The Independent's journalism is supported by our readers. When you purchase through links on our site, we may earn commission.
China launched the biggest DDoS attack in history against Google, company claims
The attack originated from China in 2017, Google says
Your support helps us to tell the story
From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.
At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.
The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.
Your support makes all the difference.A state-sponsored hacking group launched the biggest distributed denial-of-service (DDoS) attack in history against Google in 2017, the company has disclosed.
The attack lasted more than six months, and reached a peak of 2.5Tbps in traffic.
A report from Google’s Threat Analysis Group said that the attack came from China, as it originated from four Chinese internet service providers (ISPs).
"While it’s less common to see DDoS attacks rather than phishing or hacking campaigns coming from government-backed threat groups, we’ve seen bigger players increase their capabilities in launching large-scale attacks in recent years” Google’s Shane Huntley wrote in the blog.
The attack targeted thousands of Google’s IPs, the company says, but had no effect.
Google would not disclose what properties were targeted by the hackers.
“The attacker used several networks to spoof 167 Mpps (millions of packets per second) to 180,000 exposed CLDAP, DNS, and SMTP servers, which would then send large responses to us”, wrote Damian Menscher, a Security Reliability Engineer at Google.
The largest attack prior to that was one launched against Amazon, which reached a peak of 2.3 Tbps attack in mid-February this year.
Despite being the origin of the largest attack, China is only responsible for 12 per cent of state-sponsored attacks.
Russian activity made up 52 per cent of all attacks between July 2019 and June 2020, Microsoft says.
It is followed by Iran, which makes up 25 per cent of the attacks monitored.
Unlike the attack on Google, however, these assaults aim to influence government policy through subtler means, rather than targeting infrastructure directly.
This includes spear-phishing via Microsoft Word documents, and used unique credentials by imitating an American fast-food chain’s email about the coronavirus.
Google had previously found evidence of a state-sponsored campaign targeting US government officials with offers of fast food.
It was one of 18 million attempted scam messages per day related to Covid-19, as the coronavirus has been used as a cover for scam attempts.
Join our commenting forum
Join thought-provoking conversations, follow other Independent readers and see their replies
Comments