with off-the-shelf hardware. Each network appliance used to mitigate DDoS attacks is designed, implemented and maintained in-house (just like the rest of our anti-DDoS systems by the way!). Thanks to this streamlined approach, we are able to finely adjust performance expectations and constraints, then ensure our appliances match accordingly.</p>



<h2 class="wp-block-heading">The rise of (big) packet rate attacks</h2>



<p>DDoS attacks relying on high packet rate are not new and network operators all over the world had to face such attacks at least once. As an example, the highest publicly-known packet rate attack was reported by <a href="https://www.akamai.com/blog/news/largest-ever-recorded-packet-per-secondbased-ddos-attack-mitigated-by-akamai" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Akamai in 2020</a> and reached 809 Mpps. However, despite this big figure, a vast majority of packet rate attacks are well below 100 Mpps. This is probably because generating a lot of small packets is harder than generating big ones (you need much more compute &#8211; similarly to processing) and is harder to hide from network monitoring and anti-abuse systems.</p>



<p>Packet rate attacks started to seriously get some attention at OVHcloud two years ago, after we were hit  —&nbsp; but successfully mitigated —&nbsp; by a gigantic UDP flood for more than 6 hours, reaching ~700 Mpps in average for ~4 hours.</p>



<figure data-wp-context="{&quot;imageId&quot;:&quot;69dfca7779ee5&quot;}" data-wp-interactive="core/image" data-wp-key="69dfca7779ee5" class="wp-block-image size-full wp-lightbox-container"><img loading="lazy" decoding="async" width="1309" height="249" data-wp-class--hide="state.isContentHidden" data-wp-class--show="state.isContentVisible" data-wp-init="callbacks.setButtonStyles" data-wp-on--click="actions.showLightbox" data-wp-on--load="callbacks.setButtonStyles" data-wp-on-window--resize="callbacks.setButtonStyles" src="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-1.png" alt="" class="wp-image-26946" srcset="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-1.png 1309w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-1-300x57.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-1-1024x195.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-1-768x146.png 768w" sizes="auto, (max-width: 1309px) 100vw, 1309px" /><button
			class="lightbox-trigger"
			type="button"
			aria-haspopup="dialog"
			aria-label="Enlarge"
			data-wp-init="callbacks.initTriggerButton"
			data-wp-on--click="actions.showLightbox"
			data-wp-style--right="state.imageButtonRight"
			data-wp-style--top="state.imageButtonTop"
		>
			<svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" fill="none" viewBox="0 0 12 12">
				<path fill="#fff" d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z" />
			</svg>
		</button><figcaption class="wp-element-caption"><strong><em>Figure 2</em></strong><em>: this particular attack highlighted, at the time, the significant increase of capacity by botnets to generate ludicrous packet rate while being able to sustain that rate for a long period of time.</em></figcaption></figure>



<p>In the past 18 months, and especially in the past 6 months, we noticed a sharp increase of DDoS attacks leveraging packet rates greater than 100 Mpps. We went from mitigating few of them each week, to tens or even hundreds per week. Our infrastructures had to mitigate several 500+ Mpps attacks at the beginning of 2024, including one peaking at 620 Mpps. In April 2024, we even mitigated a record-breaking DDoS attack reaching ~840 Mpps, just above the previous record reported by Akamai.</p>



<figure data-wp-context="{&quot;imageId&quot;:&quot;69dfca777a340&quot;}" data-wp-interactive="core/image" data-wp-key="69dfca777a340" class="wp-block-image size-full wp-lightbox-container"><img loading="lazy" decoding="async" width="834" height="298" data-wp-class--hide="state.isContentHidden" data-wp-class--show="state.isContentVisible" data-wp-init="callbacks.setButtonStyles" data-wp-on--click="actions.showLightbox" data-wp-on--load="callbacks.setButtonStyles" data-wp-on-window--resize="callbacks.setButtonStyles" src="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-3.png" alt="" class="wp-image-26948" srcset="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-3.png 834w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-3-300x107.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-3-768x274.png 768w" sizes="auto, (max-width: 834px) 100vw, 834px" /><button
			class="lightbox-trigger"
			type="button"
			aria-haspopup="dialog"
			aria-label="Enlarge"
			data-wp-init="callbacks.initTriggerButton"
			data-wp-on--click="actions.showLightbox"
			data-wp-style--right="state.imageButtonRight"
			data-wp-style--top="state.imageButtonTop"
		>
			<svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" fill="none" viewBox="0 0 12 12">
				<path fill="#fff" d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z" />
			</svg>
		</button><figcaption class="wp-element-caption"><strong><em>Figure 3</em></strong><em>: record-breacking DDoS attack mitigated by OVHcloud reaching 840 Mpps</em></figcaption></figure>



<p>This attack was 99% of TCP ACK, originating from approximately 5,000 source IPs. Interestingly, the 1% remainder was a DNS reflection attack, leveraging ~15,000 DNS servers to amplify the traffic, which is not really efficient when trying to achieve high packet rate attacks.</p>



<p>While the attack was distributed worldwide, 2/3 of total packets entered from only 4 PoPs, all located in the US with 3 of them being on the west coast. This highlights the capability of the adversary to send a huge packet rate through only few peerings, which can prove very problematic. Generally, anti-DDoS response teams — not only at OVHcloud — assumes that it&#8217;s really hard to send massive DDoS from only few geographical locations. Based on this assumption, our infrastructures are scaled horizontally, spread worldwide, and they absorb the load more easily. However, the traffic distribution of the 840 Mpps attack has strongly questioned this assumption. While we do have the local capacity to mitigate this attack, we will consider to adjust the general scaling and distribution model of our anti-DDoS infrastructures to ensure to cope with future (and probably bigger) attacks, just as we do today.</p>



<p>In the end, the significant rise of high packet rate attacks led us&nbsp;to deep dive the topic. As a worldwide cloud provider, OVHcloud is scrubbing many DDoS attacks on a daily basis, which gives us an exceptional vantage point on this topic. We wanted to understand how these attacks were generated, where they came from, and possibly determine what we could do to better protect our infrastructures and customers against this kind of firepower.</p>



<h2 class="wp-block-heading">Unveiling evil core routers</h2>



<p>During our analysis campaign, manually dissecting almost a hundred packet rate attacks ranging from 100 up to 500 Mpps, we noticed that many attacks originated from not-that-many sources, which are sending a large proportion of the total traffic. We established a list of well-known offending IPs capable of generating at least 1 Mpps each, and decided to dig further.</p>



<p>We analyzed the top 70 IPs issuing the highest packet rates, up to 14.8 Mpps per IP. These IPs belongs mostly to Autonomous Systems (AS) in Asia, but Europe, Middle-East, North American and South America are also represented. The ASs identified seem to belong mostly to business ISPs or Cloud Connectivity providers.</p>



<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:100%">
<figure class="wp-block-image aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="852" height="688" src="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-4.png" alt="" class="wp-image-26949" style="width:384px;height:auto" srcset="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-4.png 852w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-4-300x242.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-4-768x620.png 768w" sizes="auto, (max-width: 852px) 100vw, 852px" /><figcaption class="wp-element-caption"><strong><em>Figure 4</em></strong><em>: distribution by locations of the AS of the top 70 IPs issuing the highest packet rates.</em></figcaption></figure>
</div>
</div>



<p>To understand what kind of devices were involved in these DDoS, we used <a href="https://www.onyphe.io/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">Onyphe</a> to determine if these IPs were known. Indeed, a great part of these IPs are known as MikroTik Routers and are exposing on the Internet — at least — the configuration webpage.&nbsp; </p>



<p>At this point, it remains possible this traffic is generated either by servers located behind a router configured with NAT, using spoofed IP, or leveraging some kind of weird TCP reflection. However, we quickly dismissed these hypotheses due to the improbability of encountering such a significant number of identified MikroTik routers, given that MikroTik does not hold a proportionately large market share. In addition, exposing an administration interface reflects poor management practices. It increases the device&#8217;s attack surface and can facilitate its compromise by an attacker. Moreover, RouterOS — MikroTik&#8217;s operating system — has suffered from several critical CVE over the past years. Even if a patch has been released, these devices may have not been patched so far.</p>



<p>Since the HTTP interface is open on most of the devices, it is possible to use it to recover the version of RouterOS running on said devices. Half of them are running a RouterOS version prior to 6.49.8 – released on May, 23<sup>rd.</sup>&nbsp;2023 – and the other half is running a later version. For instance, devices running RouterOS 6.49.14 – released on Aprit, 4<sup>th</sup>. 2024 &#8211; have been identified.</p>



<figure data-wp-context="{&quot;imageId&quot;:&quot;69dfca777a973&quot;}" data-wp-interactive="core/image" data-wp-key="69dfca777a973" class="wp-block-image size-full wp-lightbox-container"><img loading="lazy" decoding="async" width="2338" height="756" data-wp-class--hide="state.isContentHidden" data-wp-class--show="state.isContentVisible" data-wp-init="callbacks.setButtonStyles" data-wp-on--click="actions.showLightbox" data-wp-on--load="callbacks.setButtonStyles" data-wp-on-window--resize="callbacks.setButtonStyles" src="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-8.png" alt="" class="wp-image-26958" srcset="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-8.png 2338w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-8-300x97.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-8-1024x331.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-8-768x248.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-8-1536x497.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-8-2048x662.png 2048w" sizes="auto, (max-width: 2338px) 100vw, 2338px" /><button
			class="lightbox-trigger"
			type="button"
			aria-haspopup="dialog"
			aria-label="Enlarge"
			data-wp-init="callbacks.initTriggerButton"
			data-wp-on--click="actions.showLightbox"
			data-wp-style--right="state.imageButtonRight"
			data-wp-style--top="state.imageButtonTop"
		>
			<svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" fill="none" viewBox="0 0 12 12">
				<path fill="#fff" d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z" />
			</svg>
		</button><figcaption class="wp-element-caption"><strong><em>Figure 5</em></strong><em>: example of MikroTik device involved in high packet rate attacks identified by OVHcloud</em> <em>teams.</em></figcaption></figure>



<p>We have been surprised to discover devices with a recent firmware being potentially compromised though. As far as we know, no vulnerability affecting RouterOS 6.49.14 and later versions have been publicly published so far. A possible explanation would be these devices may&nbsp;have been patched after their compromission.</p>



<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:100%">
<p>We can&#8217;t say yet why these devices are involved in coordinated DDoS attacks, but one possible hypothesis could be the <a href="https://help.mikrotik.com/docs/display/ROS/Bandwidth+Test" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">&#8220;Bandwidth test&#8221; feature</a> from RouterOS. It allows the administrator to test the real throughput of a router by crafting packets and perform stress tests. Coincidentally, the documentation states the following: &#8220;<em>Up to RouterOS version 6.44beta39, Bandwidth Test used only single CPU core and reached its limits when core was 100% loaded. Bandwidth Test [now] uses all available bandwidth (by default) and may impact network usability</em>&#8220;. This is quite interesting since we mostly identified RouterOS v6.44 or above among the offending IPs.</p>



<h2 class="wp-block-heading">99,382 devices available on the Internet</h2>



<p>Using SNMP on devices exposing it, we have been able to determine what kind of devices were capable to issue such a high packet rate. As expected these are not residential routers, but rather core network devices.</p>



<figure data-wp-context="{&quot;imageId&quot;:&quot;69dfca777ae74&quot;}" data-wp-interactive="core/image" data-wp-key="69dfca777ae74" class="wp-block-image size-full wp-lightbox-container"><img loading="lazy" decoding="async" width="2484" height="422" data-wp-class--hide="state.isContentHidden" data-wp-class--show="state.isContentVisible" data-wp-init="callbacks.setButtonStyles" data-wp-on--click="actions.showLightbox" data-wp-on--load="callbacks.setButtonStyles" data-wp-on-window--resize="callbacks.setButtonStyles" src="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-9.png" alt="" class="wp-image-26959" srcset="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-9.png 2484w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-9-300x51.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-9-1024x174.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-9-768x130.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-9-1536x261.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-9-2048x348.png 2048w" sizes="auto, (max-width: 2484px) 100vw, 2484px" /><button
			class="lightbox-trigger"
			type="button"
			aria-haspopup="dialog"
			aria-label="Enlarge"
			data-wp-init="callbacks.initTriggerButton"
			data-wp-on--click="actions.showLightbox"
			data-wp-style--right="state.imageButtonRight"
			data-wp-style--top="state.imageButtonTop"
		>
			<svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" fill="none" viewBox="0 0 12 12">
				<path fill="#fff" d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z" />
			</svg>
		</button><figcaption class="wp-element-caption"><strong><em>Figure 6</em></strong><em>: identification of the Cloud Core Router devices</em></figcaption></figure>



<p>The results highlight the MikroTik CCR series, which stands for Cloud Core Router. Indeed, SNMP returned several <a href="https://mikrotik.com/product/CCR1036-8G-2Splus#fndtn-specifications" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">CCR1036-8G-2S+</a> and <a href="https://mikrotik.com/product/CCR1072-1G-8Splus#fndtn-specifications" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">CCR1072-1G-8S+</a>.</p>



<p>In order to have an overview of how many devices could be compromised and used in such massive packet rate DDoS attacks, we used Onyphe once again to search for CCR devices wide open on the Internet. 99,382 CCR devices were identified.</p>



<figure data-wp-context="{&quot;imageId&quot;:&quot;69dfca777b29c&quot;}" data-wp-interactive="core/image" data-wp-key="69dfca777b29c" class="wp-block-image size-large wp-lightbox-container"><img loading="lazy" decoding="async" width="1024" height="604" data-wp-class--hide="state.isContentHidden" data-wp-class--show="state.isContentVisible" data-wp-init="callbacks.setButtonStyles" data-wp-on--click="actions.showLightbox" data-wp-on--load="callbacks.setButtonStyles" data-wp-on-window--resize="callbacks.setButtonStyles" src="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-10-1024x604.png" alt="" class="wp-image-26960" srcset="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-10-1024x604.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-10-300x177.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-10-768x453.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-10.png 1418w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><button
			class="lightbox-trigger"
			type="button"
			aria-haspopup="dialog"
			aria-label="Enlarge"
			data-wp-init="callbacks.initTriggerButton"
			data-wp-on--click="actions.showLightbox"
			data-wp-style--right="state.imageButtonRight"
			data-wp-style--top="state.imageButtonTop"
		>
			<svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" fill="none" viewBox="0 0 12 12">
				<path fill="#fff" d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z" />
			</svg>
		</button><figcaption class="wp-element-caption"><em><strong>Figure 7</strong>: distribution of the device models found open on the Internet according to Onyphe.</em></figcaption></figure>



<p>We can see that both&nbsp;device models&nbsp;involved in the packet rate attacks observed by our teams – CCR1036-8G-2S+ and CCR1072-1G-8S+ – represents at least 40,000 devices open on the Internet. The CCR1036-8G-2S+ is the most found device on the Internet with 30,976 occurrences, and the CR1072-1G-8S+ is the 4<sup>th</sup> most found device with 9,353 occurrences. Since we still don&#8217;t know what kind of vulnerability has been leveraged to&nbsp;compromise these device models, we can&#8217;t say yet whether other CCR models could be compromised as well or not.&nbsp;Nonetheless, exposing the administration panel on the Internet remains a big risk for the security of the device though.</p>



<h2 class="wp-block-heading">Even more evil models?</h2>



<p>Thanks to internal data sharing and discussions, we were reminded about a L7 attack which occurred during November 2023. At the time, MikroTik routers were identified, but it did not ring bells. This attack reached 1.2 millions requests per second using HTTPS and involved roughly 3,000 source IPs. Considering our recent findings, we decided to take another look at it.</p>



<figure data-wp-context="{&quot;imageId&quot;:&quot;69dfca777b6cf&quot;}" data-wp-interactive="core/image" data-wp-key="69dfca777b6cf" class="wp-block-image size-large is-resized wp-lightbox-container"><img loading="lazy" decoding="async" width="1024" height="277" data-wp-class--hide="state.isContentHidden" data-wp-class--show="state.isContentVisible" data-wp-init="callbacks.setButtonStyles" data-wp-on--click="actions.showLightbox" data-wp-on--load="callbacks.setButtonStyles" data-wp-on-window--resize="callbacks.setButtonStyles" src="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-11-1024x277.png" alt="" class="wp-image-26963" style="width:750px;height:auto" srcset="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-11-1024x277.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-11-300x81.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-11-768x207.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-11-1536x415.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-11-2048x553.png 2048w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><button
			class="lightbox-trigger"
			type="button"
			aria-haspopup="dialog"
			aria-label="Enlarge"
			data-wp-init="callbacks.initTriggerButton"
			data-wp-on--click="actions.showLightbox"
			data-wp-style--right="state.imageButtonRight"
			data-wp-style--top="state.imageButtonTop"
		>
			<svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" fill="none" viewBox="0 0 12 12">
				<path fill="#fff" d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z" />
			</svg>
		</button><figcaption class="wp-element-caption"><b><i>F</i></b><em><strong>igure 8</strong>: layer 7 DDoS attack involving MikroTik devices recorded in November 2023.</em></figcaption></figure>



<p>In order to understand which kind of routers were involved, we recovered the 3,000 IPs involved in the attack. Past investigations shown approximately 700 IPs identified as MikroTik routers and exposing the port TCP/8291. However, we did not check at the time which kind of device were involved.</p>



<p>Just like we did before &#8211; we made a quick research using Onyphe. We first did it manually and quickly found the exact same results as before: Cloud Core Routers devices were involved in this attack as well. Among the IPs identified as CCR devices, over 10% were publicly exposing SMNP. Once again, we found core network devices: for instance, 16% of exposed devices are <a href="https://mikrotik.com/product/CCR1009-7G-1C-1Splus#fndtn-specifications" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">CCR1009-7G-1C-1S+</a> which is another similar model. This specific model is the 2<sup>nd</sup> most exposed model on the Internet according to our findings described in the previous section.</p>



<p>Determining the RouterOS version running on identified devices 8 months ago is probably not relevant, since we can&#8217;t say which version was running on the device at the time. However, analysis shows that 22% of the devices are running a RouterOS released between July 1<sup>st</sup>. 2023 and July 1<sup>st</sup> 2024. The most recent version is v6.49.15 (2024-05-24), while the oldest one is v5.20 (2012-08-15).</p>



<figure data-wp-context="{&quot;imageId&quot;:&quot;69dfca777bb5f&quot;}" data-wp-interactive="core/image" data-wp-key="69dfca777bb5f" class="wp-block-image size-large wp-lightbox-container"><img loading="lazy" decoding="async" width="1024" height="256" data-wp-class--hide="state.isContentHidden" data-wp-class--show="state.isContentVisible" data-wp-init="callbacks.setButtonStyles" data-wp-on--click="actions.showLightbox" data-wp-on--load="callbacks.setButtonStyles" data-wp-on-window--resize="callbacks.setButtonStyles" src="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-12-1024x256.png" alt="" class="wp-image-26965" srcset="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-12-1024x256.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-12-300x75.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-12-768x192.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-12-1536x384.png 1536w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-12.png 1690w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><button
			class="lightbox-trigger"
			type="button"
			aria-haspopup="dialog"
			aria-label="Enlarge"
			data-wp-init="callbacks.initTriggerButton"
			data-wp-on--click="actions.showLightbox"
			data-wp-style--right="state.imageButtonRight"
			data-wp-style--top="state.imageButtonTop"
		>
			<svg xmlns="http://www.w3.org/2000/svg" width="12" height="12" fill="none" viewBox="0 0 12 12">
				<path fill="#fff" d="M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z" />
			</svg>
		</button><figcaption class="wp-element-caption"><strong><em>Figure 9</em></strong><em>: identification of the device models with Cloud Core Router once again involved.</em></figcaption></figure>



<figure class="wp-block-image aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="722" src="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-13-1024x722.png" alt="" class="wp-image-26966" style="width:390px;height:auto" srcset="https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-13-1024x722.png 1024w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-13-300x212.png 300w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-13-768x541.png 768w, https://blog.ovhcloud.com/wp-content/uploads/2024/07/image-13.png 1078w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption"><strong><em>Figure 10</em></strong><em>: distribution of CCR device models involved in the recorded L7 attack.</em></figcaption></figure>



<p>Unfortunately, we do not have enough data anymore to provide possible requests rate depending on the device model.</p>



<p>As said before, it&#8217;s still hard to know how these devices have been compromised. Likewise, it is difficult to determine whether these attacks are related and if the same botnet is involved in the high packet rate attacks and the L7 attacks. In any case, highlighting the presence of network core devices in L7 attacks remains interesting since it demonstrates how much of a threat these devices could represent.</p>



<h2 class="wp-block-heading">Let&#8217;s do some math</h2>



<p>In order to hint at the possible capacity of a botnet leveraging these devices, we decided to focus on packet rate attacks which are well identified.</p>



<p>A quick overview of advertised capabilities for identified devices shows they are capable of handling up to 28 Gbps – for the CCR1036-8G-2S+ –  or 80 Gbps  – for the CCR1072-1G-8S+. In terms of packet rate, they claim to handle the approximate theoretical packet line-rate with respect to their bandwidth processing capabilities. As a reminder for readers, you can fit ~1.5 Mpps at most in a 1 Gbps link. Depending on the capabilities of devices to craft packets instead of just forwarding them, which is generally done in CPU whenever necessary instead of using ASICs, the amount of packets per second possibly generated by the device could vary greatly and be far lower than advertised processing capabilities. Moreover, generating traffic using the hardware of a compromised device is far from trivial: an intruder will most likely attempt to leverage CPU capabilities only or built-in features whose use has been slightly diverted from their intended usage.</p>



<p>In the context of this thought exercise, we assume networking devices are capable of crafting packets at a rate equal to 10% of their maximal capacity, leading to the following assumptions:</p>



<ul class="wp-block-list">
<li>CCR1036-8G-2S+ should be able to generate 4 Mpps each</li>



<li>CCR1072-1G-8S+ should be able to generate 12 Mpps each</li>
</ul>



<p>These estimations seems mostly accurate when compared to what we actually observed in terms of packet rates depending on the identified model. Considering the available CPU on these devices, we think these estimations are quite conservative: for instance, in the case of CCR1036-8G-2S+ devices,&nbsp;generating&nbsp;more than 4 Mpps with 36 cores @ 1.2GHz should not be difficult.</p>



<p>At this point, anyone can do the math to build a naive scale model of a botnet leveraging these devices. Considering a rate of 1% (arbitrary conservative value) of exposed devices being compromised, and focusing only on the first two models we identified as compromised:</p>
</div>
</div>



<ul class="wp-block-list">
<li>~ 300x CCR1036-8G-2S+ / 4 Mpps each</li>



<li>~&nbsp;&nbsp; 90x CCR1072-1G-8S+ / 12 Mpps each</li>
</ul>



<p>Such a botnet would theoretically be able to generate 2.28 billions packets per second (or Gpps).</p>



<p>In terms of requests per second capacity for L7 attacks, we do not have enough data to emit a strong enough hypothesis. We can only affirm theses devices seems well able to perform L7 attacks and high packet rate attacks. Attempting to estimate possible L7 capacity is left as an exercise for the reader.</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>The evidences highlighted in this article suggests a new trend: leveraging compromised network core devices to perform powerful attacks. Even if <a href="https://blog.qrator.net/en/meris-botnet-climbing-to-the-record_142/" data-wpel-link="external" target="_blank" rel="nofollow external noopener noreferrer">MikroTik devices may have been already involved in DDoS attacks</a>, no evidence yet was indicating these botnets were relying upon network core devices.</p>



<p>While any high-end server could perfectly be capable of generating packet rates at this scale, they will probably be limited by the actual amount of available public bandwidth. Because of their location within network, core devices are much less affected by this assertion: they are generally connected to even bigger devices using high-capacity network links. Moreover, the mitigations implemented by network administrators to identify abnormal behaviours on the network — such as servers initiating DDoS attacks — can be bypassed in this case because routers are generally not subject to these measures.</p>



<p>Depending on the number of compromised devices and their actual capabilities, this could be a new era for packet rate attacks: with botnets possibly capable of issuing billions of packets per second, it could seriously challenge how anti-DDoS infrastructures are built and scaled. We will definitely take this new threat into account when thinking about how we build and scale our own anti-DDoS infrastructures to make sure we remain out of any possible impact.&nbsp;</p>



<p>To conclude, the&nbsp;security of network devices&nbsp;is both a pressing concern and an actual issue. Since January, 1<sup>st</sup>. 2024, more than 10 critical CVEs have been released affecting various network devices from multiple vendors (Ivanti, Cisco, Fortinet, Palo Alto, ..). Some of them were even exploited in the wild before the public release of the CVE. However, this is the first time we face network core devices participating in coordinated DDoS attacks. This is somewhat&nbsp;concerning&nbsp;since identified devices are designed for small &amp; medium-sized network cores, and much more powerful equipment is available today.&nbsp;</p>



<p><strong>Closing note:</strong> we reached out to MikroTik through several communication channels to expose them the situation. MikroTik reached out to us on 2024-07-04 and is investigating the possible causes of the issue.</p>



<p>We are also currently contacting different AS to report them the issue.</p>
<img loading="lazy" decoding="async" src="//blog.ovhcloud.com/wp-content/plugins/matomo/app/matomo.php?idsite=1&amp;rec=1&amp;url=https%3A%2F%2Fblog.ovhcloud.com%2Fthe-rise-of-packet-rate-attacks-when-core-routers-turn-evil%2F&amp;action_name=The%20Rise%20of%20Packet%20Rate%20Attacks%3A%20When%20Core%20Routers%20Turn%20Evil&amp;urlref=https%3A%2F%2Fblog.ovhcloud.com%2Ffeed%2F" style="border:0;width:0;height:0" width="0" height="0" alt="" />]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
