The first series was detected on Friday morning. Hackers tried to block the victim's infrastructure by forwarding large traffic flows of malicious traffic towards it. Within 2 hours the amount of attack traffic was going up and down, and at its peak it reached 35 Gbps (71 Mpps), but the unknown attackers failed to breach the DDoS-GUARD protection. The targeted system remained accessible for its legitimate users, despite the 14 large and many other small attacks. The attack technique suggests that its source was in China.

The hackers have made a second attempt on Sunday, and increased the attack size to 84 Gbps (63 Mpps), but those attacks have not reached the goal. In just three hours there were detected 7 large and many weak attacks aimed at the victim's address. It is worth noting that such attacks are of average size and complexity, and the DDoS-GUARD capabilities made it easy to mitigate. However, those attacks could have been a serious problem for unprotected online systems. Web hosting service companies are "favorite" targets for DDoS attacks, since by blocking the entire hosting service, one can make unavailable all the websites located on it. Therefore, the hosting service providers are constantly at risk to become a victim of such cyber-attacks.