A Distributed Denial of Service attack was targeted at Spreedly for the purposes of extortion, and this attack caused a degradation of service for transactions. Spreedly implemented a robust and comprehensive rate limiting policy in response to this attack which mitigated the attack and allowed services to return to normal operation.
On November 11th and 12th, 2021, Spreedly’s id
service (https://id.spreedly.com/) was the target of a Distributed Denial of Service (DDoS) attack, specifically in the form of volumetric HTTPS requests to legitimate and publicly available (unauthenticated) URL endpoints. This attack coincided with receiving extortion demands.
During the DDoS attack, request volumes exceeding 10,000x our usual transactions/second throughput exhausted available resources on the id
system, resulting in the administrative console and reporting dashboard being largely unavailable. Because the core transaction processing system depends on the id
system, a percentage of requests to core received "500 errors" during each new wave of the attack.
Spreedly responded by initially blocking and then rate-limiting the attackers’ requests. The DDoS attack pivoted to additional endpoints resulting in a second wave of service degradation. Spreedly again blocked those requests, then subsequently implemented broad rate-limiting on the id
service preventing the success of further attacks.
Spreedly is dedicated to providing the most robust service possible to our clients and will continue to improve the reliability of its services through additional caching/retry mechanisms and further decoupling of our application interdependencies.