Friday, 10:14 a.m. – A routine day for the IT crew of an international financial company. A steady stream of data is flowing across the monitoring console at just under fifty megabits per second. Two minutes later, the needle jumps to 1.7 gigabits. Another minute passes, then the needle shoots up to 60 gigabits and shortly after peaks at 83 gigabits.
The traffic spike lasts less than nine minutes in total, then subsides as abruptly as it began. What looks like a heart line on an ECG on the screen is actually a distributed denial-of-service (DDoS) attack: technically simple, yet astonishingly powerful.
The attackers started cautiously with the data stream. In the first two minutes, it grew from 50 Mbit/s to 1.7 Gbit/s. This delay shows that the botnet is switching on gradually: first a few hundred, shortly followed by thousands of compromised devices. As soon as the attack reaches the next level, the data stream increases to 60 Gbit/s within a minute and shortly thereafter to 83 Gbit/s – enough to bring many company lines to their knees, as Internet connections often fall short of this capacity.
The digital flood consists of three streams:
All three strands converge on port 8080, which appears unremarkable but is popular among administrators: If port 80 (classic HTTP) and port 443 (HTTPS) are already in use or heavily regulated, many developers and manufacturers of management interfaces switch to 8080. The port is located above the “privileged zone” of operating systems. Services can start it without requiring administrator rights. It is also easy to remember.
Because of this convenience, port 8080 is now the de facto standard for test environments, proxy servers, and web-based maintenance consoles. This is precisely what makes it an attractive target for attack, as internal services are often forgotten there, while it is frequently open to the outside world.
The port statistics also show a high degree of dispersion among the source ports: Over 551 different source ports were used – an indication that the source packets were either generated from random ports or routed through NAT/gateway systems. This makes attribution even more difficult.
Around 50,000 different IP addresses from 182 countries are involved in the attack. The enormous dispersion is striking: even the largest source network, the Russian provider Rostelecom, accounts for less than three percent of the total volume. Data centers in industrialized nations provide the attack with high bandwidth, while countless compromised home routers in Asia inflate the total number of senders.
It is also interesting to note who does not appear: there is no significant traffic from typical cloud or CDN providers such as Amazon, Microsoft Azure, Akamai, Fastly, or Cloudflare, nor from telecommunications giants such as Deutsche Telekom, Vodafone, or Telefónica. The attackers are deliberately targeting resources outside the major providers. This could be an indication of careful planning or an intention not to compromise “good” networks in order to avoid detection.
The stopwatch shows nine minutes, but from the attackers’ point of view, that was already an extensive test. They were testing whether the investment in computing time is worthwhile. There are three plausible motives for this:
All three scenarios point to a professionally organized, commercially motivated group that soberly weighs the costs and benefits – unlike politically motivated hacktivists, who tend to focus on media-effective staging.
Whether proof-of-concept or fully executed, DDoS attacks like this are no longer the exception for financial institutions, e-commerce platforms, and media companies worldwide, but rather the norm.
Protect your company proactively with DDoS protection that detects attacks before they cause damage. Talk to our experts and find out how you can permanently secure your critical services from Layer 3 to Layer 7.