Incident: Network Connectivity Disruption (External DDoS Event)
Date/Time: 28 November 2025, 09:37–10:30 (CET)
Impact Window: 53 minutes (gradual recovery thereafter)
On 28 November 2025 at 09:37 CET, a major carrier partner experienced significant service disruption affecting network connectivity and related services. Initial investigation confirmed the issue was not isolated to a single network; multiple internet service providers experienced outages at the same time, indicating a broader internet-scale disturbance.
Monitoring systems detected abnormal traffic patterns immediately, and responsible teams initiated incident response within minutes. Technical analysis confirmed a large-scale Distributed Denial of Service (DDoS) attack originating from a botnet, targeting IP ranges within core network infrastructure, resulting in saturation of key interconnections and router instability/outages, causing widespread connectivity issues.
At peak, the attack reached approximately 2.5 Tbps (up to ~1 billion packets per second), which triggered cascading failures across critical network components.
This type of attack is designed to overwhelm networks with traffic. There is no indication of any data breach or compromise of customer data as a result of this incident.
The attack was partially mitigated immediately by existing DDoS defense mechanisms. Additional measures were being prepared when attack traffic began to decrease around 10:30 CET, at which point it is believed the attackers ceased activity. Network and application performance then recovered progressively, and by 11:00 CET demand and performance had returned to normal operating levels.
Following the incident, the carrier implemented and is continuing to implement additional protective measures to further strengthen core infrastructure resilience against large-scale DDoS attacks.
We continue to monitor the situation closely and are coordinating with partners to exchange intelligence and enhance collective defenses.
A large-volume DDoS attack originating from a botnet targeted core IP ranges at one of our main carrier partners, saturating interconnect capacity and causing instability in routers and critical links. Because multiple providers were impacted simultaneously, the disruption manifested as a wider internet connectivity issue, not limited to a single network.
Following the incident, additional steps have been taken and are ongoing to increase resilience, including:
We will continue to share relevant updates with customers through established channels and remain available for incident-related questions.