Delhi | 25°C (windy)

Cloudflare Thwarts Unprecedented 115 Tbps DDoS Attack: A New Era of Cyber Warfare

  • Nishadil
  • September 03, 2025
  • 0 Comments
  • 2 minutes read
  • 9 Views
Cloudflare Thwarts Unprecedented 115 Tbps DDoS Attack: A New Era of Cyber Warfare

In a stunning display of cyber resilience, Cloudflare has announced it successfully thwarted an unprecedented Distributed Denial of Service (DDoS) attack that peaked at a mind-boggling 115 Terabits per second (Tbps). This colossal assault, which also registered an astonishing 201 million requests per second (rps), wasn't just another large-scale incident; it shattered previous records and showcased a dangerous new tactic leveraging a critical vulnerability in the widely used HTTP/2 protocol.

The attack, which targeted one of Cloudflare's customers, was primarily orchestrated using a novel technique dubbed the "HTTP/2 Rapid Reset" attack.

This method exploits a weakness in how the HTTP/2 protocol handles stream cancellations, allowing attackers to rapidly send and reset many streams within a single connection. This creates an overwhelming workload for servers, easily overwhelming their capacity and leading to service disruption. Cloudflare noted that many of these attacks lasted for less than 30 seconds, though some persisted for several minutes, consistently hitting extraordinary rps figures.

What makes this particular incident so significant is its sheer scale.

To put 115 Tbps into perspective, it's an unimaginable torrent of data designed to completely cripple any target. The 201 million rps also dwarfs the previous record of 71 million rps observed earlier in 2023. This exponential increase signals a worrying trend: the capabilities of botnets, the networks of compromised devices used to launch these attacks, are growing at an alarming rate, posing an existential threat to online services worldwide.

The HTTP/2 Rapid Reset vulnerability (CVE-2023-44487) isn't unique to Cloudflare's infrastructure.

It's a fundamental flaw affecting nearly all implementations of the HTTP/2 protocol, which is foundational to modern web communication. This means a vast swathe of the internet is potentially exposed. Following Cloudflare's observations, other major tech giants like Google and Amazon also confirmed detecting and mitigating similar massive-scale attacks using this exploit, underscoring the widespread nature of this new threat vector.

Crucially, Cloudflare's advanced automated systems detected and mitigated this record-breaking barrage without human intervention.

Their layered defense mechanisms, designed to identify and filter malicious traffic in real-time, proved effective against this sophisticated, high-volume threat. This immediate, autonomous response was pivotal in ensuring the targeted customer remained online and protected from the full force of the attack.

The successful mitigation of this 115 Tbps attack serves as a stark reminder of the escalating arms race in cybersecurity.

As attackers devise increasingly potent and efficient methods to disrupt services, the onus falls on security providers to innovate and evolve their defenses. Cloudflare's swift action in neutralizing this unprecedented threat offers a vital case study in modern cyber resilience, highlighting the relentless battle to keep the internet open and accessible for everyone.

While this particular wave of HTTP/2 Rapid Reset attacks has been largely contained by leading providers, the underlying vulnerability necessitates swift action across the industry.

Organizations relying on HTTP/2 should prioritize patching and robust DDoS protection strategies to guard against future exploits of this dangerous new attack vector.

.

Disclaimer: This article was generated in part using artificial intelligence and may contain errors or omissions. The content is provided for informational purposes only and does not constitute professional advice. We makes no representations or warranties regarding its accuracy, completeness, or reliability. Readers are advised to verify the information independently before relying on