Google on Friday revealed that a “state-sponsored” hacking group launched a series of DDoS attack on its system in 2017. The DDoS attacks that lasted over six months peaked to 2.5Tbps in traffic – making it the most important cyber-attack recorded till date, the corporate added.
To prevent servers from the DDoS attacks, Google claimed that given the info and observed trends, it could “extrapolate to work out the spare capacity needed to soak up the most important attacks likely to occur.”
At the instant , it’s unclear which Google system was under the threat; however, Google‘s Threat Analysis Group (TAG) during a separate post stated that DDoS sourced out of several Chinese ISPs (ASNs 4134, 4837, 58453, and 9394).
Hackers also use different methods of channelising this attack and even provide them with “fancy names” like Smurf, Tsunami, XMAS tree, HULK, Slowloris, cache bust, TCP amplification, and more.
“We recently announced Cloud Armor Managed Protection, which enables users to further simplify their deployments, manage costs, and reduce overall DDoS and application security risk,” it said.