Need cloud computing? Get started now

Akamai Prevents DDoS Attack on Major U.S. Customer

Akamai Wave Blue

Written by

Sandeep Rath and Craig Sparling

September 13, 2024

Sandeep Rath headshot

Written by

Sandeep Rath

Sandeep Rath is a Senior Product Marketing Executive at Akamai. He is a PMMC-certified product marketing leader with a focus on translating unmet customer needs, narrative design, and value-based storytelling. He has nearly two decades of experience in leading global product marketing teams and is based in Toronto, Canada.

Craig Sparling

Written by

Craig Sparling

Craig Sparling is a Product Manager in the Cloud Security business unit. Craig joined Akamai with the acquisition of Prolexic and specializes in attack detection, network monitoring, data visualization, and user interfaces. His passion is working for customers to understand their needs and creating powerful and intuitive solutions that solve their real-world problems.

Akamai Prolexic takes a mature and differentiated approach to DDoS protection for customers.
Akamai Prolexic takes a mature and differentiated approach to DDoS protection for customers.

Executive summary 

  • On August 27, 2024, at approximately 17:18 UTC (or 1:18 PM ET), Akamai successfully detected and mitigated a distributed denial-of-service (DDoS) attack against a large customer headquartered in the United States. 

  • The attack peaked at 1.3 terabits per second (Tbps), making it the third-largest volumetric DDoS attack recorded on the Akamai Prolexic platform, and the most significant DDoS attack observed in the past four years. 

  • Despite the attack's intensity and duration, which lasted approximately 12 minutes, there was no impact on the customer or its legitimate users.

  • The same customer was targeted with a significant DDoS attack nearly a year ago, which was also successfully mitigated by Akamai Prolexic, our DDoS protection platform, with no impact.

Breaking down the attack 

It is an understatement to say that DDoS attacks have been consistently getting larger and more sophisticated over the past few years. With powerful and well-funded nation-state actors and highly resourced professional cybercrime organizations like Killnet or Anonymous Sudan that offer DDoS as a service, today’s DDoS attacks are a level up. 

In this instance, the attackers used a highly distributed botnet that cycled through a series of attack vectors within a very short period, which clearly indicates that the attack was orchestrated with a highly programmatic approach. While the vectors — UDP flood, UDP fragment, TCP ACK flood, etc. — were not novel, the scale and the constantly and rapidly evolving pattern of the attack showcased the sophistication of the attack. 

While DDoS attacks are never happenstance events and DDoS is almost always the result of a targeted attack, the targeted destination IP addresses, the scale, and the sophistication of this attack make it reasonable to conclude that this particular attack was from a very well-resourced entity that intended to deprive more than 20% of the American population and businesses from accessing the customer’s internet-connected services. 

At the peak of this DDoS attack, close to 30 Prolexic scrubbing centers globally were automatically activated to mitigate the attack and ensure that there was no impact on the customer’s digital infrastructure and web-facing assets. Figure 1 shows how Prolexic’s automation and machine intelligence, along with 20+ Tbps of dedicated cloud scrubbing capacity, scaled in realtime to mitigate the DDoS attack in zero seconds. 

A global network of Prolexic scrubbing centers mitigated the record-breaking volumetric DDoS attack in real time Fig. 1: A global network of Prolexic scrubbing centers mitigated the volumetric DDoS attack in real time

Detect and mitigate attacks

The Prolexic platform employs a wide arsenal of technologies to intelligently detect and mitigate DDoS attacks. Among many others, these technologies include: 

  • Real-time detections observed via proprietary line rate telemetry collection systems 

  • A wide array of mitigation capabilities that are proactively deployed with attack signatures before an attack starts 

  • Tooling that allows for reactive countermeasures to be deployed in subsecond to minute intervals 

The automated collection of training data from dynamically learned traffic allows the Prolexic DDoS protection platform to proactively mitigate the most sophisticated and multivector cyberattacks.  

Figure 2 showcases the global distribution of the botnet as evidenced by the IP addresses that sent the attack traffic.

The top countries of origin of the IP addresses that were used as part of the botnet that generated the massive volumetric DDoS attack Fig. 2: The top countries of origin of the IP addresses that were used as part of the botnet that generated the massive volumetric DDoS attack

During peacetime, the customer gets legitimate traffic mostly from U.S.-based IP addresses. However, during the attack, we observed malicious internet traffic sourced from IP addresses in Russia, Vietnam, Japan, India, Brazil, and China, among others. 

It is common for hackers and malicious actors to infect seemingly benign Internet of Things (IoT) devices with malware or hack into their often insufficient authentication systems and then use such devices as part of a global distributed botnet to command and control DDoS attacks. It is possible that some of these IP addresses were spoofed to mask the original IP addresses of the botnet devices or command and control communication systems.

Witness the power of peacetime cybersecurity preparation

The 4th-century Roman historian Publius Flavius Vegetius Renatus wrote (translated from the Latin), “If you want peace, prepare for war.” It is uncanny that this idea is still one of today’s most effective defense strategies — it’s certainly true for DDoS attacks in 2024. 

The Prolexic customer who was attacked on August 27, 2024, has an exceptionally robust defense model based on positive security, which has been collaboratively built and refined by the customer’s network security team and Akamai’s Security Operations Command Center (SOCC) over a decade of continuous engagement. 

A well-defined incident runbook and a multicloud resiliency model

Together, the customer and Akamai have worked diligently to minimize the potential vulnerabilities and the attack surface for all DDoS attack vectors ever monitored. A well-defined incident runbook that saves precious seconds when there is an attack of this scale is a cornerstone of successful response and incident management. 

Additionally, the customer used Akamai's multicloud resiliency model. This includes Akamai Edge DNS for Layers 3 to 7 attacks that target DNS infrastructure and availability; Akamai Connected Cloud for HTTP(s) and API attacks on Layer 7; and, above all, Akamai Prolexic for Layers 3 and 4 attacks on all ports and protocols. 

This combined impact of machine intelligence and human intelligence resulted in a superior security posture that effectively mitigated the DDoS attack in real time while ensuring zero impact to the customer’s digital infrastructure and access for the end consumers. 

Clean traffic delivered to the customer

Figure 3 juxtaposes the attack traffic prior to mitigation by Akamai Prolexic and the cleaned-up traffic that flowed from Prolexic to the customer's servers. The small spike observed at the 17:18 UTC timestamp is in accordance with the specific limits and thresholds set by the customer. 

The scale of the DDoS traffic before it was mitigated by the Prolexic platform and after the clean traffic was allowed to the customer origin Fig 3: The scale of the DDoS traffic before it was mitigated by the Prolexic platform and after the clean traffic was allowed to the customer origin

Buckle up — the DDoS attack rollercoaster is here to stay

The DDoS attack shown in Figure 3 isn’t an isolated cybersecurity incident; high-traffic websites across all major industries are being attacked on a continuous basis, making it a necessity to have proper defense technology in place. According to DDoS: Here to Stay, a white paper published earlier this year by FS-ISAC and Akamai, 35% of all DDoS attacks in 2023 were aimed at the financial services industry, which has surpassed the gaming sector as the most-attacked vertical. 

Driven by a dramatic surge in the power of botnets and hacktivism motivated by the ongoing geopolitical wars, the financial services industry experienced a 154% increase in DDoS attacks between 2022 to 2023. 

High technology and media/entertainment are the other two industry verticals that often witness DDoS attacks that disrupt the availability of their Layer 7 web applications, DNS, and the underlying digital infrastructure (Layers 3 and 4) that powers it all. 

The persistence of DDoS attacks as a cyberthreat is evidenced by the fact that the U.S.-based customer that was subjected to the attack on August 27 has consistently been protected by Akamai Prolexic from ever-increasing DDoS attacks by cybercriminals over the past two years. 

Stay buckled up even if you’ve been on this ride before

Figure 4 shows the three instances (of the 25 largest volumetric attacks) that targeted the same business that were mitigated by Prolexic. The key takeaway is that businesses across all industries must proactively establish a robust security posture against the rising tide of record-breaking DDoS attacks.

The 25 largest Layers 3 and 4 DDoS attacks mitigated by the Prolexic platform (Note: The orange columns represent the specific customer who has been repeatedly protected by the platform from several record-breaking attacks, most recently on August 27, 2024.) Fig 4: The 25 largest Layers 3 and 4 DDoS attacks mitigated by the Prolexic platform (Note: The orange columns represent the specific customer who has been repeatedly protected by the platform from several attacks, most recently on August 27, 2024.)

The direct and indirect costs of inadequate DDoS protection

Sometimes, organizations mistake the limited capabilities of on-prem solutions without a cloud backup or internet service provider (ISP)–driven solutions for adequate protection against DDoS cyberattacks. Similarly, businesses might mistakenly believe that just machine-level automation without expert-driven managed services would result in adequate protection against large and complex DDoS attacks. 

It is crucial, however, to identify whether automation and artificial intelligence by themselves are smart enough to ensure that the mitigation process itself does not lead to further challenges; for example, by automatically blocking an entire protocol when trying to avoid certain protocol attacks, thereby preventing legitimate traffic and legitimate users from accessing your services. In other words, if done wrong, an automated DDoS response without the discernment of human discretion may successfully block an attack but cause just as much damage.

The impact of such inadequate DDoS protection measures range from direct and indirect financial losses, reputational losses, and the significant human resources hours needed to reboot and stabilize your systems. 

DDoS protection requires a mature and differentiated approach

Akamai Prolexic takes a mature and differentiated approach to DDoS protection for customers. This approach has been distilled over 20-plus years of market leadership in protecting many Fortune 1,000 companies. The platform combines advanced machine intelligence along with the expertise of more than 220 global SOCC team members to build a defense-in-depth DDoS protection strategy for customers. 

Prolexic offers the flexibility to be run as an on-prem, cloud, or hybrid DDoS protection platform, and the ability to keep the platform’s protection always on, or enabled on demand. 

Adopt an in-depth strategy against all types of DDoS attacks

We advise businesses and organizations around the world to revisit their DDoS security posture and strengthen their defense systems to withstand attacks similar to the August 27 attack. 

The 7 steps we recommend to address DDoS and related cyberattack risks

  1. Assess risk, including the existing DDoS mitigation services. Conduct a thorough and proactive risk assessment that involves your DDoS defense provider — specifically in terms of extremely forceful sustained attacks like the one described in this post, and whether your existing defenses are sufficient. 

  2. Review critical subnets and IP spaces, and ensure that they have mitigation controls in place.

  3. Deploy DDoS security controls in an always-on mitigation posture as a first layer of defense to avoid an emergency integration scenario and to reduce the burden on incident responders. 

  4. Extend your security posture through an edge-based network cloud firewall beyond basic DDoS protection. A firewall at the edge of your network, in front of (and in addition to) your existing firewalls, is a powerful, easy-to-deploy, and easy-to-use tool to quickly, centrally, and globally block traffic that you don’t want to hit your networks (or certain targets within your networks). Akamai Prolexic provides a network cloud firewall as part of its DDoS defense capabilities that we consider a key defense capability.

  5. Protect your DNS infrastructure from DNS-focused DDoS attacks. Ensure that you have a robust authoritative DNS solution deployed, like Akamai Edge DNS, either in primary or secondary mode. If you have on-prem or hybrid DNS infrastructure, use a DNS proxy solution like Akamai Shield NS53, which can implement dynamic security controls to protect your network from DNS resource exhaustion (NXDOMAIN) flood attacks

  6. Develop an incident response plan and crisis response team. Proactively develop a comprehensive incident response plan that outlines the steps to be taken in the event of a DDoS attack. The plan should include roles and responsibilities, communication channels, and predefined mitigation strategies. Ensure that runbooks and emergency contacts are up-to-date.

  7. Extend your security against DDoS threats beyond the network layer. Protect your applications and APIs from application-layer attacks with Akamai App & API Protector, a robust web application firewall (WAF) that prevents malicious HTTP requests over ports 443 and 80. 

Contact us if you’re under attack right now or if you need Akamai’s help to future-proof your security.



Akamai Wave Blue

Written by

Sandeep Rath and Craig Sparling

September 13, 2024

Sandeep Rath headshot

Written by

Sandeep Rath

Sandeep Rath is a Senior Product Marketing Executive at Akamai. He is a PMMC-certified product marketing leader with a focus on translating unmet customer needs, narrative design, and value-based storytelling. He has nearly two decades of experience in leading global product marketing teams and is based in Toronto, Canada.

Craig Sparling

Written by

Craig Sparling

Craig Sparling is a Product Manager in the Cloud Security business unit. Craig joined Akamai with the acquisition of Prolexic and specializes in attack detection, network monitoring, data visualization, and user interfaces. His passion is working for customers to understand their needs and creating powerful and intuitive solutions that solve their real-world problems.