From itnews.com.au
![Modded Mirai botnet behind massive application layer DDoS attack](https://i.nextmedia.com.au/Utils/ImageResizer.ashx?n=https%3a%2f%2fi.nextmedia.com.au%2fNews%2fbotnet2_1238990.jpg&w=480&c=0&s=1)
Long onslaught generated 292,000 requests per second.
A post-mortem of a distributed denial of service attack between April and May this year points to a large new Mirai-style botnet being active, spanning around 402,000 internet protocol addresses.
Security vendor Imperva said the the attack went on for 13 days continuously, with a peak flow of 292,000 requests per second.
The DDoS was directed at the authentication component of a streaming application operated by an entertainment industry customer of Imperva, but the security vendor is not sure if the intent was to perform a brute-force or credentials stuffing attack to take over accounts.