Solana confirmed on X that its network has been under a sustained Distributed Denial of Service (DDoS) attack for over a week, with traffic peaking near 6 terabitsSolana confirmed on X that its network has been under a sustained Distributed Denial of Service (DDoS) attack for over a week, with traffic peaking near 6 terabits

Solana Absorbs One of the Largest DDoS Attacks Ever Recorded

2025/12/18 02:53
5 min read

Solana confirmed on X that its network has been under a sustained Distributed Denial of Service (DDoS) attack for over a week, with traffic peaking near 6 terabits per second.

By scale, Solana says the incident ranks as the fourth-largest attack ever recorded across any distributed system.

That number alone is extreme. But the more important detail sits beneath it.

Despite the pressure, Solana’s network performance did not degrade. On-chain activity remained stable. Confirmations stayed under one second. Slot latency showed no abnormal behavior. From the outside, users wouldn’t have known anything unusual was happening.

Solana emphasized that this outcome is not accidental. One of the network’s core design goals is to continue operating normally under adversarial conditions, including large-scale network attacks. Over the past week, that principle moved from theory to practice.

While attacks of this magnitude often expose structural weaknesses, Solana continued processing transactions as usual. No emergency measures. No visible slowdown. No congestion-driven fee spikes.

The network just kept running.

What a 6 Tbps DDoS Attack Really Means

Six terabits per second is hard to visualize. It represents an enormous volume of data, comparable to millions of high-definition video streams hitting a single destination at the same time. Except here, the traffic wasn’t legitimate. It was deliberately malicious.

To understand why this matters, it helps to separate a DoS attack from a DDoS attack.

A Denial of Service attack usually comes from a single source. One device floods a target with traffic until it can’t respond. These attacks are disruptive, but relatively easy to stop. Block the IP address. The attack ends.

A DDoS attack works differently.

Instead of one device, attackers deploy thousands or millions of compromised machines, known collectively as a botnet. These machines can be everyday devices: computers, routers, cameras, and other internet-connected hardware infected with malware. Once controlled remotely, they act in unison.

Each device sends traffic simultaneously.

That “distributed” nature makes DDoS attacks far harder to mitigate. You’re no longer blocking one source. You’re facing traffic from across the internet, arriving all at once.

In blockchain systems, DDoS attacks often appear as transaction spam. Attackers attempt to overwhelm the network by submitting massive volumes of transactions or requests, hoping to slow block production, increase latency, or raise fees.

That’s exactly why Solana’s response is notable. The attack hit hard. And the network absorbed it.

How Solana Continued Operating Without Disruption

According to Solana, internal network data showed no measurable impact throughout the attack window. Confirmations stayed fast. Slot times remained stable. Validators stayed in sync.

This outcome reflects how the network is built.

Solana’s architecture emphasizes high throughput, parallel execution, and rapid message propagation between validators. Rather than forcing transactions through a narrow execution bottleneck, the network spreads workload across available resources.

During a DDoS event, that design matters.

Where some networks experience backlogs, rising fees, or validator delays under heavy spam, Solana showed none of those symptoms. The attack did not trigger congestion. Gas fees did not spike. Users did not experience delays.

From the perspective of applications running on Solana, DeFi protocols, NFT platforms, payments, and consumer apps, operations continued as normal.

That’s the key point. Resilience isn’t just about surviving an attack. It’s about doing so without degrading the user experience.

A Clear Contrast as Sui Faces Disruptions

The timing of this incident adds important context. During the same period, the Sui network was also targeted by a DDoS attack. The outcome there was very different.

Sui experienced delays in block production and periods of degraded network performance. Normal operations were impacted. The attack produced visible effects.

This contrast highlights a reality across blockchain infrastructure. Not all networks respond the same way under stress. DDoS resilience isn’t theoretical. It’s operational.

When a network slows under attack, applications suffer. Users feel it. Builders take note.

Solana’s experience shows the opposite scenario. Even under sustained pressure at historic scale, the network continued functioning as designed. That difference matters as blockchains move closer to real-world financial and consumer use cases.

Attacks aren’t rare. They’re expected. Networks that plan for them gain credibility.

What This Means for Solana and Its Ecosystem

Solana’s native asset, SOL, underpins transaction fees, staking, and validator incentives across the network. It plays a central role in securing the chain and enabling on-chain activity across DeFi, NFTs, payments, and consumer applications.

This event strengthens a narrative that has been building around Solana: performance under real conditions matters more than benchmarks.

It’s easy to claim speed in ideal scenarios. It’s harder to maintain stability when faced with sustained hostile traffic measured in terabits per second. Over the past week, Solana demonstrated that its design choices translate into real resilience.

That matters for developers deciding where to deploy applications. It matters for users who expect networks to remain available. And it matters as blockchains increasingly resemble critical infrastructure rather than experimental technology.

Solana’s message throughout the incident remained consistent and calm. The attack happened. It was massive. And it did not succeed.

In an environment where reliability is becoming a differentiator, that outcome speaks for itself.

Disclosure: This is not trading or investment advice. Always do your research before buying any cryptocurrency or investing in any services.

Follow us on Twitter @nulltxnews to stay updated with the latest Crypto, NFT, AI, Cybersecurity, Distributed Computing, and Metaverse news!

Market Opportunity
Everscale Logo
Everscale Price(EVER)
$0.00282
$0.00282$0.00282
-3.42%
USD
Everscale (EVER) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Circle unveils CCTP V2 for seamless USDC crosschain transfers with Stellar

Circle unveils CCTP V2 for seamless USDC crosschain transfers with Stellar

The post Circle unveils CCTP V2 for seamless USDC crosschain transfers with Stellar appeared on BitcoinEthereumNews.com. Key Takeaways Circle’s CCTP V2 now supports the Stellar blockchain, allowing direct USDC transfers between Stellar and other networks. CCTP V2 eliminates the need for wrapped tokens or traditional bridges, reducing security risks in cross-chain transactions. Circle’s Cross-Chain Transfer Protocol Version 2 (CCTP V2) now supports Stellar, the decentralized blockchain platform designed for cross-border payments. Today’s integration enables seamless USDC transfers between Stellar and other blockchain networks. CCTP V2 allows users to move USD Coin, the stablecoin pegged 1:1 to the US dollar, across different blockchains without requiring wrapped tokens or traditional bridges that can introduce security risks. Source: https://cryptobriefing.com/circle-unveils-cctp-v2-for-usdc-crosschain-transfers-with-stellar/
Share
BitcoinEthereumNews2025/09/19 01:52
Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum

Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum

The post Crypto whale loses $6M to sneaky phishing scheme targeting staked Ethereum appeared on BitcoinEthereumNews.com. A crypto whale lost more than $6 million in staked Ethereum (stETH) and Aave-wrapped Bitcoin (aEthWBTC) after approving malicious signatures in a phishing scheme on Sept. 18, according to blockchain security firm Scam Sniffer. According to the firm, the attackers disguised their move as a routine wallet confirmation through “Permit” signatures, which tricked the victim into authorizing fund transfers without triggering obvious red flags. Yu Xian, founder of blockchain security company SlowMist, noted that the victim did not recognize the danger because the transaction required no gas fees. He wrote: “From the victim’s perspective, he just clicked a few times to confirm the wallet’s pop-up signature requests, didn’t spend a single penny of gas, and $6.28 million was gone.” How Permit exploits work Permit approvals were originally designed to simplify token transfers. Instead of submitting an on-chain approval and paying fees, a user can sign an off-chain message authorizing a spender. That efficiency, however, has created a new attack surface for malicious players. Once a user signs such a permit, attackers can combine two functions—Permit and TransferFrom—to drain assets directly. Because the authorization takes place off-chain, wallet dashboards show no unusual activity until the funds move. As a result, the assets are gone when the approval executes on-chain, and tokens are redirected to the attacker’s wallet. This loophole has made permit exploits increasingly attractive for malicious actors, who can siphon millions without needing complex hacks or high-cost gas wars. Phishing losses The latest theft highlights a wider trend of escalating phishing campaigns. Scam Sniffer reported that in August alone, attackers stole $12.17 million from more than 15,200 victims. That figure represented a 72% jump in losses compared with July. According to the firm, the most significant share of August’s damages came from three large accounts that accounted for nearly half…
Share
BitcoinEthereumNews2025/09/19 02:31
Scaramucci Says Trump Memecoins Drained Altcoin Market, Yet Sees Bitcoin Reaching $150,000 by Year-End

Scaramucci Says Trump Memecoins Drained Altcoin Market, Yet Sees Bitcoin Reaching $150,000 by Year-End

Anthony Scaramucci, stated that the introduction of Trump coins in January 2025 had a negative impact on the cryptocurrency revolution.
Share
Coinstats2026/02/16 01:57