A massive flood of web traffic originating from smartphones in China was used in an attempt to disrupt an unnamed web server, according to security researchers at CloudFlare.
The distributed denial of service (DDoS) attack peaked at over 275,000 HTTP requests per second and resulted in 4.5 billion hits on the targeted website.
The attack has been blamed on malicious advertising networks that compromised up to 650,000 smartphones.
Marek Majkowski, DDoS mitigation expert at CloudFlare, said that the firm's servers are constantly being targeted by DDoS attacks, from DNS reflection to Level7 HTTP botnet floods, yet this attack caught his attention because of the high levels of traffic involved.
"Attacks like this form a new trend. They present a great danger in the internet. Defending against this type of flood is not easy for small website operators."
An analysis of the attack logs found that 80 percent of the traffic originated from mobile devices, nearly all of which were from Chinese IP addresses.
Furthermore, analysis of the logs revealed the names MetaSr, F1Browser, QQBrowser and UCBrowser, all common browser applications in China.
CloudFlare has speculated on the DDoS process. First, a web user opening an application on a smartphone is served an iframe with an advertisement.
Nick Sullivan, researcher at CloudFlare, outlined earlier this year how DDoS techniques have diversified in recent years.
The website affected in the latest attack, which featured a significant amount of web traffic being deployed, has not been named by CloudFlare.
Citrix claims Workspot has 'continued to mislead the market' and use Citrix-patented features
Using proven technology from wireless, coax and ADSL/VDSL communication
Touts crowding genuine fans out of the market, claims government
Users complain they haven't been able to access their accounts or withdraw money