Types of Cyber Attacks: DDos Attack (Microsoft DDoS Attack in June)
This article is an article about DDoS attacks and is part of a series of articles about different types of cyber attacks. Denial-of-service (DoS) attacks are a type of cyber attack targeting a specific application or website with the goal of exhausting the target system’s resources, which, in turn, renders the target unreachable or inaccessible, denying legitimate users access to the service.
Our previous article about: Types of Cyber Attacks: DDoS Attacks. We are highlighting it again due to the recent Microsoft outages in June which may have affected some of our customers.
Microsoft has recently confirmed that a number of outages to its services in June were due to DDos attacks. Early in June 2023, Microsoft identified surges in traffic against some services that temporarily impacted availability.
The outages were with Microsoft Outlook, Azure and OneDrive.
Microsoft assessed that Anonymous Sudan has access to a collection of botnets and tools that could enable the threat actor to launch DDoS attacks from multiple cloud services and open proxy infrastructures. The DDoS attacks on Microsoft targeted Layer 7, which is when the threat actors target the application level by overwhelming services with a massive volume of requests, causing the services to hang as they cannot process them all. This was done using several different DDoS attack methods including: HTTP (S) flood attacks, Cache bypass, and Slowloris (if interested you can read what each of these methods are in Microsoft’s blog post here)
The threat actor Anonymous Sudan was first launched in January 2023, warning that they would conduct attacks against any country that opposes Sudan (though some believe this is a false flag and the group may be linked to Russia). Since then, the group has targeted organisations and governments worldwide, either through DDoS attacks or leaking stolen data. Companies targeted have included Scandinavian Airlines, Tinder, Lyft and various US hospitals. The group demanded USD $1m from Microsoft to stop its attack.
The next area of concern is the European banking system. The cybercriminal group, along with several other Pro-Russia threat actors warned they will be jointly targeting SEPA, IBAN, WIRE, SWIFT and WISE banking transfer systems, though there is no evidence of attacks so far.
Source of information: Tech Market View
Understanding and Responding to DDoS Attacks:
The Cybersecurity and Infrastructure Security Agency has help and advice about understanding and responding to a Distributed Denial-of-Service Attack. They advise the following steps before an attack (to prevent it):
- Understand your critical assets and services.
- Understand how your users connect to your network.
- Enrol in a DDoS protection service.
- Understand service provider defences.
- Understand your dedicated edge network defences.
- Review system/network and eliminate single points of failure.
- Develop an organisation DDoS response plan.
- Develop and organisation DDoS business continuity plan.
- Consider how a DDoS attack will impact physical backups for your network.
- Conduct a test DDoS response plan.
Confirming a DDoS Attack:
It can be difficult to confirm a DDoS attack over high internet traffic. Things to look out for include:
- Unusually slow network performance in opening files or accessing websites.
- Sluggish application performance.
- High processor and memory utilisation.
- Abnormally high network traffic.
- Unavailability or inaccessibility of websites.
Full document: Understanding and Responding to DDoS Attacks
What to do in the event of a Cyber Attack
Incidents or attacks where any security breaches may have taken place, or other damage was caused, should be reported to an external body.
The SLT digital lead will be responsible for assigning someone to report any suspicious cyber incidents or attacks. This person will need to report this to:
- Action Fraud on 0300 123 2040, or the Action Fraud website
- the DfE sector cyber team at
This email address is being protected from spambots. You need JavaScript enabled to view it.
You may also need to report to:
- the NCSC website if the incident or attack causes long term school closure, the closure of more than one school, or serious financial damage
- the ICO website within 72 hours, where a high risk data breach has or may have occurred
- your cyber insurance provider (if you have one), such as risk protection arrangement (RPA)
- Jisc, if you are a part of a further education institution
You must act in accordance with:
- Action Fraud guidance for reporting fraud and cyber crime
- Academy Trust Handbook Part 6, if you are part of an academy trust
- ICO requirements for reporting personal data breaches
Police investigations may find out if any compromised data has been published or sold and identify the perpetrator.
Preserving evidence is as important as recovering from the crime.
Forward suspicious emails to
