Anti-spam service Spamhaus has been hit with what several security firms today described as the largest distributed denial of service (DDoS) attacks ever seen.
Some of the attacks have generated so much DDoS traffic that they actually slowed down sections of the Internet for brief periods of time, according to the firms.
Matthew Prince, CEO of CloudFlare, a San Francisco-based firm that has been helping Spamhaus over the past few days, today said that the attacks have been going on since March 19 and have generated up to 300Gbps of DDoS traffic.
That's about three times bigger than the biggest DDoS attacks seen so far and several magnitudes greater than the 4Gbps to 10Gbps of traffic generated by typical DDoS attacks.
"We haven't seen anything larger than this publicly," Prince said. "Its hard to get an attack this large, because what you end up doing is congesting [portions of the Internet]," he said,
Spamhaus did not respond immediately to a request for comment. However, according to The New York Times, the attacks against the Geneva-based company began after the anti-spam service added Dutch hosting provider Cyberbunker to its global blacklist.
Cyberbunker, a hosting company that operates out of an abandoned NATO bunker in the Netherlands, is known for hosting an eclectic collection of websites -- some of which are thought to be major spammers. The company prides itself on being willing to host almost any website, except those involved with terrorism and child pornography.
The company has done little to hide its dislike for Spamhaus, which it has characterized as a bully on its website. The Times quoted an alleged spokesman for the attackers as saying that Cyberbunker was retaliating because Spamhaus had abused its influence on the Internet.
According to Prince, the DDoS attacks against Spamhaus started off being fairly typical in bandwidth, but quickly grew much bigger. Between March 19 and March 22, the DDoS attacks went from 10Gbps of traffic to over 90Gbps.
When that wasn't enough to knock Spamhaus offline, the attackers changed tactics and began going after CloudFlare's upstream service providers. "As the attacks have increased, we've seen congestion across several major Tier 1s, primarily in Europe where most of the attacks were concentrated," he said.