{"id":36529,"date":"2021-10-19T17:55:22","date_gmt":"2021-10-19T17:55:22","guid":{"rendered":"https:\/\/www.vmengine.net\/2021\/10\/19\/ddos-attacks-are-on-the-rise-after-microsoft-its-the-turn-of-the-lombardy-region\/"},"modified":"2025-05-23T17:32:29","modified_gmt":"2025-05-23T17:32:29","slug":"ddos-attacks-are-on-the-rise-after-microsoft-its-the-turn-of-the-lombardy-region","status":"publish","type":"post","link":"http:\/\/temp_new.vmenginelab.com\/en\/2021\/10\/19\/ddos-attacks-are-on-the-rise-after-microsoft-its-the-turn-of-the-lombardy-region\/","title":{"rendered":"DDoS attacks are on the rise. After Microsoft, it&#8217;s the turn of the Lombardy region."},"content":{"rendered":"<div class=\"et_pb_section et_pb_section_349 et_section_regular\" >\n<div class=\"et_pb_row et_pb_row_447\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_453  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_1456  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>A <strong>DoS<\/strong> attack, literally <strong>Denial of Service<\/strong>, consists of bombarding a site with requests until it becomes unreachable for users. Attackers use a variety of techniques that consume large amounts of network bandwidth or lock down other system resources. In this case, a lone attacker uses a single source to perform an attack against a target.<br \/>A <strong>distributed denial of service<\/strong> (<strong>DDoS<\/strong>) attack involves using multiple sources to orchestrate an attack against a target. These sources can include distributed groups of malware-infected computers, routers, IoT devices, and other endpoints.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1457  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><a href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/amirdahan\/\"> Senior Program Manager Azure Networking<\/a>, <strong>Amir Dahan<\/strong>, reported that last August Microsoft <strong>mitigated a DDoS attack of as much as 2.4 Tbps<\/strong>. This is an attack that targeted an<strong> Azure<\/strong> service customer in Europe and was more than double the volume of Microsoft&#8217;s largest attack in 2020.<br \/>It appears that the attack originated from about<strong> 70,000 sources<\/strong>, located in multiple countries in the <strong>Asia-Pacific<\/strong> area such as<strong> Malaysia<\/strong>, <strong>Vietnam<\/strong>, <strong>Taiwan<\/strong>, <strong>Japan<\/strong> and <strong>China<\/strong>, and also from the <strong>United States<\/strong>.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_image et_pb_image_388 et_animated et-waypoint\">\n<p>\t\t\t\t<span class=\"et_pb_image_wrap \"><img decoding=\"async\" src=\"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2021\/10\/microsoft-ddos-2.jpg\" alt=\"\" title=\"Microsoft DDoS\"  sizes=\"(max-width: 602px) 100vw, 602px\" class=\"wp-image-34169\" \/><\/span>\n\t\t\t<\/div>\n<div class=\"et_pb_module et_pb_cta_297 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_promo_description et_multi_view_hidden\"><\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/temp_new.vmenginelab.com\/2020\/06\/30\/cyber-security-aws-sventa-il-piu-grande-attacco-ddos-della-storia\/\" target=\"_blank\">Cyber Security: AWS Thwarts the Largest DDoS Attack in History<\/a><\/div>\n<\/p><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1458  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>Cyber attacks on the <strong>Italian Public Administration<\/strong> are also increasing, after the episodes against the <strong>Lazio<\/strong> Region, the <strong>Lombardy<\/strong> Region has also been <strong>the victim of a DDoS attack<\/strong>.<em><\/em><\/p>\n<p><em>&#8220;This morning the servers of the Lombardy Region were the subject of a major hacker attack, coming from abroad. The attack ended at 3:10 p.m. We have managed to guarantee the confidentiality as well as the absolute protection of the data of the citizens of Lombardy.&#8221;<\/em><\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1459  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>Fortunately, the attack was foiled by the technicians of <strong>Aria &#8211; <a href=\"https:\/\/www.curit.itAria\">Regional Agency for Innovation and Purchasing &#8211; <\/a><\/strong>and did not cause serious damage to users, as stated in the official statement of the region itself.<\/p>\n<p><em>&#8220;The only effect of the attack, in the early hours of the morning, was to create difficulties in connecting to some services and websites in the Region. However, we have guaranteed the most important activities and the operation of all regional platforms and, thanks to the monitoring and timeliness of the technicians, the data center has been armored and implemented with further specific protections.&#8221;<\/em><\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_image et_pb_image_389 et_animated et-waypoint\">\n<p>\t\t\t\t<span class=\"et_pb_image_wrap \"><img decoding=\"async\" src=\"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2021\/10\/PVug-2.gif\" alt=\"DDoS gif 2\" title=\"DDoS gif 2\" class=\"wp-image-34171\" \/><\/span>\n\t\t\t<\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1460  et_pb_text_align_center et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<h2>  How to Build a Resilient Architecture on AWS?  <\/p>\n<h2><\/h2>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1461  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>There are several <a href=\"https:\/\/aws.amazon.com\/it\/\"><strong>Amazon Web Services<\/strong> <\/a>that respond to this need and allow you to build an architecture that knows how to defend itself from possible attacks.<\/p>\n<p>AWS hosts services such as <a href=\"https:\/\/aws.amazon.com\/it\/cloudfront\/\"><strong>CloudFront<\/strong><\/p>\n<p><\/a>, <a href=\"https:\/\/aws.amazon.com\/it\/route53\/\"><strong>Route 53<\/strong><\/p>\n<p><\/a>, <a href=\"https:\/\/aws.amazon.com\/it\/waf\/\"><strong>WAF,<\/strong><\/p>\n<p><\/a> <a href=\"https:\/\/aws.amazon.com\/it\/shield\/\"><strong>Shield Standard,<\/strong><\/p>\n<p><\/a> <a href=\"https:\/\/aws.amazon.com\/it\/elasticloadbalancing\/\"><strong>Elastic Load Balancing<\/strong><\/p>\n<p><\/a> on a distributed network of proxy servers in data centers around the world called <a href=\"https:\/\/aws.amazon.com\/it\/cloudfront\/features\/?whats-new-cloudfront.sort-by=item.additionalFields.postDateTime&amp;whats-new-cloudfront.sort-order=desc\"><strong>Edge Locations<\/strong><\/p>\n<p><\/a>.<br \/>Using Amazon&#8217;s global network of Edge Locations for application delivery and <strong>DNS service<\/strong> plays an important role in creating a <strong>comprehensive defense against DDoS attacks<\/strong>.<\/p>\n<\/div><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_1462  et_pb_text_align_left et_pb_bg_layout_light\"><\/div>\n<div class=\"et_pb_module et_pb_cta_298 et_pb_promo  et_pb_text_align_center et_pb_bg_layout_dark\">\n<div class=\"et_pb_promo_description\">\n<h2 class=\"et_pb_module_header\">Do you want to strengthen your infrastructure and protect it from any external attacks?<\/h2>\n<\/div>\n<div class=\"et_pb_button_wrapper\"><a class=\"et_pb_button et_pb_promo_button\" href=\"https:\/\/temp_new.vmenginelab.com\/en\/contacts\/\" target=\"_blank\">Talk to a Cloud Architect<\/a><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Last August, Microsoft mitigated one of the largest DDoS attacks in history. A few months later, the same attack was also carried out in the Lombardy region.<\/p>\n","protected":false},"author":6,"featured_media":34165,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[97,3574,2297],"tags":[132,100,3712,4752,252,4753],"class_list":["post-36529","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-in-evidence","category-news-en","tag-amazon-web-services-en","tag-aws-cloud-security-en","tag-ddos-attacks","tag-lombardy-region","tag-microsoft-en","tag-microsoft-ddos-attack"],"aioseo_notices":[],"jetpack_featured_media_url":"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2021\/10\/ddos_attack_works-1.gif","amp_enabled":true,"_links":{"self":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/36529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/comments?post=36529"}],"version-history":[{"count":1,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/36529\/revisions"}],"predecessor-version":[{"id":41667,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/36529\/revisions\/41667"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/media\/34165"}],"wp:attachment":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/media?parent=36529"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/categories?post=36529"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/tags?post=36529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}