Adyen Hit by Major DDoS Attack Disrupting Payments Across Europe

Article Highlights
Off On

On April 21, 2025, Adyen, a global payment platform, faced a major disruption due to a significant Distributed-Denial-of-Service (DDoS) attack, affecting numerous customers across Europe. This incident underscored the growing threat and sophistication of cyberattacks targeting financial infrastructure. The attack resulted in widespread delays and transaction failures at crucial moments, highlighting the importance of robust cybersecurity measures.

Attack Overview and Immediate Impact

The cyberattack began at 18:51 CEST when Adyen’s internal monitoring systems detected an unusual surge of errors and sluggish response times in various payment services hosted in European data centers. A swift investigation by the company’s engineering team revealed that the issue was a DDoS attack, which overwhelmed the system with excessive traffic from multiple sources, making it nearly impossible to process legitimate requests efficiently. The peak of the assault saw millions of requests per minute targeting vital infrastructure components, leading to intermittent service availability. Notably, the most significant disruptions occurred between 18:51 and 19:35 CEST.

The attack unfolded in three distinctive waves, each wave forcing the engineering team to adjust their mitigation strategies. With each wave, the attack generated traffic from a globally distributed and continuously changing set of IP addresses. This overwhelming influx caused saturation of key infrastructure components, leading to intermittent availability of some services. E-commerce and In-Person Payment Transaction services were particularly affected, experiencing sporadic outages and degraded performance. The immediate impact of the attack highlighted the persistent and escalating cyber threats facing digital financial service providers.

Affected Services and Customer Impact

Several core services were significantly impacted, especially the European data centers that handle a substantial volume of transactions and customer-facing applications. In addition to E-commerce and In-Person Payment transactions, other disrupted services included the Customer Area, Hosted Onboarding, and Transfer API functions. Certain checkout services, such as Session Integrations, Secured Fields, and Pay by Link, also experienced prolonged disruptions throughout the incident. Consequently, many of Adyen’s customers encountered failed or delayed transactions, complicating regular business operations that depend on real-time payments. The widespread service disruptions underscored the criticality of securing payment infrastructure against such sophisticated cyberattacks.

Many merchants and businesses relying on Adyen’s payment platform faced immediate challenges as transactions failed or were delayed. The impact of the attack was particularly felt by businesses operating during peak hours. The failure of real-time payments disrupted normal operations and led to customer dissatisfaction. In an increasingly digital economy, the reliability of payment systems is paramount, and the incident highlighted the vulnerabilities that even major platforms like Adyen face.

Response and Mitigation Efforts

In response to the cyberattack, Adyen’s dedicated engineering team swiftly activated mitigation protocols. These included enabling anti-DDoS protections, scaling up system capacity, and deploying targeted filtering measures to identify and thwart malicious traffic. Despite these efforts, the dynamic nature of the attack, with new waves exhibiting different traffic patterns, posed continuous challenges. Some services continued to experience degraded performance for several hours before the situation was fully resolved. The incident was declared resolved at 03:20 CEST on April 22, nearly nine hours after the attack had commenced. Adyen maintained transparency throughout the incident by providing regular updates to its customers on the impact and progress toward resolution. This proactive communication helped maintain customer trust during a challenging period. Despite the setbacks, the company’s swift response and coordinated efforts underscored a commitment to minimizing disruption and restoring normal service levels as quickly as possible. The incident highlighted the importance of having robust and dynamic response strategies to address the evolving nature of cyberattacks.

Communication and Transparency

Throughout the incident, Adyen maintained a high level of transparency by keeping its customers informed through regular updates about the ongoing efforts and the service status. Chief Technology Officer Tom Adams acknowledged the severity of the incident and emphasized the company’s commitment to reliability and customer communication. He expressed regret for the disruptions caused to customers’ businesses and reassured them that Adyen is actively monitoring for further threats. Adams emphasized the importance of transparency in addressing such issues and highlighted the company’s dedication to conducting a comprehensive incident review.

Adams reaffirmed the company’s commitment to reliability, stating that it is paramount to Adyen’s operations. He outlined plans to continue monitoring for further attack attempts and to conduct a thorough post-incident review. This review will include a detailed root cause analysis and the development of long-term strategies to prevent similar incidents in the future. Adyen has promised to share the findings of this review with customers to maintain openness and trust. The company’s proactive stance and commitment to transparency demonstrate a focus on rebuilding customer trust and ensuring the reliability of its services.

Long-Term Strategies and Future Prevention

Adyen has committed to a thorough post-attack review focused on identifying the root causes of the incident and developing long-term strategies to prevent similar occurrences. The company plans to implement enhanced security measures based on the findings of this review, aiming to bolster system resilience against emerging and evolving cyber threats. By continually improving its defenses, Adyen aims to ensure the reliability and security of its payment services and meet the growing expectations of security in the digital age. The company has also stressed the importance of sharing the review findings with customers to reinforce transparency and trust. This initiative is part of Adyen’s broader commitment to maintaining open communication and collaboration with its client base. As part of the long-term strategy, Adyen will prioritize investments in advanced cybersecurity technologies and employ continuous monitoring practices to detect and mitigate potential threats proactively. The goal is to stay ahead of cybercriminals and ensure that the company’s infrastructure remains robust and secure.

Broader Implications and Industry Challenges

On April 21, 2025, Adyen, a well-known global payment platform, encountered a major disruption caused by a significant Distributed-Denial-of-Service (DDoS) attack. This cyberattack had widespread consequences, severely impacting numerous customers throughout Europe. As a result, there were extensive delays and transaction failures, which occurred during critical times. This incident highlighted the escalating threat and increasing sophistication of cyberattacks aimed at financial infrastructures. The situation underscored the urgent necessity for businesses to implement robust cybersecurity measures to safeguard against such events. Cybersecurity has become an integral part of maintaining the integrity and functionality of financial systems, given the potential for such attacks to disrupt essential services and cause considerable economic loss. Proactive measures, continuous monitoring, and the adoption of advanced security protocols are imperative to counteract the evolving tactics of cybercriminals. This event serves as a potent reminder of the vulnerability of even the most advanced systems and the importance of remaining vigilant in an age where digital threats are constantly evolving.

Explore more

Why is LinkedIn the Go-To for B2B Advertising Success?

In an era where digital advertising is fiercely competitive, LinkedIn emerges as a leading platform for B2B marketing success due to its expansive user base and unparalleled targeting capabilities. With over a billion users, LinkedIn provides marketers with a unique avenue to reach decision-makers and generate high-quality leads. The platform allows for strategic communication with key industry figures, a crucial

Endpoint Threat Protection Market Set for Strong Growth by 2034

As cyber threats proliferate at an unprecedented pace, the Endpoint Threat Protection market emerges as a pivotal component in the global cybersecurity fortress. By the close of 2034, experts forecast a monumental rise in the market’s valuation to approximately US$ 38 billion, up from an estimated US$ 17.42 billion. This analysis illuminates the underlying forces propelling this growth, evaluates economic

How Will ICP’s Solana Integration Transform DeFi and Web3?

The collaboration between the Internet Computer Protocol (ICP) and Solana is poised to redefine the landscape of decentralized finance (DeFi) and Web3. Announced by the DFINITY Foundation, this integration marks a pivotal step in advancing cross-chain interoperability. It follows the footsteps of previous successful integrations with Bitcoin and Ethereum, setting new standards in transactional speed, security, and user experience. Through

Embedded Finance Ecosystem – A Review

In the dynamic landscape of fintech, a remarkable shift is underway. Embedded finance is taking the stage as a transformative force, marking a significant departure from traditional financial paradigms. This evolution allows financial services such as payments, credit, and insurance to seamlessly integrate into non-financial platforms, unlocking new avenues for service delivery and consumer interaction. This review delves into the

Certificial Launches Innovative Vendor Management Program

In an era where real-time data is paramount, Certificial has unveiled its groundbreaking Vendor Management Partner Program. This initiative seeks to transform the cumbersome and often error-prone process of insurance data sharing and verification. As a leader in the Certificate of Insurance (COI) arena, Certificial’s Smart COI Network™ has become a pivotal tool for industries relying on timely insurance verification.