
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 08 Apr 2026 05:08:47 GMT</lastBuildDate>
        <item>
            <title><![CDATA[IDC MarketScape positions Cloudflare as a Leader among worldwide Commercial CDN providers]]></title>
            <link>https://blog.cloudflare.com/idc-marketscape-cdn-leader-2022/</link>
            <pubDate>Tue, 15 Mar 2022 20:29:22 GMT</pubDate>
            <description><![CDATA[ We are thrilled to announce that Cloudflare has been positioned in the Leaders category in the IDC MarketScape: Worldwide Commercial CDN 2022 Vendor Assessment ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We are thrilled to announce that Cloudflare has been positioned in the Leaders category in the IDC MarketScape: Worldwide Commercial CDN 2022 Vendor Assessment(doc #US47652821, March 2022).</p><p><b>You can download a </b><a href="https://www.cloudflare.com/lp/idc-worldwide-cdn-marketscape/"><b>complimentary copy here</b></a><b>.</b></p><p>The IDC MarketScape evaluated 10 CDN vendors based on their current capabilities and future strategies for delivering Commercial CDN services. Cloudflare is recognized as a Leader.</p><p>At Cloudflare, we release products at a dizzying pace. When we talk to our customers, we hear again and again that they appreciate Cloudflare for our relentless innovation. In 2021 alone, over the course of <a href="/2021-innovations-weeks/">seven Innovation Weeks</a>, we launched a diverse set of products and services that made our customers’ experiences on the Internet even faster, more secure, more reliable, and more private.</p><p>We leverage economies of scale and network effects to innovate at a fast pace. Of course, there’s more to our <a href="/the-secret-to-cloudflare-pace-of-innovation/">secret sauce</a> than our pace of innovation. In the report, IDC notes that Cloudflare is “a highly innovative vendor and continues to invest in its competencies to support advanced technologies such as virtualization, serverless, AI/ML, IoT, HTTP3, 5G and (mobile) edge computing.” In addition, IDC also recognizes Cloudflare for its “integrated SASE offering (that) is appealing to global enterprise customers.”</p>
    <div>
      <h3>Built for the modern Internet</h3>
      <a href="#built-for-the-modern-internet">
        
      </a>
    </div>
    <p>Building fast scalable applications on the modern Internet requires more than just caching static content on servers around the world. Developers need to be able to build applications without worrying about underlying infrastructure. A few years ago, we set out to revolutionize the way applications are built, so developers didn’t have to worry about scale, speed, or even compliance. Our goal was to let them build the code, while we handle the rest. Our serverless platform, <a href="https://workers.cloudflare.com/">Cloudflare Workers</a>, aimed to be the easiest, most powerful, and most customizable platform for developers to build and deploy their applications.</p><p>Workers was designed from the ground up for an edge-first serverless model. Since Cloudflare started with a distributed edge network, rather than trying to push compute from large centralized data centers out into the edge, working under those constraints forced us to innovate.</p><p>Today, <a href="https://workers.cloudflare.com/">Workers</a> services hundreds of thousands of developers, ranging from hobbyists to enterprises all over the world, serving millions of requests per second.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3rFCytEVuE5O5YH8SIFr39/1fe0df2048c36cfdf45dc5d0b9dc74a3/image1-45.png" />
            
            </figure><p>According to the IDC MarketScape: “The Cloudflare Workers developer platform, based on an isolate serverless architecture, is highly customizable and provides customers with a shortened time to market which is crucial in this digitally led market.”</p>
    <div>
      <h3>Data you care about, at your fingertips</h3>
      <a href="#data-you-care-about-at-your-fingertips">
        
      </a>
    </div>
    <p>Our customers today have access to extensive analytics on the dashboard and via the API around network performance, firewall actions, cache ratios, and more. We provide analytics based on raw events, which means that we go beyond simple metrics and provide powerful filtering and analysis capabilities on high-dimensionality data.</p><p>And our insights are actionable. For example, customers who are looking to optimize cache performance can analyze specific URLs and see not just hits and misses but content that is expired or revalidated (indicating a short URL). All events, both directly in the console and in the logs, are available within 30 seconds or less.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7oJAUa3DU4M52nNNRHvRLK/7a016edad9aec049a1fe06041057aa4b/image5-2.png" />
            
            </figure><p>The IDC MarketScape notes that the “self-serve portal and capabilities that include dashboards with detailed analytics as well as actionable content delivery and security analytics are complemented by a comprehensive enhanced services suite for enterprise grade customers.”</p>
    <div>
      <h3>The only unified SASE solution in the market</h3>
      <a href="#the-only-unified-sase-solution-in-the-market">
        
      </a>
    </div>
    <p>Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a> offering, <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a>, continues to grow and provides a unified and comprehensive solution to our customers. With our SASE offering, we aim to be the network that any business can plug into to deliver the fastest, most reliable, and most secure experiences to their customers. Cloudflare One combines network connectivity services with Zero Trust security services on our purpose-built global network.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1m4oD3J029KmZm6WTfxcX3/fcd03085bcc2084b09ec243c23f1ca2e/image4-2.png" />
            
            </figure><p><a href="https://www.cloudflare.com/products/zero-trust/access/">Cloudflare Access</a> and <a href="https://www.cloudflare.com/products/zero-trust/gateway/">Gateway</a> services natively work together to secure connectivity for any user to any application and Internet destination. To enhance threat and data protection, <a href="https://www.cloudflare.com/products/zero-trust/browser-isolation/">Cloudflare Browser Isolation</a> and <a href="/cloudflare-zero-trust-casb/">CASB services</a> natively work across both Access and Gateway to fully control data in transit, at rest, and in use.</p><p>The old model of the corporate network has been made obsolete by mobile, SaaS, and the public cloud. We believe <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust networking</a> is the future, and we are proud to be enabling that future. The IDC MarketScape notes: “Cloudflare’s enterprise security Zero Trust services stack is extensive and meets secure access requirements of the distributed workforce. Its data localization suite and integrated SASE offering is appealing to global enterprise customers.“</p>
    <div>
      <h3>A one-stop, truly global solution</h3>
      <a href="#a-one-stop-truly-global-solution">
        
      </a>
    </div>
    <p>Many global companies today looking to do business in China often are restricted in their operations due to the country’s unique regulatory, political, and trade policies.</p><p>Core to Cloudflare’s mission of helping build a better Internet is making it easy for our customers to improve the performance, security, and reliability of their digital properties, no matter where in the world they might be, and this includes mainland China. Our <a href="/cloudflare-partners-with-jd-cloud/">partnership with JD Cloud &amp; AI</a> allows international businesses to grow their online presence in China without having to worry about managing separate tools with separate vendors for security and performance in China.</p><p>Just last year, we made advancements to allow customers to be able to serve their DNS in mainland China. This means DNS queries are answered directly from one of the JD Cloud Points of Presence (PoPs), leading to faster response times and improved reliability. This in addition to providing DDoS protection, WAF, serverless compute, <a href="https://www.cloudflare.com/application-services/products/ssl/">SSL/TLS</a>, and caching services from more than 35 locations in mainland China.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1BVdN9aqGms1kudIsD3AsT/d217dd9a4d142356c50a5e4c53ffbdb4/image2-37.png" />
            
            </figure><p>Here’s what the IDC MarketScape noted about  Cloudflare’s China network: “Cloudflare's strategic partnership with JD Cloud enables the vendor to provide its customers cached content in-country at any of their China data centers from origins outside of mainland China and provide the same Internet performance, security, and reliability experience in China as the rest of the world.”</p>
    <div>
      <h3>A unified network that is fast, secure, reliable, customizable, and global</h3>
      <a href="#a-unified-network-that-is-fast-secure-reliable-customizable-and-global">
        
      </a>
    </div>
    <p>One of the earliest architectural decisions we made was to run the same software stack of our services across our ever-growing fleet of servers and data centers. So whether it is content caching, serverless compute, zero trust functionality, or our other performance, security, or reliability services, we run them from all of our physical points of presence. This also translates into faster performance and robust security policies for our customers, all managed from the same dashboard or APIs. This strategy has been a key enabler for us to expand our customer base significantly over the years. Today, Cloudflare’s network spans 250 cities across 100+ countries and has millions of customers, of which more than 140,000 are paying customers.</p><p>In the IDC MarketScape: Worldwide Commercial CDN 2022 Vendor Assessment, IDC notes, “[Cloudflare’s] clear strategy to invest in new technology but also expand its network as well as its sales machine across these new territories has resulted in a tremendous growth curve in the past years.”</p><p>To that, we’d humbly like to say that we are just getting started.</p><p>Stay tuned for more product and feature announcements on our blog. If you're interested in contributing to Cloudflare's mission, <a href="https://www.cloudflare.com/careers/">we'd love to hear from you</a>.</p> ]]></content:encoded>
            <category><![CDATA[CDN]]></category>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[Developer Platform]]></category>
            <guid isPermaLink="false">6JN681nixlwfkZr37qpCV9</guid>
            <dc:creator>Vivek Ganti</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS Attack Trends for Q4 2021]]></title>
            <link>https://blog.cloudflare.com/ddos-attack-trends-for-2021-q4/</link>
            <pubDate>Mon, 10 Jan 2022 13:58:20 GMT</pubDate>
            <description><![CDATA[ In Q4, we observed a 95% increase in L3/4 DDoS attacks and record-breaking levels of Ransom DDoS attacks. The Manufacturing industry was the most targeted alongside a 5,800% increase in SNMP-based DDoS attacks and massive campaigns against VoIP providers around the world ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1gkcJlZwljNNiInjszMhDS/3679e2af7a226546660265e0749f0ac2/image3-1.png" />
            
            </figure><p>The first half of 2021 witnessed massive ransomware and ransom DDoS attack campaigns that interrupted aspects of critical infrastructure around the world (including one of the largest petroleum pipeline system operators in the US) and a <a href="https://csirt.divd.nl/2021/07/03/Kaseya-Case-Update/">vulnerability in IT management software</a> that targeted schools, public sector, travel organizations, and credit unions, to name a few.</p><p>The second half of the year recorded a growing swarm of one of the most powerful botnets deployed (<a href="/meris-botnet/">Meris</a>) and <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">record-breaking HTTP DDoS attacks</a> and <a href="/cloudflare-blocks-an-almost-2-tbps-multi-vector-ddos-attack/">network-layer attacks</a> observed over the Cloudflare network. This besides the <a href="/inside-the-log4j2-vulnerability-cve-2021-44228/">Log4j2 vulnerability</a> (CVE-2021-44228) discovered in December that allows an attacker to execute code on a remote server — arguably one of the most severe vulnerabilities on the Internet since both <a href="/tag/heartbleed/">Heartbleed</a> and <a href="/inside-shellshock/">Shellshock</a>.</p><p>Prominent attacks such as the ones listed above are but a few examples that demonstrate a trend of intensifying cyber-insecurity that affected everyone, from tech firms and government organizations to wineries and meat processing plants.</p><p>Here are some <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attack</a> trends and highlights from 2021 and Q4 ‘21 specifically:</p>
    <div>
      <h3>Ransom DDoS attacks</h3>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>In Q4, <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">ransom DDoS attacks</a> increased by 29% YoY and 175% QoQ.</p></li><li><p>In December alone, one out of every three survey respondents reported being targeted by a ransom DDoS attack or threatened by the attacker.</p></li></ul>
    <div>
      <h3>Application-layer DDoS attacks</h3>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>The Manufacturing industry was the most attacked in Q4 ’21, recording a whopping 641% increase QoQ in the number of attacks. The Business Services and Gaming/Gambling industries were the second and third most targeted industries by application-layer DDoS attacks.</p></li><li><p>For the fourth time in a row this year, China topped the charts with the highest percentage of attack traffic originating from its networks.</p></li><li><p>A new botnet called the <a href="/meris-botnet/">Meris botnet</a> emerged in mid-2021 and continued to bombard organizations around the world, launching some of the largest HTTP attacks on record — including a <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">17.2M rps attack that Cloudflare automatically mitigated</a>.</p></li></ul>
    <div>
      <h3>Network-layer DDoS attacks</h3>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>Q4 ’21 was the busiest quarter for attackers in 2021. In December 2021 alone, there were more than all the attacks observed in Q1 and Q2 ’21 separately.</p></li><li><p>While the majority of attacks were small, terabit-strong attacks became the new norm in the second half of 2021. Cloudflare automatically mitigated dozens of attacks peaking over 1 Tbps, with the largest one peaking just under <a href="/cloudflare-blocks-an-almost-2-tbps-multi-vector-ddos-attack/">2 Tbps — the largest we’ve ever seen</a>.</p></li><li><p>Q4 ’21, and November specifically, recorded a persistent ransom <a href="/update-on-voip-attacks/">DDoS campaign against VoIP providers</a> around the world.</p></li><li><p>Attacks originating from Moldova quadrupled in Q4 ’21 QoQ, making it the country with the highest percentage of network-layer DDoS activity.</p></li><li><p><a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP floods</a> were the most frequent attack vectors while emerging threats such as SNMP attacks increased by nearly 5,800% QoQ.</p></li></ul><p>This report is based on DDoS attacks that were automatically detected and mitigated by Cloudflare’s DDoS Protection systems. To learn more about how it works, check out <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">this deep-dive blog post</a>.</p>
    <div>
      <h3>A note on how we measure DDoS attacks observed over our network</h3>
      <a href="#a-note-on-how-we-measure-ddos-attacks-observed-over-our-network">
        
      </a>
    </div>
    <p>To analyze attack trends, we calculate the “DDoS activity” rate, which is the percentage of attack traffic out of the total traffic (attack + clean) observed over our global network. Measuring attack numbers as a percentage of the total traffic observed allows us to normalize data points and avoid biases reflected in absolute numbers towards, for example, a Cloudflare data center that receives more total traffic and likely, also more attacks.</p><p>An interactive version of this report is available on <a href="https://radar.cloudflare.com/notebooks/ddos-2021-q4">Cloudflare Radar</a>.</p>
    <div>
      <h2>Ransom Attacks</h2>
      <a href="#ransom-attacks">
        
      </a>
    </div>
    <p>Our systems constantly analyze traffic and automatically apply mitigation when DDoS attacks are detected. Each DDoS’d customer is prompted with an automated survey to help us better understand the nature of the attack and the success of the mitigation.</p><p>For over two years now, Cloudflare has been surveying attacked customers — one question on the survey being if they received a ransom note demanding payment in exchange to stop the DDoS attack. Q4 ’21 recorded the highest survey responses ever that indicated ransom threats — ransom attacks increased by 29% YoY and 175% QoQ. More specifically, one out of every 4.5 respondents (22%) reported receiving a ransom letter demanding payment by the attacker.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6YXf8BjOc11hjAwLqsC3Ee/d9690fb0ee28b1c024b8bfceb425e82c/image9.png" />
            
            </figure><p>The percentage of respondents reported being targeted by a ransom DDoS attack or that have received threats in advance of the attack.</p><p>When we break it down by month, we can see that December 2021 topped the charts with 32% of respondents reporting receiving a ransom letter — that’s nearly one out of every three surveyed respondents.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2qNYRymdKC7OmMRlqYW6yP/95660390bf9c222518705aab2a871e8c/unnamed.png" />
            
            </figure>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, specifically HTTP DDoS attacks, are attacks that usually aim to disrupt a web server by making it unable to process legitimate user requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests and — in some cases — crash, resulting in degraded performance or an outage for legitimate users.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2rXJ2p6S40Qc709TT5Kabb/f4aa6e71713ec57142419a8acc59170e/image13.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by industry</h3>
      <a href="#application-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p><b>In Q4, DDoS attacks on Manufacturing companies increased by 641% QoQ, and DDoS attacks on the Business Services industry increased by 97%.</b></p><p>When we break down the application-layer attacks targeted by industry, the Manufacturing, Business Services, and Gaming/Gambling industries were the most targeted industries in Q4 ’21.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3VZPSeXuR577XbrkgkQKYW/c346c1c5a7a18f178ce4f388a4774919/image12.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by source country</h3>
      <a href="#application-layer-ddos-attacks-by-source-country">
        
      </a>
    </div>
    <p>To understand the origin of the HTTP attacks, we look at the geolocation of the source IP address belonging to the client that generated the attack HTTP requests. Unlike network-layer attacks, source IP addresses cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> in HTTP attacks. A high percentage of DDoS activity in a given country usually indicates the presence of botnets operating from within the country's borders.</p><p>For the fourth quarter in a row, China remains the country with the highest percentage of DDoS attacks originating from within its borders. More than three out of every thousand HTTP requests that originated from Chinese IP addresses were part of an HTTP DDoS attack. The US remained in second place, followed by Brazil and India.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4V0FXoJ0TWV5ZZfVsfJwvX/00483401590d51fde24ab76e1ce743bb/image18.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by target country</h3>
      <a href="#application-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>In order to identify which countries are targeted by the most HTTP DDoS attacks, we bucket the DDoS attacks by our customers' billing countries and represent it as a percentage out of all DDoS attacks.</p><p>For the third consecutive time this year, organizations in the United States were targeted by the most HTTP DDoS attacks, followed by Canada and Germany.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4f8B9aTjlObizqYK5FO0vA/20b782dba3e36f87f31a541664305f03/image8.png" />
            
            </figure>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application-layer attacks target the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service that end users are trying to access, <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer attacks</a> aim to overwhelm network infrastructure (such as in-line routers and servers) and the Internet link itself.</p>
    <div>
      <h3>Cloudflare thwarts an almost 2 Tbps attack</h3>
      <a href="#cloudflare-thwarts-an-almost-2-tbps-attack">
        
      </a>
    </div>
    <p>In November, our systems automatically detected and mitigated <a href="/cloudflare-blocks-an-almost-2-tbps-multi-vector-ddos-attack/">an almost 2 Tbps DDoS attack</a>. This was a multi-vector attack combining <a href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/">DNS amplification</a> attacks and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP floods</a>. The entire attack lasted just one minute. The attack was launched from approximately 15,000 bots running a variant of the original Mirai code on IoT devices and <a href="https://www.rapid7.com/blog/post/2021/11/01/gitlab-unauthenticated-remote-code-execution-cve-2021-22205-exploited-in-the-wild/">unpatched GitLab instances</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6CZbhxkxGHatqnmkf0rD8B/0c378dc0f652ffa379bef8c9e200edf7/image14.jpg" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by month</h3>
      <a href="#network-layer-ddos-attacks-by-month">
        
      </a>
    </div>
    <p><b>December was the busiest month for attackers in 2021.</b></p><p>Q4 ‘21 was the busiest quarter in 2021 for attackers. Over 43% of all network-layer DDoS attacks took place in the fourth quarter of 2021. While October was a relatively calmer month, in November, the month of the Chinese Singles' Day, the American Thanksgiving holiday, Black Friday, and Cyber Monday, the number of network-layer DDoS attacks nearly doubled. The number of observed attacks increased towards the final days of December ’21 as the world prepared to close out the year. In fact, the total number of attacks in December alone was higher than all the attacks in Q2 ’21 and almost equivalent to all attacks in Q1 ’21.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3M60fvAArNvQNb92QmXP59/273a191925bb3d77ae22c647edf8d973/image5.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by attack rate</h3>
      <a href="#network-layer-ddos-attacks-by-attack-rate">
        
      </a>
    </div>
    <p><b>While most attacks are still relatively ‘small’ in size, terabit-strong attacks are becoming the norm.</b></p><p>There are different ways of measuring the size of an L3/4 DDoS attack. One is the volume of traffic it delivers, measured as the bit rate (specifically, terabits per second or gigabits per second). Another is the number of packets it delivers, measured as the packet rate (specifically, millions of packets per second).</p><p>Attacks with high bit rates attempt to cause a denial-of-service event by clogging the Internet link, while attacks with high packet rates attempt to overwhelm the servers, routers, or other in-line hardware appliances. These devices dedicate a certain amount of memory and computation power to process each packet. Therefore, by bombarding it with many packets, the appliance can be left with no further processing resources. In such a case, packets are “dropped,” i.e., the appliance is unable to process them. For users, this results in service disruptions and denial of service.</p><p>The distribution of attacks by their size (in bit rate) and month is shown below. As seen in the graph above, the majority of attacks took place in December. However, the graph below illustrates that larger attacks, over 300 Gbps in size, took place in November. Most of the attacks between 5-20 Gbps took place in December.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3FDRn0pqTveatbegOoQqZR/88162e7e901ccd0fe1409258a62a58f6/image10.png" />
            
            </figure><p><b>Distribution by packet rate</b></p><p>An interesting correlation Cloudflare has observed is that when the number of attacks increases, their size and duration decrease. In the first two-thirds of 2021, the number of attacks was relatively small, and correspondingly, their rates increased, e.g., in Q3 ’21, attacks ranging from 1-10 million packets per second (mpps) increased by 196%. In Q4 ’21, the number of attacks increased and Cloudflare observed a decrease in the size of attacks. 91% of all attacks peaked below 50,000 packets per second (pps) — easily sufficient to take down unprotected Internet properties.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ckVnjxEu3spStObJuOkyb/d4f0fa003c675a1b224b79bbb59e1e87/image4.png" />
            
            </figure><p>Larger attacks of over 1 mpps decreased by 48% to 28% QoQ, while attacks peaking below 50K pps increased by 2.36% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Pq9PVHDkDpxA2Ao0lsk54/2b83c62b6881c5b9f65b7fcb28b50a4a/image19.png" />
            
            </figure>
    <div>
      <h3>Distribution by bit rate</h3>
      <a href="#distribution-by-bit-rate">
        
      </a>
    </div>
    <p>Similar to the trend observed in packet-intensive attacks, the amount of bit-intensive attacks shrunk as well. While attacks over 1 Tbps are becoming the norm, with the largest one we’ve ever seen peak just below 2 Tbps, the majority of attacks are still small and peaked below 500 Mbps (97.2%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16pVIsOgXI2wsHIRLv7naT/9a8c062f58e23a902eb79052e15a13f9/image17.png" />
            
            </figure><p>In Q4 ’21, larger attacks of all ranges above 500 Mbps saw massive decreases ranging from 35% to 57% for the larger 100+ Gbps attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3II1ZYySec9lPey8MzL4zu/c6faf71ae63de7801c7e90e7b21613d3/image1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by duration</h3>
      <a href="#network-layer-ddos-attacks-by-duration">
        
      </a>
    </div>
    <p><b>Most attacks remain under one hour in duration, reiterating the need for automated always-on DDoS mitigation solutions.</b></p><p>We measure the duration of an attack by recording the difference between when it is first detected by our systems as an attack and the last packet we see with that attack signature towards that specific target. In the last quarter of 2021, 98% of all network-layer attacks lasted less than one hour. This is very common as most of the attacks are short-lived. Even more so, a trend we’ve seen is that when the number of attacks increases, as in this quarter, their rate and duration decreases.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4rFMqwUHU7xE4JBesamLXP/2cc512dfab3837fa7e8b8431b4c4a529/image2.png" />
            
            </figure><p>Short attacks can easily go undetected, especially burst attacks that, within seconds, bombard a target with a significant number of packets, bytes, or requests. In this case, DDoS protection services that rely on manual mitigation by security analysis have no chance in mitigating the attack in time. They can only learn from it in their post-attack analysis, then deploy a new rule that filters the attack fingerprint and hope to catch it next time. Similarly, using an “on-demand” service, where the security team will redirect traffic to a DDoS provider during the attack, is also inefficient because the attack will already be over before the traffic routes to the on-demand DDoS provider.</p><p>It’s recommended that companies use <a href="https://www.cloudflare.com/ddos/">automated, always-on DDoS protection services</a> that analyze traffic and apply real-time fingerprinting fast enough to block short-lived attacks.</p>
    <div>
      <h2>Attack vectors</h2>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p><b>SYN floods remain attackers’ favorite method of attack, while attacks over SNMP saw a massive surge of almost 5,800% QoQ.</b></p><p>An attack vector is a term used to describe the method that the attacker uses to launch their DDoS attack, i.e., the IP protocol, packet attributes such as TCP flags, flooding method, and other criteria.</p><p>For the first time in 2021, the percentage of <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN flood</a> attacks significantly decreased. Throughout 2021, SYN floods accounted for 54% of all network-layer attacks on average. While still grabbing first place as the most frequent vector, its share dropped by 38% QoQ to 34%.</p><p>However, it was a close-run for SYN attacks and UDP attacks. A <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP flood</a> is a type of denial-of-service attack in which a large number of User Datagram Protocol (UDP) packets are sent to a targeted server with the aim of overwhelming that device’s ability to process and respond. Oftentimes, the firewall protecting the targeted server can also become exhausted as a result of UDP flooding, resulting in a denial-of-service to legitimate traffic. Attacks over UDP jumped from fourth place in Q3 ’21 to second place in Q4 ’21, with a share of 32% of all network-layer attacks — a 1,198% increase in QoQ.</p><p>In third place came the SNMP underdog that made a massive leap with its first time 2021 appearance in the top attack vectors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/lwbO8w5qu71J2zvndCsd4/b4c6479eb8f44192577a91c52f21585b/image7.png" />
            
            </figure>
    <div>
      <h2>Emerging threats</h2>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>When we look at emerging attack vectors — which helps us understand what new vectors attackers are deploying to launch attacks — we observe a massive spike in SNMP, MSSQL, and generic UDP-based DDoS attacks.</p><p>Both SNMP and MSSQL attacks are used to reflect and amplify traffic on the target by spoofing the target’s IP address as the source IP in the packets used to trigger the attack.</p><p>Simple Network Management Protocol (SNMP) is a UDP-based protocol that is often used to discover and manage network devices such as printers, switches, routers, and firewalls of a home or enterprise network on UDP well-known port 161. In an SNMP reflection attack, the attacker sends out a large number of SNMP queries while spoofing the source IP address in the packet as the targets to devices on the network that, in turn, reply to that target’s address. Numerous responses from the devices on the network results in the target network being DDoSed.</p><p>Similar to the SNMP amplification attack, the Microsoft SQL (MSSQL) attack is based on a technique that abuses the Microsoft SQL Server Resolution Protocol for the purpose of launching a reflection-based DDoS attack. The attack occurs when a <a href="https://en.wikipedia.org/wiki/Microsoft_SQL_Server">Microsoft SQL Server</a> responds to a client query or request, attempting to exploit the Microsoft SQL Server Resolution Protocol (MC-SQLR), listening on UDP port 1434.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7AtQXbK2LQzuoc0iLCHJpH/ab0c1aa0dfe437e5c53dee05ce75e078/unnamed-6.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by country</h3>
      <a href="#network-layer-ddos-attacks-by-country">
        
      </a>
    </div>
    <p><b>Attacks originating from Moldova quadrupled, making it the country with the highest percentage of network-layer DDoS activity.</b></p><p>When analyzing network-layer DDoS attacks, we bucket the traffic by the Cloudflare edge data center locations where the traffic was ingested, and not by the source IP. The reason for this is that, when attackers launch network-layer attacks, they can <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoof</a> the source IP address in order to obfuscate the attack source and introduce randomness into the attack properties, which can make it harder for simple DDoS protection systems to block the attack. Hence, if we were to derive the source country based on a spoofed source IP, we would get a spoofed country.</p><p>Cloudflare is able to overcome the challenges of spoofed IPs by displaying the attack data by the location of the Cloudflare data center in which the attack was observed. We are able to achieve geographical accuracy in our report because we have data centers in <a href="http://www.cloudflare.com/network">over 250 cities</a> around the world.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6aiutq5ecZcGT7DPuz29l8/679c95d7ce53e0242e31ee626ca4257e/image6.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1RVVsL8bBzMatBSldHMToC/9f07fc34b2fe114c4c598c2568457554/image16.png" />
            
            </figure><p>To view all regions and countries, check out the <a href="https://radar.cloudflare.com/notebooks/ddos-2021-q4#network-layer-ddos-attacks-by-country">interactive map</a>.</p>
    <div>
      <h2>Summary</h2>
      <a href="#summary">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet. A better Internet is one that is more secure, faster, and reliable for everyone — even in the face of DDoS attacks. As part of our mission, since 2017, we’ve been providing <a href="/unmetered-mitigation/">unmetered and unlimited DDoS protection</a> for free to all of our customers. Over the years, it has become increasingly easier for attackers to launch DDoS attacks. To counter the attacker’s advantage, we want to make sure that it is also easy and free for organizations of all sizes to protect themselves against DDoS attacks of all types.</p><p>Not using Cloudflare yet? <a href="https://dash.cloudflare.com/sign-up">Start now</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[RDDoS]]></category>
            <category><![CDATA[REvil]]></category>
            <category><![CDATA[VoIP]]></category>
            <category><![CDATA[Meris]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">19x0qmzhoEG72zCUibJD8Y</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Vivek Ganti</dc:creator>
        </item>
        <item>
            <title><![CDATA[A Brief History of the Meris Botnet]]></title>
            <link>https://blog.cloudflare.com/meris-botnet/</link>
            <pubDate>Tue, 09 Nov 2021 12:59:29 GMT</pubDate>
            <description><![CDATA[ Over the past months, we’ve been tracking and analyzing the activity of the Meris botnet. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Meris first got our attention due to an exceptionally large <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">17.2 million requests per second (rps) DDoS attack</a> that it launched against one of our customers. This attack, along with subsequent attacks originated by the Meris botnet, was automatically detected and mitigated by our <a href="https://www.cloudflare.com/ddos/">DDoS protection systems</a>. Cloudflare customers, even ones on the <a href="https://www.cloudflare.com/plans/free/">free plan</a>, are protected against Meris attacks.</p><p>Over the past months, we’ve been tracking and analyzing the activity of the Meris botnet. Some main highlights include:</p><ul><li><p>Meris targets approximately 50 different websites every single day with a daily average of 104 unique DDoS attacks.</p></li><li><p>More than 33% of all Meris DDoS attack traffic targeted China-based websites.</p></li><li><p>More than 12% of all websites that were attacked by Meris are operated by US-based companies.</p></li></ul><p><i>View more Meris attack insights and trends in the interactive </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet"><i>Radar dashboard</i></a><i>.</i></p>
    <div>
      <h3>So what is Meris?</h3>
      <a href="#so-what-is-meris">
        
      </a>
    </div>
    <p>Meris (Latvian for plague) is the name of an active botnet behind a series of recent DDoS attacks that have targeted thousands of websites around the world. It was originally detected in late June 2021 by <a href="https://blog.qrator.net/en/meris-botnet-climbing-to-the-record_142/">QRator</a> in joint research they conducted with Yandex. Their initial research identified 30,000 to 56,000 bots, but they estimated that the numbers are actually much higher, in the ballpark of 250,000 bots.</p><p>The Meris botnet is formed of infected routers and networking hardware manufactured by the Latvian company MikroTik. <a href="https://blog.mikrotik.com/security/meris-botnet.html">According to MikroTik’s</a> blog, the attackers exploited a vulnerability in the router’s operating system (RouterOS) which enabled attackers to gain unauthenticated remote access to read and write arbitrary files (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14847">CVE-2018-14847</a>).</p><p><a href="https://wiki.mikrotik.com/wiki/Manual:RouterOS_FAQ#What_is_MikroTik_RouterOS.E2.84.A2.3F">RouterOS</a> is the router operating system that’s used by MikroTik’s routers and the RouterBOARD hardware product family, which can also be used to turn any PC into a router. Administration of RouterOS can be done either via direct <a href="https://www.cloudflare.com/learning/access-management/what-is-ssh/">SSH connection</a> or by using a configuration utility called <a href="https://wiki.mikrotik.com/wiki/Manual:Winbox#Summary">WinBox</a>. The vulnerability itself was possible due to a <a href="https://en.wikipedia.org/wiki/Directory_traversal_attack">directory traversal</a> vulnerability in the WinBox interface with RouterOS.</p><p>Directory traversal is a type of exploit that allows attackers to travel to the parent directories to gain access to the operating system’s <a href="https://en.wikipedia.org/wiki/File_system">file system</a>, a method and structure of how data is stored and retrieved in the operating system. Once they gain access to the file system, attackers can then read the existing files that administer the router and write files directly into the file system to administer the routers to their botnet needs.</p><p>While the vulnerability was patched after its detection back in 2018, it’s still being exploited in compromised devices that do not use the patched RouterOS versions, or that use the default usernames and passwords. MicroTik has advised its customers to upgrade their devices’ OS version, to only allow access to the devices via secure IPsec, and to inspect for any abnormalities such as unknown SOCKS proxy settings and scripts.</p><p>To launch volumetric attacks, the botnet uses HTTP pipelining which allows it to send multiple requests over a single connection, thus increasing its total attack throughput. Furthermore, in an attempt to obfuscate the attack source, the botnet uses open SOCKS proxies to proxy their attack traffic to the target.</p><p>Cloudflare’s DDoS protection systems automatically detect and mitigate Meris attacks. One of the mitigation actions that the system can choose to use is the ‘Connection Close’ action which eliminates the risk of HTTP pipelining and helps slow down attackers. Additionally, as part of Cloudflare’s threat intelligence suite, we provide a Managed IP List of Open SOCKS Proxies that customers can use as part of their firewall rules — to block, challenge or rate-limit traffic that arrives via SOCKS proxies.</p>
    <div>
      <h3>How does Meris compare to Mirai?</h3>
      <a href="#how-does-meris-compare-to-mirai">
        
      </a>
    </div>
    <p>About five years ago, <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai</a> (Japanese for future) — the infamous botnet that infected hundreds of thousands of IoT devices —  <a href="/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis/">launched record-breaking DDoS attacks</a> against websites.</p><p>There have been many variants of the Mirai botnet since its source code was leaked. One version of Mirai, called <a href="/moobot-vs-gatebot-cloudflare-automatically-blocks-botnet-ddos-attack-topping-at-654-gbps/">Moobot</a>, was detected last year when it attacked a Cloudflare customer with a 654 Gbps DDoS attack. Another variant <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/#:~:text=Two%20weeks%20before%2C%20a%20Mirai-variant%20botnet%20launched%20over%20a%20dozen%20UDP%20and%20TCP%20based%20DDoS%20attacks%20that%20peaked%20multiple%20times%20above%201%20Tbps%2C%20with%20a%20max%20peak%20of%20approximately%201.2%20Tbps.">recently made a resurgence</a> when it targeted Cloudflare customers with over a dozen UDP and TCP based DDoS attacks that peaked multiple times above 1 Tbps, with a max peak of approximately 1.2 Tbps.</p><p>While Mirai infected IoT devices with low computational power, Meris is a swarm of routers that have significantly higher processing power and data transfer capabilities than IoT devices, making them much more potent in causing harm at a larger scale to web properties that are not protected by sophisticated cloud-based DDoS mitigation.</p>
    <div>
      <h2>Tracking the Meris botnet attacks</h2>
      <a href="#tracking-the-meris-botnet-attacks">
        
      </a>
    </div>
    <p>Since the appearance of Meris, Cloudflare’s systems automatically detected and mitigated Meris attacks using the existing mitigation rules. During our analysis of the Meris botnet attacks, our security experts noticed the attack vectors adapt to try and bypass Cloudflare’s defenses. Needless to say, they were not successful. But we wanted to stay many steps ahead of attackers — and so our engineers deployed additional rules that mitigate Meris attacks even more comprehensively. A side effect of these mitigation rules is that it also provides us with more granular threat intelligence on the Meris attacks.</p><p>Since we deployed the new rules in early August, we’ve seen Meris launch an average of 104 DDoS attacks on Cloudflare customers every day. The highest figure we’ve seen was on September 6, when Meris was used to launch 261 unique attacks against Cloudflare customers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6TtZZ2lzrszMdx8N3fhjp4/6bdfaba64b916e35235136ac8be75fda/unnamed--8-.png" />
            
            </figure><p><i>View the interactive graph on</i> <a href="https://radar.cloudflare.com/notebooks/meris-botnet#meris_attacks_over_time"><i>Cloudflare Radar</i></a><i>.</i></p><p>During that same day, on September 6, attacks from Meris accounted for a record-breaking 17.5% of all L7 DDoS attacks that Cloudflare observed.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3OP78KrTmwCcDv1W1n6jPr/f1ea42eb24f867c74eff3289d16941de/unnamed--1--3.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#share_of_meris_attacks"><i>Cloudflare Radar</i></a><i>.</i></p><p>Overall, Meris targets about 50 different websites and applications every single day. Although the average attack peaked at 106K rps, the median attack size was actually smaller at 17.6K rps. The largest attack we’ve seen was 17.2M rps and that occurred in July. In the graph below, you can see the daily highest requests per second rate after we deployed the new rules. Since then, the largest attack we’ve seen was 16.7M rps, which took place on August 19.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6yGWKQcIfIFhUsuJShFunZ/8f01287788ec1337311772309fc64354/unnamed--9-.png" />
            
            </figure>
    <div>
      <h2>Meris used to target Banks, Financial Services, and Insurance companies</h2>
      <a href="#meris-used-to-target-banks-financial-services-and-insurance-companies">
        
      </a>
    </div>
    <p>Over the past few months, the industry that received the most attack traffic from the Meris botnet was the Banking, Financial Services, and Insurance (BFSI) industry</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3GdZyXvW0bu3BUGgoptusx/073d6227e2b14baa96cc57cc926ab63b/unnamed-6.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#top10_industries_by_total_requests"><i>Cloudflare Radar</i></a><i>.</i></p><p>Following the BFSI industry, the most attacked industries were the Publishing, Gaming/Gambling, and IT Services industries. And while BFSI was the number one most attacked industry when considering the Meris DDoS activity rate, it <i>only</i> came in fourth place when considering the percentage of targeted websites.</p><p>In terms of the percentage of targeted websites, the Computer Software industry came in first place. Almost 4% of all impacted websites were of Computer Software companies protected by Cloudflare, followed by Gaming/Gambling and IT Services with 3% and 2%, respectively.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/72tWyMdL7CFZWKLTUe4MSN/fa7c89b73a1d34866284c9249460cdcf/unnamed--2--3.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#top10_industries_by_internet_properties"><i>Cloudflare Radar</i></a><i>.</i></p>
    <div>
      <h3>Attacks on industries over time</h3>
      <a href="#attacks-on-industries-over-time">
        
      </a>
    </div>
    <p>Besides the total breakdowns shown above, we can also view the top industries the botnet attacked over time to understand the changing trends. These trends may be tied to political events, new video game releases, sporting events, or any other global or local public interest events.</p><p>Off the top, we can already see the two largest peaks on August 9 and August 29 — mainly on the Computer Software, Gaming/Gambling, and IT industries. Another interesting peak occurred on August 14 against Cryptocurrency providers.</p><p>In late August, the botnet was pointed against gambling and casino websites, generating attacks at rates of hundreds of thousands to millions of requests per second. A second significant wave against the same industry was launched in early September.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Ch2h4SDn7AL79q3sLbr7m/deb98d1529f528523b70bf6818d13bd4/unnamed--3--3.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#top10_industries_attacked_by_meris"><i>Cloudflare Radar</i></a><i>.</i></p>
    <div>
      <h2>Meris targets websites in China, Australia, and US</h2>
      <a href="#meris-targets-websites-in-china-australia-and-us">
        
      </a>
    </div>
    <p>Similarly to the analysis of the top industries, we can calculate the Meris DDoS activity rate per target country to identify which countries came under the most attacks. In total, China-based companies saw the largest amount of DDoS attacks. More than 33% of all requests generated by Meris were destined for China-based companies that are protected by Cloudflare. Australia came in second place, and the US in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2efvUpiNBPMcVRff9MswfD/1c4adfa719a2a27a711a7a699ad470f6/unnamed--4--3.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#top10_countries_by_total_requests"><i>Cloudflare Radar</i></a><i>.</i></p><p>On the other hand, when we look at the number of websites that were targeted by Meris, the US came in first place. More than 12% of all websites that were targeted by Meris are operated by US-based companies. China came in second place with 5.6% and Russia in third with 4.4%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ztEAlupBFh5IMb6sx2zzR/dfdfdb346b7d59a993bf32e8948246bc/unnamed--5--2.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#top10_countries_by_internet_properties"><i>Cloudflare Radar</i></a><i>.</i></p>
    <div>
      <h3>Attacks on countries over time</h3>
      <a href="#attacks-on-countries-over-time">
        
      </a>
    </div>
    <p>Over time, we can see how the attacks on the top countries change. Similarly to the per-industry breakdown, we can also see two large peaks. The first one occurred on the same spike as the per-industry breakdown on August 9. However, the second one here occurred on September 1.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4wpvipMV2Q30VIGdGaoV1o/72dc434553158e6a1b8e74f922183834/unnamed--10-.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#top10_countries_attacked_by_meris"><i>Cloudflare Radar</i></a><i>.</i></p>
    <div>
      <h2>Location of the Meris bots</h2>
      <a href="#location-of-the-meris-bots">
        
      </a>
    </div>
    <p>Although only tens of thousands of bots have been detected per attack, it is estimated that there are roughly 250,000 bots worldwide. As indicated above, the botnet is formed of MikroTik routers. Using the source IP address of the routers, we’re able to identify the origin country of the bots to paint a geographical representation of the bots' presence and growth over time.</p><p>The change in the location of the bots doesn’t necessarily indicate that the botnet is growing or shrinking. It could also be that different bot groups are activated from time to time to spread the load of the attacks while attempting not to get caught.</p><p>At the beginning of August, the majority of the bots were located in Brazil. But by the end of August, that number plummeted to a single digit percentage close to zero. Meanwhile, the number of infected devices grew in the United States. From the beginning of September, the number of bots was significantly higher in the US, Russia, India, Indonesia, and China.</p><div></div><p><i>View the interactive graph on </i><a href="http://radar.cloudflare.com/notebooks/meris-botnet#location-of-the-meris-bots"><i>Cloudflare Radar</i></a><i>.</i></p>
    <div>
      <h2>Cloudflare protects against Meris attacks</h2>
      <a href="#cloudflare-protects-against-meris-attacks">
        
      </a>
    </div>
    <p>Cloudflare operates autonomous DDoS protection systems that automatically detect and mitigate DDoS attacks of all types, including attacks launched by Meris and Mirai. These systems are also customizable, and Cloudflare customers can tweak and tune their DDoS protection settings as needed with the <a href="/http-ddos-managed-rules/">HTTP DDoS Managed Ruleset</a> and the <a href="https://developers.cloudflare.com/waf/ddos-l34-mitigation">L3/4 DDoS Managed Ruleset</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[RDDoS]]></category>
            <category><![CDATA[Meris]]></category>
            <category><![CDATA[VoIP]]></category>
            <category><![CDATA[Mirai]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">1XxFdHMIJKNoJcgPqqPKMp</guid>
            <dc:creator>Vivek Ganti</dc:creator>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS Attack Trends for Q3 2021]]></title>
            <link>https://blog.cloudflare.com/ddos-attack-trends-for-2021-q3/</link>
            <pubDate>Thu, 04 Nov 2021 12:58:40 GMT</pubDate>
            <description><![CDATA[ In Q3, 2021 we saw and mitigated record-setting HTTP DDoS attacks, terabit-strong network layer attacks, one of the largest botnets ever deployed (Meris), and more recently, ransom attacks on Voice-over-IP (VoIP) service providers. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>The third quarter of 2021 was a busy quarter for DDoS attackers. Cloudflare observed and mitigated <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">record-setting HTTP DDoS attacks</a>, <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/#:~:text=with%20a%20max%20peak%20of%20approximately%201.2%20Tbps">terabit-strong network-layer attacks</a>, one of the <a href="/meris-botnet/">largest botnets ever deployed (Meris)</a>, and more recently, <a href="/update-on-voip-attacks/">ransom DDoS attacks on voice over IP (VoIP) service providers</a> and their <a href="/attacks-on-voip-providers/">network infrastructure</a> around the world.</p><p>Here’s a summary of the trends observed in Q3 ‘21:</p>
    <div>
      <h4>Application-layer (L7) DDoS attack trends:</h4>
      <a href="#application-layer-l7-ddos-attack-trends">
        
      </a>
    </div>
    <ul><li><p>For the second consecutive quarter in 2021, US-based companies were the most targeted in the world.</p></li><li><p>For the first time in 2021, attacks on UK-based and Canada-based companies skyrocketed, making them the second and third most targeted countries, respectively.</p></li><li><p>Attacks on Computer Software, Gaming/ Gambling, IT, and Internet companies increased by an average of 573% compared to the previous quarter.</p></li><li><p>Meris, one of the most powerful botnets in history, aided in launching DDoS campaigns across various industries and countries.</p></li></ul>
    <div>
      <h4>Network-layer (L3/4) DDoS attack trends:</h4>
      <a href="#network-layer-l3-4-ddos-attack-trends">
        
      </a>
    </div>
    <ul><li><p>DDoS attacks increased by 44% worldwide compared to the previous quarter.</p></li><li><p>The Middle East and Africa recorded the largest average attack increase of approximately 80%.</p></li><li><p>Morocco recorded the highest DDoS activity in the third quarter globally — three out of every 100 packets were part of a DDoS attack.</p></li><li><p>While SYN and RST attacks remain the dominant attack method used by attackers, Cloudflare observed a surge in <a href="https://en.wikipedia.org/wiki/Datagram_Transport_Layer_Security">DTLS</a> amplification attacks — recording a 3,549% increase QoQ.</p></li><li><p>Attackers targeted (and continue to target going into the fourth quarter this year) VoIP service providers with massive DDoS attack campaigns in attempts to bring SIP infrastructure down.</p></li></ul><p><b>Note on avoiding data biases:</b> When we analyze attack trends, we calculate the “DDoS activity” rate, which is the percentage of attack traffic of the total traffic (attack + clean). When reporting application- and network-layer DDoS attack trends, we use this metric, which allows us to normalize the data points and avoid biases toward, for example, a larger Cloudflare data center that naturally handles more traffic and therefore also, possibly, more attacks compared to a smaller Cloudflare data center located elsewhere.</p>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, specifically HTTP DDoS attacks, are attacks that usually aim to disrupt a web server by making it unable to process legitimate user requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests and — in some cases — crash, resulting in degraded performance or an outage for legitimate users.</p>
    <div>
      <h4>Q3 ‘21 was the quarter of Meris — one of the most powerful botnets deployed to launch some of the largest HTTP DDoS attacks in history.</h4>
      <a href="#q3-21-was-the-quarter-of-meris-one-of-the-most-powerful-botnets-deployed-to-launch-some-of-the-largest-http-ddos-attacks-in-history">
        
      </a>
    </div>
    <p>This past quarter, we observed <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">one of the largest recorded HTTP attacks</a> — 17.2M rps (requests per second) — targeting a customer in the financial services industry. One of the most powerful botnets ever observed, called Meris, is known to be deployed in launching these attacks.</p><p>Meris (Latvian for plague) is a botnet behind recent DDoS attacks that have targeted networks or organizations around the world. The Meris botnet infected routers and other networking equipment manufactured by the Latvian company MikroTik. According to MikroTik’s blog, a vulnerability in the MikroTik RouterOS (that was patched after its detection back in 2018) was exploited in still unpatched devices to build a botnet and launch coordinated DDoS attacks by bad actors.</p><p>Similar to the <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai botnet</a> of 2016, Meris is one of the most powerful botnets recorded. While Mirai infected IoT devices with low computational power such as smart cameras, Meris is a growing swarm of networking infrastructure (such as routers and switches) with significantly higher processing power and data transfer capabilities than IoT devices — making them much more potent in causing harm at a larger scale. Be that as it may, Meris is an example of how the attack volume doesn’t necessarily guarantee damage to the target. As far as we know, Meris, despite its strength, was not able to cause significant impact or Internet outages. On the other hand, by tactically <a href="https://en.wikipedia.org/wiki/DDoS_attack_on_Dyn">targeting the DYN DNS service in 2016</a>, Mirai succeeded in causing significant Internet disruptions.</p>
    <div>
      <h3>Application-layer DDoS attacks by industry</h3>
      <a href="#application-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p><b>The tech and gaming industries were the most targeted industries in Q3 ‘21.</b></p><p>When we break down the application-layer attacks targeted by industry, Computer Software companies topped the charts. The Gaming/Gambling industry, also known to be regular targets of online attacks, was a close second, followed by the Internet and IT industries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/JPadNrIHstG6fM3Oxg6A7/22252c708bd8797a7d4be42348929b7a/image6-5.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by source country</h3>
      <a href="#application-layer-ddos-attacks-by-source-country">
        
      </a>
    </div>
    <p>To understand the origin of the HTTP attacks, we look at the geolocation of the source IP address belonging to the client that generated the attack HTTP requests. Unlike network-layer attacks, source IPs cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> in HTTP attacks. A high DDoS activity rate in a given country usually indicates the presence of botnets operating from within.</p><p>In the third quarter of 2021, most attacks originated from devices/servers in China, the United States, and India. While China remains in first place, the number of attacks originating from Chinese IPs actually decreased by 30% compared to the previous quarter. Almost one out of every 200 HTTP requests that originated from China was part of an HTTP DDoS attack.</p><p>Additionally, attacks from Brazil and Germany shrank by 38% compared to the previous quarter. Attacks originating from the US and Malaysia reduced by 40% and 45%, respectively.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ABqWAhmZCoG1eZ6RBNc9g/6a5bb8519048c6464df07a30876cdce7/image31.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by target country</h3>
      <a href="#application-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>In order to identify which countries are targeted the most by L7 attacks, we break down the DDoS activity by our customers’ billing countries.</p><p>For the second consecutive time this year, organizations in the United States were targeted the most by L7 DDoS attacks in the world, followed by those in the UK and Canada.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6T0eaxRVbixvISjvuFzNGG/79519d6af266fec7ee15e866df162c88/image10-7.png" />
            
            </figure>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application-layer attacks target the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service that end users are trying to access, <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer attacks</a> aim to overwhelm network infrastructure (such as in-line routers and servers) and the Internet link itself.</p>
    <div>
      <h4>Mirai-variant botnet strikes with a force of 1.2 Tbps.</h4>
      <a href="#mirai-variant-botnet-strikes-with-a-force-of-1-2-tbps">
        
      </a>
    </div>
    <p>Q3 ‘21 was also the quarter when the infamous Mirai made a resurgence. A Mirai-variant botnet launched over a dozen UDP- and TCP-based DDoS attacks that peaked multiple times above 1 Tbps, with a max peak of approximately 1.2 Tbps. These network-layer attacks targeted Cloudflare customers on the <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> and <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Spectrum</a> services. One of these targets was a major APAC-based Internet services, telecommunications, and hosting provider and the other was a gaming company. In all cases, the attacks were automatically detected and mitigated without human intervention.</p>
    <div>
      <h3>Network-layer DDoS attacks by month</h3>
      <a href="#network-layer-ddos-attacks-by-month">
        
      </a>
    </div>
    
    <div>
      <h4>September was, by far, the busiest month for attackers this year.</h4>
      <a href="#september-was-by-far-the-busiest-month-for-attackers-this-year">
        
      </a>
    </div>
    <p>Q3 ‘21 accounted for more than 38% of all attacks this year. September was the busiest month for attackers so far in 2021 — accounting for over 16% of all attacks this year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7rSRKsyrgPbljcg6EKZLAt/91e1b92d2ac5aa052a29936f7deca4e5/image20.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by attack rate</h3>
      <a href="#network-layer-ddos-attacks-by-attack-rate">
        
      </a>
    </div>
    <p><b>Most attacks are ‘small’ in size, but the number of larger attacks continues to rise.</b></p><p>There are different ways of measuring the size of a L3/4 DDoS attack. One is the volume of traffic it delivers, measured as the bit rate (specifically, terabits per second or gigabits per second). Another is the number of packets it delivers, measured as the packet rate (specifically, millions of packets per second).</p><p>Attacks with high bit rates attempt to cause a denial-of-service event by clogging the Internet link, while attacks with high packet rates attempt to overwhelm the servers, routers, or other in-line hardware appliances. Appliances dedicate a certain amount of memory and computation power to process each packet. Therefore, by bombarding it with many packets, the appliance can be left with no further processing resources. In such a case, packets are “dropped,” i.e., the appliance is unable to process them. For users, this results in service disruptions and denial of service.</p><p>The distribution of attacks by their size (in bit rate) and month is shown below. Interestingly enough, all attacks over 400 Gbps took place in August, including some of the largest attacks we have seen; multiple attacks peaked above 1 Tbps and reached as high as 1.2 Tbps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2gWdjNgw6dpUGm9dtwTl6m/7342a03af814d9530dfbb83a95c2fe58/image8-6.png" />
            
            </figure>
    <div>
      <h4>Packet rate</h4>
      <a href="#packet-rate">
        
      </a>
    </div>
    <p>As seen in previous quarters, the majority of attacks observed in Q3 ‘21 were relatively small in size — nearly 89% of all attacks peaked below 50K packets per second (pps). While a majority of attacks are smaller in size, we observed that the number of larger attacks is increasing QoQ — attacks that peaked above 10M pps increased by 142% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6l8ybFgUYfXl660WkGXssz/be1059d15032c3add6a75d125a1bb2cb/image16-1.png" />
            
            </figure><p>Attacks of packet rates ranging from 1-10 million packets per second increased by 196% compared to the previous quarter. This trend is similar to what we observed the last quarter as well, suggesting that larger attacks are increasing.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7dkSGlex98BjHJxLGMXc58/a91d6928dadb6f9e6aba034947d648b9/image22-1.png" />
            
            </figure>
    <div>
      <h4>Bit rate</h4>
      <a href="#bit-rate">
        
      </a>
    </div>
    <p>From the bit rate perspective, a similar trend was observed — a total of 95.4% of all attacks peaked below 500 Mbps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2O1tTLdcoHzRwGSSaj5Kl0/367783ca32926c29b7b9d619f219b403/image11-4.png" />
            
            </figure><p>QoQ data shows that the number of attacks of sizes ranging from 500 Mbps to 10 Gbps saw massive increases of 126% to 289% compared to the previous quarter. Attacks over 100 Gbps decreased by nearly 14%.</p><p>The number of larger bitrate attacks increased QoQ (with the one exception being attacks over 100 Gbps, which decreased by nearly 14% QoQ). In particular, attacks ranging from 500 Mbps to 1 Gbps saw a surge of 289% QoQ and those ranging from 1 Gbps to 100 Gbps surged by 126%.</p><p>This trend once again illustrates that, while (in general) a majority of the attacks are indeed smaller, the number of “larger” attacks is increasing. This suggests that more attackers are garnering more resources to launch larger attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ktaoC9RxCLuAKOxdrHZHx/ae793021eb74f2a9f10be3c14212926d/image2-3.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by duration</h3>
      <a href="#network-layer-ddos-attacks-by-duration">
        
      </a>
    </div>
    
    <div>
      <h4>Most attacks remain under one hour in duration, reiterating the need for automated always-on DDoS mitigation solutions.</h4>
      <a href="#most-attacks-remain-under-one-hour-in-duration-reiterating-the-need-for-automated-always-on-ddos-mitigation-solutions">
        
      </a>
    </div>
    <p>We measure the duration of an attack by recording the difference between when it is first detected by our systems as an attack and the last packet we see with that attack signature. As in previous quarters, most of the attacks are short-lived. To be specific, 94.4% of all DDoS attacks lasted less than an hour. On the other end of the axis, attacks over 6 hours accounted for less than 0.4% in Q3 ‘21, and we did see a QoQ increase of 165% in attacks ranging 1-2 hours. Be that as it may, a longer attack does not necessarily mean a more dangerous one.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4bpCM8AFhJhVr2SrzJLLY2/f46527826d0d7aa0b866ca343d641b96/image23-1.png" />
            
            </figure><p>Short attacks can easily go undetected, especially burst attacks that, within seconds, bombard a target with a significant number of packets, bytes, or requests. In this case, DDoS protection services that rely on manual mitigation by security analysis have no chance in mitigating the attack in time. They can only learn from it in their post-attack analysis, then deploy a new rule that filters the attack fingerprint and hope to catch it next time. Similarly, using an “on-demand” service, where the security team will redirect traffic to a DDoS provider during the attack, is also inefficient because the attack will already be over before the traffic routes to the on-demand DDoS provider.</p><p>Cloudflare recommends that companies use automated, always-on DDoS protection services that analyze traffic and apply real-time fingerprinting fast enough to block the short-lived attacks. Cloudflare analyzes traffic out-of-path, ensuring that DDoS mitigation does not add any latency to legitimate traffic, even in always-on deployments. Once an attack is identified, our autonomous edge DDoS protection system (<a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">dosd</a>) generates and applies a dynamically crafted rule with a real-time signature. Pre-configured firewall rules comprising allow/deny lists for known traffic patterns take effect immediately.</p>
    <div>
      <h3>Attack vectors</h3>
      <a href="#attack-vectors">
        
      </a>
    </div>
    
    <div>
      <h4>SYN floods remain attackers’ favorite method of attack, while attacks over DTLS saw a massive surge — 3,549% QoQ.</h4>
      <a href="#syn-floods-remain-attackers-favorite-method-of-attack-while-attacks-over-dtls-saw-a-massive-surge-3-549-qoq">
        
      </a>
    </div>
    <p>An attack vector is the term used to describe the method that the attacker utilizes in their attempt to cause a denial-of-service event.</p><p>As observed in previous quarters, attacks utilizing SYN floods remain the most popular method used by attackers.</p><p>A <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN flood</a> attack is a DDoS attack that works by exploiting the very foundation of the TCP protocol — the stateful TCP connection between a client and a server as a part of the 3-way TCP handshake. As a part of the TCP handshake, the client sends an initial connection request packet with a synchronize flag (SYN). The server responds with a packet that contains a synchronized acknowledgment flag (SYN-ACK). Finally, the client responds with an acknowledgment (ACK) packet. At this point, a connection is established and data can be exchanged until the connection is closed. This stateful process can be abused by attackers to cause denial-of-service events.</p><p>By repeatedly sending SYN packets, the attacker attempts to overwhelm a server or the router’s connection table that tracks the state of TCP connections. The server replies with a SYN-ACK packet, allocates a certain amount of memory for each given connection, and falsely waits for the client to respond with the final ACK. Given a sufficient number of connections occupying the server’s memory, the server is unable to allocate further memory for legitimate clients, causing the server to crash or preventing it from handling legitimate client connections, i.e., a denial-of-service event.</p><p>More than half of all attacks observed over our network were SYN floods. This was followed by RST, ACK, and UDP floods.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Vo4muJmB01yU0Qh88Ni35/1605e4b188335f8433a57368c39424f1/image4-3.png" />
            
            </figure>
    <div>
      <h3>Emerging threats</h3>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>While SYN and RST floods remain popular overall, when we look at emerging attack vectors — which helps us understand what new vectors attackers are deploying to launch attacks — we observed a massive spike in <a href="https://en.wikipedia.org/wiki/Datagram_Transport_Layer_Security">DTLS</a> amplification attacks. DTLS floods increased by 3,549% QoQ.</p><p>Datagram Transport Layer Security (DTLS) is a protocol similar to Transport Layer Security (<a href="https://www.cloudflare.com/learning/ssl/transport-layer-security-tls/">TLS</a>) designed to provide similar security guarantees to connectionless datagram-based applications to prevent message forgery, eavesdropping, or tampering. DTLS, being connectionless, is specifically useful for establishing VPN connections, without the <a href="https://openvpn.net/faq/what-is-tcp-meltdown/">TCP meltdown</a> problem. The application is responsible for reordering and other connection properties.</p><p>Just as with most UDP-based protocols, DTLS is spoofable and being used by attackers to generate reflection amplification attacks to overwhelm network gateways.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/73mUxKAOpch92qdR7CR6ZJ/530b32f08bbf9f4adae6f31e717f7197/image18-1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by country</h3>
      <a href="#network-layer-ddos-attacks-by-country">
        
      </a>
    </div>
    <p><b>While Morocco topped the charts in terms of the highest network attack rate observed, Asian countries closely followed.</b></p><p>When analyzing network-layer DDoS attacks, we bucket the traffic by the Cloudflare edge data center locations where the traffic was ingested, and not by the source IP. The reason for this is that, when attackers launch network-layer attacks, they can <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoof</a> the source IP address in order to obfuscate the attack source and introduce randomness into the attack properties, which may make it harder for simple DDoS protection systems to block the attack. Hence, if we were to derive the source country based on a spoofed source IP, we would get a spoofed country.</p><p>Cloudflare is able to overcome the challenges of spoofed IPs by displaying the attack data by the location of the Cloudflare data center in which the attack was observed. We are able to achieve geographical accuracy in our report because we have data centers in <a href="http://www.cloudflare.com/network">over 250 cities</a> around the world.</p>
    <div>
      <h4>Worldwide</h4>
      <a href="#worldwide">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2mpDYFQKy9GOIoJkGbnntr/d38114debdb65a05ef4e9b51e8570464/image12-7.png" />
            
            </figure><p>To view all regions and countries, check out the <a href="https://radar.cloudflare.com/notebooks/ddos-2021-q3#network-layer-ddos-attacks-by-country">Radar DDoS Report dashboard’s interactive map</a>.</p>
    <div>
      <h3>A note on recent attacks on voice over-IP service providers — and ransom DDoS attacks</h3>
      <a href="#a-note-on-recent-attacks-on-voice-over-ip-service-providers-and-ransom-ddos-attacks">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6EzEvtPaswPIEik7EsnQZq/327aba3e45924d43cf71dd629436bd88/image25-1.png" />
            
            </figure><p>We <a href="/attacks-on-voip-providers/">recently reported</a> and <a href="/update-on-voip-attacks/">provided an update</a> on the surge in DDoS attacks on VoIP service providers — some of who have also received ransom threats. As of early Q4 ‘21, this attack campaign is still ongoing and current. At Cloudflare, we continue to onboard VoIP service providers and shield their applications and networks against attacks.</p><p>HTTP attacks against <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api-gateway/">API gateways</a> and the corporate websites of the providers have been combined with network-layer and transport-layer attacks against VoIP infrastructures.</p><p>Examples include:</p><ol><li><p><b>TCP floods targeting stateful firewalls:</b> These are being used in “trial-and-error” type attacks. They are not very effective against telephony infrastructure specifically (because it is mostly UDP) but very effective at overwhelming stateful firewalls.</p></li><li><p><b>UDP floods targeting SIP infrastructure:</b> Floods of UDP traffic that have no well-known fingerprint, aimed at critical VoIP services. Generic floods like this may look like legitimate traffic to unsophisticated filtering systems.</p></li><li><p><b>UDP reflection targeting SIP infrastructure:</b> These methods, when targeted at SIP or RTP services, can easily overwhelm Session Border Controllers (SBCs) and other telephony infrastructure. The attacker seems to learn enough about the target’s infrastructure to target such services with high precision.</p></li><li><p><b>SIP protocol-specific attacks:</b> Attacks at the application layer are of particular concern because of the higher resource cost of generating application errors versus filtering on network devices.</p></li></ol><p>Organizations also continue to receive ransom notes that threaten attacks in exchange for bitcoin. <a href="https://www.cloudflare.com/learning/security/ransomware/what-is-ransomware/">Ransomware</a> and <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">ransom DDoS</a> attacks, for the fourth consecutive quarter, continue to be a germane threat to organizations all over the world.</p><p>Cloudflare products close off several threat vectors that can lead to a ransomware infection and ransom DDoS attacks:</p><ul><li><p>Cloudflare <a href="https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/">DNS filtering</a> blocks unsafe websites.</p></li><li><p>Cloudflare <a href="https://www.cloudflare.com/teams/browser-isolation/">Browser Isolation</a> prevents drive-by downloads and other browser-based attacks.</p></li><li><p>A <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> architecture can help <a href="https://www.cloudflare.com/learning/security/ransomware/how-to-prevent-ransomware/">prevent ransomware from spreading</a> within a network.</p></li><li><p><a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> protects organizations’ networks against <a href="https://www.cloudflare.com/learning/ddos/how-to-prevent-ddos-attacks/">DDoS attacks</a> using BGP route redistribution — without impacting latency.</p></li></ul>
    <div>
      <h2>Helping build a better Internet</h2>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>Cloudflare was founded on the mission to help build a better Internet. And part of that mission is to build an Internet where the impact of DDoS attacks is a thing of the past. Over the last 10 years, we have been unwavering in our efforts to protect our customers’ Internet properties from DDoS attacks of any size or kind. In <a href="/unmetered-mitigation/">2017</a>, we announced <a href="https://www.cloudflare.com/ddos/">unmetered DDoS protection</a> for free — as part of every Cloudflare service and plan, including the Free plan — to make sure every organization can stay protected and available. Organizations big and small have joined Cloudflare over the past several years to ensure their websites, applications, and networks are secure from DDoS attacks, and remain fast and reliable.</p><p>But cyberattacks come in various forms, not just DDoS attacks. Malicious bots, ransomware attacks, email phishing, and VPN / remote access hacks are some many attacks that continue to plague organizations of all sizes globally. These attacks target websites, APIs, applications, and entire networks — which form the lifeblood of any online business. That is why the <a href="https://www.cloudflare.com/security/">Cloudflare security portfolio</a> accounts for everything and everyone connected to the Internet.</p><p>To learn more about <a href="http://www.cloudflare.com/ddos">Cloudflare DDoS</a> or our <a href="https://www.cloudflare.com/network-services/">network services</a>, <a href="http://dash.cloudflare.com">create an account</a> or <a href="http://www.cloudflare.com/enterprise">reach out to us</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[RDDoS]]></category>
            <category><![CDATA[REvil]]></category>
            <category><![CDATA[VoIP]]></category>
            <category><![CDATA[Meris]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">7kwFdWfVmfPJD0WyuH6Bqu</guid>
            <dc:creator>Vivek Ganti</dc:creator>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Update on recent VoIP attacks: What should I do if I’m attacked?]]></title>
            <link>https://blog.cloudflare.com/update-on-voip-attacks/</link>
            <pubDate>Thu, 07 Oct 2021 02:20:59 GMT</pubDate>
            <description><![CDATA[ Because of the sustained attacks we are observing, we are sharing details on recent attack patterns, what steps they should take before an attack, and what to do after an attack has taken place. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/34Ko9laUln2ejkX7zQx97s/a3d664659f98cf96aca8a6d7a9942606/image-2-1.png" />
            
            </figure><p>Attackers continue targeting VoIP infrastructure around the world. In our blog from last week, <a href="/attacks-on-voip-providers/">May I ask who’s calling, please? A recent rise in VoIP DDoS attacks</a>, we reviewed how the SIP protocol works, ways it can be abused, and how Cloudflare can help protect against attacks on VoIP infrastructure without impacting performance.</p><p>Cloudflare’s network stands in front of some of the largest, most performance-sensitive voice and video providers in the world, and is uniquely well suited to mitigating attacks on VoIP providers.</p><p>Because of the sustained attacks we are observing, we are sharing details on recent attack patterns, what steps they should take before an attack, and what to do after an attack has taken place.</p><p>Below are three of the most common questions we’ve received from companies concerned about attacks on their VoIP systems, and Cloudflare’s answers.</p>
    <div>
      <h3>Question #1: How is VoIP infrastructure being attacked?</h3>
      <a href="#question-1-how-is-voip-infrastructure-being-attacked">
        
      </a>
    </div>
    <p>The attackers primarily use off-the-shelf <a href="https://www.cloudflare.com/learning/ddos/ddos-attack-tools/ddos-booter-ip-stresser">booter</a> services to launch attacks against VoIP infrastructure. The attack methods being used are not novel, <b>but the persistence of the attacker and their attempts to understand the target’s infrastructure are.</b></p><p>Attackers have used various attack vectors to probe the existing defenses of targets and try to infiltrate any existing defenses to disrupt VoIP services offered by certain providers. In some cases, they have been successful. HTTP attacks against <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api-gateway/">API gateways</a> and the corporate websites of the providers have been combined with network-layer and transport-layer attack against VoIP infrastructures. Examples:</p><ol><li><p><b><b><b>TCP floods targeting stateful firewalls</b></b></b>These are being used in “trial-and-error” type attacks. They are not very effective against telephony infrastructure specifically (because it’s mostly UDP) but very effective at overwhelming stateful firewalls.</p></li><li><p><b><b><b>UDP floods targeting SIP infrastructure</b></b></b>Floods of UDP traffic that have no well-known fingerprint, aimed at critical VoIP services. Generic floods like this may look like legitimate traffic to unsophisticated filtering systems.</p></li><li><p><b><b><b>UDP reflection targeting SIP infrastructure</b></b></b>These methods, when targeted at SIP or RTP services, can easily overwhelm <a href="https://en.wikipedia.org/wiki/Session_border_controller">Session Border Controllers</a> (SBCs) and other telephony infrastructure. The attacker seems to learn enough about the target’s infrastructure to target such services with high precision.</p></li><li><p><b><b><b>SIP protocol-specific attacks</b></b></b>Attacks at the application layer are of particular concern because of the higher resource cost of generating application errors vs filtering on network devices.</p></li></ol>
    <div>
      <h3>Question #2: How should I prepare my organization in case our VoIP infrastructure is targeted?</h3>
      <a href="#question-2-how-should-i-prepare-my-organization-in-case-our-voip-infrastructure-is-targeted">
        
      </a>
    </div>
    <ol><li><p><b><b><b>Deploy an always-on DDoS mitigation service</b></b></b>Cloudflare recommends the deployment of always-on network level protection, like <a href="https://www.cloudflare.com/magic-transit/">Cloudflare Magic Transit</a>, prior to your organization being attacked.</p><p>Do not rely on reactive on-demand SOC-based DDoS Protection services that require humans to analyze attack traffic — they take too long to respond. Instead, onboard to a cloud service that has sufficient network capacity and automated DDoS mitigation systems.</p><p><b>Cloudflare has effective mitigations in place for the attacks seen against VoIP infrastructure</b>, including for <a href="/announcing-flowtrackd/">sophisticated TCP floods</a> and SIP specific attacks.</p></li><li><p><b><b><b>Enforce a positive security model</b></b></b>Block TCP on IP/port ranges that are not expected to receive TCP, instead of relying on on-premise firewalls that can be overwhelmed. Block network probing attempts (e.g. ICMP) and other packets that you don't normally expect to see.</p></li><li><p><b><b><b>Build custom mitigation strategies</b></b></b>Work together with your DDoS protection vendor to tailor mitigation strategies to your workload. Every network is different, and each poses unique challenges when integrating with DDoS mitigation systems.</p></li><li><p><b><b><b>Educate your employees</b></b></b>Train all of your employees to be on the lookout for ransom demands. Check email, support tickets, form submissions, and even server access logs. Ensure employees know to immediately report ransom demands to your Security Incident Response team.</p></li></ol>
    <div>
      <h3>Question #3: What should I do if I receive a ransom/threat?</h3>
      <a href="#question-3-what-should-i-do-if-i-receive-a-ransom-threat">
        
      </a>
    </div>
    <ol><li><p><b><b><b>Do not pay the ransom</b></b></b>Paying the ransom only encourages bad actors—and there’s no guarantee that they won’t attack your network now or later.</p></li><li><p><b><b><b>Notify Cloudflare</b></b></b>We can help ensure your website and network infrastructure are safeguarded against these attacks.</p></li><li><p><b><b><b>Notify local law enforcement</b></b></b>They will also likely request a copy of the ransom letter that you received.</p></li></ol>
    <div>
      <h3>Cloudflare is here to help</h3>
      <a href="#cloudflare-is-here-to-help">
        
      </a>
    </div>
    <p>With over 100 Tbps of network capacity, a network architecture that <a href="/magic-transit-network-functions/">efficiently filters traffic close to the source</a>, and a physical presence in over 250 cities, Cloudflare can help protect critical VoIP infrastructure without impacting latency, jitter, and call quality. Test results demonstrate a performance improvement of 36% on average across the globe for a real customer network using Cloudflare Magic Transit.</p><p>Some of the largest voice and video providers in the world rely on Cloudflare to protect their networks and ensure their services remain online and fast. We stand ready to help.</p><p>Talk to a Cloudflare specialist to <a href="https://www.cloudflare.com/lp/voip-ddos-protection/">learn more</a>.Under attack? Contact our <a href="https://www.cloudflare.com/under-attack-hotline/">hotline</a> to speak with someone immediately.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[VoIP]]></category>
            <category><![CDATA[UDP]]></category>
            <category><![CDATA[REvil]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">2KaaFctdoCtSayt95YpQ48</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Vivek Ganti</dc:creator>
            <dc:creator>Alex Forster</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS attack trends for 2021 Q2]]></title>
            <link>https://blog.cloudflare.com/ddos-attack-trends-for-2021-q2/</link>
            <pubDate>Tue, 20 Jul 2021 14:07:52 GMT</pubDate>
            <description><![CDATA[ The DDoS attack trends observed over Cloudflare’s network in 2021 Q2 paint a picture that reflects the overall global cyber threat landscape. Here are some highlights of DDoS attack trends observed in 2021 Q2.  ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/39mNnJiwZsNven8wj6LLMm/4e94ad8ffcaf3f8317b9e2763a110e96/image4-4.png" />
            
            </figure><p>Recent weeks have witnessed massive ransomware and ransom DDoS (Distributed Denial of Service) attack campaigns that interrupted aspects of critical infrastructure around the world, including one of the largest petroleum pipeline system operators, and one of the world’s biggest meat processing companies. Earlier this quarter, more than 200 organizations across Belgium, including the government and parliament websites and other services, were <a href="https://www.welivesecurity.com/2021/05/05/belgium-government-websites-offline-ddos-attack/">also DDoS’d</a>.</p><p>And when most of the United States were celebrating Independence Day on July 4, <a href="https://www.nytimes.com/2021/07/02/technology/cyberattack-businesses-ransom.html">hundreds of US companies</a> were hit by a ransomware attack demanding 70 million USD in Bitcoin. Attackers known to be affiliated with <a href="https://en.wikipedia.org/wiki/REvil">REvil</a>, a Russian ransomware group, exploited multiple previously unknown <a href="https://csirt.divd.nl/2021/07/03/Kaseya-Case-Update/">vulnerabilities in IT management software</a>. The targets included schools, small public-sector bodies, travel and leisure organizations, and credit unions, to name a few. While the threat of ransomware and ransom DDoS is not new (read our posts on <a href="/targeted-ransomware-attack/">ransomware</a> and <a href="/ransom-ddos-attacks-target-a-fortune-global-500-company/">ransom DDoS</a> from 2021 Q1), the latest attacks on Internet properties ranging from wineries, professional sports teams, ferry services and hospitals has brought them from just being background noise to front page headlines affecting our day-to-day lives. In fact, recent attacks have propelled ransomware and DDoS to the <a href="https://www.nytimes.com/2021/06/15/world/europe/biden-putin-cyberweapons.html">top of US President Biden’s national security agenda</a>.</p><p>The DDoS attack trends observed over Cloudflare’s network in 2021 Q2 paint a picture that reflects the overall global cyber threat landscape. Here are some highlights.</p><ul><li><p>Over 11% of our surveyed customers who were targeted by a DDoS attack reported receiving a threat or ransom letter threatening in advance, in the first six months of this year. Emergency onboarding of customers under an active DDoS attack increased by 41.8% in 2021 H1 compared to 2020 H2.</p></li><li><p>HTTP DDoS attacks targeting government administration/public sector websites increased by 491%, making it the second most targeted industry after Consumer Services whose DDoS activity increased by 684% QoQ.</p></li><li><p>China remains the country with the most DDoS activity originating from within their borders — 7 out of every 1,000 HTTP requests originating from China were part of an HTTP DDoS attack targeting websites, and more than 3 out of every 100 bytes that were ingested in our data centers in China were part of a network-layer DDoS attack.</p></li><li><p>Emerging threats included amplification DDoS attacks that abused the <a href="https://en.wikipedia.org/wiki/QOTD">Quote of the Day</a> (QOTD) protocol which increased by 123% QoQ. Additionally, as the adoption of QUIC protocol continues to increase, so do <a href="https://www.cloudflare.com/learning/ddos/what-is-a-quic-flood/">attacks over QUIC</a> — registering a whopping 109% QoQ surge in 2021 Q2.The number of network-layer DDoS attacks in the range of 10-100 Gbps increased by 21.4% QoQ. One customer that was attacked is <a href="https://hypixel.net/">Hypixel</a>, an American gaming company. Hypixel remained online with no downtime and no performance penalties to their gamer users, even when under an active DDoS attack campaign larger than 620 Gbps. Read their <a href="#Hypixel">story here</a>.</p></li></ul><p>To view all DDoS attack insights across all regions and industries worldwide, visit Cloudflare’s interactive <a href="https://radar.cloudflare.com/ddos-2021-q2">Radar DDoS dashboard</a>.</p>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, specifically HTTP DDoS attacks, are attacks that usually aim to disrupt an HTTP server by making it unable to process legitimate user requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests or even crash resulting in performance penalties or a denial of service event for legitimate users.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4wBrQ5nbm5Ftp4Jtp3FUmf/aa80f246fbda295e4c277287a84e2f20/image9-2.png" />
            
            </figure>
    <div>
      <h3>DDoS activity per market industry</h3>
      <a href="#ddos-activity-per-market-industry">
        
      </a>
    </div>
    <p>When we analyze attacks, we calculate the ‘DDoS activity’ rate, which is the percentage of attack traffic out of the total traffic (attack + clean). This allows us to normalize the data points and avoid biases towards, for example, a larger data center that naturally handles more traffic and therefore also more attacks.</p><p>In 2021 Q2, Consumer Services was the most targeted industry followed by Government Administration and Marketing &amp; Advertising.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/BNS2NS3CfkboBTbio9DNB/ec93a3a12f67b36282445109cb4884bd/image9-5.png" />
            
            </figure>
    <div>
      <h3>DDoS activity per source country</h3>
      <a href="#ddos-activity-per-source-country">
        
      </a>
    </div>
    <p>To understand the origin of the HTTP attacks we observed over Cloudflare’s network, we look at the source IP address of the client generating the attack HTTP requests. Unlike network-layer attacks, source IPs cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> in HTTP attacks. A high DDoS activity rate in a given country indicates large botnets operating from within.</p><p>China and the US remain in the first and second places, respectively, regarding the percentage of DDoS activity originating from within their territories. In China, more than 7 out of every 1,000 HTTP requests were part of an HTTP DDoS attack, while in the US almost 5 out of 1,000 HTTP requests were part of an attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Dofsks3JwUiz1DFtZMfiz/5e11649e0a5a8c4599d54a253968eaec/image15-1.png" />
            
            </figure>
    <div>
      <h3>DDoS activity per target country</h3>
      <a href="#ddos-activity-per-target-country">
        
      </a>
    </div>
    <p>In order to identify which countries the targets of the DDoS attacks resided in, we break down the DDoS activity by our customers’ billing countries. Note that Cloudflare does not charge for attack traffic and has pioneered providing <a href="/unmetered-mitigation/">unmetered and unlimited DDoS protection since 2017</a>. By cross-referencing the attack data with our customers’ billing country, we can identify which countries were attacked the most.</p><p>Data observed in 2021 Q2 suggest that organizations in the US and China were the most targeted by HTTP DDoS attacks. In fact, one out of every 200 HTTP requests destined to US-based organizations was part of a DDoS attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3IjvjwsPMjZklE4Ydp8rMV/995d9b12aeaf3ff03dbfe8fae8035ccd/image12-2.png" />
            
            </figure>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application-layer attacks strike the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service end users are trying to access, <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer attacks</a> target network infrastructure (such as in-line routers and other network servers) and the Internet link itself.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ZGk7zNsakyucjxh3dTfHT/73cf3e238051b8224084bb7948634205/image8-3.png" />
            
            </figure><p>The chart above shows the distribution of network-layer DDoS attacks in 2021 Q2.</p>
    <div>
      <h3>Distribution of attacks by size (packet rate and bit rate)</h3>
      <a href="#distribution-of-attacks-by-size-packet-rate-and-bit-rate">
        
      </a>
    </div>
    <p>There are different ways of measuring the size of a L3/4 DDoS attack. One is the volume of traffic it delivers, measured as the bit rate (specifically, gigabits-per-second). Another is the number of packets it delivers, measured as the packet rate (specifically, packets-per-second). Attacks with high bit rates attempt to saturate the Internet link, while attacks with high packet rates attempt to overwhelm the servers, routers or other in-line hardware appliances.</p><p>The distribution of attacks by their size (in bit rate) and month is shown below. As observed in the chart, all attacks over 300 Gbps were observed in the month of June.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4UfdUlKKsI8GOpFmwf03Rc/1452780737730707fdadbc662a8d26ae/image17-1.png" />
            
            </figure><p>In terms of bit rate, attacks under 500 Mbps constituted a majority of all DDoS attacks observed in 2021 Q2.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/bfz0GXloSJaPAHNhsfYso/3eed0e35c5d233976ffc93d75744302d/image1-11.png" />
            
            </figure><p>Similarly, looking from the lens of packet rate, nearly 94% of attacks were under 50K pps. Even though attacks from 1-10M pps constituted only 1% of all DDoS attacks observed, this number is 27.5% higher than that observed in the previous quarter, suggesting that larger attacks are not diminishing either -- but rather increasing.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4T311qgyhubyXagT3qusJH/79e0c1cabb0178149b20ce68cb9d540d/image16-1.png" />
            
            </figure><p>Note that while attacks under 500 Mbps and 50K pps might seem ‘small’ compared to other headline-making large attacks, they are often sufficient to create major disruptions for Internet properties that are not protected by an always-on, automated cloud-based DDoS protection service. Moreso, many organisations have uplinks provided by their service providers with a bandwidth capacity smaller than 1 Gbps. Assuming their public-facing network interface also serves legitimate traffic, DDoS attacks smaller than 500 Mbps are often capable of taking down exposed Internet properties.</p>
    <div>
      <h3>Distribution by attack duration</h3>
      <a href="#distribution-by-attack-duration">
        
      </a>
    </div>
    <p>Cloudflare continues to see a large percentage of DDoS attacks that last under an hour. In Q2, over 97% of all DDoS attacks lasted less than an hour.</p><p>Short burst attacks may attempt to cause damage without being detected by DDoS detection systems. DDoS services that rely on manual analysis and mitigation may prove to be useless against these types of attacks because they are over before the analyst even identifies the attack traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3jfGiII5EZLrv7MuMuYw9B/adadf963a342123c02a2c1d7ca5668ac/image7-2.png" />
            
            </figure><p>Alternatively, the use of short attacks may be used to probe the cyber defenses of the target. Load-testing tools and automated DDoS tools, that are widely available on the dark web, can generate short bursts of a SYN flood, for example, and then follow up with another short attack using a different attack vector. This allows attackers to understand the security posture of their targets before they decide to launch larger attacks at larger rates and longer durations — which come at a cost.</p><p>In other cases, attackers generate small DDoS attacks as proof and warning to the target organization of the attacker’s ability to cause real damage later on. It’s often followed by a ransom email to the target organization, demanding payment to avoid suffering an attack that could more thoroughly cripple network infrastructure.</p><p>This highlights the need for an always on, automated DDoS protection approach. DDoS protection services that rely on manual re-routing, analysis and mitigation may prove to be useless against these types of attacks because they are over before the analyst can even identify the attack traffic.</p>
    <div>
      <h3>Distribution of attacks by attack vectors</h3>
      <a href="#distribution-of-attacks-by-attack-vectors">
        
      </a>
    </div>
    <p>An attack vector is the term used to describe the method that the attacker utilizes in their attempt to cause a denial of service event.</p><p>As observed in previous quarters, attacks utilizing SYN floods and UDP-based protocols remain the most popular methods by attackers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6UzS0qrB22W6hhSdHJavER/c93432b06a08b1ea8769fe344c01c230/image13-2.png" />
            
            </figure><p>What is a <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN flood</a> attack? It’s a DDoS attack that exploits the very foundation of the TCP protocol. A stateful TCP connection between a client and a server begins with a 3-way <a href="https://www.cloudflare.com/learning/ddos/glossary/tcp-ip/">TCP handshake</a>. The client sends an initial connection request packet with a synchronize flag (SYN). The server responds with a packet that contains a synchronized acknowledgment flag (SYN-ACK). Finally, the client responds with an acknowledgment (ACK) packet. At this point, a connection is established and data can be exchanged until the connection is closed. This stateful process can be abused by attackers to cause denial of service events.</p><p>By repeatedly sending SYN packets, the attacker attempts to overwhelm a server or the router’s connection table that tracks the state of TCP connections. The router replies with a SYN-ACK packet, allocates a certain amount of memory for each given connection, and falsely waits for the client to respond with the final ACK. Given a sufficient number of connections occupying the router’s memory, the router is unable to allocate further memory for legitimate clients, causing the router to crash or preventing it from handling legitimate client connections, i.e., a denial of service event.</p>
    <div>
      <h3>Emerging threats</h3>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>Emerging threats included amplification DDoS attacks that abuse the <a href="https://en.wikipedia.org/wiki/QOTD">Quote of the Day</a> (QOTD) service which increased by 123% QoQ. QOTD was defined in <a href="https://datatracker.ietf.org/doc/html/rfc865">RFC-865</a> (1983) and can be sent over either the UDP or TCP protocols. It was originally designed for debugging and as a measurement tool, with no specific syntax for the quote. The RFC does however recommend the use of ASCII characters and to limit the length to 512 characters.</p><p>Furthermore, we’ve seen a 107% increase QoQ in UDP Portmap and Echo attacks -- all of which are really old attack vectors. This may indicate attackers digging up old methods and attack tools to try and overcome protection systems.</p><p>As we’ve seen in previous quarters, the adoption of the <a href="/quic-version-1-is-live-on-cloudflare/">QUIC protocol</a> continues to increase. Consequently, so do attacks over QUIC, or more specifically floods and amplification attacks of non-QUIC traffic in places where we’d expect to see QUIC traffic. In 2021 Q2, these types of attacks increased by 109% QoQ. This continued trend may indicate that attackers are attempting to abuse the QUIC-designated ports and gateways into organizations' networks -- searching for vulnerabilities and security holes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4oq2p0pv8pJ5L9PrZ48iAO/7ce4c68fa4a294937b83e4614d5b544d/image14-1.png" />
            
            </figure>
    <div>
      <h3>DDoS activity by Cloudflare data center country</h3>
      <a href="#ddos-activity-by-cloudflare-data-center-country">
        
      </a>
    </div>
    <p>In 2021 Q2, our data center in Haiti observed the largest percentage of network-layer DDoS attack traffic, followed by Brunei (almost 3 out of every 100 packets were part of an attack) and China.</p><p>Note that when analyzing network-layer DDoS attacks, we bucket the traffic by the Cloudflare edge data center locations where the traffic was ingested, and not by the source IP. The reason for this is that, when attackers launch network-layer attacks, they can <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoof</a> the source IP address in order to obfuscate the attack source and introduce randomness into the attack properties, which may make it harder for simple DDoS protection systems to block the attack. Hence, if we were to derive the source country based on a spoofed source IP, we would get a spoofed country. Cloudflare is able to overcome the challenges of spoofed IPs by displaying the attack data by the location of Cloudflare’s data center in which the attack was observed. We’re able to achieve geographical accuracy in our report because we have data centers in <a href="http://www.cloudflare.com/network">over 200 cities</a> around the world.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5c6ZKm5g6OF4A6tUh9eOra/bb9d6d9c2c8096484264b4b3b5c2be07/image6-5.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/78BgjOWRRSWxuQlWkM0EXJ/47bfe5fb782651d81e9ae01bc48651dc/image11-3.png" />
            
            </figure><p>To view all regions and countries, check out the <a href="https://radar.cloudflare.com/ddos-2021-q2#ddos-activity-by-cloudflare-data-center-country">Radar DDoS Report dashboard’s interactive map</a>.</p>
    <div>
      <h2>A note on ransomware and ransom DDoS — a growing global threat</h2>
      <a href="#a-note-on-ransomware-and-ransom-ddos-a-growing-global-threat">
        
      </a>
    </div>
    <p>The last few weeks have seen a resurgence of ransom-driven cyber threats: <a href="/targeted-ransomware-attack/">ransomware</a> and <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">ransom DDoS</a> (RDDoS).</p>
    <div>
      <h3>So what is ransomware and ransom DDoS, and how are they different?</h3>
      <a href="#so-what-is-ransomware-and-ransom-ddos-and-how-are-they-different">
        
      </a>
    </div>
    <p>Ransomware is malicious software that encrypts an organization's systems and databases, rendering them inaccessible and unusable. Malware is usually introduced into an organization's systems via <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing emails</a> -- tricking employees to click on a link or download a file. Once the malware is installed on the employee’s device, it encrypts the device and can propagate to the entire network of the organization’s servers and employee devices. The attacker will demand money, usually in the form of Bitcoin, in exchange for decrypting the organization's systems and granting them access back to their systems.</p><p>Unlike a ransomware attack, a ransom DDoS attack does not encrypt a company's systems; it aims to knock them offline if the ransom is not paid. What makes ransom DDoS attacks even more dangerous is that they do not require the attacker to gain access to a business's internal systems to execute the attack. However, with a strong DDoS protection strategy in place, a ransom DDoS attack has little to no effect on businesses.</p><p>Ransomware and ransom DDoS threats are impacting most industries across the globe — the financial industry, transportation, oil and gas, consumer goods, and even education and healthcare.</p><p>Entities claiming to be ‘Fancy Lazarus’, ‘Fancy Bear’, ‘Lazarus Group’, and ‘REvil’ are once again launching ransomware and ransom-DDoS attacks against organizations’ websites and network infrastructure unless a ransom is paid before a given deadline. In the case of DDoS threats, prior to the ransom note, a small DDoS attack is usually launched as a form of demonstration. The demonstration attack is typically over UDP, lasting roughly 30-120 minutes.</p><p>The ransom note is typically sent to the common group email aliases of the company that are publicly available online such as noc@, support@, help@, legal@, abuse@, etc. In several cases, it has ended up in spam. In other cases, we’ve seen employees disregard the ransom note as spam, increasing the organization’s response time which resulted in further damage to their online properties.</p><p>Cloudflare’s recommendation for organizations that receive a threat or ransom note:</p><ol><li><p><b>Do not panic, and we recommend you do not pay the ransom</b>: Paying ransom only encourages and funds bad actors. There’s also no guarantee that you won’t be attacked again anyway.</p></li><li><p><b>Contact local law enforcement</b>: Be ready to provide a copy of the ransom letter you received and any other logs or packet captures.</p></li><li><p><b>Activate an effective DDoS protection strategy</b>: Cloud-based DDoS protection can be quickly onboarded in the event of an active threat, and with a team of security experts on your side, risks can be mitigated quickly and effectively.</p></li></ol><p><a href="http://www.cloudflare.com/ransom-ddos">Here’s a short video</a> by Cloudflare CTO, John Graham-Cumming addressing the threat of ransom DDoS attacks.</p><a><h2>Cloudflare protects Hypixel against a massive DDoS attack campaign</h2></a><p>At Cloudflare, our teams have been exceptionally busy this past quarter rapidly onboarding (onto our <a href="https://www.cloudflare.com/magic-transit/">Magic Transit service</a>) a multitude of new and existing customers that have either received a ransom letter or were under an active DDoS attack.</p><p>One such customer is <a href="https://hypixel.net/">Hypixel Inc</a>, the development studio behind the world's largest Minecraft minigame server. With over 24M total unique logins to date and a world record 216,000+ concurrent players on PC, the Hypixel team works hard to add value to the experience of millions of players across the globe.</p><p>The gaming industry is often subject to some of the largest volumetric DDoS attacks — and as a marquee brand, Hypixel attracts more than its fair share. Uptime and high performance are fundamental to the functioning of Hypixel’s servers. Any perceived downtime or noticeable lag could result in an exodus of gamers.</p><p>When Hypixel was under a massive DDoS attack campaign, they turned to Cloudflare to extend their services with Cloudflare to include Magic Transit, Cloudflare’s BGP-based DDoS protection service for network infrastructure. After rapidly onboarding them overnight, Cloudflare was automatically able to detect and mitigate DDoS attacks targeting their network — several of which were well over 620 Gbps. The DDoS attack comprised mostly TCP floods and UDP amplification attacks. In the graph, the various colors represent the multiple Cloudflare systems that contribute to detecting and mitigating the multi-vector attack — emphasising the value of our multi-layered DDoS approach.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3OOyezktZS10mCS4iK4YH2/e6b0cac93a92b09e7b2e1737aedc833d/image10-5.png" />
            
            </figure><p>Even as attack patterns changed in real-time, Magic Transit shielded Hypixel’s network. In fact, because all their clean traffic routed over Cloudflare’s high performing low-latency network, Hypixel’s users noticed no change in gamer experience — even during an active volumetric DDoS attack.</p><p>During the attack campaign, Cloudflare automatically detected and mitigated over 5,000 DDoS attacks: 53% were ACK floods, 39% were UDP-based attacks and 8% SYN floods.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7KjFtFo9jD57noYEmgeOGA/06f02cd677a11129603870fe28a0c85d/image4-6.png" />
            
            </figure><blockquote><p>“<i>We had several attacks of well over 620 Gbps with no impact at all on our players. Their gaming experience remained uninterrupted and fast, thanks to Cloudflare Magic Transit</i>.”- <b>Simon Collins-Laflamme, CEO, Hypixel Inc.</b></p></blockquote><p>Hypixel’s journey with Cloudflare began with them employing <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Cloudflare Spectrum</a> to help protect their gaming infrastructure against DDoS attacks. As their user base grew, they adopted additional Cloudflare products to bolster the robustness and resilience of all of their critical infrastructure. Today, they use multiple Cloudflare products including <a href="http://www.cloudflare.com/cdn">CDN</a>, <a href="https://www.cloudflare.com/rate-limiting/">Rate Limiting</a>, <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Spectrum</a>, <a href="https://www.cloudflare.com/products/argo-smart-routing/">Argo Smart Routing</a>, and <a href="https://www.cloudflare.com/load-balancing/">Load Balancing</a> to build and secure infrastructure that provides gamers around the world the real-time gaming experiences they need.</p>
    <div>
      <h2>Get holistic protection against cyber attacks of any kind</h2>
      <a href="#get-holistic-protection-against-cyber-attacks-of-any-kind">
        
      </a>
    </div>
    <p>DDoS attacks constitute just one facet of the many cyber threats organizations are facing today. As businesses shift to a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> approach, network and security buyers will face larger threats related to network access, and a continued surge in the frequency and sophistication of bot-related and ransomware attacks.</p><p>A key design tenet while building products at Cloudflare is integration. <a href="/introducing-cloudflare-one/">Cloudflare One</a> is a solution that uses a Zero Trust security model to provide companies a better way to protect devices, data, and applications — and is deeply integrated with our existing platform of security and DDoS solutions.</p><p>In fact, Cloudflare offers an integrated solution that comprises an all-star cast featuring the following to name a few:</p><ul><li><p><b>DDoS</b>: LEADER in Forrester Wave™ for DDoS Mitigation Solutions, Q1 2021<sup>1</sup></p></li><li><p><b>WAF</b>: Cloudflare is a CHALLENGER in the 2020 Gartner Magic Quadrant for Web Application Firewall (receiving the highest placement in the ‘Ability to Execute’)<sup>2</sup></p></li><li><p><b>Zero Trust</b>: Cloudflare is a LEADER in the Omdia Market Radar: Zero-Trust Access Report, 2020<sup>3</sup></p></li><li><p><b>Web protection</b>: Innovation leader in the Global Holistic Web Protection Market for 2020 by Frost &amp; Sullivan<sup>4</sup></p></li></ul><p>Cloudflare’s global (<a href="/ten-new-cities-four-new-countries/">and growing</a>) network is uniquely positioned to deliver DDoS protection and other security, performance, and reliability services with unparalleled scale, speed, and smarts.</p><p>To learn more about Cloudflare’s DDoS solution <a href="https://www.cloudflare.com/plans/enterprise/">contact us</a> or <a href="http://dash.cloudflare.com">get started</a>.</p><p>____</p><p><sup>1</sup>Forrester Wave™: DDoS Mitigation Solutions, Q1 2021, Forrester Research, Inc., March 3, 2021. Access the report at <a href="https://www.cloudflare.com/forrester-wave-ddos-mitigation-2021/">https://www.cloudflare.com/forrester-wave-ddos-mitigation-2021/</a></p><p><sup>2</sup>Gartner, “Magic Quadrant for Web Application Firewalls”, Analyst(s): Jeremy D'Hoinne, Adam Hils, John Watts, Rajpreet Kaur, October 19, 2020. <a href="https://www.cloudflare.com/gartner-mq-waf-2020/">https://www.cloudflare.com/gartner-mq-waf-2020/</a></p><p><sup>3</sup> <a href="https://www.cloudflare.com/lp/omdia-zero-trust">https://www.cloudflare.com/lp/omdia-zero-trust</a></p><p><sup>4</sup><a href="https://www.cloudflare.com/lp/frost-radar-holistic-web/">https://www.cloudflare.com/lp/frost-radar-holistic-web/</a></p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Fancy Bear]]></category>
            <category><![CDATA[Lazarus group]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">6p5SAqIZUvGBphfunpzQWJ</guid>
            <dc:creator>Vivek Ganti</dc:creator>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS attack trends for 2021 Q1]]></title>
            <link>https://blog.cloudflare.com/ddos-attack-trends-for-2021-q1/</link>
            <pubDate>Mon, 19 Apr 2021 11:00:00 GMT</pubDate>
            <description><![CDATA[ Today, along with this deep-dive analysis blog, we’re excited to announce the new Radar DDoS Report page, our first fully automated data notebook built on top of Jupyter, Clickhouse, and Workers. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Last week was <a href="/developers-developers-developers/">Developer Week</a> at Cloudflare. During that week, our teams released a bunch of cool new products, including a bunch of <a href="/location-based-personalization-using-workers/">improvements to Workers</a>. And it's not just our customers that love deploying apps with Workers, but also our engineering teams. Workers is also what powers our Internet traffic and attack trends on <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>. Today, along with this deep-dive analysis blog, we’re excited to announce the new <a href="https://radar.cloudflare.com/notebooks/ddos">Radar DDoS Report</a> page, our first fully automated data notebook built on top of <a href="https://jupyter.org/">Jupyter</a>, <a href="/explaining-cloudflares-abr-analytics/">Clickhouse</a>, and <a href="https://workers.cloudflare.com/">Workers</a>.</p><p>Last month, we introduced our <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">autonomous edge DDoS (Distributed Denial of Service) protection system</a> and explained how it is able to drop attacks at wire speed without impacting performance. It runs in our networks’ edge, analyzes traffic asynchronously to avoid impacting performance, and pushes mitigation rules in-line immediately once attacks are detected. All of this is done autonomously, i.e., without requiring centralized consensus.</p><p>Today, we’d like to share the latest DDoS insights and trends that are based on attacks that our system mitigated during the first quarter of 2021. When we analyze attacks, we calculate the “DDoS activity” rate, which is the percent of attack traffic out of the total traffic (attack + clean). This allows us to normalize the data points and avoid biases towards, for example, a data center that sees more traffic and therefore also more attacks.</p>
    <div>
      <h2>Highlights</h2>
      <a href="#highlights">
        
      </a>
    </div>
    
    <div>
      <h4>Application-layer DDoS attacks</h4>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>In 2021 Q1, the country with the highest percentage of HTTP attack traffic was China. This was followed by the United States, Malaysia, and India.</p></li><li><p>The telecommunication industry was the most attacked in Q1, followed by Consumer Services, Security and Investigations, Internet, and Cryptocurrency.</p></li><li><p>The most attacked Internet properties were of companies based in China, the US, and Morocco.</p></li></ul>
    <div>
      <h4>Network-layer DDoS attacks</h4>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>On the Cloudflare network, the highest DDoS activity was observed in our data centers in Rwanda, China, and Brunei.</p></li><li><p>Almost 44% of all of the attacks in Q1 occurred in January.</p></li><li><p>Top emerging threats include attacks targeting Jenkins and TeamSpeak3 servers, which increased by 940% and 203% QoQ, respectively.</p></li><li><p>Additional emerging threats include floods of QUIC version negotiation packets that may have been an attempt to disrupt Cloudflare’s infrastructure.</p></li></ul>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, or HTTP DDoS attacks, are attacks that aim to disrupt an HTTP server by making it unable to process requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests or even crash.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7zHfLkEUKYGWOIpgUYwdOc/7e4ae5ae564b55f53322def6efa42a82/image9.png" />
            
            </figure>
    <div>
      <h3>DDoS attack activity per industry</h3>
      <a href="#ddos-attack-activity-per-industry">
        
      </a>
    </div>
    <p>When we break down DDoS activity by our customer’s market industry, we can see that Telecommunication was the most targeted industry in Q1. This is a significant jump from sixth place in 2020 Q4. Following in second place is the Consumer Services industry, and in third place the Security and Investigations industry.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5sK5ELeb1Eij8hODdzJt4U/9ba29a69a234d70a6791e1249ac5f044/image12.png" />
            
            </figure>
    <div>
      <h3>DDoS activity by source country</h3>
      <a href="#ddos-activity-by-source-country">
        
      </a>
    </div>
    <p>As opposed to network-layer attacks, the source IP cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> in an HTTP attack. A connection must be established. By looking up the location of the source IP of the client, we can identify the source country. A high DDoS activity rate in a given country indicates large botnets operating from within. Both in 2020 Q4 and 2021 Q1, China came in first place, with the US not far behind.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2FpP9q0YTMzJDb417AgsLE/3f4e239136ffc2d97e230ffc162209c0/image2-24.png" />
            
            </figure>
    <div>
      <h3>DDoS activity by target country</h3>
      <a href="#ddos-activity-by-target-country">
        
      </a>
    </div>
    <p>In order to identify which countries are being attacked the most, we break down the DDoS activity by our customer’s billing country. Similar to the attack source breakdown, China and the US come in first and second places, respectively. Interestingly enough, in the previous quarter, India dethroned China from the first place, perhaps due to the <a href="https://en.wikipedia.org/wiki/2020_elections_in_India">elections in India</a> that also occurred throughout 2020 Q4.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6G47cuf1hYvoQZO3wULEWv/9a16be5118d72abe9861e2c1135014cd/image8-2.png" />
            
            </figure>
    <div>
      <h3>Ransom attacks</h3>
      <a href="#ransom-attacks">
        
      </a>
    </div>
    <p>As we’ve seen, our customers on the non-Enterprise plans were the most targeted by DDoS attacks. However, it’s not just the quantity of attacks that is high, but these customers also reported the highest number of <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attacks</a> (RDDoS). In 2021 Q1, 13% of surveyed Cloudflare customers that were hit by a DDoS attack reported they were either extorted by an RDDoS attack or received a threat in advance. Of those, 62% are on the Pro plan and 33% on the Business plan. This is a continued trend from 2020 Q4 where the number of extorted customers was 17%, including a <a href="/ransom-ddos-attacks-target-a-fortune-global-500-company/">Fortune Global 500 company that was targeted by a group claiming to be the Lazarus Group</a>, a company which we onboarded and protected.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/kLEhKiSOs26DK1eJRQhkH/c3cf31bf45373f2372870ca36961dc8b/image7-2.png" />
            
            </figure>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application layer attacks strike the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service end users are trying to access, <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network layer attacks</a> target exposed network infrastructure (such as in-line routers and other network servers) and the Internet link itself.</p>
    <div>
      <h3>Number of attacks</h3>
      <a href="#number-of-attacks">
        
      </a>
    </div>
    <p>On a monthly basis, January was Q1’s busiest month for attackers, constituting 42% of the total attacks observed in the quarter. Followed by March with 34.2% and February with 23.8%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/p03PCIyhshKZKFNbz3cXB/37c2da51f705baa0901597977c79f8f3/image11.png" />
            
            </figure><p>In February, we did however see the largest attacks of Q1 peaking at 300-400 Gbps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4zpiMkoaYbMGQeMnpWLeuM/98a865e4388ac26f56f0aa8978f85497/image1-29.png" />
            
            </figure>
    <div>
      <h3>Size of attacks</h3>
      <a href="#size-of-attacks">
        
      </a>
    </div>
    <p>There are different ways of measuring a L3/4 DDoS attack’s size. One is the volume of traffic it delivers, measured as the bit rate (specifically, gigabits-per-second). Another is the number of packets it delivers, measured as the packet rate (specifically, packets-per-second). Attacks with high bit rates attempt to saturate the Internet link, while attacks with high packet rates attempt to overwhelm the routers or other in-line hardware devices.</p><p>In 2021 Q1, a vast majority (over 97%) of the L3/4 attacks observed were smaller than 1 mpps and 500 Mbps.</p><p>This is a continuation of the trend we observed all of last year. However, this does not imply that these attacks are harmless.</p><p>Attacks under 500 Mbps are often sufficient to create major disruptions for Internet properties that are not protected by a cloud-based DDoS protection service. Many organizations have uplinks provided by their service providers with less bandwidth capacity than 1 Gbps. Assuming their public facing network interface also serves legitimate traffic, you can see how even DDoS attacks under 500 Mbps can easily take down Internet properties.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7oPtvs3zwGtwsACiQEynA1/b19e1f604b8501d2aeaa1c7616e1d6fb/image.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3LiAZ3oYFU4s0V31k1inlJ/9270c0f61cc205a3c7cf0eb44f007bb2/image4-9.png" />
            
            </figure>
    <div>
      <h3>Duration of attacks</h3>
      <a href="#duration-of-attacks">
        
      </a>
    </div>
    <p>Over 90% of attacks lasted under one hour in duration. Short burst attacks may attempt to cause damage without being detected by DDoS detection systems. DDoS services that rely on manual analysis and mitigation may prove to be useless against these types of attacks because they are over before the analyst can even identify the attack traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/15WjsZ3uHu23zy7hzkr9x4/dc4665b2672a736fb6c406879a0d95b0/image13.png" />
            
            </figure><p>Short attacks are often also used to probe the cyber defenses of the target. Load-testing tools and automated DDoS tools, widely available on the dark web, can generate short bursts of, say, a SYN flood, and then following up with another short attack using an alternate attack vector. This allows attackers to understand the security posture of their targets before they decide to potentially launch larger attacks at larger rates and longer durations.</p>
    <div>
      <h3>Attack vectors</h3>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p>An attack vector is the attack method that the attacker utilizes. In 2021 Q1, SYN attacks continued to remain the most popular attack vector used by attackers, followed by RST, UDP, and DNS amplification attacks.</p><p>What is a <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN flood</a> attack? It’s a DDoS attack that exploits the very foundation of a TCP connection. A stateful TCP connection between a client and a server begins with a <a href="https://www.cloudflare.com/learning/ddos/glossary/tcp-ip/">3-way TCP handshake</a>. The client sends an initial connection request packet with a synchronize flag (SYN). The server responds with a packet that contains a synchronized acknowledgment flag (SYN-ACK). Finally, the client responds with an acknowledgment (ACK) packet. At this point, a connection is established and data can be exchanged until the connection is closed. This stateful process can be abused by attackers to cause denial of service events.</p><p>By repeatedly sending SYN packets, the attacker attempts to overwhelm a server or the router’s connection table that tracks the state of TCP connections. The router replies with a SYN-ACK packet, allocates a certain amount of memory for each given connection, and falsely waits for the client to respond with the final ACK. Given a sufficient number of connections occupying the router’s memory, the router is unable to allocate more memory for legitimate clients, causing the router to crash or preventing it from handling legitimate client connections, i.e., a denial of service event.</p><p>Similarly, a RST amplification flood attack exhausts the target servers by depleting their system resources used to look up incoming packets for a current session.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3uURPZrVY130yaOVkCaHLI/58f535d22c101585894d6246f0e207d3/image5-10.png" />
            
            </figure>
    <div>
      <h3>Emerging threats</h3>
      <a href="#emerging-threats">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6AVVildNSyWCtEtNvrB3wB/69b0bc43f33bfe56cf324a9871b7b35c/image10-1.png" />
            
            </figure><p>While SYN attacks remain popular, this quarter we’ve seen an enormous uptick of 940% in attacks targeting <a href="https://en.wikipedia.org/wiki/Jenkins_(software)">Jenkins</a> servers. Jenkins is a free open-source automation server. It helps engineering teams facilitate software development. A <a href="https://www.cloudflare.com/the-net/oss-attack-detection/">vulnerability</a> in an older version of the server (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-2100">Jenkins 2.218 and earlier</a>) aided the launch of DDoS attacks. This vulnerability was fixed in Jenkins 2.219 by disabling UDP multicast/broadcast messages by default. However, there are still many vulnerable and exposed devices running UDP-based services which are being harnessed to generate volumetric amplification attacks.</p><p>Cloudflare also observed a 433% increase in L3/4 DDoS attacks over the <a href="/the-road-to-quic/">QUIC protocol</a>, a new encrypted-by-default Internet transport protocol that runs over UDP. Version negotiations packets sent by a server to client allow the server to indicate the version of QUIC it supports to the client. Since UDP is stateless, it is easy for attackers to mimic Version Negotiation packets by spoofing the source IP address and overwhelm a client.</p><p>The attacks targeting Cloudflare may have meant to impact Cloudflare’s infrastructure — perhaps by downgrading the versions being used — rather than targeting specific customers. You can learn more about QUIC amplification attacks <a href="https://www.cloudflare.com/learning/ddos/what-is-a-quic-flood/">here</a>.</p><p>The third emerging threat vector observed was <a href="https://en.wikipedia.org/wiki/TeamSpeak">TeamSpeak</a>, a proprietary <a href="https://en.wikipedia.org/wiki/Voice_over_IP">voice-over-Internet Protocol (VoIP)</a> that runs over UDP to help gamers talk with other gamers in real time. This emerging threat increased by 203% QoQ.Talking instead of just chatting can significantly improve a gaming team’s efficiency and help them win. DDoS attacks that target TeamSpeak servers may be launched by rival groups in an attempt to disrupt their communication path during real-time multiplayer games and thus impact their team’s performance.</p>
    <div>
      <h3>DDoS activity by Cloudflare data center country</h3>
      <a href="#ddos-activity-by-cloudflare-data-center-country">
        
      </a>
    </div>
    <p>Looking at country-based distribution for network layer DDoS attacks, Rwanda, China, and Brunei observed the most number of L3/4 DDoS attacks. Unlike application layer DDoS attacks, attackers can (and typically do) spoof the source IP address to obfuscate the source location of the DDoS attack. For this reason, when analyzing L3/4 DDoS attacks, we bucket the traffic by the Cloudflare edge data center locations where the traffic was ingested, and not by the location of the source IP. Cloudflare is able to overcome the challenges of spoofed IPs by displaying the attack data by the location of Cloudflare’s data center in which the attack was observed. We’re able to achieve geographical accuracy in our report because we have <a href="https://www.cloudflare.com/network/">data centers in over 200 cities around the world</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4jzyvvFcp0SUb34CmLFP3o/84c17f9049c1f312e7b9db0ca7b60df5/image3-11.png" />
            
            </figure><p>To view all regions and countries, check out the <a href="https://radar.cloudflare.com/notebooks/ddos#ddos-activity-by-cloudflare-data-center-country">Radar DDoS Report dashboard’s interactive map</a>.</p>
    <div>
      <h3>Helping build a better Internet</h3>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>Cloudflare was founded with the mission to help build a better Internet — one where the impact of DDoS attacks is a thing of the past. Over the last 10 years, we have been unwavering in our efforts to protect our customers’ Internet properties from DDoS attacks of any size or kind. <a href="https://www.cloudflare.com/case-studies/ccp-games/">CCP Games</a> and <a href="https://www.cloudflare.com/case-studies/panasonic/">Panasonic</a> are two of many customers that benefit from Cloudflare’s DDoS Protection.</p><p>Cloudflare was also recently named a leader in The Forrester WaveTM: DDoS Mitigation Solutions, Q1 2021. You can download a complimentary copy of the report <a href="https://www.cloudflare.com/forrester-wave-ddos-mitigation-2021/">here</a>.</p><p>According to the report, written by Forrester Senior Analyst for Security and Risk, David Holmes, “Cloudflare protects against DDoS from the edge, and fast… customer references view Cloudflare’s edge network as a compelling way to protect and deliver applications.”</p><p>There are three key reasons Cloudflare DDoS Protection is recognized by customer and industry analysts alike:</p><ol><li><p><b>Cloudflare’s network architecture</b>: Cloudflare <a href="/no-scrubs-architecture-unmetered-mitigation/">doesn't operate scrubbing centers</a>, as we believe that the scrubbing center model is a flawed approach to DDoS protection. Scrubbing centers cause delays and cost too much to build and run. Instead, we run DDoS protection from every server in every data center in our network. Our Anycast-based architecture makes our capacity equivalent to our DDoS scrubbing capacity, the largest in the market at 59 Tbps. This means Cloudflare detects and mitigates DDoS attacks close to the source of attack. Better yet, Cloudflare’s global threat intelligence acts like an immune system for the Internet — employing our machine learning models to learn from and mitigate attacks against any customer to protect them all.</p></li><li><p><b>Fast performance</b>: Our customers constantly tell us that they want robust security but not at the expense of performance. From its inception, Cloudflare was architected so that customers do not incur a latency penalty as a result of attacks. Our Anycast architecture allows us to mitigate attacks closest to the source and analyze traffic out-of-path, ensuring that our DDoS mitigation solution doesn’t add any latency to legitimate traffic. The rule is applied at the most optimal place in the Linux stack for a cost efficient mitigation, ensuring that there's no performance penalty. <a href="https://assets.ctfassets.net/slt3lc6tev37/6tiRCy6p07AlHfUIPkYfpI/cad96e1cef8a048fd2a007cffbb2b92e/Magic_Transit_protects_networks_while_also_improving_performance__1_.pdf">Performance tests</a> over Cloudflare’s network show that the latency decreased by 3 ms and packet loss was nearly zero when traffic was routed over <a href="https://www.cloudflare.com/magic-transit/">Cloudflare Magic Transit</a>.</p></li><li><p><b>Cloudflare’s support</b>: Every Cloudflare enterprise customer account is assigned a team (including an Account Executive, Solution Engineer, and Customer Success Manager) that actively supports customers through onboarding and beyond to help identify areas for optimization in customer configurations.</p></li></ol><p>Cloudflare’s 24x7x365 global “follow the sun” support team is always ready to pick up the phone and provide instant human response when our enterprise customers request urgent support.</p><p>To quote Grant Ingersoll, CTO of the Wikimedia Foundation, “Cloudflare has reliable infrastructure and an extremely competent and responsive team. They are well-positioned to deflect even the largest of attacks.”</p><p>To learn more about Cloudflare’s DDoS solution <a href="https://www.cloudflare.com/plans/enterprise/">contact us</a> or <a href="http://dash.cloudflare.com">get started</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <guid isPermaLink="false">6PbbUFBpriR3EcOUROnxbv</guid>
            <dc:creator>Vivek Ganti</dc:creator>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare recognized as a 'Leader' in The Forrester Wave for DDoS Mitigation Solutions]]></title>
            <link>https://blog.cloudflare.com/cloudflare-is-named-a-leader-in-the-forrester-wave-for-ddos-mitigation-solutions/</link>
            <pubDate>Tue, 02 Mar 2021 17:41:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare is named a ‘Leader’ in Forrester Wave™ for DDoS Mitigation Solutions, Q1 2021 ]]></description>
            <content:encoded><![CDATA[ <p></p><p>We’re thrilled to announce that Cloudflare has been named a leader in The Forrester Wave<sup>TM</sup>: DDoS Mitigation Solutions, Q1 2021. You can download a complimentary copy of the report <a href="https://www.cloudflare.com/forrester-wave-ddos-mitigation-2021/">here</a>.</p><p>According to the report, written by, Forrester Senior Analyst for Security and Risk, David Holmes, “Cloudflare protects against DDoS from the edge, and fast… customer references view Cloudflare’s edge network as a compelling way to protect and deliver applications.”</p>
    <div>
      <h3>Unmetered and unlimited DDoS protection for all</h3>
      <a href="#unmetered-and-unlimited-ddos-protection-for-all">
        
      </a>
    </div>
    <p>Cloudflare was founded with the mission to help build a better Internet — one where the impact of <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attacks</a> is a thing of the past. Over the last 10 years, we have been unwavering in our efforts to protect our customers’ Internet properties from DDoS attacks of any size or kind. In 2017, we announced <a href="/unmetered-mitigation/">unmetered DDoS protection</a> for free — as part of every Cloudflare service and plan including the <a href="https://www.cloudflare.com/plans/free/">Free plan</a> — to make sure every organization can stay protected and available.</p><p>Thanks to our home-grown automated DDoS protection systems, we’re able to provide unmetered and unlimited DDoS protection for free. Our automated systems constantly analyze traffic samples asynchronously as to avoid impact to performance. They scan for DDoS attacks across layers 3-7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>. They look for patterns in IP packets, HTTP requests and HTTP responses. When an attack is identified, a real-time signature is generated in the form of an ephemeral mitigation rule. The rule is propagated to the most optimal location in our edge for the most cost-efficient mitigation: either in the Linux kernel’s <a href="/l4drop-xdp-ebpf-based-ddos-mitigations/">eXpress Data Path (XDP)</a>, Linux userspace <a href="https://en.wikipedia.org/wiki/Iptables">iptables</a> or in the <a href="https://www.cloudflare.com/learning/cdn/glossary/reverse-proxy/">HTTP reverse-proxy</a>. A cost-efficient mitigation strategy means that we can mitigate the most volumetric, distributed attacks without impacting performance.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ntBzgaPpwL2XGZkm6gf4h/746afe4ef6425a348d9a5f52304f261f/image1-3.png" />
            
            </figure><p>Read more about how Cloudflare’s DDoS protection systems work <a href="/moobot-vs-gatebot-cloudflare-automatically-blocks-botnet-ddos-attack-topping-at-654-gbps/#ddos-detect-mitigate">here</a>.</p>
    <div>
      <h3>DDoS attacks increasing</h3>
      <a href="#ddos-attacks-increasing">
        
      </a>
    </div>
    <p>We’d like to say DDoS attacks are a thing of the past. But unfortunately, they are not.</p><p>On the contrary, we continue to see the frequency, sophistication, and geographical distribution of DDoS attacks rise every quarter - in quantity or size. See our reports from last year (<a href="/network-layer-ddos-attack-trends-for-q1-2020">Q1 ‘20</a>, <a href="/network-layer-ddos-attack-trends-for-q2-2020">Q2 ‘20</a>, <a href="/network-layer-ddos-attack-trends-for-q3-2020">Q3 ‘20</a>, and <a href="/network-layer-ddos-attack-trends-for-q4-2020">Q4 ‘20</a>) and view overall Internet traffic trends here on <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>.</p><p>Over the past year, Cloudflare has seen and automatically mitigated some of the <a href="/mitigating-a-754-million-pps-ddos-attack-automatically/">largest</a> and arguably the <a href="/beat-an-acoustics-inspired-ddos-attack/">most creative</a> cyber attacks. As attackers are getting bolder and smarter in their ways, organizations are looking for ways to battle these kinds of attacks with no disruption to the services they provide.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/14r4mPbdidClfY2emgP5cz/61610b64dec9217cc8bcf479ff25dcf9/image3-1.png" />
            
            </figure><p>DDoS attacks in 2020</p>
    <div>
      <h3>Organizations are being extorted under threat of DDoS</h3>
      <a href="#organizations-are-being-extorted-under-threat-of-ddos">
        
      </a>
    </div>
    <p>In January this year, we shared the story of <a href="/ransom-ddos-attacks-target-a-fortune-global-500-company/">how we helped a Fortune Global 500 company</a> stay online and protected whilst they were targeted by a <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">ransom DDoS attack</a>. They weren’t the only one. In fact, in the fourth quarter of 2020, 17% of surveyed Cloudflare customers reported receiving a ransom or a threat of DDoS attack. In Q1 2021, this increased to 26% — roughly 1 out of every 4 respondents reported a ransom threat and a subsequent DDoS attack on their network infrastructure.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7L2603xOPoKMKp1UH5RMws/c44673cac81e915183dd635fb2ead4f6/image4-1.png" />
            
            </figure><p>Whether organizations are targeted with ransom attacks or amateur ‘cyber vandalism’, it's important for organizations to utilize an <i>always-on, automated</i> DDoS protection service that doesn’t require manual human intervention in the hour of need. We take great pride in being able to provide this level of protection to our customers.</p>
    <div>
      <h3>Continuous improvement</h3>
      <a href="#continuous-improvement">
        
      </a>
    </div>
    <p>As attacks have continued to evolve, and the number of customers using our services has increased, Cloudflare has continually invested in our technology to stay several steps ahead of attackers. We’ve made significant investments in bolstering our mitigation capacity, honing our detection algorithms, and providing better analytics capabilities to our customers. Our aim is to make impact from DDoS attacks a thing of the past, for all customers, just like spam in the 90s.</p><p>In 2019, we <a href="/rolling-with-the-punches-shifting-attack-tactics-dropping-packets-faster-cheaper-at-the-edge/">rolled out our autonomous DDoS detection and mitigation system</a>, dosd. This component of our mitigation stack is fully software-defined, leverages Linux’s eXpress Data Path (XDP), and allows us to quickly and automatically deploy eBPF rules that run on each packet received for inspection — mitigating the most sophisticated attacks within less than 3 seconds on average at the edge and other common attacks instantly. It works by detecting patterns in the attack traffic and then quickly deploying rules autonomously to drop the offenders at wire speed. Additionally, because dosd operates independently within each data center, with no reliance on a centralized data center, it greatly increases the resilience of our network.</p><p>While dosd is great at mitigating attacks by detecting patterns in the traffic, what about patternless attacks? That’s where <a href="/announcing-flowtrackd/">flowtrackd</a> comes in, our novel TCP state classification engine, built in 2020, to defend against disruptive L3/L4 attacks targeting our <a href="/magic-transit/">Magic Transit customers</a>. It’s able to detect and mitigate <a href="/beat-an-acoustics-inspired-ddos-attack/">the most randomized, sophisticated attacks</a>. Additionally, at L7, we also learn our customer’s traffic baselines and <a href="/rolling-with-the-punches-shifting-attack-tactics-dropping-packets-faster-cheaper-at-the-edge/#low">identify when their origin is in distress</a>. When an origin server shows signs of deterioration, our systems begin <i>soft</i> mitigation in order to reduce the impact on the server and allow it to recuperate.</p><p>Building advanced DDoS protection systems is not only about the detection, but also about cost efficient mitigation. We aim to mitigate attacks without impacting performance that can be caused due to excessive computational consumption. This requirement is why we <a href="/rolling-with-the-punches-shifting-attack-tactics-dropping-packets-faster-cheaper-at-the-edge/#jails">introduced IP Jails</a> to the world: IP Jails is a <a href="/meet-gatebot-a-bot-that-allows-us-to-sleep/">gatebot</a> capability that mitigates the most volumetric and distributed attacks without impacting performance. Gatebot activates IP Jails when attacks become significantly volumetric, and then instead of blocking at L7, IP Jails temporarily drops the connection of the offending IP address that generated the request which matched the attack signature that gatebot created. IP Jails leverages the Linux iptables mechanism to drop packets at wirespeed. Dropping L7 attacks at L4, is significantly more cost-efficient, and benefits both our customers and our Site Reliability Engineering team.</p><p>Lastly, to provide our customers better visibility and insight into the increasingly sophisticated attacks we’re seeing and mitigating, <a href="/new-firewall-tab-and-analytics/">we released</a> the <a href="https://support.cloudflare.com/hc/en-us/articles/360024520152-Understanding-Cloudflare-Firewall-Analytics">Firewall Analytics</a> dashboard in 2019. This dashboard provides insights into both HTTP application security and DDoS activity at L7, allowing customers to configure <a href="https://support.cloudflare.com/hc/en-us/articles/360016473712-Cloudflare-Firewall-Rules">rules</a> directly from within analytics dashboards thus tightening the feedback loop for responding to events. Later in 2020, <a href="/announcing-network-analytics/">we released</a> an equivalent dashboard for L3/4 activity for our enterprise Magic Transit and Spectrum customers, in the form of the <a href="https://support.cloudflare.com/hc/en-us/articles/360038696631-Understanding-Cloudflare-Network-Analytics">Network Analytics</a> dashboard. Network Analytics provides insight into packet-level traffic and DDoS attack activity, along with periodical <a href="/announcing-spectrum-ddos-analytics-and-ddos-insights-trends/">Insights and Trends</a>. To complement the dashboards and provide our users the right information as they need it, <a href="/announcing-ddos-alerts/">we rolled out real-time DDoS alerts</a> and also periodical <a href="https://support.cloudflare.com/hc/en-us/articles/360053233231-Understanding-Cloudflare-DDoS-reports">DDoS reports</a> -- right into your inboxes. Or if you prefer, directly into your <a href="https://developers.cloudflare.com/logs/">SIEM dashboards</a>.</p>
    <div>
      <h3>Cloudflare received the top score in the strategy category</h3>
      <a href="#cloudflare-received-the-top-score-in-the-strategy-category">
        
      </a>
    </div>
    <p>This year, due to our advanced DDoS protection capabilities, Cloudflare received the top score in the strategy category and among the top three in the current offering category. Additionally, we were given the highest possible scores in 15 criteria in the report, including:</p><ul><li><p>Threat detection</p></li><li><p>Burst attacks</p></li><li><p>Response automation</p></li><li><p>Speed of implementation</p></li><li><p>Product vision</p></li><li><p>Performance</p></li><li><p>Security operation center (SOC) service</p></li></ul><p>We believe that our standing stems from the sustained investments we’ve made over the last few years in our <a href="http://www.cloudflare.com/network">global Anycast network</a> — which serves as the foundation of all services we provide to our customers.</p><p>Our network is architected for scale — every service runs on every server in every Cloudflare data center that spans over 200 cities globally. And as opposed to some of the other vendors in the report, every Cloudflare service is delivered from every one of our edge data centers.</p>
    <div>
      <h3>Integrated security and performance</h3>
      <a href="#integrated-security-and-performance">
        
      </a>
    </div>
    <p>A leading <a href="https://www.cloudflare.com/application-services/solutions/app-performance-monitoring/">application performance monitoring</a> company that uses Cloudflare’s services for serverless compute and content delivery recently told us that they wanted to consolidate their <a href="https://www.cloudflare.com/application-services/solutions/">performance and security services</a> under one provider. They got rid of their incumbent L3 services provider and onboarded Cloudflare for their application and network services (with <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a>) for easier management and better support.</p><p>We see this more and more. The benefits of using a single cloud provider for bundled security and performance services are plentiful:</p><ul><li><p><b>Easier management</b> — users can manage all of Cloudflare’s services such as <a href="https://www.cloudflare.com/ddos/">DDoS protection</a>, <a href="https://www.cloudflare.com/waf/">WAF</a>, <a href="https://www.cloudflare.com/cdn/">CDN</a>, <a href="https://www.cloudflare.com/products/bot-management/">bot management</a> and <a href="https://workers.cloudflare.com/">serverless compute</a> from a single dashboard and a single API endpoint.</p></li><li><p><b>Deep service integration</b> - all of our services are deeply integrated which allows our users to truly leverage the power of Cloudflare. As an example, Bot Management rules are implemented with our Application Firewall.</p></li><li><p><b>Easier troubleshooting</b> — instead of having to reach out to multiple providers, our customers have a <a href="https://www.cloudflare.com/technical-account-management-service/">single point of contact</a> when troubleshooting. Additionally, we provide immediate human response in our <a href="https://www.cloudflare.com/ddos/under-attack/">under attack hotline</a>.</p></li><li><p><b>Lower latency</b> — because every one of our services are delivered from all of our data centers, there are no performance penalties. As an example, there are no additional routing hops between the DDoS service to Bot Management service to <a href="https://www.cloudflare.com/learning/cdn/what-is-a-cdn/">CDN service</a>.</p></li></ul><p>However, not all cloud services are built the same, i.e. most vendors today do not have a comprehensive and robust solution to offer. Cloudflare’s unique architecture enables it to offer an integrated solution that comprises an all-star cast featuring the following to name a few:</p><ul><li><p><b>CDN</b>: Cloudflare CDN recognized as a Gartner Peer Insights "Customer's Choice" in 2020 for Global CDN<sup>1</sup></p></li><li><p><b>DDoS</b>: Received the highest number of high scores in the 2020 Gartner report for Solution Comparison for DDoS Cloud Scrubbing Centers<sup>2</sup></p></li><li><p><b>WAF</b>: Cloudflare is a CHALLENGER in the 2020 Gartner Magic Quadrant for Web Application Firewall (receiving the highest placement in the ‘Ability to Execute’)<sup>3</sup></p></li><li><p><b>Zero Trust</b>: Cloudflare is a LEADER in the Omdia Market Radar: Zero-Trust Access Report, 2020<sup>4</sup></p></li><li><p><b>Bot Management</b>: Leader in the 2020 SPARK Matrix of Bot Management Market<sup>5</sup></p></li><li><p><b>Integrated solution</b>: Innovation leader in the Global Holistic Web Protection Market for 2020 by Frost &amp; Sullivan<sup>6</sup></p></li></ul><p>We are pleased to be named a LEADER in The Forrester Wave™: for DDoS Mitigation Solutions, Q1 2021 report, and will continue to work tirelessly to remain, as the report puts it, a “compelling way to protect and deliver applications” for our customers.</p><p>For more information about Cloudflare’s DDoS protection, <a href="http://www.cloudflare.com/enterprise">reach out to us here</a> or hands-on evaluation of Cloudflare, sign up <a href="https://dash.cloudflare.com/sign-up">here</a>.</p><p>.........
<sup>1</sup><a href="https://www.gartner.com/reviews/market/global-cdn/vendor/cloudflare/product/cloudflare-cdn">https://www.gartner.com/reviews/market/global-cdn/vendor/cloudflare/product/cloudflare-cdn</a></p><p><sup>2</sup><a href="https://www.gartner.com/en/documents/3983636/solution-comparison-for-ddos-cloud-scrubbing-centers">https://www.gartner.com/en/documents/3983636/solution-comparison-for-ddos-cloud-scrubbing-centers</a></p><p><sup>3</sup>Gartner, “Magic Quadrant for Web Application Firewalls'', Analyst(s): Jeremy D'Hoinne, Adam Hils, John Watts, Rajpreet Kaur, October 19, 2020. <a href="https://www.gartner.com/doc/reprints?id=1-249JQ6L1&amp;ct=200929&amp;st=sb">https://www.gartner.com/doc/reprints?id=1-249JQ6L1&amp;ct=200929&amp;st=sb</a>
<sup>4</sup><a href="https://www.cloudflare.com/lp/omdia-zero-trust">https://www.cloudflare.com/lp/omdia-zero-trust</a>
<sup>5</sup><a href="https://www.cloudflare.com/lp/qks-bot-management-leader/">https://www.cloudflare.com/lp/qks-bot-management-leader/</a></p><p><sup>6</sup><a href="https://www.cloudflare.com/lp/frost-radar-holistic-web/">https://www.cloudflare.com/lp/frost-radar-holistic-web/</a></p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Network]]></category>
            <category><![CDATA[Forrester]]></category>
            <guid isPermaLink="false">2PvdHKMNIrz2L5jsQnr2cb</guid>
            <dc:creator>Vivek Ganti</dc:creator>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Network-layer DDoS attack trends for Q4 2020]]></title>
            <link>https://blog.cloudflare.com/network-layer-ddos-attack-trends-for-q4-2020/</link>
            <pubDate>Fri, 22 Jan 2021 12:00:00 GMT</pubDate>
            <description><![CDATA[ DDoS attack trends in the final quarter of 2020 defied norms in many ways. For the first time in 2020, Cloudflare observed an increase in the number of large DDoS attacks. Specifically, the number of attacks over 500Mbps and 50K pps saw a massive uptick.  ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7s9ko2O5p5cLQZgufvnI5S/b74e1b67409f06450d3c29c62cba4018/image21-1.png" />
            
            </figure><p>DDoS attack trends in the final quarter of 2020 defied norms in many ways. For the first time in 2020, Cloudflare observed an increase in the number of large DDoS attacks. Specifically, the number of attacks over 500Mbps and 50K pps saw a massive uptick.</p><p>In addition, attack vectors continued to evolve, with protocol-based attacks seeing a 3-10x increase compared to the prior quarter. Attackers were also more persistent than ever — nearly 9% of all attacks observed between October and December lasted more than 24 hours.</p><p>Below are additional noteworthy observations from the fourth quarter of 2020, which the rest of this blog explores in greater detail.</p><ul><li><p><b>Number of attacks:</b> For the first time in 2020, the total number of attacks observed in Q4 decreased compared to the prior quarter.</p></li><li><p><b>Attack duration:</b> 73% of all attacks observed lasted under an hour, a decrease from 88% in Q3.</p></li><li><p><b>Attack vectors:</b> While SYN, ACK, and RST floods continued to be the dominant attack vectors deployed, attacks over NetBIOS saw a whopping 5400% increase, followed by those over ISAKMP and SPSS.</p></li><li><p><b>Global DDoS activity:</b> Our data centers in Mauritius, Romania, and Brunei recorded the highest percentages of DDoS activity relative to non-attack traffic.</p></li><li><p><b>Additional attack tactics:</b> <a href="/ransom-ddos-attacks-target-a-fortune-global-500-company/">Ransom DDoS (RDDoS)</a> attacks continue to target organizations around the world as criminal groups attempt to extort a ransom in the form of Bitcoin under a threat of a DDoS attack.</p></li></ul>
    <div>
      <h2>Number of attacks</h2>
      <a href="#number-of-attacks">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3HM7RUrs09sv3IbtaQvXGv/7dbb30b2db348e3bf883cddf52d078a8/image13.png" />
            
            </figure><p>For the first time in 2020, the total number of network layer DDoS attacks we observed decreased compared to the previous quarter. Q4 constituted 15% of all attacks observed in 2020, compared to Q3’s 48%. In fact, the total number of attacks in Q4 was less than that seen in the month of September alone by a whopping 60%. On a monthly basis, December was Q4’s busiest month for attackers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Ip14T10pJRkDIw9fvTfQ0/09e7c30e8b4e043c3d005ad71162d91d/image15.png" />
            
            </figure>
    <div>
      <h2>Attack rates</h2>
      <a href="#attack-rates">
        
      </a>
    </div>
    <p>There are different ways of measuring an L3/4 DDoS attack’s size. One is the volume of traffic it delivers, or its ‘bit rate’ (measured in gigabits-per-second). Another is the number of packets it delivers, or its ‘packet rate’ (measured in packets-per-second). Attacks with high bit rates attempt to saturate last-mile network links of the target, and attacks with high packet rates attempt to overwhelm routers or other in-line hardware <a href="/network-layer-ddos-attack-trends-for-q3-2020/#blog-1-ddos">devices</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2RcquZz3afZORkFCgX36I9/a88c1203f6ef1febdbd32b813c174b82/image8-4.png" />
            
            </figure><p>In Q4, as in previous quarters, the majority of attacks were quite small —  under 1 Gbps and 1M pps, specifically. This trend is not surprising, since most attacks are launched by amateur attackers using tools that are easy to use and cost a few dollars at most. Small attacks may also serve as a smokescreen to distract security teams from other kinds of cyberattacks, or to test a network’s existing defense mechanisms.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1E4MxtMUrD6jJyaE3fRs4r/292e5113b67c5aa523853af314307cc3/image16.png" />
            
            </figure><p>However, the overall popularity of small attacks didn’t tell the whole story in Q4. Attacks over 500Mbps and 50K pps constituted a larger percentage of total attacks than they did in previous quarters. In fact, the number of attacks over 100 Gbps increased by 10x from Q3, and those over 10M pps increased by 3.6x.</p><p>One unique large attack Cloudflare observed was an ACK flood DoS attack that was automatically detected and mitigated by Cloudflare’s systems. What was unique about this attack was not the max packet rate, but the attack method that appears to have been borrowed from the world of acoustics.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/35buUEe8hOv4zBOQOA9iP8/5707197c5eeb59b31485f69baf0d0f2a/image18.png" />
            
            </figure><p>As can be seen in the graph above, the attack’s packet rate followed a wave-shaped pattern for over 19 hours. It seems as though the attacker was inspired by an acoustics concept called <a href="https://en.wikipedia.org/wiki/Beat_%28acoustics%29">beat</a>. For this reason, we codenamed this attack “Beat”. In acoustics, a beat is a term that is used to describe an interference of two different wave frequencies. You can read more about the Beat attack in our blog post: <a href="/beat-an-acoustics-inspired-ddos-attack/">Beat - An Acoustics Inspired DDoS Attack</a></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4PEt7dDxV5LREn7Q6iIdth/eae37ba35274b2a5f7cac79c2a6dc9d3/image14.png" />
            
            </figure><p>Whether packet intensive or bit intensive, the increase in large DDoS attacks is a disturbing trend. It indicates that attackers are getting more brazen, and are using tools that allow them to launch larger attacks. What’s worse, often larger attacks have implications to not just target the network, but also intermediary service providers that serve the target network downstream.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5wdXb2mmtdoiXsN7xcyPDM/b71256231eac1a31492c7dc0e009ad74/image10.png" />
            
            </figure>
    <div>
      <h2>Attack Duration</h2>
      <a href="#attack-duration">
        
      </a>
    </div>
    <p>73% of attacks in Q4 ‘20 lasted for under an hour. On the other end of the spectrum, nearly 9% of attacks lasted over 24 hrs (compared to a mere 1.5% in Q3 '20). This increase reinforces the need for a real-time, always-on defense system to protect against attacks of every size and duration.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/17UQiWvWFYIaUiolqdKt5Q/6fb13aac9a437538dbd08bb88e002220/image2-6.png" />
            
            </figure>
    <div>
      <h2>Attack vectors</h2>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p>An ‘attack vector’ is a term used to describe the attack method. The most popular method, SYN floods, constituted nearly 42% of all attacks observed in Q3, followed by ACK, RST, and UDP-based DDoS attacks. This is relatively consistent with observations from previous quarters. However, ACK attacks jumped from ninth place in Q3 to second place — a 13x increase quarter-over-quarter— dethroning RST attacks from second place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5zC3yC4BbV7Lj4xWjHJSvB/7e7da50386d5112e32675c0125610d44/image3-9.png" />
            
            </figure>
    <div>
      <h2>Top emerging threats</h2>
      <a href="#top-emerging-threats">
        
      </a>
    </div>
    <p>While TCP based attacks like SYN and RST floods remain popular, UDP-protocol specific attacks such as NetBIOS and ISAKMP-based DDoS attacks are seeing an explosion compared to the prior quarter.</p><p>NetBIOS is a protocol that allows applications on separate machines to communicate and access shared resources over a local area network, and ISAKMP is a protocol used to establish Security Associations (SAs) and cryptographic keys when setting up an <a href="https://www.cloudflare.com/learning/network-layer/what-is-ipsec/">IPsec</a> VPN connection (IPsec uses the Internet Key Exchange (IKE) protocol to ensure secure connections and will authenticate and encrypt packets of data sent over an Internet Protocol (IP) network.)</p><p>Cloudflare continues to see protocol based attacks — and indeed, multi-vector attacks — deployed to attempt to bring networks down. As the complexity of attacks elevates, adequate <a href="https://www.cloudflare.com/ddos/">DDoS protection</a> needs to be put in place to keep organizations secure and online at all times.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1alYse6gRa3CRb7XWg6X1E/1c0ef1468c1daa632afa9df7da740ad3/image20.png" />
            
            </figure>
    <div>
      <h2>Global DDoS activity</h2>
      <a href="#global-ddos-activity">
        
      </a>
    </div>
    <p>To understand where these attacks come from, we look at the Cloudflare edge network data centers where the traffic was ingested, rather than the location of the source IP. The reason? When attackers launch L3/4 attacks, they can spoof the source IP address in order to obfuscate their attack’s source.</p><p>In this report, we also measure the attack traffic observed at a Cloudflare data center relative to the non-attack traffic observed at the same data center for geo-based distribution. This gives us more accuracy in our endeavor to pinpoint geographic locations that are observing more threats than others. We’re able to achieve geographical accuracy in our report because we have data centers in over 200 cities, in more than 100 countries around the world.</p><p>Looking at Q4 metrics, we observed interesting insights — our data centers in Mauritius, Romania, and Brunei recorded the highest percentages of attack traffic relative to non-attack traffic. Specifically, between 4.4% and 4.9% of all traffic in those countries came from DDoS attacks. Another way of saying this is that almost 5 out of every 100 bytes was part of attack traffic. These observations indicate increased botnet activities in those countries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6vEdVCnJ29d4xYl4OO4ewm/23ad8afedefe5599f5ee21f8b15782b3/image17.png" />
            
            </figure><p>What might explain the comparatively high incidence of DDoS attacks in these countries? While it’s impossible to say for sure, here are some possibilities for the top two countries on the list:</p><p><a href="https://en.wikipedia.org/wiki/Mauritius"><b>Mauritius</b></a> - In August 2020, a state of environmental emergency was declared in Mauritius after a <a href="https://news.sky.com/story/mauritius-declares-environmental-emergency-after-mass-oil-spill-from-grounded-tanker-12044845">ship carrying nearly 4,000 tons of fuel cracked its hull</a>. The oil spill ignited <a href="https://en.wikipedia.org/wiki/MV_Wakashio_oil_spill#Anti-government_protests">anti-government protests</a> calling for the resignation of the prime minister. Since then, the government has suspended the parliament twice, and has also been accused of suppressing local media and independent reporting covering the incident. Even five months after, following a series of human-rights scandals, the <a href="https://www.forbes.com/sites/nishandegnarain/2021/12/30/protests-continue-in-mauritius-five-months-after-oil-spill/">protests continue</a>. The events in Mauritius may be linked to the increased DDoS activity.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1XhinXF9uOitM4v87nMXAU/19f3794f239cb09dfec881486b387eed/image19.png" />
            
            </figure><p>Source: wikipedia</p><p><a href="https://en.wikipedia.org/wiki/Romania"><b>Romania</b></a> - Two events may be behind the increased DDoS activity in Romania. Romania recently held parliamentary elections which ended on December 6, 2020. In addition, the EU announced on December 9th that <a href="https://www.zdnet.com/article/romania-to-host-the-eus-new-cybersecurity-research-hub/">Romania will host their new cyber security research hub</a>, the European Cybersecurity Industrial, Technology and Research Competence Centre (ECCC). Another possible explanation is that Romania is the country <a href="https://www.romania-insider.com/romania-cheapest-fast-internet-december-2019#:~:text=The%20price%20of%20super%2Dfast,and%20discounts%20platform%20Picodi.com.">with the cheapest super-fast broadband Internet in the world</a> — making it easier for anyone to launch volumetric attacks from within Romania.</p><blockquote><p>?<a href="https://twitter.com/hashtag/Bucharest?src=hash&amp;ref_src=twsrc%5Etfw">#Bucharest</a> to be the host of the future EU <a href="https://twitter.com/hashtag/Cyber?src=hash&amp;ref_src=twsrc%5Etfw">#Cyber</a> Centre?Hub for high tech and innovation, featuring a thriving digital ecosystem, dynamic and young, Romania’s capital will take this task in a responsible and dedicated manner, to the benefit of the entire European Union???</p>— Romania in the EU ?? (@romaniaineu) <a href="https://twitter.com/romaniaineu/status/1336801063865880577?ref_src=twsrc%5Etfw">December 9, 2020</a></blockquote> 
    <div>
      <h2>DDoS activity by region</h2>
      <a href="#ddos-activity-by-region">
        
      </a>
    </div>
    
    <div>
      <h3>Africa</h3>
      <a href="#africa">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4aSVgyvlzwLkSjZgJ822q6/06214280151ad46a664f65fe9671f05f/image1-8.png" />
            
            </figure>
    <div>
      <h3>Asia Pacific and Oceania</h3>
      <a href="#asia-pacific-and-oceania">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3rY41nNbrh7XbMHwYvnuod/c64daed84c64daee7dd1e7ec09e8012e/image7-2.png" />
            
            </figure>
    <div>
      <h3>Europe</h3>
      <a href="#europe">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1biS8O0qMJlUx6w8UHlBk8/3f03e086baf3601a1908f2f0da747e62/image5-4.png" />
            
            </figure>
    <div>
      <h3>Middle East</h3>
      <a href="#middle-east">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2EWOB1PIiaEJlm9ckwiZfB/cf6815df60afae615fe1c38b3b1aeafe/image12.png" />
            
            </figure>
    <div>
      <h3>North America</h3>
      <a href="#north-america">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/SzOJ762wAnsnEVcd1EFMi/9de62ea7f35e75a434cba2b910155c4e/image6-2.png" />
            
            </figure>
    <div>
      <h3>South America</h3>
      <a href="#south-america">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/42E9QJzkD2jBaAyC5lWQym/7ca786d49fcb7a49d7a7d4e2de9bf955/image11.png" />
            
            </figure>
    <div>
      <h3>United States</h3>
      <a href="#united-states">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/sg1e4R6PEPFjK6Yul5t7N/8a896086e83ec12b910a250ba30df568/image9-1.png" />
            
            </figure>
    <div>
      <h2>Ransom-based attacks continue to plague organizations</h2>
      <a href="#ransom-based-attacks-continue-to-plague-organizations">
        
      </a>
    </div>
    <p>In <a href="/network-layer-ddos-attack-trends-for-q3-2020/">our previous quarterly DDoS report</a>, we noted a rise in extortion and ransom-based DDoS (RDDoS) attacks around the world. In a RDDoS attack, a malicious party threatens a person or organization with a cyberattack that could knock their networks, websites, or applications offline for a period of time, unless the person or organization pays a ransom. You can read more about RDDoS attacks <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">here</a>.</p><p>In Q4 ‘20, this disturbing trend continued. Organizations large and small came to Cloudflare asking for help in keeping their network infrastructure online while they figured out how to respond to ransom notes. <a href="/ransom-ddos-attacks-target-a-fortune-global-500-company/">Read this story</a> of what a Fortune Global 500 company did when they received a ransom note, and about their recommendations for organizations.</p><p>Cloudflare continues to closely monitor this trend. If you receive a threat:</p><ol><li><p><b>Do not panic — we recommend you to not pay the ransom</b>: Paying the ransom only encourages bad actors and finances illegal activities — and there’s no guarantee attackers won’t attack your network anyway.</p></li><li><p><b>Notify local law enforcement</b>: They will also likely request a copy of the ransom letter that you received.</p></li><li><p><b>Contact Cloudflare</b>: We can help ensure your website and network infrastructure are safeguarded from these ransom attacks.</p></li></ol>
    <div>
      <h2>Cloudflare DDoS Protection</h2>
      <a href="#cloudflare-ddos-protection">
        
      </a>
    </div>
    <p>Cloudflare provides comprehensive L3-L7 DDoS protection. In 2017, we pioneered the elimination of the industry standard surge pricing for DDoS attacks, providing customers with unmetered and unlimited DDoS protection. Since then, we’ve onboarded thousands of customers of all sizes — including <a href="https://www.cloudflare.com/case-studies/wikimedia-foundation">Wikimedia</a>, <a href="https://www.cloudflare.com/case-studies/panasonic">Panasonic</a>, and <a href="https://www.cloudflare.com/case-studies/discord">Discord</a> — that use Cloudflare to  protect and accelerate their Internet properties. Why do they choose Cloudflare? Three main reasons:</p><p><b>1. No scrubs</b>Cloudflare doesn't operate scrubbing centers as we believe that <a href="/no-scrubs-architecture-unmetered-mitigation/">the scrubbing center model is a flawed approach to DDoS protection</a>. Scrubbing centers cause delays and cost too much to build and run. What’s more, DDoS attacks are asymmetric — attackers have more available bandwidth than a single scrubbing center will ever be able to handle.</p><p>Cloudflare’s network is architected so that every machine in every data center performs DDoS mitigation. Doing this at the edge is the only way to mitigate at scale without impacting performance. Our Anycast-based architecture makes our capacity equivalent to our DDoS scrubbing capacity, the largest in the market at 51 Tbps. This means Cloudflare detects and mitigates DDoS attacks close to the source of attack. Better yet, Cloudflare’s global threat intelligence acts like an immune system for the Internet — employing our <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning models</a> to learn from and mitigate attacks against any customer to protect them all.</p><p><b>2. It’s about time</b>Most organizations are in some stage of their journey from on-prem to the cloud. The threat landscape, functional requirements, and scale of business applications are evolving faster than ever before, and the volume and sophistication of network attacks are already straining the defensive capabilities of even the most advanced enterprises. One concern many enterprises have when adopting the cloud is added latency for applications. Most cloud-based DDoS protection services rely on specialized data centers aka “scrubbing centers'' for DDoS mitigation. Backhauling traffic to those data centers can add significant latency depending on its location relative to the destination server.</p><p>This problem compounds when an organization uses different providers for different networking functions. When traffic must hop from provider to provider, latency can be measured in hundreds of milliseconds.</p><p>Cloudflare’s <a href="http://www.cloudflare.com/network">distributed geographical presence</a> ensures that attacks are globally detected and mitigated in under 3 seconds on average — making it one of the fastest in the industry.</p><p><b>3. It’s not just about DDoS</b>DDoS attacks constitute just one facet of the many cyber threats organizations are facing today. As businesses shift to a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> approach, network and security buyers will face larger threats related to network access, and a continued surge in the frequency and sophistication of bot-related attacks.</p><p>A key design tenet while building products at Cloudflare is integration. <a href="/introducing-cloudflare-one/">Cloudflare One</a> is a solution that uses a Zero Trust security model to provide companies a better way to protect devices, data, and applications — and is deeply integrated with our existing platform of security and DDoS solutions.</p><p>To learn more about Cloudflare’s DDoS solution <a href="https://www.cloudflare.com/plans/enterprise/">contact us</a> or <a href="https://dash.cloudflare.com/">get started</a> today by signing up on our dashboard.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <category><![CDATA[RDDoS]]></category>
            <category><![CDATA[Fancy Bear]]></category>
            <category><![CDATA[Lazarus group]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <guid isPermaLink="false">3VunyYvpqhFGSKSBurDLOq</guid>
            <dc:creator>Vivek Ganti</dc:creator>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Network-layer DDoS attack trends for Q3 2020]]></title>
            <link>https://blog.cloudflare.com/network-layer-ddos-attack-trends-for-q3-2020/</link>
            <pubDate>Wed, 18 Nov 2020 12:00:00 GMT</pubDate>
            <description><![CDATA[ In Q3 ‘20, Cloudflare observed a surge in DDoS attacks, with double the number of DDoS attacks and more attack vectors deployed than ever — with a notable surge in protocol-specific DDoS attacks such as mDNS, Memcached, and Jenkins amplification floods. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1jF83Q9sYOyLDQ8T7y5CXX/45f7608acb2ef5cd2dc30d4e650b782b/image6-4.png" />
            
            </figure><p><b>DDoS attacks are surging</b> — both in frequency and sophistication. After doubling from Q1 to Q2, the total number of network layer attacks observed in Q3 doubled again — resulting in a 4x increase in number compared to the pre-COVID levels in the first quarter. Cloudflare also observed more attack vectors deployed than ever — in fact, while SYN, RST, and UDP floods continue to dominate the landscape, we saw an explosion in protocol specific attacks such as mDNS, Memcached, and Jenkins DoS attacks.</p><p>Here are other key network layer DDoS trends we observed in Q3:</p><ul><li><p>Majority of the attacks are under 500 Mbps and 1 Mpps — both still suffice to cause service disruptions</p></li><li><p>We continue to see a majority of attacks be under 1 hr in duration</p></li><li><p>Ransom-driven DDoS attacks (RDDoS) are on the rise as groups claiming to be Fancy Bear, Cozy Bear and the Lazarus Group extort organizations around the world. As of this writing, the ransom campaign is still ongoing. See a special note on this below.</p></li></ul>
    <div>
      <h3>Number of attacks</h3>
      <a href="#number-of-attacks">
        
      </a>
    </div>
    <p>The total number of L3/4 DDoS attacks we observe on our network continues to increase substantially, as indicated in the graph below. All in all, Q3 saw over 56% of all attacks this year — double that of Q2, and four times that of Q1. In addition, the number of attacks per month increased throughout the quarter.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/eIvD1EPThyRCdvoFBL8XX/8501596dd9c41688c0eb29e8af3d5703/image12-1.png" />
            
            </figure><p>While September witnessed the largest number of attacks overall, August saw the most large attacks (over 500Mbps). Ninety-one percent of large attacks in Q3 took place in that month—while monthly distribution of other attack sizes was far more even.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2IrTs1dyFpufH2GrOLC3Pa/8b27913d3fb0609774f5b65fbcac7af0/image9-1.png" />
            
            </figure><p>While the total number of attacks between 200-300 Gbps decreased in September, we saw more global attacks on our network in Q3. This suggests the increase in the use of distributed botnets to launch attacks. In fact, in early July, Cloudflare witnessed <a href="/moobot-vs-gatebot-cloudflare-automatically-blocks-botnet-ddos-attack-topping-at-654-gbps/">one of the largest-ever attacks on our network</a> — generated by Moobot, a <a href="/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis/">Mirai</a>-based botnet. The attack peaked at 654 Gbps and originated from 18,705 unique IP addresses, each believed to be a Moobot-infected IoT device. The attack campaign lasted nearly 10 days, but the customer was protected by Cloudflare, so they observed no downtime or service degradation.</p><h2>Attack size (bit rate and packet rate)</h2><p>There are different ways of measuring a L3/4 DDoS attack’s size. One is the volume of traffic it delivers, measured as the bit rate (specifically, Gigabits-per-second). Another is the number of packets it delivers, measured as the packet rate (specifically, packets-per-second). Attacks with high bit rates attempt to saturate the Internet link, and attacks with high packet rates attempt to overwhelm the routers or other in-line hardware devices.</p><p>In Q3, most of the attacks we observed were smaller in size. In fact, over 87% of all attacks were under 1 Gbps. This represents a significant increase from Q2, when roughly 52% of attacks were that small.  Note that, even ‘small’ attacks of under 500 Mbps are many times sufficient to create major disruptions for Internet properties that are not protected by a Cloud based DDoS protection service. Many organizations have uplinks provided by their ISPs that are far less than 1 Gbps. Assuming their public facing network interface also serves legitimate traffic, you can see how even these ‘small’ DDoS attacks can easily take down Internet properties.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/67jEBElzS4SdgzUg2qWb6y/0b29ee030f2126e6cfe779a17a03692b/image10-2.png" />
            
            </figure><p>This trend holds true for attack packet rates. In Q3, 47% of attacks were under 50k pps — compared to just 19% in Q2.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6jDfpcPzz6D2Ga9pudsPdJ/42d892f6d8e234dedcdd62fbb2c5db19/image8-1.png" />
            
            </figure><p>Smaller attacks can indicate that amateur attackers may be behind the attacks — using tools easily available to generate attacks on exposed IPs/ networks. Alternatively, small attacks may serve as a smokescreen to distract security teams from other kinds of cyberattacks that might be taking place simultaneously.</p>
    <div>
      <h3>Attack duration</h3>
      <a href="#attack-duration">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2EGtlfRfpul4ouwzzixxB5/c64951bcd1c43c05fa9d9f0ef85341cf/image5-3.png" />
            
            </figure><p>In terms of length, very short attacks were the most common attack type observed in Q3, accounting for nearly 88% of all attacks. This observation is in line with our prior reports — in general, Layer 3/4 DDoS attacks are getting shorter in duration.</p><p>Short burst attacks may attempt to cause damage without being detected by DDoS detection systems. DDoS services that rely on manual analysis and mitigation may prove to be useless against these types of attacks because they are over before the analyst even identifies the attack traffic.</p><p>Alternatively, the use of short attacks may be used to probe the cyber defenses of the target. Load-testing tools and automated DDoS tools, that are widely available on the dark web, can generate short bursts of, say, a SYN flood, and then following up with another short attack using an alternate attack vector. This allows attackers to understand the security posture of their targets before they decide to potentially launch larger attacks at larger rates and longer durations - which come at a cost.</p><p>In other cases, attackers generate small DDoS attacks as proof and warning to the target organization of the attacker’s ability to cause real damage later on. It’s often followed by a ransom note to the target organization, demanding payment so as to avoid suffering an attack that could more thoroughly cripple network infrastructure.</p><p>Whatever their motivation, DDoS attacks of any size or duration are not going away anytime soon. Even short DDoS attacks cause harm, and having an automated real-time defense mechanism in place is critical for any online business.</p>
    <div>
      <h3>Attack vectors</h3>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> constituted nearly 65% of all attacks observed in Q3, followed by RST floods and UDP floods in second and third places. This is relatively consistent with observations from previous quarters, highlighting the DDoS attack vector of choice by attackers.</p><p>While TCP based attacks like SYN and RST floods continue to be popular, UDP-protocol specific attacks such as mDNS, Memcached, and Jenkins are seeing an explosion compared to the prior quarter.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3aC5Dl4SPW5m6IWzVdlJpJ/f092be311fee7c0b28116c0d394f66dc/image-5.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1IzY6gk4kSWcqvKrcBtLmo/3fd3997ccfebab2ff263ca50ecd0cf1f/image13-1.png" />
            
            </figure><p>Multicast DNS (mDNS) is a UDP-based protocol that is used in local networks for service/device discovery. Vulnerable mDNS servers respond to unicast queries originating outside of the local network, which are ‘spoofed’ (altered) with the victim's source address. This results in amplification attacks. In Q3, we noticed an explosion of mDNS attacks — specifically, we saw a 2,680% increase compared to the previous quarter.</p><p>This was followed by <a href="https://www.cloudflare.com/learning/ddos/memcached-ddos-attack">Memcached</a> and Jenkins attacks. Memcached is a Key Value database. Requests can be made over the UDP protocol with a spoofed source address of the target. The size of the Value stored in the requested Key will affect the amplification factor, resulting in a DDoS amplification attack. Similarly, Jenkins, NTP, Ubiquity and the other UDP based protocols have seen a dramatic increase over the quarter due to its UDP stateless nature. A vulnerability in the older version (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-2100">Jenkins 2.218</a> and earlier) aided the launch of DDoS attacks. This vulnerability was fixed in Jenkins 2.219 by disabling UDP multicast/ broadcast messages by default. However there are still many vulnerable and exposed devices that run UDP based services which are being harnessed to generate volumetric amplification attacks.</p>
    <div>
      <h3>Attack by country</h3>
      <a href="#attack-by-country">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7G3o9akXvt2LTGVWEijSqr/3b1c55ce7380c55fa6f8bcc94d000112/image2-9.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1N6lAC9tcUt07R9tJlv1Tv/c0757a5918fff27c58c302e2e7bde238/image4-8.png" />
            
            </figure><p>Looking at country-based distribution, the United States observed the most number of L3/4 DDoS attacks, followed by Germany and Australia. Note that when analyzing L3/4 DDoS attacks, we bucket the traffic by the Cloudflare edge data center locations where the traffic was ingested, and not by the location of the source IP. The reason is when attackers launch L3/4 attacks they can spoof the source IP address in order to obfuscate the attack source. If we were to derive the country based on a spoofed source IP, we would get a spoofed country. Cloudflare is able to overcome the challenges of spoofed IPs by displaying the attack data by the location of Cloudflare’s data center in which the attack was observed. We’re able to achieve geographical accuracy in our report because we have data centers in over 200 cities around the world.</p>
    <div>
      <h3>Africa</h3>
      <a href="#africa">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7wsuVQRHIvB0rqToNcP9Tl/3ac6afddef1846c058e4eb0acade724e/BDES-1247_DDoS_Trends_Report_Q32020-10.png" />
            
            </figure>
    <div>
      <h3>Asia Pacific &amp; Oceania</h3>
      <a href="#asia-pacific-oceania">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ACJVFEAu49FbAEq1QNt6v/3f6cb0da18ffd22aab96ff943ce90260/BDES-1247_DDoS_Trends_Report_Q32020-11.png" />
            
            </figure>
    <div>
      <h3>Europe</h3>
      <a href="#europe">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ITS2QtgD0BCbrSl2td6LE/c6c17ac71c7e35a5aabd6e9d660d6c5b/BDES-1247_DDoS_Trends_Report_Q32020-12.png" />
            
            </figure>
    <div>
      <h3>Middle East</h3>
      <a href="#middle-east">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/21t1TvjNu1RBkTF4u3pIxI/b33ed46dced8d1c16c15deaab52f1ab2/Middle-East_3x.png" />
            
            </figure>
    <div>
      <h3>North America</h3>
      <a href="#north-america">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3V3ZzVYkNANX8iwKAmVSbK/6e3165239cfee9689f8819706296d8f5/North-America_3x.png" />
            
            </figure>
    <div>
      <h3>South America</h3>
      <a href="#south-america">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5BOr2iIu2AbVgqIsyLRKTB/1fa12fe524225792e8b41c78751cf33b/BDES-1247_DDoS_Trends_Report_Q32020-15.png" />
            
            </figure>
    <div>
      <h3>United States</h3>
      <a href="#united-states">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/66zKSWET6zVODRjcb2seiU/13785a8bec7c281b45b31ae895a94e2c/BDES-1247_DDoS_Trends_Report_Q32020-16.png" />
            
            </figure>
    <div>
      <h3>A note on recent ransom-driven DDoS attacks</h3>
      <a href="#a-note-on-recent-ransom-driven-ddos-attacks">
        
      </a>
    </div>
    <p>Over the past months, Cloudflare has observed another disturbing trend — a rise in extortion and ransom-based DDoS (RDDoS) attacks targeting organizations around the world. While RDDoS threats do not always result in an actual attack, the cases seen in recent months show that attacker groups are willing to carry out the threat, launching large scale DDoS attacks that can overwhelm organizations that lack adequate protection. In some cases, the initial teaser attack may be sufficient to cause impact if not protected by a Cloud based DDoS protection service.</p><p>In a RDDoS attack, a malicious party threatens a person or organization with a cyberattack that could knock their networks, websites, or applications offline for a period of time, unless the person or organization pays a ransom. You can read more about RDDoS attacks <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">here</a>.</p><p>Entities claiming to be Fancy Bear, Cozy Bear, and Lazarus have been threatening to launch DDoS attacks against organizations’ websites and network infrastructure unless a ransom is paid before a given deadline. Additionally, an initial ‘teaser’ DDoS attack is usually launched as a form of demonstration before parallel to the ransom email. The demonstration attack is typically a UDP reflection attack using a variety of protocols, lasting roughly 30 minutes in duration (or less).</p><p>What to do if you receive a threat:</p><ol><li><p><b>Do not panic and we recommend you to not pay the ransom</b>: Paying the ransom only encourages bad actors, finances illegal activities —and there’s no guarantee that they won’t attack your network now or later.</p></li><li><p><b>Notify local law enforcement</b>: They will also likely request a copy of the ransom letter that you received.</p></li><li><p><b>Contact Cloudflare</b>: We can help ensure your website and network infrastructure are safeguarded from these ransom attacks.</p></li></ol>
    <div>
      <h3>Cloudflare DDoS protection is different</h3>
      <a href="#cloudflare-ddos-protection-is-different">
        
      </a>
    </div>
    <p>On-prem hardware/cloud-scrubbing centers can't address the challenges of modern volumetric DDoS attacks. Appliances are easily overwhelmed by large DDoS attacks, Internet links quickly saturate, and rerouting traffic to cloud scrubbing centers introduces unacceptable latency penalties. Our <a href="https://www.cloudflare.com/ddos/">cloud-native, always-on, automated DDoS protection</a> approach solves problems that traditional cloud signaling approaches were originally created to address.</p><p>Cloudflare’s mission is to help build a better Internet, which grounds our DDoS approach and is why in 2017, we pioneered <a href="/unmetered-mitigation/">unmetered DDoS mitigation</a> for all of our customers on all plans including the <a href="https://www.cloudflare.com/plans/free/">free plan</a>. We are able to provide this level of protection because every server on our network can <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">detect &amp; block threats</a>, enabling us to absorb attacks of any size/kind, with no latency impact. This architecture gives us unparalleled advantages compared to any other vendor.</p><ul><li><p><b>51 Tbps of DDoS mitigation capacity and under 3 sec TTM</b>: Every data center in Cloudflare’s network detects and mitigates DDoS attacks. Once an attack is identified, the Cloudflare’s local data center mitigation system (dosd) generates and applies a dynamically crafted rule with a real-time signature — and mitigates attacks in under 3 seconds globally on average. This 3-second Time To Mitigate (TTM) is one of the fastest in the industry. Firewall rules and “proactive”/static configurations take effect immediately.</p></li><li><p><b>Fast performance included</b>:  Cloudflare is architected so that customers do not incur a latency penalty as a result of attacks. We deliver DDoS protection from every Cloudflare data center (instead of legacy scrubbing centers or on-premise hardware boxes) which allows us to mitigate attacks closest to the source. Cloudflare analyzes traffic out-of-path ensuring that our DDoS mitigation solution doesn’t add any latency to legitimate traffic. The rule is applied at the most optimal place in the Linux stack for a cost efficient mitigation, ensuring no performance penalty.</p></li><li><p><b>Global Threat Intelligence</b>: Like an immune system, our network learns from/mitigates attacks against any customer to protect them all. With threat intelligence (TI), it automatically blocks attacks and is employed in customer facing features (Bot Fight mode, Firewall Rules &amp; Security Level). Users create custom rules to mitigate attacks based on traffic attribute filters, threat &amp; bot scores generated using ML models (protecting against bots/botnets/DDoS).</p></li></ul><p>To learn more about Cloudflare’s DDoS solution <a href="https://www.cloudflare.com/plans/enterprise/">contact us</a> or <a href="https://dash.cloudflare.com/">get started</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[RDDoS]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <category><![CDATA[Fancy Bear]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <guid isPermaLink="false">2wAF9ScxGpcNPZViO9aZhy</guid>
            <dc:creator>Vivek Ganti</dc:creator>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Network-layer DDoS attack trends for Q2 2020]]></title>
            <link>https://blog.cloudflare.com/network-layer-ddos-attack-trends-for-q2-2020/</link>
            <pubDate>Wed, 05 Aug 2020 13:00:00 GMT</pubDate>
            <description><![CDATA[ This quarter, we saw an increasing number of large scale attacks; both in terms of packet rate and bit rate. In fact, 88% of all DDoS attacks in 2020 that peaked above 100 Gbps were launched after shelter-in-place went into effect in March. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>In the first quarter of 2020, within a matter of weeks, our way of life shifted. We’ve become reliant on online services more than ever. Employees that can are working from home, students of all ages and grades are taking classes online, and we’ve redefined what it means to stay connected. The more the public is dependent on staying connected, the larger the potential reward for attackers to cause chaos and disrupt our way of life. It is therefore no surprise that in Q1 2020 (January 1, 2020 to March 31, 2020) we reported an <a href="/network-layer-ddos-attack-trends-for-q1-2020/">increase in the number of attacks</a>—especially after various government authority mandates to stay indoors—shelter-in-place went into effect in the second half of March.</p><p>In Q2 2020 (April 1, 2020 to June 30, 2020), this trend of increasing DDoS attacks continued and even accelerated:</p><ul><li><p>The number of L3/4 DDoS attacks observed over our network <b>doubled</b> compared to that in the first three months of the year.</p></li><li><p>The scale of the largest L3/4 DDoS attacks increased significantly. In fact, we observed <b>some of the largest attacks</b> ever recorded over our network.</p></li><li><p>We observed <b>more attack vectors being deployed</b> and attacks were more geographically distributed.</p></li></ul>
    <div>
      <h3>The number of global L3/4 DDoS attacks in Q2 doubled</h3>
      <a href="#the-number-of-global-l3-4-ddos-attacks-in-q2-doubled">
        
      </a>
    </div>
    <p><a href="/meet-gatebot-a-bot-that-allows-us-to-sleep/">Gatebot</a> is Cloudflare’s primary <a href="https://www.cloudflare.com/ddos/">DDoS protection system</a>. It automatically detects and mitigates globally distributed DDoS attacks. A global DDoS attack is an attack that we observe in more than one of our edge data centers. These attacks are usually generated by sophisticated attackers employing <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">botnets</a> in the range of tens of thousand to millions of bots.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/47WCdxk1Mt8sLcQAHBuPoI/6ac0aca28acc5a3ab26010b8460f3690/BDES-831_DDoS_Report_Q2-20_Infographic_Blog_1_V2.png" />
            
            </figure><p>Sophisticated attackers kept Gatebot busy in Q2. The total number of global L3/4 DDoS attacks that Gatebot detected and mitigated in Q2 doubled quarter over quarter. In our <a href="/network-layer-ddos-attack-trends-for-q1-2020/">Q1 DDoS report</a>, we reported a spike in the number and size of attacks. We continue to see this trend accelerate through Q2; over 66% of all global DDoS attacks in 2020 occurred in the second quarter (nearly 100% increase). May was the busiest month in the first half of 2020, followed by June and April. Almost a third of all L3/4 DDoS attacks occurred in May.</p><p>In fact, 63% of all L3/4 DDoS attacks that peaked over 100 Gbps occurred in May. As the global pandemic continued to heighten around the world in May, attackers were especially eager to take down websites and other Internet properties.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7bjRAemRrFuqWj4tGMlYOp/df7ef51902d7589c5aefa4d07c217db9/BDES-831_DDoS_Report_Q2-20_Infographic_Blog_2_V2.png" />
            
            </figure>
    <div>
      <h3>Small attacks continue to dominate in numbers as big attacks get bigger in size</h3>
      <a href="#small-attacks-continue-to-dominate-in-numbers-as-big-attacks-get-bigger-in-size">
        
      </a>
    </div>
    <p>A DDoS attack’s strength is equivalent to its size—the actual number of packets or bits flooding the link to overwhelm the target. A ‘large’ DDoS attack refers to an attack that peaks at a high rate of Internet traffic. The rate can be measured in terms of packets or bits. Attacks with high bit rates attempt to saturate the Internet link, and attacks with high packet rates attempt to overwhelm the routers or other in-line hardware devices.</p><p>Similar to Q1, the majority of L3/4 DDoS attacks that we observed in Q2 were also relatively ‘small’ with regards to the scale of Cloudflare’s network. In Q2, nearly 90% of all L3/4 DDoS attacks that we saw peaked below 10 Gbps. Small attacks that peak below 10 Gbps can still easily cause an outage to most of the websites and Internet properties around the world if they are not protected by a cloud-based DDoS mitigation service.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/36Tgs9VZmAcNX3TPWkHPpU/502a253607b57bf51133d567e961ab10/image3.png" />
            
            </figure><p>Similarly, from a packet rate perspective, 76% of all L3/4 DDoS attacks in Q2 peaked up to 1 million packets per second (pps). Typically, a 1 Gbps Ethernet interface can deliver anywhere between 80k to 1.5M pps. Assuming the interface also serves legitimate traffic, and that most organizations have much less than a 1 Gbps interface, you can see how even these ‘small’ packet rate DDoS attacks can easily take down Internet properties.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/18wm0SLmVLT1h1UoMJzJIW/3bf410f64fb2a576b08f4b559678d30b/image12.png" />
            
            </figure><p>In terms of duration, 83% of all attacks lasted between 30 to 60 minutes. We saw a similar trend in Q1 with 79% of attacks falling in the same duration range. This may seem like a short duration, but imagine this as a 30 to 60 minute cyber battle between your security team and the attackers. Now it doesn’t seem so short. Additionally, if a DDoS attack creates an outage or service degradation, the recovery time to reboot your appliances and relaunch your services can be much longer; costing you lost revenue and reputation for every minute.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5KPKYEa3dJbVOPMbD9xgwL/c8450e405c54ee4a4726762c268537a4/image5.png" />
            
            </figure>
    <div>
      <h3>In Q2, we saw the largest DDoS attacks on our network, ever</h3>
      <a href="#in-q2-we-saw-the-largest-ddos-attacks-on-our-network-ever">
        
      </a>
    </div>
    <p>This quarter, we saw an increasing number of large scale attacks; both in terms of packet rate and bit rate. In fact, 88% of all DDoS attacks in 2020 that peaked above 100 Gbps were launched after shelter-in-place went into effect in March. Once again, May was not just the busiest month with the most number of attacks, but also the greatest number of large attacks above 100 Gbps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3xCmRbu0sb7vVxPZDCGcSa/bf34333c6a086b67c1fd1bd7dd002a78/BDES-831_DDoS_Report_Q2-20_Infographic_Blog_6_V2.png" />
            
            </figure><p>From the packet perspective, June took the lead with a whopping <a href="/mitigating-a-754-million-pps-ddos-attack-automatically/">754 million pps attack</a>. Besides that attack, the maximum packet rates stayed mostly consistent throughout the quarter with around 200 million pps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ls9LREIXlweivtOQ5shCc/fce688b880352f78c80f77209f57a85e/image4.png" />
            
            </figure><p>The 754 million pps attack was automatically detected and mitigated by Cloudflare. The attack was part of an organized four-day campaign that lasted from June 18 to the 21. As part of the campaign, attack traffic from over 316,000 IP addresses targeted a single Cloudflare IP address.</p><p>Cloudflare’s DDoS protection systems automatically detected and mitigated the attack, and due to the size and global coverage of our network, there was no impact to performance. A global interconnected network is crucial when mitigating large attacks in order to be able to absorb the attack traffic and mitigate it close to the source, whilst also continuing serving legitimate customer traffic without inducing latency or service interruptions.</p>
    <div>
      <h3>The United States is targeted with the most attacks</h3>
      <a href="#the-united-states-is-targeted-with-the-most-attacks">
        
      </a>
    </div>
    <p>When we look at the L3/4 DDoS attack distribution by country, our data centers in the United States received the most number of attacks (22.6%), followed by Germany (4.4%), Canada (2.7%) and Great Britain (2.6%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5T9sq77C8KOW3XyxL7qLHB/fe9c95beac6dea4acd76c9f3a8a153d9/image8.png" />
            
            </figure><p>However when we look at the total attack bytes mitigated by each Cloudflare data center, the United States still leads (34.9%), but followed by Hong Kong (6.6%), Russia (6.5%), Germany (4.5%) and Colombia (3.7%). The reason for this change is due to the total amount of bandwidth that was generated in each attack. For instance, while Hong Kong did not make it to the top 10 list due to the relatively small number of attacks that was observed in Hong Kong (1.8%), the attacks were highly volumetric and generated so much attack traffic that pushed Hong Kong to the 2nd place.</p><p>When analyzing L3/4 DDoS attacks, we bucket the traffic by the Cloudflare edge data center locations and not by the location of the source IP. The reason is when attackers launch L3/4 attacks they can ‘spoof’ (alter) the source IP address in order to obfuscate the attack source. If we were to derive the country based on a spoofed source IP, we would get a spoofed country. Cloudflare is able to overcome the challenges of spoofed IPs by displaying the attack data by the location of Cloudflare’s data center in which the attack was observed. We’re able to achieve geographical accuracy in our report because we have data centers in over 200 cities around the world.</p>
    <div>
      <h3>57% of all L3/4 DDoS attacks in Q2 were SYN floods</h3>
      <a href="#57-of-all-l3-4-ddos-attacks-in-q2-were-syn-floods">
        
      </a>
    </div>
    <p>An attack vector is a term used to describe the attack method. In Q2, we observed an increase in the number of vectors used by attackers in L3/4 DDoS attacks. A total of 39 different types of attack vectors were used in Q2, compared to 34 in Q1. <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> formed the majority with over 57% in share, followed by RST (13%), <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP</a> (7%), <a href="/reflections-on-reflections/">CLDAP</a> (6%) and <a href="/ssdp-100gbps/">SSDP</a> (3%) attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3uMfQ2KnxdxxglFtKKfcsF/357a42eda1cf52d00983ac476d317a3a/image1-3.png" />
            
            </figure><p>SYN flood attacks aim to exploit the handshake process of a <a href="https://www.cloudflare.com/learning/ddos/glossary/tcp-ip/">TCP</a> connection. By repeatedly sending initial connection request packets with a synchronize flag (SYN), the attacker attempts to overwhelm the router’s connection table that tracks the state of TCP connections. The router replies with a packet that contains a synchronized acknowledgment flag (SYN-ACK), allocates a certain amount of memory for each given connection and falsely waits for the client to respond with a final acknowledgment (ACK). Given a sufficient number of SYNs that occupy the router’s memory, the router is unable to allocate further memory for legitimate clients causing a denial of service.</p><p>No matter the attack vector, Cloudflare automatically detects and mitigates stateful or stateless DDoS attacks using our 3 pronged protection approach comprising of our home-built DDoS protection systems:</p><ol><li><p><a href="/meet-gatebot-a-bot-that-allows-us-to-sleep/"><b>Gatebot</b></a> - Cloudflare's centralized DDoS protection systems for detecting and mitigating globally distributed volumetric DDoS attacks. Gatebot runs in our network’s core data center. It receives samples from every one of our edge data centers, analyzes them and automatically sends mitigation instructions when attacks are detected. Gatebot is also synchronized to each of our customers’ web servers to identify its health and triggers accordingly, tailored protection.</p></li><li><p><a href="/rolling-with-the-punches-shifting-attack-tactics-dropping-packets-faster-cheaper-at-the-edge/"><b>dosd</b></a> <b>(denial of service daemon)</b> - Cloudflare’s decentralized DDoS protection systems. dosd runs autonomously in each server in every Cloudflare data center around the world, analyzes traffic, and applies local mitigation rules when needed. Besides being able to detect and mitigate attacks at super fast speeds, dosd significantly improves our network resilience by delegating the detection and mitigation capabilities to the edge.</p></li><li><p><a href="/announcing-flowtrackd/"><b>flowtrackd</b></a> <b>(flow tracking daemon)</b> - Cloudflare’s TCP state tracking machine for detecting and mitigating the most randomized and sophisticated TCP-based DDoS attacks in unidirectional routing topologies. flowtrackd is able to identify the state of a TCP connection and then drops, challenges or rate-limits packets that don’t belong to a legitimate connection.</p></li></ol><p>In addition to our automated DDoS protection systems, Cloudflare also generates real-time threat intelligence that automatically mitigates attacks. Furthermore, Cloudflare provides its customers firewall, rate-limiting and additional tools to further customize and optimize their protection.</p>
    <div>
      <h3>Cloudflare DDoS mitigation</h3>
      <a href="#cloudflare-ddos-mitigation">
        
      </a>
    </div>
    <p>As Internet usage continues to evolve for businesses and individuals, expect DDoS tactics to adapt as well. Cloudflare protects <a href="http://www.cloudflare.com/ddos">websites</a>, <a href="http://www.cloudflare.com/products/cloudflare-spectrum">applications</a>, and <a href="http://www.cloudflare.com/magic-transit">entire networks</a> from DDoS attacks of any size, kind, or level of sophistication.</p><p>Our customers and industry analysts recommend our comprehensive solution for three main reasons:</p><ul><li><p><b>Network scale</b>: Cloudflare’s 37 Tbps network can easily block attacks of any size, type, or level of sophistication. The Cloudflare network has a DDoS mitigation capacity that is higher than the next four competitors—combined.</p></li><li><p><b>Time-to-mitigation</b>: Cloudflare mitigates most network layer attacks in under 10 seconds globally, and immediate mitigation (0 seconds) when static rules are preconfigured. With our global presence, Cloudflare mitigates attacks close to the source with minimal latency. In some cases, traffic is even faster than over the public Internet.</p></li><li><p><b>Threat intelligence</b>: Cloudflare’s DDoS mitigation is powered by threat intelligence harnessed from over 27 million Internet properties on it. Additionally, the threat intelligence is incorporated into customer facing firewalls and tools in order to empower our customers.</p></li></ul><p>Cloudflare is uniquely positioned to deliver DDoS mitigation with unparalleled scale, speed, and smarts because of the architecture of our network. Cloudflare’s network is like a fractal—every service runs on every server in every Cloudflare data center that spans over <a href="http://www.cloudflare.com/network">200 cities globally</a>. This enables Cloudflare to detect and mitigate attacks close to the source of origin, no matter the size, source, or type of attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/svcStXyOyAmevBtneBBQG/a78a9f59b796b37125f4a6a93068d215/image10.png" />
            
            </figure><p>To learn more about Cloudflare’s DDoS solution <a href="https://www.cloudflare.com/plans/enterprise/">contact us</a> or <a href="https://dash.cloudflare.com/">get started</a>.</p><p>You can also join an upcoming live webinar where we will be discussing these trends, and strategies enterprises can implement to combat DDoS attacks and keep their networks online and fast. You can <a href="https://onlinexperiences.com/Launch/QReg/ShowUUID=43F66E2A-9532-44CF-9852-59324105F8E0&amp;LangLocaleID=1033">register here</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[COVID-19]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <guid isPermaLink="false">7qppwIMZPstAb2tBMtHhL2</guid>
            <dc:creator>Vivek Ganti</dc:creator>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
    </channel>
</rss>