Cybersecurity vendor NSFOCUS has released a report detailing its successful defense against a massive Distributed Denial-of-Service (DDoS) attack that targeted an unnamed critical infrastructure operator. The attack, which occurred on October 21, 2025, reached a peak volume of 843.4 Gbps and a rate of 73.6 million packets per second (Mpps). The multi-vector assault was sustained at over 600 Gbps for more than 30 minutes, demonstrating the attackers' significant resources. The primary attack vector was a UDP flood. The NSFOCUS Cloud DDoS Protection Service (Cloud DPS) was able to mitigate the attack in real-time, dropping more than 99.9% of the malicious traffic and ensuring the continuity of the operator's services.
The incident showcases the escalating scale and sophistication of DDoS attacks targeting critical infrastructure. The attack was not a simple, single-vector flood but a complex, multi-vector assault designed to overwhelm the target's network capacity and security appliances. The key characteristics of the attack include:
The attack utilized several TTPs from the MITRE ATT&CK framework:
T1498 - Network Denial of Service): This was the overall goal of the attack—to make the critical infrastructure operator's services unavailable.T1498.001 - Direct Network Flood): The dominant component was a UDP flood, which accounted for 70.7% (609 Gbps) of the traffic. This involves sending a massive number of UDP packets to the target's IP addresses, consuming all available bandwidth.T1498.002 - Reflection Amplification): The report mentions amplification and reflection, where attackers spoof the target's IP address and send requests to public servers (like DNS or NTP). These servers then send a much larger response to the victim, amplifying the attack's volume.NSFOCUS's mitigation involved redirecting the operator's traffic through its cloud scrubbing centers, where it could analyze the traffic, distinguish malicious packets from legitimate ones, and only forward the 'clean' traffic to the operator. This kept the legitimate traffic flow below 700 Mbps, preventing any service disruption.
Had the attack been successful, the impact on the critical infrastructure operator could have been severe. A successful DDoS attack can lead to:
This incident demonstrates the necessity for critical infrastructure operators to have pre-provisioned, cloud-based DDoS mitigation services capable of absorbing such massive volumes of traffic.
| Type | Value | Description |
|---|---|---|
| Protocol | UDP |
An overwhelming and disproportionate amount of inbound UDP traffic is the primary indicator of a UDP flood. |
| Port | Random High Ports |
UDP floods often use randomized source and destination ports to bypass simple port-based filtering. |
| Network Traffic Pattern | High inbound bandwidth utilization | A sudden spike in network traffic that saturates the internet circuit is the most obvious sign of a volumetric DDoS attack. |
| Log Source | Netflow/sFlow Data |
Network flow data provides visibility into traffic volumes, source IPs, and protocols, which is essential for DDoS detection. |
Use a cloud-based DDoS mitigation service that can absorb and filter massive volumetric attacks before they reach the organization's network.
Work with upstream ISPs to filter malicious traffic as close to the source as possible.
For any critical infrastructure operator, relying solely on on-premises equipment to defend against DDoS attacks is no longer viable. The 843.4 Gbps volume of this attack would saturate the internet circuits of almost any organization. The only effective countermeasure is to contract with a Cloud DDoS Scrubbing Provider like NSFOCUS, Akamai, or Cloudflare. This should be done proactively. The operator should have an 'always-on' or 'on-demand' service in place. When a large attack is detected, all inbound traffic is rerouted (via BGP or DNS) to the provider's global network of scrubbing centers. These centers have terabits of capacity to absorb the attack traffic, use advanced analytics to separate malicious packets from legitimate user traffic, and then forward only the clean traffic to the operator's data center via a private GRE tunnel. This is the industry-standard solution for mitigating large-scale volumetric attacks.
Effective DDoS defense requires robust Network Traffic Analysis. The critical infrastructure operator must have tools that analyze NetFlow, sFlow, or IPFIX data from their edge routers in real-time. This allows them to establish a clear baseline of what normal traffic looks like in terms of volume (Gbps), rate (pps), and protocol mix. When an attack begins, these tools can provide immediate detection by alerting on the massive deviation from the baseline. This analysis is also crucial for triggering the response. For an on-demand scrubbing service, the NTA tool can automatically initiate the BGP announcement to divert traffic. During the attack, this analysis helps the security team understand the attack vectors (e.g., UDP flood, NTP amplification) and work with the scrubbing provider to fine-tune the filtering rules.
A critical, yet non-technical, countermeasure is a well-rehearsed Incident Response Plan specifically for DDoS attacks. This plan must be created before an attack occurs. It should define the roles and responsibilities of the security team, network team, and executive leadership. It must contain the exact technical procedures for activating the cloud scrubbing service, including contact numbers and authentication details for the provider's portal. The plan should also include a communications strategy for notifying stakeholders, upstream ISPs, and, if necessary, the public. Regular testing of this plan through tabletop exercises and live drills is essential to ensure a smooth and rapid response when a real attack like this one occurs.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats