Akamai has reported that a DDoS attack was targeted at one of its customers in the gaming industry. This attack leveraged a UDP amplification technique known called WS-Discovery (WSD). The attack generated 35GB junk traffic per second and is the fourth largest DDoS attack the company has seen in terms of the highest reflected amplification factor.

Web Services Dynamic Discovery (WSD) allows network devices to send user datagram protocol packets, and also receive and respond to them. WSD operates over TCP and UDP port 3702 and is found in many internet-connected devices. It can be spoofed by sending a UDP packet with a forged return IP address. The response will be sent to the forged IP address and this allows hackers to aim the traffic to DDoS targets.