Adyen Hit by Major DDoS Attack Disrupting Payments Across Europe

Article Highlights
Off On

On April 21, 2025, Adyen, a global payment platform, faced a major disruption due to a significant Distributed-Denial-of-Service (DDoS) attack, affecting numerous customers across Europe. This incident underscored the growing threat and sophistication of cyberattacks targeting financial infrastructure. The attack resulted in widespread delays and transaction failures at crucial moments, highlighting the importance of robust cybersecurity measures.

Attack Overview and Immediate Impact

The cyberattack began at 18:51 CEST when Adyen’s internal monitoring systems detected an unusual surge of errors and sluggish response times in various payment services hosted in European data centers. A swift investigation by the company’s engineering team revealed that the issue was a DDoS attack, which overwhelmed the system with excessive traffic from multiple sources, making it nearly impossible to process legitimate requests efficiently. The peak of the assault saw millions of requests per minute targeting vital infrastructure components, leading to intermittent service availability. Notably, the most significant disruptions occurred between 18:51 and 19:35 CEST.

The attack unfolded in three distinctive waves, each wave forcing the engineering team to adjust their mitigation strategies. With each wave, the attack generated traffic from a globally distributed and continuously changing set of IP addresses. This overwhelming influx caused saturation of key infrastructure components, leading to intermittent availability of some services. E-commerce and In-Person Payment Transaction services were particularly affected, experiencing sporadic outages and degraded performance. The immediate impact of the attack highlighted the persistent and escalating cyber threats facing digital financial service providers.

Affected Services and Customer Impact

Several core services were significantly impacted, especially the European data centers that handle a substantial volume of transactions and customer-facing applications. In addition to E-commerce and In-Person Payment transactions, other disrupted services included the Customer Area, Hosted Onboarding, and Transfer API functions. Certain checkout services, such as Session Integrations, Secured Fields, and Pay by Link, also experienced prolonged disruptions throughout the incident. Consequently, many of Adyen’s customers encountered failed or delayed transactions, complicating regular business operations that depend on real-time payments. The widespread service disruptions underscored the criticality of securing payment infrastructure against such sophisticated cyberattacks.

Many merchants and businesses relying on Adyen’s payment platform faced immediate challenges as transactions failed or were delayed. The impact of the attack was particularly felt by businesses operating during peak hours. The failure of real-time payments disrupted normal operations and led to customer dissatisfaction. In an increasingly digital economy, the reliability of payment systems is paramount, and the incident highlighted the vulnerabilities that even major platforms like Adyen face.

Response and Mitigation Efforts

In response to the cyberattack, Adyen’s dedicated engineering team swiftly activated mitigation protocols. These included enabling anti-DDoS protections, scaling up system capacity, and deploying targeted filtering measures to identify and thwart malicious traffic. Despite these efforts, the dynamic nature of the attack, with new waves exhibiting different traffic patterns, posed continuous challenges. Some services continued to experience degraded performance for several hours before the situation was fully resolved. The incident was declared resolved at 03:20 CEST on April 22, nearly nine hours after the attack had commenced. Adyen maintained transparency throughout the incident by providing regular updates to its customers on the impact and progress toward resolution. This proactive communication helped maintain customer trust during a challenging period. Despite the setbacks, the company’s swift response and coordinated efforts underscored a commitment to minimizing disruption and restoring normal service levels as quickly as possible. The incident highlighted the importance of having robust and dynamic response strategies to address the evolving nature of cyberattacks.

Communication and Transparency

Throughout the incident, Adyen maintained a high level of transparency by keeping its customers informed through regular updates about the ongoing efforts and the service status. Chief Technology Officer Tom Adams acknowledged the severity of the incident and emphasized the company’s commitment to reliability and customer communication. He expressed regret for the disruptions caused to customers’ businesses and reassured them that Adyen is actively monitoring for further threats. Adams emphasized the importance of transparency in addressing such issues and highlighted the company’s dedication to conducting a comprehensive incident review.

Adams reaffirmed the company’s commitment to reliability, stating that it is paramount to Adyen’s operations. He outlined plans to continue monitoring for further attack attempts and to conduct a thorough post-incident review. This review will include a detailed root cause analysis and the development of long-term strategies to prevent similar incidents in the future. Adyen has promised to share the findings of this review with customers to maintain openness and trust. The company’s proactive stance and commitment to transparency demonstrate a focus on rebuilding customer trust and ensuring the reliability of its services.

Long-Term Strategies and Future Prevention

Adyen has committed to a thorough post-attack review focused on identifying the root causes of the incident and developing long-term strategies to prevent similar occurrences. The company plans to implement enhanced security measures based on the findings of this review, aiming to bolster system resilience against emerging and evolving cyber threats. By continually improving its defenses, Adyen aims to ensure the reliability and security of its payment services and meet the growing expectations of security in the digital age. The company has also stressed the importance of sharing the review findings with customers to reinforce transparency and trust. This initiative is part of Adyen’s broader commitment to maintaining open communication and collaboration with its client base. As part of the long-term strategy, Adyen will prioritize investments in advanced cybersecurity technologies and employ continuous monitoring practices to detect and mitigate potential threats proactively. The goal is to stay ahead of cybercriminals and ensure that the company’s infrastructure remains robust and secure.

Broader Implications and Industry Challenges

On April 21, 2025, Adyen, a well-known global payment platform, encountered a major disruption caused by a significant Distributed-Denial-of-Service (DDoS) attack. This cyberattack had widespread consequences, severely impacting numerous customers throughout Europe. As a result, there were extensive delays and transaction failures, which occurred during critical times. This incident highlighted the escalating threat and increasing sophistication of cyberattacks aimed at financial infrastructures. The situation underscored the urgent necessity for businesses to implement robust cybersecurity measures to safeguard against such events. Cybersecurity has become an integral part of maintaining the integrity and functionality of financial systems, given the potential for such attacks to disrupt essential services and cause considerable economic loss. Proactive measures, continuous monitoring, and the adoption of advanced security protocols are imperative to counteract the evolving tactics of cybercriminals. This event serves as a potent reminder of the vulnerability of even the most advanced systems and the importance of remaining vigilant in an age where digital threats are constantly evolving.

Explore more

Is Recruiting Support Staff Harder Than Hiring Teachers?

The traditional image of a school crisis usually centers on a shortage of teachers, yet a much quieter and potentially more damaging vacancy is hollowing out the English education system. While headlines frequently focus on those leading the classrooms, the invisible backbone of the school—the teaching assistants and technical support staff—is disappearing at an alarming rate. This shift has created

How Can HR Successfully Move to a Skills-Based Model?

The traditional corporate hierarchy, once anchored by rigid job descriptions and static titles, is rapidly dissolving into a more fluid ecosystem centered on individual competencies. As generative AI continues to redefine the boundaries of human productivity in 2026, organizations are discovering that the “job” as a unit of work is often too slow to adapt to fluctuating market demands. This

How Is Kazakhstan Shaping the Future of Financial AI?

While many global financial centers are entangled in the restrictive complexities of preventative legislation, Kazakhstan has quietly transformed into a high-velocity laboratory for artificial intelligence integration within the banking sector. This Central Asian nation is currently redefining the intersection of sovereign technology and fiscal oversight by prioritizing infrastructural depth over rigid, preemptive regulation. By fostering a climate of “technological neutrality,”

The Future of Data Entry: Integrating AI, RPA, and Human Insight

Organizations failing to recognize the fundamental shift from clerical data entry to intelligent information synthesis risk a complete loss of operational competitiveness in a global market that no longer rewards manual speed. The landscape of data management is undergoing a profound transformation, moving away from the stagnant, labor-intensive practices of the past toward a dynamic, technology-driven ecosystem. Historically, data entry

Getsitecontrol Debuts Free Tools to Boost Email Performance

Digital marketers often face a frustrating paradox where the most visually stunning campaign assets are the very things that cause an email to vanish into a spam folder or fail to load on a mobile device. The introduction of Getsitecontrol’s new suite marks a significant pivot toward accessible, high-performance marketing utilities. By offering browser-based solutions for file optimization, the platform