Adyen Hit by Major DDoS Attack Disrupting Payments Across Europe

Article Highlights
Off On

On April 21, 2025, Adyen, a global payment platform, faced a major disruption due to a significant Distributed-Denial-of-Service (DDoS) attack, affecting numerous customers across Europe. This incident underscored the growing threat and sophistication of cyberattacks targeting financial infrastructure. The attack resulted in widespread delays and transaction failures at crucial moments, highlighting the importance of robust cybersecurity measures.

Attack Overview and Immediate Impact

The cyberattack began at 18:51 CEST when Adyen’s internal monitoring systems detected an unusual surge of errors and sluggish response times in various payment services hosted in European data centers. A swift investigation by the company’s engineering team revealed that the issue was a DDoS attack, which overwhelmed the system with excessive traffic from multiple sources, making it nearly impossible to process legitimate requests efficiently. The peak of the assault saw millions of requests per minute targeting vital infrastructure components, leading to intermittent service availability. Notably, the most significant disruptions occurred between 18:51 and 19:35 CEST.

The attack unfolded in three distinctive waves, each wave forcing the engineering team to adjust their mitigation strategies. With each wave, the attack generated traffic from a globally distributed and continuously changing set of IP addresses. This overwhelming influx caused saturation of key infrastructure components, leading to intermittent availability of some services. E-commerce and In-Person Payment Transaction services were particularly affected, experiencing sporadic outages and degraded performance. The immediate impact of the attack highlighted the persistent and escalating cyber threats facing digital financial service providers.

Affected Services and Customer Impact

Several core services were significantly impacted, especially the European data centers that handle a substantial volume of transactions and customer-facing applications. In addition to E-commerce and In-Person Payment transactions, other disrupted services included the Customer Area, Hosted Onboarding, and Transfer API functions. Certain checkout services, such as Session Integrations, Secured Fields, and Pay by Link, also experienced prolonged disruptions throughout the incident. Consequently, many of Adyen’s customers encountered failed or delayed transactions, complicating regular business operations that depend on real-time payments. The widespread service disruptions underscored the criticality of securing payment infrastructure against such sophisticated cyberattacks.

Many merchants and businesses relying on Adyen’s payment platform faced immediate challenges as transactions failed or were delayed. The impact of the attack was particularly felt by businesses operating during peak hours. The failure of real-time payments disrupted normal operations and led to customer dissatisfaction. In an increasingly digital economy, the reliability of payment systems is paramount, and the incident highlighted the vulnerabilities that even major platforms like Adyen face.

Response and Mitigation Efforts

In response to the cyberattack, Adyen’s dedicated engineering team swiftly activated mitigation protocols. These included enabling anti-DDoS protections, scaling up system capacity, and deploying targeted filtering measures to identify and thwart malicious traffic. Despite these efforts, the dynamic nature of the attack, with new waves exhibiting different traffic patterns, posed continuous challenges. Some services continued to experience degraded performance for several hours before the situation was fully resolved. The incident was declared resolved at 03:20 CEST on April 22, nearly nine hours after the attack had commenced. Adyen maintained transparency throughout the incident by providing regular updates to its customers on the impact and progress toward resolution. This proactive communication helped maintain customer trust during a challenging period. Despite the setbacks, the company’s swift response and coordinated efforts underscored a commitment to minimizing disruption and restoring normal service levels as quickly as possible. The incident highlighted the importance of having robust and dynamic response strategies to address the evolving nature of cyberattacks.

Communication and Transparency

Throughout the incident, Adyen maintained a high level of transparency by keeping its customers informed through regular updates about the ongoing efforts and the service status. Chief Technology Officer Tom Adams acknowledged the severity of the incident and emphasized the company’s commitment to reliability and customer communication. He expressed regret for the disruptions caused to customers’ businesses and reassured them that Adyen is actively monitoring for further threats. Adams emphasized the importance of transparency in addressing such issues and highlighted the company’s dedication to conducting a comprehensive incident review.

Adams reaffirmed the company’s commitment to reliability, stating that it is paramount to Adyen’s operations. He outlined plans to continue monitoring for further attack attempts and to conduct a thorough post-incident review. This review will include a detailed root cause analysis and the development of long-term strategies to prevent similar incidents in the future. Adyen has promised to share the findings of this review with customers to maintain openness and trust. The company’s proactive stance and commitment to transparency demonstrate a focus on rebuilding customer trust and ensuring the reliability of its services.

Long-Term Strategies and Future Prevention

Adyen has committed to a thorough post-attack review focused on identifying the root causes of the incident and developing long-term strategies to prevent similar occurrences. The company plans to implement enhanced security measures based on the findings of this review, aiming to bolster system resilience against emerging and evolving cyber threats. By continually improving its defenses, Adyen aims to ensure the reliability and security of its payment services and meet the growing expectations of security in the digital age. The company has also stressed the importance of sharing the review findings with customers to reinforce transparency and trust. This initiative is part of Adyen’s broader commitment to maintaining open communication and collaboration with its client base. As part of the long-term strategy, Adyen will prioritize investments in advanced cybersecurity technologies and employ continuous monitoring practices to detect and mitigate potential threats proactively. The goal is to stay ahead of cybercriminals and ensure that the company’s infrastructure remains robust and secure.

Broader Implications and Industry Challenges

On April 21, 2025, Adyen, a well-known global payment platform, encountered a major disruption caused by a significant Distributed-Denial-of-Service (DDoS) attack. This cyberattack had widespread consequences, severely impacting numerous customers throughout Europe. As a result, there were extensive delays and transaction failures, which occurred during critical times. This incident highlighted the escalating threat and increasing sophistication of cyberattacks aimed at financial infrastructures. The situation underscored the urgent necessity for businesses to implement robust cybersecurity measures to safeguard against such events. Cybersecurity has become an integral part of maintaining the integrity and functionality of financial systems, given the potential for such attacks to disrupt essential services and cause considerable economic loss. Proactive measures, continuous monitoring, and the adoption of advanced security protocols are imperative to counteract the evolving tactics of cybercriminals. This event serves as a potent reminder of the vulnerability of even the most advanced systems and the importance of remaining vigilant in an age where digital threats are constantly evolving.

Explore more

Agentic AI Redefines the Software Development Lifecycle

The quiet hum of servers executing tasks once performed by entire teams of developers now underpins the modern software engineering landscape, signaling a fundamental and irreversible shift in how digital products are conceived and built. The emergence of Agentic AI Workflows represents a significant advancement in the software development sector, moving far beyond the simple code-completion tools of the past.

Is AI Creating a Hidden DevOps Crisis?

The sophisticated artificial intelligence that powers real-time recommendations and autonomous systems is placing an unprecedented strain on the very DevOps foundations built to support it, revealing a silent but escalating crisis. As organizations race to deploy increasingly complex AI and machine learning models, they are discovering that the conventional, component-focused practices that served them well in the past are fundamentally

Agentic AI in Banking – Review

The vast majority of a bank’s operational costs are hidden within complex, multi-step workflows that have long resisted traditional automation efforts, a challenge now being met by a new generation of intelligent systems. Agentic and multiagent Artificial Intelligence represent a significant advancement in the banking sector, poised to fundamentally reshape operations. This review will explore the evolution of this technology,

Cooling Job Market Requires a New Talent Strategy

The once-frenzied rhythm of the American job market has slowed to a quiet, steady hum, signaling a profound and lasting transformation that demands an entirely new approach to organizational leadership and talent management. For human resources leaders accustomed to the high-stakes war for talent, the current landscape presents a different, more subtle challenge. The cooldown is not a momentary pause

What If You Hired for Potential, Not Pedigree?

In an increasingly dynamic business landscape, the long-standing practice of using traditional credentials like university degrees and linear career histories as primary hiring benchmarks is proving to be a fundamentally flawed predictor of job success. A more powerful and predictive model is rapidly gaining momentum, one that shifts the focus from a candidate’s past pedigree to their present capabilities and