{"id":30295,"date":"2020-10-19T14:14:38","date_gmt":"2020-10-19T11:14:38","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=30295"},"modified":"2025-08-27T21:36:33","modified_gmt":"2025-08-27T18:36:33","slug":"google-reveals-details-of-a-previously-unknown-large-scale-ddos-attack","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/google-reveals-details-of-a-previously-unknown-large-scale-ddos-attack\/","title":{"rendered":"Google reveals details of a previously unknown large-scale DDoS attack"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The Google Cloud team <\/span><a href=\"https:\/\/cloud.google.com\/blog\/products\/identity-security\/identifying-and-protecting-against-the-largest-ddos-attacks\"><span style=\"font-weight: 400;\">described<\/span><\/a><span style=\"font-weight: 400;\"> a large-scale DDoS attack targeting Google&#8217;s services in 2017. Its peak traffic reached 2.54 Tbps, making it one of the largest DDoS attacks on record.<\/span><!--more--><\/p>\n<p><span style=\"font-weight: 400;\">According to the report, reaching 2.54 Tbps in September 2017 marked the culmination of a six-month campaign against Google. During it, attackers used a variety of methods to disrupt servers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In a separate <\/span><a href=\"https:\/\/blog.google\/threat-analysis-group\/how-were-tackling-evolving-online-threats\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">report<\/span><\/a><span style=\"font-weight: 400;\"> by the Google Threat Analysis Group, the attack originated from networks of Chinese internet providers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The described incident surpasses the scale of the <\/span><a href=\"https:\/\/www.zdnet.com\/article\/aws-said-it-mitigated-a-2-3-tbps-ddos-attack-the-largest-ever\/#ftag=CAD-00-10aag7e\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Amazon AWS attack<\/span><\/a><span style=\"font-weight: 400;\"> that occurred in February 2020, with a peak of 2.3 Tbps.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The attackers&#8217; actions did not affect Google&#8217;s infrastructure.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Earlier in June, hackers <\/span><span style=\"font-weight: 400;\">attacked<\/span><span style=\"font-weight: 400;\"> the Microsoft Azure cloud service to mine Monero.<\/span><\/p>\n<p>Subscribe to ForkLog news on Telegram: <a href=\"https:\/\/t.me\/forklogfeed\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ForkLog Feed<\/a> \u2014 the full news feed, <a href=\"https:\/\/telegram.me\/forklog\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ForkLog<\/a> \u2014 the most important news and polls.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Google Cloud team described a large-scale DDoS attack targeting Google&#8217;s services in 2017. Its peak traffic reached 2.54 Tbps, making it one of the largest DDoS attacks on record.<\/p>\n","protected":false},"author":1,"featured_media":30296,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1154,1772,738],"class_list":["post-30295","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-crimes","tag-ddos-attacks","tag-google"],"aioseo_notices":[],"amp_enabled":true,"views":"19","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/30295","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=30295"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/30295\/revisions"}],"predecessor-version":[{"id":30297,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/30295\/revisions\/30297"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/30296"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=30295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=30295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=30295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}