A massive flood of web traffic originating from smartphones in China was used in an attempt to disrupt an unnamed web server, according to security researchers at CloudFlare.
The distributed denial of service (DDoS) attack peaked at over 275,000 HTTP requests per second and resulted in 4.5 billion hits on the targeted website.
The attack has been blamed on malicious advertising networks that compromised up to 650,000 smartphones.
Marek Majkowski, DDoS mitigation expert at CloudFlare, said that the firm's servers are constantly being targeted by DDoS attacks, from DNS reflection to Level7 HTTP botnet floods, yet this attack caught his attention because of the high levels of traffic involved.
"Attacks like this form a new trend. They present a great danger in the internet. Defending against this type of flood is not easy for small website operators."
An analysis of the attack logs found that 80 percent of the traffic originated from mobile devices, nearly all of which were from Chinese IP addresses.
Furthermore, analysis of the logs revealed the names MetaSr, F1Browser, QQBrowser and UCBrowser, all common browser applications in China.
CloudFlare has speculated on the DDoS process. First, a web user opening an application on a smartphone is served an iframe with an advertisement.
Nick Sullivan, researcher at CloudFlare, outlined earlier this year how DDoS techniques have diversified in recent years.
The website affected in the latest attack, which featured a significant amount of web traffic being deployed, has not been named by CloudFlare.
A fast, gorgeous but expensive display
Intel wants to get inside your car, despite missing out on mobile
'We'll keep fighting to fight to keep the web free and open,' claim EFF
Breached in March by the same attackers, claim 'insiders'