The Containment Era is here. →Explore

Executive Summary

In September 2025, Cloudflare successfully mitigated a record-breaking Distributed Denial-of-Service (DDoS) attack that peaked at 22.2 Tbps and 10.6 billion packets per second. Orchestrated over just 40 seconds, the massive volumetric attack overwhelmed network infrastructure, pushing the limits of firewalls, routers, and load balancers. Prior research links recent large-scale DDoS campaigns—including those hitting Cloudflare—to the AISURU botnet, which leveraged a sudden increase in infected devices globally, stemming in part from exploited router firmware vulnerabilities. Business impact was minimized due to Cloudflare’s rapid mitigation, but the attack underscores the ever-increasing scale and sophistication of DDoS threats.

Record-breaking DDoS attacks are climbing in frequency and intensity, with attackers exploiting IoT vulnerabilities and leveraging formidable botnets. This surge highlights the urgent need for resilient, scalable mitigation strategies, and amplifies ongoing regulatory and industry pressure to strengthen defenses against large-scale infrastructure threats.

Why This Matters Now

This incident demonstrates that DDoS attack scale and velocity are outpacing traditional network defenses, driven by massive IoT botnets like AISURU. Organizations must rapidly adapt, as such attacks can disrupt business continuity and erode trust, even with world-leading mitigation services. The escalating arms race between attackers and defenders makes immediate investment in modern DDoS resilience and compliance essential.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The attack set a new record at 22.2 Tbps, showcasing the ability of IoT-based botnets like AISURU to overwhelm even the largest mitigation platforms.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Zero Trust Segmentation, Inline Threat Detection, and Cloud Network Security Fabric controls directly reduce the ability for compromised devices to participate in DDoS botnets and limit blast radius. Microsegmentation, egress enforcement, and high-performance encrypted network controls confine lateral spread, block malicious outbound command traffic, and reduce the surface for massive DDoS attacks.

Initial Compromise

Control: Cloud Firewall (ACF)

Mitigation: Prevents inbound exploitation traffic from reaching unpatched or exposed devices.

Privilege Escalation

Control: Threat Detection & Anomaly Response

Mitigation: Detects unusual privilege escalation or firmware anomaly on monitored devices.

Lateral Movement

Control: Zero Trust Segmentation

Mitigation: Restricts east-west traffic flows, inhibiting malware spread to additional assets.

Command & Control

Control: Egress Security & Policy Enforcement

Mitigation: Blocks unauthorized outbound traffic and detects suspicious C2 communication.

Exfiltration

Control: Multicloud Visibility & Control

Mitigation: Enables rapid detection of unexpected outbound communications.

Impact (Mitigations)

Mitigates or rates-limits DDoS traffic at scale with inline distributed enforcement.

Impact at a Glance

Affected Business Functions

  • Network Operations
  • Customer Services
  • Online Transactions
Operational Disruption

Estimated downtime: 1 days

Financial Impact

Estimated loss: $5,000,000

Data Exposure

No data exposure reported; the primary impact was service disruption due to the volumetric DDoS attack.

Recommended Actions

  • Deploy Zero Trust Segmentation and microsegmentation to prevent lateral malware propagation between device and workload groups.
  • Enforce rigorous egress controls and FQDN filtering to block device-to-internet connections and command-and-control operations.
  • Utilize Cloud Native Security Fabric for real-time detection and automated throttling of large-scale DDoS and anomalous traffic at the core and edge.
  • Implement cloud firewalls with AI threat intelligence to reduce the exposed attack surface and block inbound exploitation attempts.
  • Enhance visibility and anomaly response across cloud and hybrid environments with centralized control and event monitoring pipelines.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image