Site icon FastNetMon DDoS Detection Tool

Record-size DDoS batters betting site during a major NHL event

On 3 April 2025, an online bookmaker was battered by the largest public DDoS disclosed so far in 2025. As reported by Techradar, the traffic began spiking at 11:15 UTC, jumped from 67 Gbps to 217 Gbps in eight minutes, and peaked at 965 Gbps by 11:36. The flood faded after 90 minutes, but not before punters across several regions saw payment pages time out and in-play bets vanish.


What happened?


The assault combined four classic techniques:


Using several vectors forces defences to chase multiple signatures at once, buying attackers extra minutes of disruption.

Why are betting platforms tempting targets?

Betting sites process thousands of micro-transactions per second. When a major sporting moment sends traffic soaring, even a brief slowdown can freeze odds or cancel cash-outs, costing both house and players. Attackers bank on that urgency. An one-hour outage during peak play can translate to lost turnover, charge-backs and frustrated customers ready to switch providers.

How a near-terabit flood is assembled?

Today’s DDoS crews rent power rather than build it. They compromise unpatched routers, webcams and servers, then lease the combined bandwidth as an hourly service. Because devices are scattered worldwide, filtering by geography or single IP blocks rarely works.

How to reduce the blast radius?


About FastNetMon

FastNetMon is a leading solution for network security, offering advanced DDoS detection and mitigation. With real-time analytics and rapid response capabilities, FastNetMon helps organisations protect their infrastructure from evolving cyber threats.

For more information, visit https://fastnetmon.com

Exit mobile version