Current Cyber Threats

Anti-DDoS Outfit Walloped by Record Packet Flood

Summary:
FastNetMon, a company that specializes in defending against distributed denial-of-service (DDoS) attacks, was itself targeted by what it described as the largest packet flood it has ever recorded. The assault reached an unprecedented rate of 840 million packets per second (pps), overwhelming network infrastructure and demonstrating how attackers continue to refine their methods for bypassing anti-DDoS measures. The incident highlights that even firms specializing in mitigation are not immune from becoming targets, particularly when attackers want to test the limits of defensive technologies.

Security Officer Comments:
This was a big-scale attack and also ironic in that it targeted a company that focuses on DDoS protection. It is understandable with regard to the opportunity for attackers to target security firms specifically, not just to create a disruption, but to tune to professional defense. These attacks demonstrate the cat and mouse game played between those who develop increasingly large and capable floods, and the protector who is trying to shift filtering and capacity. For cloud- and network-based businesses, this means the way in which collateral damage can result if their provider's infrastructure is utilized as a testbed for high-volume assaults.

Suggested Corrections:
Organizations should ensure they have multi-layered DDoS defenses, combining on-premise hardware and cloud-based scrubbing services to handle gigantic volumetric floods. They should also work in tandem with ISPs and upstream providers to utilize traffic filtering, rate-limiting, and routing policies such as BGP FlowSpec or RTBH (Remote Triggered Black Hole) to herd packet storms. Stress-testing defenses regularly against simulated floods can uncover bottlenecks ahead of attackers.

Link(s):
https://www.theregister.com/2025/09/11/fastnetmon_ddos_attack/