
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Mon, 06 Apr 2026 16:49:01 GMT</lastBuildDate>
        <item>
            <title><![CDATA[2025 Q4 DDoS threat report: A record-setting 31.4 Tbps attack caps a year of massive DDoS assaults]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-2025-q4/</link>
            <pubDate>Thu, 05 Feb 2026 14:00:00 GMT</pubDate>
            <description><![CDATA[ The number of DDoS attacks more than doubled in 2025. The network layer is under particular threat as hyper-volumetric attacks grew 700%. ]]></description>
            <content:encoded><![CDATA[ <p>Welcome to the 24th edition of Cloudflare’s Quarterly DDoS Threat Report. In this report, <a href="https://www.cloudflare.com/cloudforce-one/"><u>Cloudforce One</u></a> offers a comprehensive analysis of the evolving threat landscape of <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/"><u>Distributed Denial of Service (DDoS) attacks</u></a> based on data from the <a href="https://www.cloudflare.com/network/"><u>Cloudflare network</u></a>. In this edition, we focus on the fourth quarter of 2025, as well as share overall 2025 data.</p><p>The fourth quarter of 2025 was characterized by an unprecedented bombardment launched by the <a href="https://www.cloudflare.com/learning/ddos/glossary/aisuru-kimwolf-botnet/"><u>Aisuru-Kimwolf botnet</u></a>, dubbed “The Night Before Christmas" DDoS attack campaign. The campaign targeted Cloudflare customers as well as Cloudflare’s dashboard and infrastructure with hyper-volumetric HTTP DDoS attacks exceeding rates of 200 million requests per second (rps), just weeks after a record-breaking 31.4 Terabits per second (Tbps) attack.</p>
    <div>
      <h2>Key insights</h2>
      <a href="#key-insights">
        
      </a>
    </div>
    <ol><li><p>DDoS attacks surged by 121% in 2025, reaching an average of 5,376 attacks automatically mitigated every hour.</p></li><li><p>In the final quarter of 2025, Hong Kong jumped 12 places, making it the second most DDoS’d place on earth. The United Kingdom also leapt by an astonishing 36 places, making it the sixth most-attacked place.</p></li><li><p>Infected Android TVs — part of the Aisuru-Kimwolf botnet — bombarded Cloudflare’s network with hyper-volumetric HTTP DDoS attacks, while Telcos emerged as the most-attacked industry.</p></li></ol>
    <div>
      <h2>2025 saw a huge spike in DDoS attacks</h2>
      <a href="#2025-saw-a-huge-spike-in-ddos-attacks">
        
      </a>
    </div>
    <p>In 2025, the total number of DDoS attacks more than doubled to an incredible 47.1 million. Such attacks have soared in recent years: The number of DDoS attacks spiked 236% between 2023 and 2025.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gWz9fvMGvTVL30YfnFL55/57749a329c2be23e45f87227221aa440/BLOG-3098_2.png" />
          </figure><p>In 2025, Cloudflare mitigated an average of 5,376 DDoS attacks every hour — of these, 3,925 were network-layer DDoS attacks and 1,451 were HTTP DDoS attacks. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6cANr8wDVOOMNIb9IPvPYb/56f75509048fcd68c188fdd87f68e883/.png" />
          </figure>
    <div>
      <h3>Network-layer DDoS attacks more than tripled in 2025</h3>
      <a href="#network-layer-ddos-attacks-more-than-tripled-in-2025">
        
      </a>
    </div>
    <p>The most substantial growth was in network-layer DDoS attacks, which more than tripled year over year. Cloudflare mitigated 34.4 million network-layer DDoS attacks in 2025, compared to 11.4 million in 2024.</p><p>A substantial portion of the network-layer attacks — approximately 13.5 million — targeted global Internet infrastructure protected by <a href="https://www.cloudflare.com/en-gb/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> and Cloudflare’s infrastructure directly, as part of an 18-day DDoS campaign in the first quarter of 2025. Of these attacks, 6.9 million targeted Magic Transit customers while the remaining 6.6 million targeted Cloudflare directly. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6jomtSPOraOer8LPDxJ3Aw/603db470ecbde1362579624193807e43/BLOG-3098_4.png" />
          </figure><p>This assault was a multi-vector DDoS campaign comprising <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/"><u>SYN flood attacks</u></a>, <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/"><u>Mirai-generated DDoS attacks</u></a>, and <a href="https://www.cloudflare.com/learning/ddos/ssdp-ddos-attack/"><u>SSDP amplification attacks</u></a> to name a few. Our systems detected and mitigated these attacks automatically. In fact, we only discovered the campaign while preparing our <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q1/"><u>DDoS threat report for 2025 Q1</u></a> — an example of how effective Cloudflare’s DDoS mitigation is!</p><p>In the final quarter of 2025, the number of DDoS attacks grew by 31% over the previous quarter and 58% over 2024. Network-layer DDoS attacks fueled that growth. In 2025 Q4, network-layer DDoS attacks accounted for 78% of all DDoS attacks. The amount of HTTP DDoS attacks remained the same, but surged in their size to rates that we haven’t seen since the <a href="https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/"><u>HTTP/2 Rapid Reset DDoS campaign</u></a> in 2023. These recent surges were launched by the <a href="https://www.cloudflare.com/learning/ddos/glossary/aisuru-kimwolf-botnet/"><u>Aisuru-Kimwolf botnet</u></a>, which we will cover in the next section. </p>
    <div>
      <h3>“The Night Before Christmas” DDoS campaign</h3>
      <a href="#the-night-before-christmas-ddos-campaign">
        
      </a>
    </div>
    <p>On Friday, December 19, 2025, the <a href="https://www.cloudflare.com/learning/ddos/glossary/aisuru-kimwolf-botnet/"><u>Aisuru-Kimwolf botnet</u></a> began bombarding Cloudflare infrastructure and Cloudflare customers with hyper-volumetric DDoS attacks. What was new in this campaign was its size: The botnet used hyper-volumetric HTTP DDoS attacks exceeding rates of 20 million requests per second (Mrps).

</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6CMbEWh6TwRcld7gccwE81/dbe9877483861026d2fec6c0112ca8bb/BLOG-3098_5.png" />
          </figure><p>The Aisuru-Kimwolf botnet is a massive collection of <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/"><u>malware</u></a>-infected devices, primarily Android TVs. The botnet comprises an estimated 1-4 million infected hosts. It is capable of launching DDoS attacks that can cripple critical infrastructure, crash most legacy cloud-based DDoS protection solutions, and even disrupt the connectivity of entire nations.</p><p>Throughout the campaign, Cloudflare’s autonomous DDoS defense systems detected and mitigated all of the attacks: 384 packet-intensive attacks, 329 bit-intensive attacks, and 189 request-intensive attacks, for a total of 902 hyper-volumetric DDoS attacks, averaging 53 attacks a day.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3GDQWNNnHac5Ovwm4z5Bug/052d194716063d069e4ccd2ff49e4228/BLOG-3098_6.png" />
          </figure><p>The average size of the hyper-volumetric DDoS attacks during the campaign were 3 Bpps, 4 Tbps, and 54 Mrps. The maximum rates recorded during the campaign were 9 Bpps, 24 Tbps, and 205 Mrps.</p><p>To put that in context, the scale of a 205 Mrps DDoS attack is comparable to the combined populations of the UK, Germany, and Spain all simultaneously typing a website address and then hitting 'enter’ at the same second.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7N0ruuQdsq6ncG7sQOMvv2/eb092b6380378031003760697d123f9d/BLOG-3098_7.png" />
          </figure><p>While highly dramatic, The Night Before Christmas campaign accounted for only a small portion of the hyper-volumetric DDoS attacks we saw throughout the year.</p>
    <div>
      <h3>Hyper-volumetric DDoS attacks</h3>
      <a href="#hyper-volumetric-ddos-attacks">
        
      </a>
    </div>
    <p>Throughout 2025, Cloudflare observed a continuous increase in hyper-volumetric DDoS attacks. In 2025 Q4, hyper-volumetric attacks increased by 40% compared to the previous quarter.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ZZAyBKHY8TST9or2kXc7b/a5927b87b686c50aa7137847cd204b74/BLOG-3098_8.png" />
          </figure><p>As the number of attacks increased over the course of 2025, the size of the attacks increased as well, growing by over 700% compared to the large attacks seen in late 2024, with one reaching 31.4 Tbps in a DDoS attack that lasted just 35 seconds. The graph below portrays the rapid growth in DDoS attack sizes as seen and blocked by Cloudflare — each one a world record, i.e. the largest ever disclosed publicly by any company at the time.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5fqqJ2VBvAlhnv0vIpoGZF/bd260c5a7ab673b35865e94b9e86a6d7/BLOG-3098_9.png" />
          </figure><p>Like all of the other attacks, the 31.4 Tbps DDoS attack was detected and mitigated automatically by Cloudflare’s autonomous DDoS defense, which was able to adapt and quickly lock on to botnets such as Aisuru-Kimwolf.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3piM1qb6UGpxBXExV0adHn/8f1cfbb2841dce9d6b462fb71704bca2/BLOG-3098_10.png" />
          </figure><p>Most of the hyper-volumetric DDoS attacks targeted Cloudflare customers in the Telecommunications, Service Providers and Carriers industry. Cloudflare customers in the Gaming industry and customers providing Generative AI services were also heavily targeted. Lastly, Cloudflare’s own infrastructure itself was targeted by multiple attack vectors such as <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/"><u>HTTP floods</u></a>, <a href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/"><u>DNS attacks</u></a> and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/"><u>UDP flood</u></a>.</p>
    <div>
      <h3>Most-attacked industries</h3>
      <a href="#most-attacked-industries">
        
      </a>
    </div>
    <p>When analyzing DDoS attacks of all sizes, the Telecommunications, Service Providers and Carriers industry was also the most targeted. Previously, the Information Technology &amp; Services industry held that unlucky title.</p><p>The Gambling &amp; Casinos and Gaming industries ranked third and fourth, respectively. The quarter’s biggest changes in the top 10 were the Computer Software and Business Services industries, which both climbed several spots. </p><p>The most-attacked industries are defined by their role as critical infrastructure, a central backbone for other businesses, or their immediate, high-stakes financial sensitivity to service interruption and latency.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2zmtrvUq0cXCEKlprLopWg/80e622f255fa6466f5facfa1288d571b/image8.png" />
          </figure>
    <div>
      <h3>Most-attacked locations</h3>
      <a href="#most-attacked-locations">
        
      </a>
    </div>
    <p>The DDoS landscape saw both predictable stability and dramatic shifts among the world's most-attacked locations. Targets like China, Germany, Brazil, and the United States were the top five, demonstrating persistent appeal for attackers. </p><p>Hong Kong made a significant move, jumping twelve spots to land at number two. However, the bigger story was the meteoric rise of the United Kingdom, which surged an astonishing 36 places this quarter, making it the sixth most-attacked location.  </p><p>Vietnam held its place as the seventh most-attacked location, followed by Azerbaijan in eighth, India in ninth, and Singapore as number ten.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1fbfabacHT9WNKaZLhShlP/465f20da2e2f728692d5c22fc788a0a3/image10.png" />
          </figure>
    <div>
      <h3>Top attack sources</h3>
      <a href="#top-attack-sources">
        
      </a>
    </div>
    <p>Bangladesh dethroned Indonesia as the largest source of DDoS attacks in the fourth quarter of 2025. Indonesia dropped to the third spot, after spending a year as the top source of DDoS attacks. Ecuador also jumped two spots, making it the second-largest source.</p><p>Notably, Argentina soared an incredible twenty places, making it the fourth-largest source of DDoS attacks. Hong Kong rose three places, taking fifth place. Ukraine came in sixth place, followed by Vietnam, Taiwan, Singapore, and Peru.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/67THFzBjHYivQwttU61U9a/f8f5fe3afcca9495cb7d5fb7f61220fa/image5.png" />
          </figure>
    <div>
      <h2>Top source networks</h2>
      <a href="#top-source-networks">
        
      </a>
    </div>
    <p>The top 10 list of attack source networks reads like a list of Internet giants, revealing a fascinating story about the anatomy of modern DDoS attacks. The common thread is clear: Threat actors are leveraging the world's most accessible and powerful network infrastructure — primarily large, public-facing services. </p><p>We see most DDoS attacks coming from IP addresses associated with Cloud Computing Platforms and Cloud Infrastructure Providers, including<a href="https://radar.cloudflare.com/as14061"> <u>DigitalOcean (AS 14061)</u></a>,<a href="https://radar.cloudflare.com/as8075"> <u>Microsoft (AS 8075)</u></a>,<a href="https://radar.cloudflare.com/as132203"> <u>Tencent (AS 132203)</u></a>, <a href="https://radar.cloudflare.com/as31898"><u>Oracle (AS 31898)</u></a>, and<a href="https://radar.cloudflare.com/as24940"> <u>Hetzner (AS 24940)</u></a>. This demonstrates the strong link between easily-provisioned virtual machines and high-volume attacks. These cloud sources, heavily concentrated in the United States, are closely followed by a significant presence of attacks coming from IP addresses associated with traditional Telecommunications Providers (Telcos). These Telcos, primarily from the Asia-Pacific region (including Vietnam, China, Malaysia, and Taiwan), round out the rest of the top 10.</p><p>This geographic and organizational diversity confirms a two-pronged attack reality: While the sheer scale of the highest-ranking sources often originates from global cloud hubs, the problem is truly worldwide, routed through the Internet's most critical pathways from across the globe. In many DDoS attacks, we see thousands of various source ASNs, highlighting the truly global distribution of botnet nodes.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ga5hHIgrc1pTwosbpx9di/458a87c028e8d51e10c7c56b416d3b64/BLOG-3098_14.png" />
          </figure><p>To help hosting providers, cloud computing platforms and Internet service providers identify and take down the abusive IP addresses/accounts that launch these attacks, we leverage Cloudflare’s unique vantage point on DDoS attacks to provide a <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/"><u>free DDoS Botnet Threat Feed for Service Providers</u></a>. </p><p>Over 800 networks worldwide have signed up for this feed, and we’ve already seen great collaboration across the community to take down botnet nodes.</p>
    <div>
      <h3>Helping defend the Internet</h3>
      <a href="#helping-defend-the-internet">
        
      </a>
    </div>
    <p>DDoS attacks are rapidly growing in sophistication and size, surpassing what was previously imaginable. This evolving threat landscape presents a significant challenge for many organizations to keep pace. Organizations currently relying on on-premise mitigation appliances or on-demand scrubbing centers may benefit from re-evaluating their defense strategy.</p><p>Cloudflare is dedicated to offering<a href="https://www.cloudflare.com/ddos/"> <u>free, unmetered DDoS protection</u></a> to all its customers, regardless of the size, duration, or volume of attacks, leveraging its<a href="https://www.cloudflare.com/network/"> <u>vast global network</u></a> and<a href="https://developers.cloudflare.com/ddos-protection/about/"> <u>autonomous DDoS mitigation systems</u></a>.</p>
    <div>
      <h3>About Cloudforce One</h3>
      <a href="#about-cloudforce-one">
        
      </a>
    </div>
    <p>Driven by a mission to help defend the Internet, <a href="https://www.cloudflare.com/cloudforce-one/"><u>Cloudforce One</u></a> leverages telemetry from Cloudflare’s global network — which protects approximately 20% of the web — to drive threat research and operational response, protecting critical systems for millions of organizations worldwide.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Cloudforce One]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Advanced DDoS]]></category>
            <category><![CDATA[AI]]></category>
            <guid isPermaLink="false">4RtH1xA4p0tuaD6gFL46Pf</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
            <dc:creator>Cloudforce One</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare's 2025 Q3 DDoS threat report -- including Aisuru, the apex of botnets]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-2025-q3/</link>
            <pubDate>Wed, 03 Dec 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ Welcome to the 23rd edition of Cloudflare’s Quarterly DDoS Threat Report. This report offers a comprehensive analysis of the evolving threat landscape of Distributed Denial of Service (DDoS) attacks based on data from the Cloudflare network. In this edition, we focus on the third quarter of 2025. ]]></description>
            <content:encoded><![CDATA[ <p>Welcome to the 23rd edition of Cloudflare’s Quarterly DDoS Threat Report. This report offers a comprehensive analysis of the evolving threat landscape of <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/"><u>Distributed Denial of Service (DDoS) attacks</u></a> based on data from the <a href="https://www.cloudflare.com/network/"><u>Cloudflare network</u></a>. In this edition, we focus on the third quarter of 2025.</p><p>The third quarter of 2025 was overshadowed by the Aisuru botnet with a massive army of an estimated 1–4 million infected hosts globally. Aisuru unleashed hyper-volumetric DDoS attacks routinely exceeding 1 terabit per second (Tbps) and 1 billion packets per second (Bpps). The number of these attacks surged 54% quarter-over-quarter (QoQ), averaging 14 hyper-volumetric attacks daily. The scale was unprecedented, with attacks peaking at 29.7 Tbps and 14.1 Bpps.</p>
    <div>
      <h2>Key insights</h2>
      <a href="#key-insights">
        
      </a>
    </div>
    <p>Other than Aisuru, additional key insights in this report include:</p><ol><li><p>DDoS attack traffic against AI companies surged by as much as 347% MoM in September 2025, as public concern and regulatory review of AI increases. </p></li><li><p>Escalating EU-China trade tensions over rare earth minerals and EV tariffs coincide with a significant increase in DDoS attacks against the Mining, Minerals &amp; Metals industry as well as the Automotive industry in 2025 Q3.</p></li><li><p>Overall, in the third quarter of 2025, Cloudflare’s autonomous defenses blocked a total of 8.3 million DDoS attacks. That’s an average of almost 3,780 DDoS attacks per hour. The number of DDoS attacks grew by 15% QoQ and 40% YoY. </p></li></ol>
    <div>
      <h2>DDoS attacks in numbers</h2>
      <a href="#ddos-attacks-in-numbers">
        
      </a>
    </div>
    <p>So far in 2025, and with an entire quarter to go until the end of the year, Cloudflare has already mitigated 36.2 million DDoS attacks. That corresponds to 170% of the DDoS attacks Cloudflare mitigated throughout 2024. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1QLCQUXGrmRZcmIwHMCbTv/a09ba99c8f31dec842b2f8a5199f6ed1/image7.png" />
          </figure><p>In the third quarter of 2025, Cloudflare automatically detected and mitigated 8.3 million DDoS attacks, representing a 15% increase QoQ and 40% increase YoY.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ZmBSvQBKaYpeWCyK1FGOG/a4b853fdcd925c7719719cfdc8ab93b1/image10.png" />
          </figure><p>Network-layer DDoS attacks, accounting for 71% of the DDoS attacks in 2025 Q3, or 5.9 million DDoS attacks, increased by 87% QoQ and 95% YoY. However, HTTP DDoS attacks, accounting only for 29% of the DDoS attacks in 2025 Q3, or 2.4 million DDoS attacks, decreased by 41% QoQ and 17% YoY.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1O5ch4cMbuknOjrqbafPNg/2316adb67b36151b7761c2b4badc996b/image17.png" />
          </figure><p>In the third quarter of 2025, Cloudflare mitigated an average of 3,780 DDoS attacks every hour.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7oAh0gu3V3vynIWzz3GEQ8/f880711ec0fb6c70ba7db3d2e1916499/image9.png" />
          </figure>
    <div>
      <h2>Aisuru breaking records with ultrasophisticated, hyper-volumetric DDoS attacks</h2>
      <a href="#aisuru-breaking-records-with-ultrasophisticated-hyper-volumetric-ddos-attacks">
        
      </a>
    </div>
    <p><b>Disruptive force</b></p><p>Aisuru targeted telecommunication providers, <a href="https://www.cloudflare.com/gaming/"><u>gaming companies</u></a>, hosting providers, and <a href="https://www.cloudflare.com/banking-and-financial-services/"><u>financial services</u></a>, to name a few. It has also caused “widespread collateral Internet disruption [in the US]”, as <a href="https://krebsonsecurity.com/2025/10/ddos-botnet-aisuru-blankets-us-isps-in-record-ddos/"><u>reported by Krebs on Security</u></a>, simply due to the amount of botnet traffic routing through the Internet Service Providers (ISPs). </p><p>Let that sink in. If Aisuru’s attack traffic can disrupt parts of the U.S. Internet infrastructure when said ISPs were not even the target of the attack, imagine what it can do when it’s directly aimed at unprotected or insufficiently protected ISPs, <a href="https://www.cloudflare.com/the-net/government/critical-infrastructure/"><u>critical infrastructure</u></a>, <a href="https://www.cloudflare.com/healthcare/"><u>healthcare services</u></a>, emergency services, and military systems. </p><p><b>Botnet-for-hire and DDoS stats</b></p><p>“Chunks” of Aisuru are offered by distributors as botnets-for-hire, so anyone can potentially inflict chaos on entire nations by crippling backbone networks and saturating Internet links, disrupting millions of users and impairing access to essential services — all at a cost of a few hundred to a few thousand U.S. dollars. </p><p>Since the start of 2025, Cloudflare has already mitigated 2,867 Aisuru attacks. In the third quarter alone, Cloudflare mitigated 1,304 hyper-volumetric attacks launched by Aisuru. That represents an increase of 54% QoQ. These include the world record-breaking 29.7 Tbps DDoS attack and the 14.1 Bpps DDoS attack. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2UZV89JNOcl0yLbG4HDgvz/0061bb2be7a8ae9a7b80b88ce4988e93/image15.png" />
          </figure><p>The 29.7 Tbps was a UDP carpet-bombing attack bombarding an average of 15K destination ports per second. The distributed attack randomized various packet attributes in an attempt to evade defenses, but Cloudflare’s mitigation systems detected and mitigated all the attacks, including this one, fully autonomously. Read more on <a href="https://blog.cloudflare.com/how-cloudflare-auto-mitigated-world-record-3-8-tbps-ddos-attack/#how-cloudflare-defends-against-large-attacks"><u>How Cloudflare mitigates hyper-volumetric DDoS attacks</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1DtwdZEIMGpvEsSlj1qfhm/9f2448d11b9ae69fd2372856b4755ca7/image12.png" />
          </figure>
    <div>
      <h2>Attack characteristics</h2>
      <a href="#attack-characteristics">
        
      </a>
    </div>
    <p>While the majority of DDoS attacks are relatively small, in Q3, the amount of DDoS attacks that exceeded 100 million packets per second (Mpps) increased by 189% QoQ. Similarly, attacks exceeding 1 Tbps increased by 227% QoQ. On the HTTP layer, 4 out of every 100 attacks exceeded 1 million requests per second. </p><p>Furthermore, most attacks, 71% of HTTP DDoS and 89% of network-layer, end in under 10 minutes. That's too fast for any human or on-demand service to react. A short attack may only last a few seconds, but the disruption it causes can be severe, and recovery takes far longer. Engineering and operational teams are then stuck with a complex, multi-step process to get critical systems back online, check data for consistency across distributed systems, and restore secure, reliable service to customers. </p><p>The impact of short-lived DDoS attacks, whether hyper-volumetric or not, can extend well beyond the duration of the attack.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6N0gv9eyTPPFU4z8PtTVKL/14a52537d3f0fbecf70b1b3b1abd6af5/image5.png" />
          </figure>
    <div>
      <h2>Top attack sources</h2>
      <a href="#top-attack-sources">
        
      </a>
    </div>
    <p>Seven out of the ten top sources are locations within Asia, with Indonesia in the lead. Indonesia is the largest source of DDoS attacks, and it has been ranked number one in the world for an entire year (since 2024 Q3). Even prior to this, Indonesia has always been placed in the top lists of attack sources. In 2024 Q2, Indonesia was the second-largest source, after climbing up from lower ranks in previous quarters and years.</p><p>To illustrate the rise of Indonesia as a DDoS hub, in just five years (since 2021 Q3), the percentage of HTTP DDoS attack requests originating from Indonesia has increased by a staggering 31,900%. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/266w30HDsQmP5YZ2FGl7ZT/a65ec3bfea8d887461b6248ff9bfb59e/image14.png" />
          </figure>
    <div>
      <h2>Top attacked industries</h2>
      <a href="#top-attacked-industries">
        
      </a>
    </div>
    <p><b>DDoS attackers go after rare Earth minerals</b></p><p>DDoS attacks against the Mining, Minerals &amp; Metals industry significantly increased in the third quarter of 2025 as the <a href="https://www.consilium.europa.eu/en/press/press-releases/2025/07/24/25th-eu-china-summit-eu-press-release/"><u>25th European Union–China trade summit</u></a> saw rising tensions over Electric Vehicle (EV) tariffs, rare-earth exports, and cybersecurity issues, according to multiple news outlets. The BBC <a href="https://www.bbc.co.uk/news/articles/clyxk4ywppzo"><u>reported</u></a> that “China also raised export controls on rare earths and critical minerals.” Overall, the Mining, Minerals &amp; Metals industry surged 24 spots on the global ranking, making it the 49th most attacked industry in the world.</p><p>The Automotive industry saw the largest surge in DDoS attacks, leaping the industry by 62 spots in just one quarter, placing it as the sixth most attacked industry in the world. Cybersecurity companies also saw a significant increase in DDoS attacks. The Cybersecurity industry hopped by 17 spots, making it the 13th most attacked industry in the world.</p><p><b>DDoS attacks against AI surge by 347%</b></p><p>In September 2025, a<a href="https://www.theguardian.com/technology/2025/sep/22/more-britons-view-ai-as-economic-risk-than-opportunity-tony-blair-thinktank-finds?utm_source=chatgpt.com"> <u>Tony Blair Institute poll</u></a> showed Britons view AI more as an economic risk than an opportunity, sparking major headlines about automation and trust. The<a href="https://www.localgovernmentlawyer.co.uk/governance/396-governance-news/62164-law-commission-to-review-public-sector-use-of-ai-in-automated-decisions?utm_source=chatgpt.com"> <u>UK Law Commission</u></a> launched a review into AI use in government, making it a headline month for AI ethics, regulation, and generative-AI adoption. In September 2025, Cloudflare also saw MoM spikes as high as 347% in HTTP DDoS attack traffic against generative AI companies (based on a sample of leading generative AI services).</p><p><b>The top 10</b></p><p>In the third quarter of 2025, Information Technology &amp; Services topped the list as the most attacked industry, followed by Telecommunications, and Gambling &amp; Casinos. Notably, Automotive surged dramatically by 62 spots QoQ. Media, Production &amp; Publishing also saw a sharp rise, preceded by the Banking &amp; Financial Services industry, the <a href="https://www.cloudflare.com/retail/"><u>Retail industry</u></a>, and the Consumer Electronics industry.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5XfLCO7VG8CE1oCqMvz56y/3848413b8c0d13c74d625a1ca116d272/image11.png" />
          </figure>
    <div>
      <h2>Top attacked locations</h2>
      <a href="#top-attacked-locations">
        
      </a>
    </div>
    <p>There is a direct correlation between geopolitical events and DDoS attack activity.</p><p><b>Stop the Loot!</b></p><p>"Lootuvaifi" (Stop the Loot!) in Maldivian<b>, </b>became the rallying chant in the <a href="https://en.wikipedia.org/wiki/2025_Maldivian_protests"><u>2025 Maldivian protests</u></a> as protesters took to the streets objecting the “perceived government corruption and democratic backsliding,” peaking with the “end of free speech” media bill, which the <a href="https://www.ohchr.org/en/press-releases/2025/09/un-human-rights-chief-calls-repeal-new-media-law-maldives"><u>UN Human Rights Chief</u></a> said will “seriously undermine media freedom and the right to freedom of expression for the people of the Maldives if not withdrawn.” The 2025 Maldivian protests were accompanied by a barrage of DDoS attacks. Correspondingly, the Maldives was the country that saw the highest increase in DDoS attacks. In the third quarter of 2025, the Maldives leaped by 125 spots, making it the 38th most attacked country in the world.</p><p><b>‘Block Everything’</b></p><p>The <a href="https://www.reuters.com/world/europe/block-everything-protests-sweep-across-france-scores-arrested-2025-09-10/"><u>nationwide protest movement</u></a>, “Block Everything,”<b> </b>or “Bloquons Tout” in French, was launched by French trade unions in September 2025 to oppose President Macron’s government over new austerity measures, pension system changes, and rising living costs. While trade unions called for coordinated strikes and transport blockades to paralyze the country, cyber threat actors targeted French websites and Internet services with waves of DDoS attacks. France jumped 65 spots QoQ, making it the 18th most attacked country in the world. </p><p><b>‘Drawing the red line for Gaza in Brussels’</b></p><p>Increases in DDoS attacks were observed alongside protests in more countries. For example, <a href="https://www.euronews.com/2025/09/07/tens-of-thousands-of-protesters-draw-the-red-line-for-gaza-in-brussels"><u>Belgium</u></a> jumped 63 places making it the 74th most attacked country in the world, as “tens of thousands of protesters drew the Red Line for Gaza in Brussels.”</p><p><b>The top 10</b></p><p>In the third quarter of 2025, China remained the most attacked, followed by Turkey in second, and Germany in third place. The most notable changes within this quarter was an increase in DDoS attacks against the United States, which leaped by 11 spots as the fifth most attacked country. The Philippines saw the largest increase within the top 10 – it jumped by 20 spots.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3gMNTNdj0YIhjmKlQDgHqD/a7d47f2e54236aa362ed89540b9c5a48/image3.png" />
          </figure>
    <div>
      <h2>Attack vectors </h2>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p><b>Network-layer DDoS attacks</b></p><p>The number of <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/"><u>UDP DDoS attacks</u></a>, partially fueled by Aisuru attacks, increased by 231% QoQ making it the top attack vector at the network-layer. <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/"><u>DNS floods</u></a> came in second place, <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/"><u>SYN floods</u></a> in third, and <a href="https://www.cloudflare.com/learning/ddos/ping-icmp-flood-ddos-attack/"><u>ICMP floods</u></a> in fourth — accounting for just over half of all network-layer DDoS attacks.</p><p>Although almost 10 years have passed since its first major debut, Mirai DDoS attacks are still quite common. Almost 2 out of every 100 network-layer DDoS attacks are launched by permutations of the <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/"><u>Mirai botnet</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Efit0jw1fku9MRQigXN9n/da577b0ff61b4f7fda9dd924a0503884/image19.png" />
          </figure><p><b>HTTP DDoS attacks</b></p><p>Nearly 70% of HTTP DDoS attacks originated from <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/"><u>botnets</u></a> already known to Cloudflare. This reflects one of the benefits that our customers gain from using Cloudflare. Once a botnet attacks one out of the millions of Cloudflare customers, everyone is automatically protected from that botnet.</p><p>Another ~20% of HTTP DDoS attacks originated from fake or headless browsers, or included suspicious HTTP attributes. The remaining ~10% were a combination of <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/"><u>generic floods</u></a>, unusual requests, cache busting attacks, and attacks that targeted login endpoints.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/8BohIaUui3UFOf6njtjM9/30534ee91a2317f97784bed3e9ddea35/image8.png" />
          </figure>
    <div>
      <h2>Why legacy DDoS solutions no longer suffice</h2>
      <a href="#why-legacy-ddos-solutions-no-longer-suffice">
        
      </a>
    </div>
    <p>We've entered an era where DDoS attacks have rapidly grown in sophistication and size — beyond anything we could’ve imagined a few years ago. Many organizations have faced challenges in keeping pace with this evolving threat landscape. </p><p>Organizations relying on on-premise mitigation appliances or on-demand scrubbing center solutions may benefit from reviewing their defense strategy given the current threat landscape.</p><p>Cloudflare, with its <a href="https://www.cloudflare.com/network/"><u>vast global network</u></a> and <a href="https://developers.cloudflare.com/ddos-protection/about/"><u>autonomous DDoS mitigation systems</u></a>, is committed to providing<a href="https://www.cloudflare.com/ddos/"><u> free unmetered DDoS protection</u></a> to all customers, no matter the size, duration, or quantity of the DDoS attacks they face.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[DDoS]]></category>
            <guid isPermaLink="false">1lRRUtB2DMN3pPhk7yfeSM</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[Hyper-volumetric DDoS attacks skyrocket: Cloudflare’s 2025 Q2 DDoS threat report]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/</link>
            <pubDate>Tue, 15 Jul 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ June was the busiest month for DDoS attacks in 2025 Q2, accounting for nearly 38% of all observed activity. ]]></description>
            <content:encoded><![CDATA[ <p>Welcome to the 22nd edition of the Cloudflare DDoS Threat Report. Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of <a href="https://www.cloudflare.com/en-gb/learning/ddos/glossary/denial-of-service/"><u>Distributed Denial of Service (DDoS) attacks</u></a> based on data from the <a href="https://www.cloudflare.com/network/"><u>Cloudflare network</u></a>. In this edition, we focus on the second quarter of 2025. To view previous reports, visit <a href="http://www.ddosreport.com"><u>www.ddosreport.com</u></a>.</p><p>June was the busiest month for DDoS attacks in 2025 Q2, accounting for nearly 38% of all observed activity. One notable target was an independent Eastern European news outlet protected by Cloudflare, which reported being attacked following its coverage of a local Pride parade during LGBTQ Pride Month.</p>
    <div>
      <h2>Key DDoS insights</h2>
      <a href="#key-ddos-insights">
        
      </a>
    </div>
    <ul><li><p>DDoS attacks continue to break records. During 2025 Q2, Cloudflare automatically blocked the largest ever reported DDoS attacks, peaking at <a href="https://blog.cloudflare.com/defending-the-internet-how-cloudflare-blocked-a-monumental-7-3-tbps-ddos/"><u>7.3 terabits per second (Tbps)</u></a> and 4.8 billion packets per second (Bpps).</p></li><li><p>Overall, in 2025 Q2, hyper-volumetric DDoS attacks skyrocketed. Cloudflare blocked over 6,500 hyper-volumetric DDoS attacks, an average of 71 per day. </p></li><li><p>Although the overall number of DDoS attacks dropped compared to the previous quarter — which saw an unprecedented surge driven by a large-scale campaign targeting Cloudflare’s network and critical Internet infrastructure protected by Cloudflare — the number of attacks in 2025 Q2 were still 44% higher than in 2024 Q2. <a href="https://www.cloudflare.com/the-net/government/critical-infrastructure/">Critical infrastructure</a> continues to face sustained pressure, with the Telecommunications, Service Providers, and Carriers sector jumping again to the top as the most targeted industry.</p></li></ul><p>All the attacks in this report were automatically detected and blocked by our <a href="https://www.cloudflare.com/ddos/"><u>autonomous defenses</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4D7sY9wWyZAarqgEOuudjL/4a1a424dd002a85cd65ebd2678deeb9b/image11.png" />
          </figure><p>To learn more about DDoS attacks and other types of cyber threats, refer to our <a href="https://www.cloudflare.com/learning/"><u>Learning Center</u></a>. Visit <a href="https://radar.cloudflare.com/reports?q=DDoS"><u>Cloudflare Radar</u></a> to view an interactive version of this report where you can drill down further. Radar also offers a <a href="https://developers.cloudflare.com/radar/"><u>free API</u></a> for those interested in investigating Internet trends. You can also learn more about the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/"><u>methodologies</u></a> used in preparing these reports.</p>
    <div>
      <h2>DDoS attacks in numbers</h2>
      <a href="#ddos-attacks-in-numbers">
        
      </a>
    </div>
    <p>In 2025 Q2, Cloudflare mitigated 7.3 million DDoS attacks — down sharply from 20.5 million in Q1, when an 18-day campaign against Cloudflare’s own and other critical infrastructure protected by Cloudflare, drove 13.5 million of those attacks. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/66gdansdUZd0UgyFW8bQQu/8e1cde9766c737d0f33354cab8425a9f/image13.png" />
          </figure><p><sup>DDoS attacks by quarter</sup></p><p>We’ve just crossed halfway through 2025, and so far Cloudflare has already blocked 27.8 million DDoS attacks, equivalent to 130% of all the DDoS attacks we blocked in the full calendar year 2024.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7zwR5A7JjeS1yH37j0VRlM/2bbc86d197f6bb53de5f86c2fa975b0a/image7.png" />
          </figure><p><sup>DDoS attacks by year</sup></p><p>Breaking it down further, <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/"><u>Layer 3/Layer 4 (L3/4) DDoS attacks</u></a> plunged 81% quarter-over-quarter to 3.2 million, while HTTP DDoS attacks rose 9% to 4.1 million. Year-over-year changes remain elevated. Overall attacks were 44% higher than 2024 Q2, with HTTP DDoS attacks seeing the largest increase of 129% YoY.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6dxz1L4L4Y8ihvTxdKZRZf/7294397a7957d4f186ac80b43eabb5a0/image8.png" />
          </figure><p><sup>DDoS attacks by month</sup></p>
    <div>
      <h2>Hyper-volumetric DDoS attacks</h2>
      <a href="#hyper-volumetric-ddos-attacks">
        
      </a>
    </div>
    <p>In 2025 Q2, Cloudflare blocked over 6,500 hyper-volumetric DDoS attacks, averaging 71 hyper-volumetric attacks per day. Hyper-volumetric attacks include L3/4 DDoS attacks exceeding 1 Bpps or 1 Tbps, and HTTP DDoS attacks exceeding 1 million requests per second (Mrps).</p><p>The number of hyper-volumetric DDoS attacks exceeding 100 million packets per second (pps) surged by 592% compared to the previous quarter, and the number exceeding 1 billion pps and 1 terabits per second (Tbps) doubled compared to the previous quarter. The number of HTTP DDoS attacks exceeding 1 million rps (rps) remained the same at around 20 million in total, an average of almost 220,000 attacks every day.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2yDy1OKIjVSssQrxTuHoLx/452dcdd5d2aacc936cb4a6b4ec7f9317/image4.png" />
          </figure><p><sup>Hyper-volumetric DDoS attacks in 2025 Q2</sup></p>
    <div>
      <h2>Threat actors</h2>
      <a href="#threat-actors">
        
      </a>
    </div>
    <p>When asked who was behind the DDoS attacks they experienced in 2025 Q2, the majority (71%) of respondents said they didn’t know who attacked them. Of the remaining 29% of respondents that claimed to have identified the threat actor, 63% pointed to competitors, a pattern especially common in the Gaming, Gambling and Crypto industries. Another 21% attributed the attack to state-level or state-sponsored actors, while 5% each said they’d inadvertently attacked themselves (self-DDoS), were targeted by extortionists, or suffered an assault from disgruntled customers/users.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1rGHPX3t7S9KpTde5udYKi/ba0e11669b7d38520c221f190f500e14/image5.png" />
          </figure><p><sup>Top threat actors reported in 2025 Q2</sup></p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>The percentage of attacked Cloudflare customers that reported being targeted by a <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/"><u>Ransom DDoS attack</u></a> or that were threatened increased by 68% compared to the previous quarter, and by 6% compared to the same quarter in 2024. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/78PZiUidGYsY2qS9KY7eFl/0e132812ede418be620a48c882ba37b2/image6.png" />
          </figure><p><sup>Ransom DDoS attacks by quarter 2025 Q2</sup></p><p>Diving deeper, Ransom DDoS attacks soared in June 2025. Around a third of respondents reported being threatened or subjected to Ransom DDoS attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Urv9538LpsEoZFNNfha7o/871c9d30431df06b2c0962729191b482/image9.png" />
          </figure><p><sup>Ransom DDoS attacks by month 2025 Q2</sup></p>
    <div>
      <h2>Top attacked locations</h2>
      <a href="#top-attacked-locations">
        
      </a>
    </div>
    <p>The ranking of the top 10 most attacked locations in 2025 Q2 shifted significantly. China climbed two spots to reclaim first place, Brazil jumped four spots to second place, Germany slipped two spaces to third place, India edged up one to fourth, and South Korea rose four to fifth. Turkey fell four places to sixth, Hong Kong dropped three to seventh, and Vietnam vaulted an astonishing fifteen spots into eighth. Meanwhile, Russia rocketed forty places to ninth, and Azerbaijan surged thirty-one to round out the top ten.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7HNdD7VgymVfuJBZtV5bII/ed6eed8f676ba0a0d7cec9a595521903/image19.png" />
          </figure><p><sup>The locations most targeted by DDoS attacks for 2025 Q2</sup></p><p>It’s important to note that these attacked locations are determined by the billing country of the Cloudflare customer whose services were targeted — not that those nations themselves are under attack. In other words, a high rank simply means more of our registered customers in that billing jurisdiction were targeted by DDoS traffic, rather than implying direct geopolitical targeting.</p>
    <div>
      <h2>Top attacked industries</h2>
      <a href="#top-attacked-industries">
        
      </a>
    </div>
    <p>The ranking of the top 10 most attacked industries in 2025 Q2 also saw notable movement. Telecommunications, Service Providers and Carriers climbed one spot to claim first place, while the Internet sector jumped two spots to second place. Information Technology &amp; Services held its placement as third most attacked, and Gaming rose one spot to fourth place. Gambling &amp; Casinos slipped four spots to fifth place, and the Banking &amp; Financial Services industry remained in sixth place. Retail inched up one spot to seventh place, and Agriculture made a dramatic 38-place leap into eighth. Computer Software climbed two spots to ninth place, and Government hopped two places to round out the top ten most attacked industries.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4YTWU2MwLdGg5SumDgAogC/ec6e812c894cbe14490f74b90fa4da94/image20.png" />
          </figure><p><sup>The top attacked industries of DDoS attacks for 2025 Q2</sup></p>
    <div>
      <h2>Top sources of DDoS attacks</h2>
      <a href="#top-sources-of-ddos-attacks">
        
      </a>
    </div>
    <p>The ranking of the top 10 largest sources of DDoS attacks in 2025 Q2 also saw several shifts compared to the previous quarter. Indonesia climbed one spot to claim the first place, Singapore jumped two places to second place, Hong Kong dropped two places to third, Argentina slipped one space as fourth and Ukraine held on as the fifth-largest source of DDoS attacks. Russia surged six spots as the sixth-largest source, followed by Ecuador who jumped seven places. Vietnam inched up one place as the eighth-largest source. The Netherlands moved up four places as the ninth-largest source, and Thailand fell three places as the tenth-largest source of DDoS attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6X8C3xPqQ08FYLCe7BE0Sm/997ae266e8ddfa19c8d320a2448cb793/image10.png" />
          </figure><p><sup>The top sources of DDoS attacks for 2025 Q2</sup></p><p>It’s important to note that these “source” rankings reflect where botnet nodes, proxy or VPN endpoints reside — not the actual location of threat actors. For L3/4 DDoS attacks, where <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/"><u>IP spoofing</u></a> is rampant, we geolocate each packet to the Cloudflare data center that first ingested and blocked it, drawing on our presence in over 330 cities for truly granular accuracy.</p>
    <div>
      <h2>Top source networks of DDoS attacks</h2>
      <a href="#top-source-networks-of-ddos-attacks">
        
      </a>
    </div>
    <p>An <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>ASN (Autonomous System Number)</u></a> is a unique identifier assigned to a network or group of IP networks that operate under a single routing policy on the Internet. It’s used to exchange routing information between systems using protocols like <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/"><u>BGP (Border Gateway Protocol)</u></a>.</p><p>For the first time in about a year, the German-based <a href="https://radar.cloudflare.com/as24940"><u>Hetzner (AS24940)</u></a> network dropped from the first place as the largest source of HTTP DDoS attack to the third place. In its place, German-based <a href="https://radar.cloudflare.com/as200373"><u>Drei-K-Tech-GmbH (AS200373)</u></a>, also known as 3xK Tech, jumped 6 places as the number one largest source of HTTP DDoS attacks. The US-based <a href="https://radar.cloudflare.com/as14061"><u>DigitalOcean (AS14061)</u></a> hopped one spot to the second place. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2hfTFpswSIsQwpZVoKlvUs/0897717483b4dcefa02fbce1fa8b6b48/image22.png" />
          </figure><p><sup>The top 10 ASN sources of HTTP DDoS attacks</sup></p><p>As can be seen in the chart above, 9 out of 10 ASNs listed offer <a href="https://www.cloudflare.com/learning/cloud/what-is-a-virtual-machine/"><u>virtual machines (VMs)</u></a>, hosting, or cloud services which indicate the common use of VM-based botnets. These botnets are <a href="https://blog.cloudflare.com/ddos-threat-report-2023-q2/#the-rise-of-the-virtual-machine-botnets"><u>estimated to be 5,000x stronger</u></a> than IoT-based botnets. Only <a href="https://radar.cloudflare.com/as4134"><u>ChinaNet Backbone (AS4134)</u></a> is primarily an ISPs/telecom carriers without significant public VM/cloud offerings.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/17jMjLVEx0puvK14GOozDo/7a12fbb2816ace763098d0ef86203740/image2.png" />
          </figure><p><sup>IoT-based botnets versus VM-based botnets</sup></p><p>To help hosting providers, cloud computing providers and any Internet service providers identify and take down the abusive accounts that launch these attacks, we leverage Cloudflare’s unique vantage point to provide a <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/"><u>free DDoS Botnet Threat Feed for Service Providers</u></a>. Over 600 organizations worldwide have already signed up for this feed, and we’ve already seen great collaboration across the community to take down botnet nodes. This is possible thanks to the threat feed which provides these service providers a list of offending IP addresses from within their ASN that we see launching HTTP DDoS attacks. It’s completely free and all it takes is opening a free Cloudflare account, authenticating the ASN via <a href="https://docs.peeringdb.com/howto/authenticate/"><u>PeeringDB</u></a>, and then <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/#get-full-report"><u>fetching the threat intelligence via API</u></a>.</p><p>With a simple API call, service providers can get a list of offending IPs from within their network. An example response is provided below.</p>
            <pre><code>{
  "result": [
    {
      "cidr": "127.0.0.1/32",
      "date": "2024-05-05T00:00:00Z",
      "offense_count": 10000
    },
    // ... other entries ...
  ],
  "success": true,
  "errors": [],
  "messages": []
}</code></pre>
            <p><sup>Example response from the free ISP DDoS Botnet Threat Feed API</sup></p>
    <div>
      <h2>Attack vectors</h2>
      <a href="#attack-vectors">
        
      </a>
    </div>
    
    <div>
      <h3>Defending against DDoS Botnets</h3>
      <a href="#defending-against-ddos-botnets">
        
      </a>
    </div>
    <p>In Q2 2025, the majority (71%) of HTTP DDoS attacks were launched by known <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/"><u>botnets</u></a>. Rapid detection and blocking of these attacks was possible as a result of operating a massive network and seeing many different types of attacks and botnets. By leveraging real-time threat intelligence, our systems are able to incriminate DDoS botnets very fast, contributing to a more effective mitigation. Even if a DDoS botnet has been incriminated while targeting only one website or IP address, our entire network and customer base is immediately protected against it. This real-time threat intelligence system adapts with botnets as they morph and change nodes.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2PtgDqHMGY52nVPAoBy6o2/f51af7ded6817ff568ad22701a17a47e/image1.png" />
          </figure><p><sup>The top HTTP DDoS attack vectors for 2025 Q2</sup></p>
    <div>
      <h2>L3/4 attack vectors</h2>
      <a href="#l3-4-attack-vectors">
        
      </a>
    </div>
    <p>In Q2 2025, <a href="#dns-flood-attack">DNS flood</a> attacks were the top L3/4 attack vector accounting for almost a third of all L3/4 DDoS attacks. <a href="#syn-flood-attack">SYN floods</a> was the second most common attack vector, dipping from 31% in Q1 to 27% in Q2. </p><p>In third place, <a href="#udp-ddos-attack">UDP floods</a> also grew meaningfully, rising from 9% in Q1 to 13% in Q2. RST floods, another form of TCP-based DDoS attacks, accounting for 5% of all L3/4 attacks, was the fourth most common vector. Rounding out the top five, <a href="https://www.cloudflare.com/learning/ddos/ssdp-ddos-attack/"><u>SSDP floods</u></a> edged into fifth place at 3% despite a decline from 4.3% last quarter, but enough to push the previously prevalent <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/"><u>Mirai attacks</u></a> (which fell from 18% in Q1 to just 2% in Q2) out of the top five altogether.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3QzJzqm583fTd4r5fGiz3q/af7aad3201ccee3004c18d9a8c326b76/image15.png" />
          </figure><p><sup>The top L3/4 DDoS attack vectors for 2025 Q2</sup></p>
    <div>
      <h3>Breakdown of the top 3 L3/4 DDoS attack vectors</h3>
      <a href="#breakdown-of-the-top-3-l3-4-ddos-attack-vectors">
        
      </a>
    </div>
    <p>Below are details about the top 3 most common L3/4 DDoS attacks. We provide recommendations on how organizations can avoid becoming a reflection and amplification element, and also recommendations on how to defend against these attacks whilst avoiding impact to legitimate traffic. Cloudflare's customers are protected against these attacks.</p>
    <div>
      <h4>DNS Flood Attack</h4>
      <a href="#dns-flood-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type:</b> Flood</p></li><li><p><b>How it works:</b> A DNS flood aims to overwhelm a DNS server with a high volume of DNS queries—either valid, random, or malformed—to exhaust CPU, memory, or bandwidth. Unlike amplification attacks, this is a direct flood aimed at degrading performance or causing outages, often over UDP port 53, but sometimes over TCP as well (especially for DNS-over-TCP or <a href="https://www.cloudflare.com/learning/dns/dnssec/how-dnssec-works/"><u>DNSSEC</u></a>-enabled zones). Learn more about <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/#dns-flood-attack">DNS attacks</a>.</p></li><li><p><b>How to defend against the attack:</b> Use <a href="https://www.cloudflare.com/application-services/products/dns/"><u>Cloudflare DNS</u></a> as primary or secondary, <a href="https://www.cloudflare.com/dns/dns-firewall/"><u>Cloudflare DNS Firewall</u></a> and/or <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> to absorb and mitigate query floods before they reach your origin. Cloudflare’s global network handles tens of millions of DNS queries per second with built-in DDoS filtering and query caching, blocking malformed or excessive traffic while answering legitimate requests.</p></li><li><p><b>How to avoid unintended impact:</b> Avoid blocking all DNS traffic or disabling UDP port 53, which would break normal resolution. Rely on Cloudflare’s DNS-specific protection such as the <a href="https://developers.cloudflare.com/ddos-protection/advanced-ddos-systems/overview/advanced-dns-protection/"><u>Advanced DNS Protection system</u></a>, and deploy DNSSEC-aware protection to handle TCP-based query floods safely.</p></li></ul>
    <div>
      <h4>SYN Flood Attack</h4>
      <a href="#syn-flood-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type:</b> Flood</p></li><li><p><b>How it works:</b> In a SYN flood, threat actors send a large volume of TCP SYN packets—often with spoofed IP addresses—to initiate connections that are never completed. This leaves the target system with half-open connections, consuming memory and connection tracking resources, potentially exhausting server limits and preventing real clients from connecting. Learn more about <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN attacks</a>.</p></li><li><p><b>How to defend against the attack:</b> Use <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> to intercept and mitigate TCP SYN floods at the edge. Cloudflare leverages SYN cookies, connection tracking, and behavioral analysis to distinguish real clients from spoofed or malicious sources, ensuring legitimate TCP connections are completed successfully. Using Cloudflare’s <a href="https://www.cloudflare.com/application-services/products/cdn/"><u>CDN</u></a>/<a href="https://www.cloudflare.com/application-services/products/waf/"><u>WAF</u></a> services or <a href="https://www.cloudflare.com/application-services/products/cloudflare-spectrum/"><u>Cloudflare Spectrum</u></a> which are both reverse-proxy services for HTTP or TCP, respectively. Using a reverse-proxy basically eliminates the possible impact of TCP-based DDoS attacks.</p></li><li><p><b>How to avoid unintended impact:</b> Blocking all SYN traffic or applying aggressive timeouts can block real users. Instead, rely on <a href="https://developers.cloudflare.com/ddos-protection/advanced-ddos-systems/overview/advanced-tcp-protection/"><u>Cloudflare’s Advanced TCP protection system</u></a>, which uses SYN rate shaping, anomaly detection, and spoofed-packet filtering to mitigate attacks without affecting genuine client connections.</p></li></ul>
    <div>
      <h4>UDP DDoS attack</h4>
      <a href="#udp-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type</b>: Flood</p></li><li><p><b>How it works</b>: A high volume of UDP packets is sent to random or specific ports on the target IP address(es). It may attempt to saturate the Internet link or overwhelm its in-line appliances with more packets than it can handle in order to create disruption or an outage. Learn more about <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP attacks</a>.</p></li><li><p><b>How to defend against the attack</b>: Deploy cloud-based volumetric DDoS protection that can fingerprint attack traffic in real-time such as <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> or <a href="https://www.cloudflare.com/application-services/products/cloudflare-spectrum/"><u>Cloudflare Spectrum</u></a>, apply smart rate-limiting on UDP traffic, and drop unwanted UDP traffic altogether with the <a href="https://www.cloudflare.com/network-services/products/magic-firewall/"><u>Magic Firewall</u></a>.</p></li><li><p><b>How to avoid unintended impact</b>: Aggressive filtering may disrupt legitimate UDP services such as VoIP, video conferencing, or online games. Apply thresholds carefully.</p></li></ul>
    <div>
      <h2>Emerging threats</h2>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>Among emerging L3/4 DDoS threats in 2025 Q2, <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/#teeworlds-ddos-attack">Teeworlds flood</a> saw the biggest spike. These attacks jumped 385% QoQ, followed by the <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/#ripv1-ddos-attack"><u>RIPv1 flood</u></a>, which surged 296%. <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/#rdp-ddos-attack"><u>RDP floods</u></a> climbed by 173%, and <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/#demonbot-ddos-attack"><u>Demon Bot floods</u></a> increased by 149%. Even the venerable <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q2/#vxworks-flood-ddos-attack"><u>VxWorks flood</u></a> made a comeback, rising 71% quarter-over-quarter. These dramatic upticks highlight threat actors’ ongoing experimentation with lesser-known and legacy protocols to evade standard defenses.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/70OHdfj3auYqnHGCc2s1P0/1beaa1427cc5007fa069f028c0c1bb4c/image14.png" />
          </figure><p><sup>The top emerging threats for 2025 Q2</sup></p>
    <div>
      <h3>Breakdown of the top emerging threats</h3>
      <a href="#breakdown-of-the-top-emerging-threats">
        
      </a>
    </div>
    <p>Below are details about the emerging threats for 2025 Q2, mostly recycling of very old attack vectors. We provide recommendations on how organizations can avoid becoming a reflection and amplification element, and also recommendations on how to defend against these attacks whilst avoiding impact to legitimate traffic. Cloudflare's customers are protected against these attacks.</p>
    <div>
      <h4>Teeworlds DDoS Attack</h4>
      <a href="#teeworlds-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type:</b> Flood</p></li><li><p><b>How it works:</b> <a href="https://en.wikipedia.org/wiki/Teeworlds"><u>Teeworlds</u></a> is a fast-paced, open-source 2D multiplayer shooter game that uses a custom UDP-based protocol for real-time gameplay. Threat actors flood the target’s game server with spoofed or excessive UDP packets that mimic in-game actions or connection attempts. This can overwhelm server resources and cause lag or outages.</p></li><li><p><b>How to defend against the attack:</b> Use <a href="https://www.cloudflare.com/application-services/products/cloudflare-spectrum/"><u>Cloudflare Spectrum</u></a> or <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> to protect the servers. Cloudflare automatically detects and mitigates these types of attacks using real-time fingerprinting, blocking attack traffic while allowing real players through. Magic Transit also provides a packet-level firewall capability, the <a href="https://www.cloudflare.com/network-services/products/magic-firewall/"><u>Magic Firewall</u></a> which can be used to craft custom protection.</p></li><li><p><b>How to avoid unintended impact:</b> When crafting custom rules, avoid blocking or aggressively rate-limiting UDP port 8303 directly as it can disrupt overall gameplay. Instead, rely on intelligent detection and mitigation services to avoid affecting legitimate users.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/608xA7d6AuPV38WCXWcfxj/1d00cec07300ecd15b99c9ca5d0bb07c/image17.png" />
          </figure><p><sup>Teeworlds Screenshot Jungle. Source: </sup><a href="https://commons.wikimedia.org/wiki/File:Teeworlds_Screenshot_Jungle_0.6.1.png"><sup><u>Wikipedia</u></sup></a></p>
    <div>
      <h4>RIPv1 DDoS attack</h4>
      <a href="#ripv1-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type</b>: Reflection + (Low) Amplification</p></li><li><p><b>How it works</b>: Exploits the Routing Information protocol version 1 (RIPv1), an old unauthenticated distance-vector routing protocol that uses UDP/520. Threat actors send spoofed routing updates to flood or confuse networks.</p></li><li><p><b>How to prevent becoming a reflection / amplification element</b>: Disable RIPv1 on routers. Use RIPv2 with authentication where routing is needed.</p></li><li><p><b>How to defend against the attack</b>: Block inbound UDP/520 from untrusted networks. Monitor for unexpected routing updates.</p></li><li><p><b>How to avoid unintended impact</b>: RIPv1 is mostly obsolete; disabling it is generally safe. If legacy systems rely on it, validate routing behavior before changes.</p></li></ul>
    <div>
      <h4>RDP DDoS Attack</h4>
      <a href="#rdp-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type</b>: Reflection + Amplification</p></li><li><p><b>How it works</b>: The <a href="https://www.cloudflare.com/learning/access-management/what-is-the-remote-desktop-protocol/"><u>Remote Desktop Protocol (RDP)</u></a> is used for remote access to Windows systems and typically runs over <a href="https://www.speedguide.net/port.php?port=3389"><u>TCP port 3389</u></a>. In some misconfigured or legacy setups, RDP can respond to unauthenticated connection attempts, making it possible to abuse for reflection or amplification. Threat actors send spoofed RDP initiation packets to exposed servers, causing them to reply to a victim, generating high volumes of unwanted traffic.</p></li><li><p><b>How to defend against the attack</b>: Use <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> to protect your network infrastructure. Magic Transit provides L3/L4 DDoS protection, filtering out spoofed or malformed RDP traffic before it reaches your origin. For targeted application-layer abuse, <a href="https://www.cloudflare.com/zero-trust/products/gateway/"><u>Cloudflare Gateway</u></a> or <a href="https://www.cloudflare.com/zero-trust/products/access/"><u>Zero Trust Network Access (ZTNA)</u></a> can help secure remote desktop access behind authenticated tunnels.</p></li><li><p><b>How to avoid unintended impact</b>: Do not block TCP/3389 globally if RDP is actively used. Instead, restrict RDP access to known IPs or internal networks, or use <a href="https://developers.cloudflare.com/cloudflare-one/connections/connect-networks/"><u>Cloudflare Tunnel</u></a> with <a href="https://www.cloudflare.com/zero-trust/products/access/"><u>Zero Trust Network Access (ZTNA)</u></a> to remove public exposure altogether while maintaining secure access for legitimate users.</p></li></ul>
    <div>
      <h4>DemonBot DDoS Attack</h4>
      <a href="#demonbot-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type</b>: Botnet-based Flood</p></li><li><p><b>How it works</b>: DemonBot is a malware strain that infects Linux-based systems—particularly unsecured IoT devices—via open ports or weak credentials. Once infected, devices become part of a botnet that can launch high-volume UDP, TCP, and application-layer floods. Attacks are typically command-and-control (C2) driven and can generate significant volumetric traffic, often targeting gaming, hosting, or enterprise services. To avoid infection, leverage antivirus software and domain filtering. </p></li><li><p><b>How to defend against the attack</b>: Use <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> to absorb and filter large-scale network-layer floods before they reach your infrastructure. Cloudflare’s real-time traffic analysis and signature-based detection neutralize traffic originating from DemonBot-infected devices. For application-layer services, <a href="https://www.cloudflare.com/ddos/"><u>Cloudflare DDoS protection</u></a> and <a href="https://www.cloudflare.com/application-services/products/waf/"><u>WAF</u></a> can mitigate targeted <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/"><u>HTTP floods</u></a> and connection abuse.</p></li><li><p><b>How to avoid unintended impact</b>: Instead of broadly blocking traffic types or ports, rely on Cloudflare’s adaptive mitigation to distinguish between legitimate users and botnet traffic. Combine with IP reputation filtering, geo-blocking, and rate limiting to reduce false positives and maintain service availability.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/41SKW3kjd0hp7wmySRb7OP/97a59d135cd7c3c975cda581acdec88c/image18.png" />
          </figure>
    <div>
      <h4>VxWorks Flood DDoS Attack</h4>
      <a href="#vxworks-flood-ddos-attack">
        
      </a>
    </div>
    <ul><li>
    <div>
      <h4><b>Type:</b> Flood (IoT-based)</h4>
      <a href="#type-flood-iot-based">
        
      </a>
    </div>
    </li><li><p><b>How it works:</b> <a href="https://en.wikipedia.org/wiki/VxWorks"><u>VxWorks</u></a> is a real-time operating system (<a href="https://en.wikipedia.org/wiki/Real-time_operating_system"><u>RTOS</u></a>) used in millions of embedded and IoT devices (e.g., routers, industrial controllers). Devices running outdated or misconfigured versions of VxWorks can be compromised and used to launch DDoS attacks. Once infected—often via public exploits or weak credentials—they send high volumes of UDP, TCP, or ICMP traffic to overwhelm targets, similar to traditional IoT botnets.</p></li><li><p><b>How to defend against the attack:</b> Deploy <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> to block volumetric traffic at the network edge. Cloudflare uses real-time fingerprinting and  proprietary heuristics to identify traffic from compromised VxWorks devices and mitigate it in real-time. For application services, <a href="https://www.cloudflare.com/ddos/"><u>Cloudflare’s DDoS mitigation</u></a><b> </b>and<b> </b><a href="https://www.cloudflare.com/zero-trust/products/gateway/"><b><u>Gateway services</u></b></a> provide additional protection against protocol-level abuse.</p></li><li><p><b>How to avoid unintended impact:</b> Avoid over-blocking UDP or ICMP traffic, as it may disrupt legitimate diagnostics or real-time services. Instead, use Cloudflare’s intelligent filtering, rate limiting, and geo/IP reputation tools to safely mitigate attacks while avoiding impact to legitimate traffic.</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6b6CqQNrSd3QFE2yTaDaFU/3ecc930ecf487067dac0dc2f4d50d390/image21.png" />
          </figure><p><sup>Cloudflare’s real-time fingerprint generation flow</sup></p>
    <div>
      <h2>Attack size &amp; duration</h2>
      <a href="#attack-size-duration">
        
      </a>
    </div>
    <p>Most DDoS attacks are small and short. In 2025 Q2, 94% of L3/4 DDoS attacks didn’t exceed 500 Mbps. Similarly, around 85% of L3/4 DDoS attacks didn’t exceed 50,000 pps. The majority of HTTP DDoS attacks are also small, 65% stay below 50K rps. “Small”, though, is a relative term.</p><p>An average modern server typically refers to a general-purpose physical or virtual machine with around 4–8 CPU cores (e.g. Intel Xeon Silver), 16–64 GB RAM, and a 1 Gbps NIC, running a Linux OS like Ubuntu or CentOS with NGINX or similar software. This setup can handle ~100,000–500,000 pps, up to ~940 Mbps throughput, and around 10,000–100,000 rps for static content or 500–1,000 rps for database-backed dynamic applications, depending on tuning and workload.</p><p>Assuming the server is unprotected by a cloud DDoS protection service, if it’s targeted by “small” DDoS attacks during peak time traffic rates, it is very likely that the server won’t be able to handle it. Even “small” DDoS attacks can cause significant impact to unprotected servers.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5bAmx7jQRjWgJHit83V57j/d8ec58ee7b1b207e36cb8e5b20984d9c/image3.png" />
          </figure><p><sup>DDoS attacks size and duration in 2025 Q2</sup></p><p>While the majority of DDoS attacks are small, hyper-volumetric DDoS attacks are increasing in size and frequency. 6 out of every 100 HTTP DDoS attacks exceed 1M rps, and 5 out of every 10,000 L3/4 DDoS attacks exceed 1 Tbps — a 1,150% QoQ increase.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ukMkHvtJOpfQwfPWn6Co9/62e161fa9f091ce2d99d56e57a7cd354/image16.png" />
          </figure><p><sup>The largest attack in the world: 7.3 Tbps</sup></p><p>Most DDoS attacks are short in duration, even the largest and most intense ones. Threat actors often rely on brief bursts of concentrated traffic—sometimes lasting as little as 45 seconds as seen with the monumental 7.3 Tbps DDoS attack — in an attempt to avoid detection, overwhelm targets and cause maximum disruption before defenses can fully activate. This tactic of short, high-intensity bursts makes detection and mitigation more challenging and underscores the need for always-on, real-time protection. Thankfully, Cloudflare’s autonomous DDoS defenses kick in immediately.</p>
    <div>
      <h2>Helping build a better Internet</h2>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>At Cloudflare, we’re committed to helping build a better Internet. A part of that mission is offering free, unmetered DDoS protection regardless of size, duration and quantity. We don’t just defend against DDoS attacks. The best defense is a good offense, and using our free ISP Botnet Threat Feed, we contribute to botnet takedowns. </p><p>While many still adopt protection reactively or rely on outdated solutions, our data shows proactive, always-on security is far more effective. Powered by a global network with 388 Tbps capacity across 330+ cities, we provide automated, in-line, battle-proven defense against all types of DDoS attacks.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Connectivity Cloud]]></category>
            <category><![CDATA[DDoS Alerts]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <guid isPermaLink="false">4aLih3oZO76muFrc9vJufj</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[Defending the Internet: how Cloudflare blocked a monumental 7.3 Tbps DDoS attack]]></title>
            <link>https://blog.cloudflare.com/defending-the-internet-how-cloudflare-blocked-a-monumental-7-3-tbps-ddos/</link>
            <pubDate>Thu, 19 Jun 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ In mid-May 2025, Cloudflare blocked the largest DDoS attack ever recorded: a staggering 7.3 terabits per second (Tbps). ]]></description>
            <content:encoded><![CDATA[ <p>In mid-May 2025, Cloudflare blocked the largest DDoS attack ever recorded: a staggering 7.3 terabits per second (Tbps). This comes shortly after the publication of our <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q1/"><u>DDoS threat report for 2025 Q1</u></a> on April 27, 2025, where we highlighted attacks reaching 6.5 Tbps and 4.8 billion packets per second (pps). The 7.3 Tbps attack is 12% larger than our previous record and 1 Tbps greater than a recent attack reported by cyber security reporter Brian Krebs at <a href="https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/"><u>KrebsOnSecurity</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ANdNP7alw2BkWu5hiXaTa/4e6c32c48c5b48ed1943ddb9c9819d18/1.png" />
          </figure><p><sup><i>New world record: 7.3 Tbps DDoS attack autonomously blocked by Cloudflare</i></sup></p><p>The attack targeted a Cloudflare customer, a hosting provider, that uses <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Magic Transit</u></a> to defend their IP network. Hosting providers and critical Internet infrastructure have increasingly become targets of <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attacks</a>, as we reported in our <a href="https://blog.cloudflare.com/ddos-threat-report-for-2025-q1/#attacks-target-the-cloudflare-network-and-internet-infrastructure"><u>latest DDoS threat report</u></a>. Pictured below is an attack campaign from January and February 2025 that blasted over 13.5 million DDoS attacks against Cloudflare’s infrastructure and hosting providers protected by Cloudflare.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1fbj7Uvc4g61ag7FdNpsVY/e0911256cdda102d394f04467922989e/2.png" />
          </figure><p><sup><i>DDoS attack campaign target Cloudflare infrastructure and hosting providers protected by Cloudflare</i></sup></p><p>Let's start with some stats, and then we’ll dive into how our systems detected and mitigated this attack.</p>
    <div>
      <h2>The 7.3 Tbps attack delivered 37.4 terabytes in 45 seconds</h2>
      <a href="#the-7-3-tbps-attack-delivered-37-4-terabytes-in-45-seconds">
        
      </a>
    </div>
    <p>37.4 terabytes is not a staggering figure in today’s scales, but blasting 37.4 terabytes in just 45 seconds is. It’s the equivalent to flooding your network with over 9,350 full-length HD movies, or streaming 7,480 hours of high-definition video nonstop (that’s nearly a year of back-to-back binge-watching) in just 45 seconds. If it were music, you’d be downloading about 9.35 million songs in under a minute, enough to keep a listener busy for 57 years straight. Think of snapping 12.5 million high-resolution photos on your smartphone and never running out of storage—even if you took one shot every day, you’d be clicking away for 4,000 years — but in 45 seconds. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2LdE4nXpbZNNq5nuu6zcAI/0d3bb3ce445219e32e0c193ac293e2c7/3.png" />
          </figure><p><sup><i>The record-breaking 7.3 Tbps DDoS attack delivered 37.4 TB in 45 seconds</i></sup></p>
    <div>
      <h2>The attack details</h2>
      <a href="#the-attack-details">
        
      </a>
    </div>
    <p>The attack carpet-bombed an average of 21,925 destination ports of a single IP address owned and used by our customer, with a peak of 34,517 destination ports per second. The attack also originated from a similar distribution of source ports. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/GZqL1pFqCYp7YmaY6BJ7B/7bfc6c9896f68936897ffa4458705eac/4.png" />
          </figure><p><sup><i>Distribution of destination ports</i></sup></p>
    <div>
      <h3>Attack vectors</h3>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p>The 7.3 Tbps attack was a multivector DDoS attack. Around 99.996% of the attack traffic was categorized as <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP floods</a>. However, the remaining 0.004%, which accounted for 1.3 GB of the attack traffic, were identified as QOTD reflection attacks, Echo reflection attack, NTP reflection attack, Mirai UDP flood attack, Portmap flood, and RIPv1 amplification attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/11Vi16gyvOnkCK9XCjkiW7/5453372518abfe68982ff3450245a295/5.png" />
          </figure><p><sup><i>The attack vectors other than UDP floods</i></sup></p>
    <div>
      <h3>Breakdown of the attack vectors</h3>
      <a href="#breakdown-of-the-attack-vectors">
        
      </a>
    </div>
    <p>Below are details about the various attack vectors seen in this attack, how organizations can avoid becoming a reflection and amplification participant, and recommendations on how to defend against these attacks whilst avoiding impact to legitimate traffic. Cloudflare's customers are protected against these attacks.</p>
    <div>
      <h4>UDP DDoS attack</h4>
      <a href="#udp-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type</b>: Flood</p></li><li><p><b>How it works:</b> A high volume of UDP packets is sent to random or specific ports on the target IP address(es). It may attempt to saturate the Internet link or overwhelm its in-line appliances with more packets than it can handle.</p></li><li><p><b>How to defend against the attack:</b> Deploy cloud-based volumetric DDoS protection, apply smart rate-limiting on UDP traffic, and drop unwanted UDP traffic altogether.</p></li><li><p><b>How to avoid unintended impact:</b> Aggressive filtering may disrupt legitimate UDP services such as VoIP, video conferencing, or online games. Apply thresholds carefully.</p></li></ul>
    <div>
      <h4>QOTD DDoS attack</h4>
      <a href="#qotd-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type:</b> Reflection + Amplification</p></li><li><p><b>How it works:</b> Abuses the Quote of the Day (QOTD) Protocol, which listens on UDP port 17 and responds with a short quote or message. Attackers send QOTD requests to exposed servers from a spoofed IP address, causing amplified responses to flood the victim.</p></li><li><p><b>How to prevent becoming a reflection / amplification element:</b> Disable the QOTD service and block UDP/17 on all servers and firewalls.</p></li><li><p><b>How to defend against the attack:</b> Block inbound UDP/17. Drop abnormal small-packet UDP request spikes.</p></li><li><p><b>How to avoid unintended impact:</b> QOTD is an obsolete diagnostic/debugging protocol and is not used by modern applications. Disabling it should not have any negative effect on legitimate services.</p></li></ul>
    <div>
      <h4>Echo DDoS attack</h4>
      <a href="#echo-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type: </b>Reflection + Amplification</p></li><li><p><b>How it works: </b>Exploits the Echo protocol (UDP/TCP port 7), which replies with the same data it receives. Attackers spoof the victim’s IP address, causing devices to reflect the data back, amplifying the attack.</p></li><li><p><b>How to prevent becoming a reflection / amplification element:</b> Disable the Echo service on all devices. Block UDP/TCP port 7 at the edge.</p></li><li><p><b>How to defend against the attack: </b>Disable the Echo service and block TCP/UDP port 7 at the network perimeter.</p></li><li><p><b>How to avoid unintended impact: </b>Echo is an obsolete diagnostic tool; disabling or blocking it has no negative effect on modern systems.</p></li></ul>
    <div>
      <h4>NTP DDoS attack</h4>
      <a href="#ntp-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type: </b>Reflection + Amplification</p></li><li><p><b>How it works: </b>Abuses the Network Time Protocol (NTP), used to sync clocks over the Internet. Attackers exploit the monlist command on old NTP servers (UDP/123) which returns a large list of recent connections. Spoofed requests cause amplified reflections.</p></li><li><p><b>How to prevent becoming a reflection / amplification element:</b> Upgrade or configure NTP servers to disable monlist. Restrict NTP queries to trusted IP addresses only.</p></li><li><p><b>How to defend against the attack: </b>Disable the monlist command, update NTP software, and filter or rate-limit UDP/123 traffic.</p></li><li><p><b>How to avoid unintended impact: </b>Disabling monlist has no effect on time synchronization. However, filtering or blocking UDP/123 could affect time syncing if done too broadly — ensure only untrusted or external sources are blocked.</p></li></ul>
    <div>
      <h4>Mirai UDP attack</h4>
      <a href="#mirai-udp-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type: </b>Flood</p></li><li><p><b>How it works: </b>The <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/"><u>Mirai botnet</u></a>, made up of compromised IoT devices, floods victims using random or service-specific UDP packets (e.g., DNS, game services).</p></li><li><p><b>How to prevent becoming part of the botnet:</b> Secure your IoT devices, change default passwords, upgrade to the latest firmware versions, and follow <a href="https://www.cloudflare.com/learning/security/glossary/iot-security/"><u>IoT security best practices</u></a> to avoid becoming part of the <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">botnet</a>. When possible, monitor outbound traffic to detect irregularities.</p></li><li><p><b>How to defend against the attack: </b>Deploy cloud-based volumetric DDoS protection and <a href="https://www.cloudflare.com/learning/bots/what-is-rate-limiting/">rate-limiting</a> for UDP traffic.</p></li><li><p><b>How to avoid unintended impact:</b> First, understand your network and the type of traffic that you receive, specifically the protocols, their sources and their destinations. Identify services that run over UDP that you want to avoid impacting. Once you have identified those, you can apply rate-limiting in a way that excludes those end points, or takes into account your regular traffic levels. Otherwise, aggressively rate-limiting UDP traffic can impact your legitimate traffic and impact services that run over UDP such as VoIP calls and VPN traffic.</p></li></ul>
    <div>
      <h4>Portmap DDoS attack</h4>
      <a href="#portmap-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type:</b> Reflection + Amplification</p></li><li><p><b>How it works: </b>Targets the Portmapper service (UDP/111) used by Remote Procedure Call (RPC)-based applications to identify available services. Spoofed requests result in reflected responses.</p></li><li><p><b>How to prevent becoming a reflection / amplification element: </b>Disable the Portmapper service if not required. If needed internally, restrict it to trusted IP addresses only.</p></li><li><p><b>How to defend against the attack: </b>Disable the Portmapper service if not needed, block inbound UDP/111 traffic. Use Access Control Lists (ACLs) or firewalls to restrict access to known RPC services.</p></li><li><p><b>How to avoid unintended impact: </b>Disabling Portmapper may disrupt applications relying on RPC (e.g., Network File System protocol). Validate service dependencies before removal.</p></li></ul>
    <div>
      <h4>RIPv1 DDoS attack</h4>
      <a href="#ripv1-ddos-attack">
        
      </a>
    </div>
    <ul><li><p><b>Type:</b> Reflection + (Low) Amplification</p></li><li><p><b>How it works: </b>Exploits the Routing Information protocol version 1 (RIPv1), an old unauthenticated distance-vector routing protocol that uses UDP/520. Attackers send spoofed routing updates to flood or confuse networks.</p></li><li><p><b>How to prevent becoming a reflection / amplification element: </b>Disable RIPv1 on routers. Use RIPv2 with authentication where routing is needed.</p></li><li><p><b>How to defend against the attack: </b>Block inbound UDP/520 from untrusted networks. Monitor for unexpected routing updates.</p></li><li><p><b>How to avoid unintended impact: </b>RIPv1 is mostly obsolete; disabling it is generally safe. If legacy systems rely on it, validate routing behavior before changes.</p></li></ul><p>All recommendations here should be taken into consideration with the context and behavior of each unique network or application to avoid any unintended impact to legitimate traffic.</p>
    <div>
      <h3>Attack origins</h3>
      <a href="#attack-origins">
        
      </a>
    </div>
    <p>The attack originated from over 122,145 source IP addresses spanning 5,433 Autonomous Systems (AS) across 161 countries. </p><p>Almost half of the attack traffic originated from Brazil and Vietnam, with approximately a quarter each. Another third, in aggregate, originated from Taiwan, China, Indonesia, Ukraine, Ecuador, Thailand, the United States, and Saudi Arabia.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5CNlOoTGF4USsh5q7Lw5XK/4c108ae003c4f14418aeab2ad98ab197/6.png" />
          </figure><p><sup><i>Top 10 source countries of the attack traffic</i></sup></p><p>The average number of unique source IP addresses per second was 26,855 with a peak of 45,097.  </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Il1KDn7BuFpFBYvvdiEaK/ba2a5b75f087bbd16ab0c94840ff0951/7.png" />
          </figure><p><sup><i>Distribution of unique source IP addresses</i></sup></p><p>The attack originated from 5,433 different networks (<a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>ASes</u></a>). Telefonica Brazil (<a href="https://radar.cloudflare.com/as27699"><u>AS27699</u></a>) accounted for the largest portion of the DDoS attack traffic, responsible for 10.5% of the total. Viettel Group (<a href="https://radar.cloudflare.com/as7552"><u>AS7552</u></a>) follows closely with 9.8%, while China Unicom (<a href="https://radar.cloudflare.com/as4837"><u>AS4837</u></a>) and Chunghwa Telecom (<a href="https://radar.cloudflare.com/as3462"><u>AS3462</u></a>) contributed 3.9% and 2.9% respectively. China Telecom (<a href="https://radar.cloudflare.com/as4134"><u>AS4134</u></a>) accounted for 2.8% of the traffic. The remaining ASNs in the top 10, including Claro NXT (<a href="https://radar.cloudflare.com/as28573"><u>AS28573</u></a>), VNPT Corp (<a href="https://radar.cloudflare.com/as45899"><u>AS45899</u></a>), UFINET Panama (<a href="https://radar.cloudflare.com/as52468"><u>AS52468</u></a>), STC (<a href="https://radar.cloudflare.com/as25019"><u>AS25019</u></a>), and FPT Telecom Company (<a href="https://radar.cloudflare.com/as18403"><u>AS18403</u></a>), each contributed between 1.3% and 1.8% of the total DDoS attack traffic.
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6msz4mK3gxDD1gBnIbYmt9/3d56c615b29def674d9a699339f65a4c/8.png" />
          </figure><p><i>Top 10 source autonomous systems</i></p>
    <div>
      <h3>Free botnet threat feed</h3>
      <a href="#free-botnet-threat-feed">
        
      </a>
    </div>
    <p>To help hosting providers, cloud computing providers, and any Internet service providers identify and take down the abusive accounts that launch these attacks, we leverage Cloudflare’s unique vantage point to provide a <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/"><u>free DDoS Botnet Threat Feed for Service Providers</u></a>. Over 600 organizations worldwide have already signed up for this feed. It gives service providers a list of offending IP addresses from within their ASN that we see launching HTTP DDoS attacks. It’s completely free and all it takes is opening a free Cloudflare account, authenticating the ASN via <a href="https://docs.peeringdb.com/howto/authenticate/"><u>PeeringDB</u></a>, and then <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/#get-full-report"><u>fetching the feed via API</u></a>.</p>
    <div>
      <h2>How the attack was detected and mitigated</h2>
      <a href="#how-the-attack-was-detected-and-mitigated">
        
      </a>
    </div>
    
    <div>
      <h3>Using the distributed nature of DDoS attacks against it</h3>
      <a href="#using-the-distributed-nature-of-ddos-attacks-against-it">
        
      </a>
    </div>
    <p>The attacked IP address was advertised from Cloudflare’s network using global <a href="https://www.cloudflare.com/learning/cdn/glossary/anycast-network/"><u>anycast</u></a>. This means that the attack packets that targeted the IP were routed to the closest Cloudflare data center. Using global anycast allows us to spread the attack traffic and use its distributed nature against it, enabling us to mitigate close to the botnet nodes and continue serving users from the data centers closest to them. In the case of this attack, it was detected and mitigated in 477 data centers across 293 locations around the world. In high-traffic locations, we have presence in multiple data centers. </p>
    <div>
      <h3>Autonomous DDoS detection and mitigation</h3>
      <a href="#autonomous-ddos-detection-and-mitigation">
        
      </a>
    </div>
    <p>The Cloudflare global network runs every service in every data center. This includes our DDoS detection and mitigation systems. This means that attacks can be detected and mitigated fully autonomously, regardless of where they originate from. </p>
    <div>
      <h3>Real-time fingerprinting</h3>
      <a href="#real-time-fingerprinting">
        
      </a>
    </div>
    <p>When a packet enters our data center, it is <a href="https://blog.cloudflare.com/unimog-cloudflares-edge-load-balancer/"><u>intelligently load-balanced</u></a> to an available server. We then sample packets directly from within the depths of the Linux kernel, from the <a href="https://en.wikipedia.org/wiki/Express_Data_Path"><i><u>eXpress Data Path</u></i><u> (XDP)</u></a> using an <a href="https://en.wikipedia.org/wiki/EBPF"><u>extended Berkley Packer Filter (eBPF)</u></a> program to route packet samples to the user space where we run the analysis.</p><p>Our system analyzes the packet samples to identify suspicious patterns based on our unique heuristic engine named <i>dosd</i> (denial of service daemon). Dosd looks for patterns in the packet samples, such as finding commonality in the packet header fields and looking for packet anomalies, as well as applying other proprietary techniques.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5fIg4qw12q8V4WDwV9t2gj/a4f02ff1618e5a68de9f660cb053be7d/9.png" />
          </figure><p><sup> </sup><sup><i>Flow diagram of the real-time fingerprint generation</i></sup></p><p>To our customers, this complex fingerprinting system is encapsulated as a user-friendly group of <i>managed rules</i>, the <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/"><u>DDoS Protection Managed Rulesets</u></a>. </p><p>When patterns are detected by dosd, it generates multiple permutations of those fingerprints in order to find the most accurate fingerprint that will have the highest mitigation efficacy and accuracy, i.e. to try and surgically match against attack traffic without impacting legitimate traffic. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ZnkWPuJ9sy5eVXvjcr0bO/eaf92ebca11a718f181d13d3396840b6/10.png" />
          </figure><p><sup><i>Diagram of Cloudflare’s DDoS Protection systems</i></sup><sup> </sup></p>
    <div>
      <h2>Mitigation</h2>
      <a href="#mitigation">
        
      </a>
    </div>
    <p>We count the various packet samples that match each fingerprint permutation, and using a data streaming algorithm, we bubble up the fingerprint with the most hits. When activation thresholds are exceeded, to avoid false positives, a mitigation rule using the fingerprint syntax is compiled as an eBPF program to drop packets that match the attack pattern. Once the attack ends, the rule times out and is automatically removed.</p>
    <div>
      <h2>Gossiping about attacks</h2>
      <a href="#gossiping-about-attacks">
        
      </a>
    </div>
    <p>As we mentioned, each server detects and mitigates attacks fully autonomously — making our network highly efficient, resilient, and fast at blocking attacks. In addition, each server <i>gossips</i> (<a href="https://www.cloudflare.com/learning/network-layer/what-is-igmp/"><i><u>multicasts</u></i></a>) the top fingerprint permutations within a data center, and globally. This sharing of real-time threat intelligence helps improve the mitigation efficacy within a data center and globally. </p>
    <div>
      <h2>Protecting the Internet</h2>
      <a href="#protecting-the-internet">
        
      </a>
    </div>
    <p>Our systems successfully blocked this record-breaking 7.3 Tbps DDoS attack fully autonomously without requiring any human intervention, without triggering any alerts, and without causing any incidents. This demonstrates the effectiveness of our world-leading DDoS protection systems. We built this system as part of our mission to help build a better Internet committed to provide <a href="https://www.cloudflare.com/ddos/">free unmetered DDoS protection</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <guid isPermaLink="false">4BIcJ46lxWU4w1NytPTCsu</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Targeted by 20.5 million DDoS attacks, up 358% year-over-year: Cloudflare’s 2025 Q1 DDoS Threat Report]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2025-q1/</link>
            <pubDate>Sun, 27 Apr 2025 23:00:00 GMT</pubDate>
            <description><![CDATA[ DDoS attacks are surging. In 2025 Q1, Cloudflare blocked +20M attacks (a 358% YoY spike) along with 5.6 Tbps and 4.8 Bpps record-breaking attacks. ]]></description>
            <content:encoded><![CDATA[ <p>Welcome to the 21st edition of the Cloudflare DDoS Threat Report. Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of <a href="https://www.cloudflare.com/learning/ddos/glossary/denial-of-service/"><u>Distributed Denial of Service (DDoS) attacks</u></a> based on data from the <a href="https://www.cloudflare.com/network/"><u>Cloudflare network</u></a>. In this edition, we focus on the first quarter of 2025. To view previous reports, visit <a href="http://www.ddosreport.com"><u>www.ddosreport.com</u></a>.</p><p>While this report primarily focuses on 2025 Q1, it also includes late-breaking data from a <a href="#hyper-volumetric-ddos-attacks">hyper-volumetric DDoS campaign observed in April 2025</a>, featuring some of the largest attacks ever publicly disclosed. In a historic surge of activity, we blocked the most intense packet rate attack on record, peaking at 4.8 billion packets per second (Bpps), 52% higher than the previous benchmark, and separately defended against a massive 6.5 terabits-per-second (Tbps) flood, matching the highest bandwidth attacks ever reported.</p>
    <div>
      <h2>Key DDoS insights</h2>
      <a href="#key-ddos-insights">
        
      </a>
    </div>
    <ul><li><p>In the first quarter of 2025, Cloudflare blocked 20.5 million DDoS attacks. That represents a 358% year-over-year (YoY) increase and a 198% quarter-over-quarter (QoQ) increase. </p></li><li><p>Around one third of those, 6.6 million, targeted the Cloudflare network infrastructure directly, as part of an 18-day multi-vector attack campaign.</p></li><li><p>Furthermore, in the first quarter of 2025, Cloudflare blocked approximately 700 hyper-volumetric DDoS attacks that exceeded 1 Tbps or 1 Bpps — an average of around 8 attacks per day.</p></li></ul><p>All the attacks were blocked by our <a href="https://www.cloudflare.com/ddos/"><u>autonomous defenses</u></a>.</p><p><i>To learn more about DDoS attacks and other types of cyber threats, refer to our </i><a href="https://www.cloudflare.com/learning/"><i><u>Learning Center</u></i></a><i>. Visit </i><a href="https://radar.cloudflare.com/reports?q=DDoS"><i><u>Cloudflare Radar</u></i></a><i> to view this report in its interactive version where you can drill down further. There's a </i><a href="https://developers.cloudflare.com/radar/"><i><u>free API</u></i></a><i> for those interested in investigating Internet trends. You can also learn more about the </i><a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/"><i><u>methodologies</u></i></a><i> used in preparing these reports.</i></p>
    <div>
      <h2>DDoS attacks in numbers</h2>
      <a href="#ddos-attacks-in-numbers">
        
      </a>
    </div>
    <p>In the first quarter of 2025, we blocked 20.5 million DDoS attacks. For comparison, during the calendar year 2024, we blocked 21.3 million DDoS attacks. In just this past quarter, we blocked 96% of what we blocked in 2024.</p><p>The most significant increase was in network-layer DDoS attacks. In 2025 Q1, we blocked 16.8M network-layer DDoS attacks. That’s a 397% QoQ increase and a 509% YoY increase. HTTP DDoS attacks also increased — a 7% QoQ increase and a 118% YoY increase.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4sBpHyhcmYaGxx6bYjGhIR/c257628e5f3c3f854f734c371192de00/image2.png" />
          </figure><p>We count DDoS attacks based on unique real-time fingerprints generated by our systems. In some instances, a single attack or campaign may generate multiple fingerprints, particularly when different mitigation strategies are applied. While this can occasionally lead to higher counts, the metric offers a strong overall indicator of attack activity during a given period.</p>
    <div>
      <h3>Attacks target the Cloudflare network and Internet infrastructure</h3>
      <a href="#attacks-target-the-cloudflare-network-and-internet-infrastructure">
        
      </a>
    </div>
    <p>Of the 20.5 million DDoS attacks blocked in Q1, 16.8 million were network-layer DDoS attacks, and of those, 6.6M targeted Cloudflare’s network infrastructure directly. Another 6.9 million targeted hosting providers and service providers protected by Cloudflare.</p><p>These attacks were part of an 18-day multi-vector DDoS campaign comprising <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/"><u>SYN flood attacks</u></a>, <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/"><u>Mirai-generated DDoS attacks</u></a>, and <a href="https://www.cloudflare.com/learning/ddos/ssdp-ddos-attack/"><u>SSDP amplification attacks</u></a> to name a few. These attacks, as with all of the 20.5 million, were autonomously detected and blocked by our DDoS defenses.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3vyRgcrWUTgw9aClvNaLE9/7afb403ff99c4565c3874fe252372961/image5.png" />
          </figure><p>In the graph below, daily aggregates of attacks against Cloudflare are represented by the blue line, and the other colors represent the various hosting providers and Internet service providers using Cloudflare’s <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Magic Transit</u></a> service that were attacked simultaneously.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3sh8O0seqxOmmQxYY0xO7F/c8563ea41e431b037a7312b60ed36fdc/image1.png" />
          </figure>
    <div>
      <h3>Hyper-volumetric DDoS attacks</h3>
      <a href="#hyper-volumetric-ddos-attacks">
        
      </a>
    </div>
    <p>Hyper-volumetric DDoS attacks are attacks that exceed 1-2 Tbps or 1 Bpps. In 2025 Q1, we blocked over 700 of these attacks. Approximately 4 out of every 100,000 network-layer DDoS attacks were hyper-volumetric. Hyper-volumetric DDoS attacks tend to take place over <a href="https://www.cloudflare.com/learning/ddos/glossary/user-datagram-protocol-udp/"><u>UDP</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4GtQgxuXLcOgXRabQadxb1/00dc9fbf694fd2ec5ada0ca222dc9a2f/image10.png" />
          </figure>
    <div>
      <h3>Hyper-volumetric attacks continue spill into Q2</h3>
      <a href="#hyper-volumetric-attacks-continue-spill-into-q2">
        
      </a>
    </div>
    <p>While this report primarily focuses on 2025 Q1, we believe it is important to also highlight the significant hyper-volumetric record-breaking DDoS attacks that continued into Q2. As such, we have included initial insights from that campaign.</p><p>In the second half of April 2025, Cloudflare’s systems automatically detected and blocked dozens of hyper-volumetric DDoS attacks as part of an intense campaign. The largest attacks peaked at 4.8 Bpps and 6.5 Tbps, with these massive surges typically lasting between 35 and 45 seconds. At 6.5 Tbps, this attack matches the <a href="https://www.wired.com/story/eleven11bot-botnet-record-size-ddos-attacks/"><u>largest publicly disclosed DDoS attack</u></a> to date. The 4.8 Bpps attack is the largest ever to be disclosed from the packet intensity perspective, approximately 52% larger than the previous 3.15 Bpps record.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1F1R0SBYghSqSPjiNYYK6W/c60c183589e9d554b9fb32e9553737a6/image17.png" />
          </figure><p>The attacks originated from 147 countries and targeted multiple IP addresses and ports of a hosting provider that is protected by Cloudflare <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Magic Transit</u></a>. All the attacks were successfully blocked by Cloudflare’s network.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5oqr2yW1zOQYx3tTUbUt93/b283fda3d65be0e9e37d2e786ff13f8a/image6.png" />
          </figure>
    <div>
      <h2>Threat actors</h2>
      <a href="#threat-actors">
        
      </a>
    </div>
    <p>When surveying Cloudflare customers that were targeted by DDoS attacks, the majority said they didn’t know who attacked them. The ones that did know reported their competitors as the number one threat actor behind the attacks (39%), which is similar to last quarter. This is quite common in the gaming and gambling industry.</p><p>Another 17% reported that a state-level or state-sponsored threat actor was behind the attack, and a similar percentage reported that a disgruntled user or customer was behind the attack. </p><p>Another 11% reported that they mistakenly inflicted the DDoS attack on themselves (self-DDoS) and a similar percentage said an extortionist was behind the attacks. 6% reported that the attacks were launched by disgruntled or former employees.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5M5hxvgMluwmP7m0SLaxMz/8ef0cb0d5788e036f7b476010fab9139/image9.png" />
          </figure>
    <div>
      <h2>Anatomy of a DDoS attack</h2>
      <a href="#anatomy-of-a-ddos-attack">
        
      </a>
    </div>
    <p>On the network-layer, <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/"><u>SYN flood</u></a> remains the most common Layer 3/4 DDoS attack vector, followed by <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/"><u>DNS flood</u></a> attacks. <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/"><u>Mirai</u></a>-launched DDoS attacks take the third place, replacing <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/"><u>UDP flood</u></a> attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2vo7n97mpZ9F3ms2evLTfr/cd41b34aac742ce542ceface04edfb47/image11.png" />
          </figure><p>In the HTTP realm, over 60% of the attacks were identified and blocked as known botnets, 21% were attacks with suspicious HTTP attributes, another 10% were launched by botnets impersonating browsers, and the remaining 8% were generic floods, attacks of unusual request patterns, and cache busting attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2X6OoIc5DeB9uBA43gmNAZ/bc438e6aa93820b68cde82b483e84c27/image12.png" />
          </figure>
    <div>
      <h3>Emerging threats</h3>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>In 2025 Q1, we saw a 3,488% QoQ increase in CLDAP reflection/amplification attacks. <a href="https://datatracker.ietf.org/doc/html/rfc1798"><u>CLDAP (Connectionless Lightweight Directory Access Protocol)</u></a> is a variant of <a href="https://datatracker.ietf.org/doc/html/rfc4511"><u>LDAP (Lightweight Directory Access Protocol)</u></a>, used for querying and modifying directory services running over IP networks. CLDAP is connectionless, using UDP instead of TCP, making it faster but less reliable. Because it uses UDP, there’s no handshake requirement, which allows attackers to spoof the source IP address, thus allowing attackers to exploit it as a reflection vector. In these attacks, small queries are sent with a spoofed source IP address (the victim's IP), causing servers to send large responses to the victim, overwhelming it. Mitigation involves filtering and monitoring unusual CLDAP traffic.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1TnoEpazSZJfAwYAkXIlTi/84c59434f17502d11eeea290e27ba4f4/image4.png" />
          </figure><p>We also saw a 2,301% QoQ increase in ESP reflection/amplification attacks. The ESP (Encapsulating Security Payload) protocol is part of <a href="https://www.cloudflare.com/learning/network-layer/what-is-ipsec/"><u>IPsec</u></a> and provides confidentiality, authentication, and integrity to network communications. However, it can be abused in DDoS attacks if malicious actors exploit misconfigured or vulnerable systems to reflect or amplify traffic towards a target, leading to service disruption. Like with other protocols, securing and properly configuring the systems using ESP is crucial to block the risks of DDoS attacks.</p>
    <div>
      <h2>Attack size &amp; duration</h2>
      <a href="#attack-size-duration">
        
      </a>
    </div>
    <p>Despite the increase in hyper-volumetric attacks, most DDoS attacks are small. In 2025 Q1, 99% of Layer 3/4 DDoS attacks were under 1 Gbps and 1 Mpps. Similarly, 94% of HTTP DDoS attacks were 1 million requests per second (rps). However, ‘small’ is a relative term and most Internet properties wouldn’t be able to withstand even those small attacks. They can easily saturate unprotected Internet links and crash unprotected servers.</p><p>Furthermore, most attacks are very short-lived. 89% of Layer 3/4 DDoS attacks and 75% of HTTP DDoS attacks end within 10 minutes. Even the largest, record-breaking, hyper-volumetric DDoS attacks can be very short, such as the 35-second attack seen in the examples above. 35 seconds, or even 10 minutes, is not a sufficient time for manual mitigation or activating an on-demand solution: by the time a security analyst receives the alert, and analyzes the attack, it’s already over. And while the attacks may be very short, the trickle effect of attack leads to network and applications failures that can take days to recover from — all whilst services are down or degraded. The current threat landscape leaves no time for human intervention. Detection and mitigation should be always-on, in-line and automated — with sufficient capacity and global coverage to handle the attack traffic along with legitimate peak time traffic.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Qb588RBcnkgWlTyqpP1gF/9b582d0a766be5e200b4a608a5fc2ee0/image7.png" />
          </figure><p>On the other hand, hyper-volumetric HTTP DDoS attacks that exceed 1 Mrps doubled their share. In 2025 Q1, 6 out of every 100 HTTP DDoS attacks exceeded 1 Mrps. On the network-layer, 1 out of every 100,000 attacks exceeded 1 Tbps or 1 Bpps.</p>
    <div>
      <h3>Attack example</h3>
      <a href="#attack-example">
        
      </a>
    </div>
    <p>One example of such an attack targeted a <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> customer. The customer itself is a US-based hosting provider that offers web servers, <a href="https://www.cloudflare.com/learning/video/what-is-voip/"><u>Voice over IP (VoIP)</u></a> servers, and game servers amongst its solutions. This specific attack targeted port 27015. This port is most commonly associated with multiplayer gaming servers, especially Valve's Source engine games, such as Counter-Strike: Global Offensive (CS:GO), Team Fortress 2, Garry's Mod, Left 4 Dead, and Half-Life 2: Deathmatch.</p><p>It's used for the game server connection, letting clients connect to the server to play online. In many cases, this port is open for both UDP and TCP, depending on the game and what kind of communication it's doing. This customer was targeted with multiple hyper-volumetric attacks that were autonomously blocked by Cloudflare.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YQNMOEL84t0oPfNpYiSnF/ee44629d6a191c23eddc1bb36a66b879/image8.png" />
          </figure>
    <div>
      <h2>Top attacked locations</h2>
      <a href="#top-attacked-locations">
        
      </a>
    </div>
    <p>The first quarter of 2025 saw a significant shift in the top 10 <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-country"><u>most attacked locations</u></a> globally. Germany made a notable jump, climbing four spots — making it the most attacked country. In second place, Turkey also experienced a surge of 11 spots. In third, China, on the other hand, slipped two spots compared to the previous quarter, while Hong Kong remained unchanged. India rose four spots, and Brazil stayed the same. Taiwan dropped four positions. The Philippines experienced the largest decline, falling 6 spots. South Korea and Indonesia, however, both jumped up by two spots each.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1EZzoKCRJBdxvb4loWUImY/eb7ae5cf9c66b4fc551a8d60cf22b03b/image15.png" />
          </figure>
    <div>
      <h2>Top attacked industries</h2>
      <a href="#top-attacked-industries">
        
      </a>
    </div>
    <p>The top 10 <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-industry"><u>most attacked industries</u></a> in 2025 Q1 saw some notable changes. The Gambling &amp; Casinos industry jumped up four spots as the most attacked industry, while the Telecommunications, Service Providers and Carriers industry slid down one spot. The Information Technology &amp; Services and Internet industries both saw minor fluctuations, moving up one and down two spots, respectively. The Gaming and <a href="https://www.cloudflare.com/banking-and-financial-services/">Banking &amp; Financial Services industries</a> both saw a one-spot increase, while the Cyber Security industry made a massive leap of 37 spots compared to the previous quarter. Retail saw a slight decline of one spot, while the Manufacturing, Machinery, Technology &amp; Engineering industry surged 28 spots. The Airlines, Aviation &amp; Aerospace industry had the biggest jump of all, moving up 40 spots making it the tenth most attacked industry.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1G4wkWm6UVSR5sgPY3NjP6/fe1311ec9e7b8a2485fea2014346d65b/image16.png" />
          </figure>
    <div>
      <h2>Top attack sources</h2>
      <a href="#top-attack-sources">
        
      </a>
    </div>
    <p>The ranking of the top 10 <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#source-country"><u>largest sources of DDoS attacks</u></a> in 2025 Q1 also shifted notably. Hong Kong soared to the number one position, climbing three spots from the previous quarter. Indonesia edged down to second place, while Argentina rose two spots to third. Singapore slipped two spots to fourth, and Ukraine dropped one to fifth. Brazil made a striking leap, climbing seven places to land in sixth place, closely followed by Thailand, which also rose seven spots to seventh. Germany also increased, moving up two positions to eighth. Vietnam made the most dramatic climb, jumping 15 spots to claim ninth place, while Bulgaria rounded out the list, dipping two spots to tenth.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7tPgUpT7o7ifuMAu2aODrq/b19b39fc919f95b569a187f1ddf66ec0/image3.png" />
          </figure>
    <div>
      <h3>Top source ASNs</h3>
      <a href="#top-source-asns">
        
      </a>
    </div>
    <p>An <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>ASN (Autonomous System Number)</u></a> is a unique identifier assigned to a network or group of IP networks that operate under a single routing policy on the Internet. It’s used to exchange routing information between systems using protocols like <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/"><u>BGP (Border Gateway Protocol)</u></a>.</p><p>When looking at where the DDoS attacks originate from, specifically HTTP DDoS attacks, there are a few autonomous systems that stand out. In 2025 Q1, the German-based <a href="https://radar.cloudflare.com/as24940"><u>Hetzner (AS24940)</u></a> retained its position as the largest source of HTTP DDoS attacks. It was followed by the French-based <a href="https://radar.cloudflare.com/as16276"><u>OVH (AS16276)</u></a> in second, the US-based <a href="https://radar.cloudflare.com/as14061"><u>DigitalOcean (AS14061)</u></a> in third, and another German-based provider, <a href="https://radar.cloudflare.com/as51167"><u>Contabo (AS51167)</u></a>, in fourth. </p><p>Other major sources included the China-based <a href="https://radar.cloudflare.com/as4134"><u>ChinaNet Backbone (AS4134)</u></a> and <a href="https://radar.cloudflare.com/as132203"><u>Tencent (AS132203)</u></a>, the Austrian-based <a href="https://radar.cloudflare.com/as200373"><u>Drei (AS200373)</u></a>, and three US-based providers to wrap up the top 10 — <a href="https://radar.cloudflare.com/as8075"><u>Microsoft (AS8075)</u></a>, <a href="https://radar.cloudflare.com/as31898"><u>Oracle (AS31898)</u></a>, and <a href="https://radar.cloudflare.com/as396982"><u>Google Cloud Platform (AS396982)</u></a>. Most of the networks in this ranking are well-known cloud computing or hosting providers, highlighting how cloud infrastructure is frequently leveraged — either intentionally or through exploitation — for launching DDoS attacks.</p><p>To help hosting providers, cloud computing providers and any Internet service providers identify and take down the abusive accounts that launch these attacks, we leverage Cloudflare’s unique vantage point to provide a <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/"><u>free DDoS Botnet Threat Feed for Service Providers</u></a>. Over 600 organizations worldwide have already signed up for this feed. It gives service providers a list of offending IP addresses from within their ASN that we see launching HTTP DDoS attacks. It’s completely free and all it takes is opening a free Cloudflare account, authenticating the ASN via <a href="https://docs.peeringdb.com/howto/authenticate/"><u>PeeringDB</u></a>, and then <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/#get-full-report"><u>fetching the threat intelligence via API</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4AX4nalnfQuGKu7rea9HLM/7b2c0f6919aab8627ddcf0fff2a2449a/image13.png" />
          </figure>
    <div>
      <h2>Helping build a better Internet</h2>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>At Cloudflare, our mission is to help build a better Internet. A key part of that commitment is offering free protection against DDoS attacks, as well as supporting the broader Internet community by providing free tools to help other networks detect and dismantle botnets operating within their infrastructure.</p><p>As the threat landscape continues to evolve, we see that many organizations still adopt DDoS protection only after experiencing an attack or rely on outdated, on-demand solutions. In contrast, our data shows that those with proactive security strategies are far more resilient. That’s why we focus on automation and a comprehensive, always-on, in-line security approach to stay ahead of both existing and emerging threats.</p><p>Backed by our global network with 348 Tbps of capacity spanning 335 cities, we remain dedicated to delivering unmetered, unlimited DDoS protection, regardless of the size, duration, or frequency of attacks.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Mirai]]></category>
            <guid isPermaLink="false">4xYQnrTgTa1v8bY1lRyu4G</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare thwarts over 47 million cyberthreats against Jewish and Holocaust educational websites]]></title>
            <link>https://blog.cloudflare.com/cloudflare-thwarts-over-47-million-cyberthreats-against-jewish-and-holocaust/</link>
            <pubDate>Mon, 27 Jan 2025 22:07:41 GMT</pubDate>
            <description><![CDATA[ January 27 marks the International Holocaust Remembrance Day — a solemn occasion to honor the memory of the six million Jews who perished in the Holocaust, along with countless others who fell victim ]]></description>
            <content:encoded><![CDATA[ <p></p><p>January 27 marks the <a href="https://en.wikipedia.org/wiki/International_Holocaust_Remembrance_Day"><u>International Holocaust Remembrance Day</u></a> — a solemn occasion to honor the memory of the six million Jews who perished in the Holocaust, along with countless others who fell victim to the Nazi regime's campaign of hatred and intolerance. This tragic chapter in human history serves as a stark reminder of the catastrophic consequences of prejudice and extremism. </p><p>The United Nations General Assembly designated January 27 — the anniversary of the liberation of <a href="https://en.wikipedia.org/wiki/Auschwitz_concentration_camp"><u>Auschwitz-Birkenau</u></a> —  as International Holocaust Remembrance Day. This year, we commemorate the 80th anniversary of the liberation of this infamous extermination camp.</p><p>As the world reflects on this dark period, a troubling resurgence of antisemitism underscores the importance of vigilance. This growing hatred has spilled into the digital realm, with cyberattacks increasingly targeting Jewish and Holocaust remembrance and educational websites — spaces dedicated to preserving historical truth and fostering awareness.</p><p>For this reason, here at Cloudflare, we began to publish annual reports covering cyberattacks that target these organizations. These cyberattacks include <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/"><u>DDoS attacks</u></a> as well as <a href="https://www.cloudflare.com/learning/bots/what-is-a-bot/"><u>bot</u></a> and <a href="https://www.cloudflare.com/en-gb/learning/security/what-is-web-application-security/"><u>application attacks</u></a>. The insights and trends are based on websites protected by Cloudflare. This is our fourth report, and you can view our previous Holocaust Remembrance Day blogs <a href="https://blog.cloudflare.com/tag/holocaust/"><u>here</u></a>.</p>
    <div>
      <h2>Project Galileo</h2>
      <a href="#project-galileo">
        
      </a>
    </div>
    <p>At Cloudflare, we are proud to support these vital organizations through <a href="https://www.cloudflare.com/en-gb/galileo/"><u>Project Galileo</u></a>, an initiative providing free security protections to vulnerable groups worldwide. If you or your organization could benefit from this program, consider applying today to help protect these essential platforms and the invaluable work they do.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3tyusSSEjith2HMfONmpfZ/d7a47e9faa2b0003ae4e3c2ab1c01722/BLOG-2659_2.png" />
          </figure><p><sup><i>Project Galileo overview. Source: </i></sup><a href="https://cf-assets.www.cloudflare.com/slt3lc6tev37/7bEraZE4BmpaCFfYYHxbaU/20dda9014ac14793e61daaff0783eee5/2024_Cloudflare_Impact_Report.pdf"><sup><i><u>Cloudflare 2024 Impact Report</u></i></sup></a><sup><i></i></sup></p><p>One of the organizations that we protect through Project Galileo is <a href="https://muzeon.ro/en/"><u>Muzeon</u></a>, a museum dedicated to preserving Jewish history in Cluj-Napoca, Romania. Muzeon faced significant cyberattacks that impacted their website’s performance and hindered operations before using Cloudflare.</p><p>As part of Project Galileo, Muzeon implemented Cloudflare's <a href="https://www.cloudflare.com/en-gb/ddos/"><u>DDoS mitigation</u></a>, <a href="https://www.cloudflare.com/en-gb/application-services/products/waf/"><u>Web Application Firewall (WAF)</u></a>, <a href="https://www.cloudflare.com/application-services/products/dns/"><u>Managed DNS</u></a>, and other services. These measures drastically reduced the attacks and allowed Muzeon to focus on its important mission of storytelling and preserving cultural heritage. </p><p>Cloudflare’s solutions not only protected their digital infrastructure but also freed up time for Muzeon to expand its interactive exhibits, ensuring they could continue sharing their essential work globally. You can read more about this case study <a href="https://www.cloudflare.com/en-gb/case-studies/muzeon/"><u>here</u></a>. </p>
    <div>
      <h2>Significant rise in antisemitism around the world</h2>
      <a href="#significant-rise-in-antisemitism-around-the-world">
        
      </a>
    </div>
    <p>Following the October 7, 2023, <a href="https://en.wikipedia.org/wiki/October_7_Hamas-led_attack_on_Israel"><u>Hamas-led attack</u></a> on Israel, there has been a <a href="https://en.wikipedia.org/wiki/Antisemitism_during_the_Israel%E2%80%93Hamas_war"><u>surge in global antisemitic incidents</u></a>. In the <a href="https://www.adl.org/resources/press-release/over-10000-antisemitic-incidents-recorded-us-oct-7-2023-according-adl"><u>U.S. alone</u></a> there have been more than 10,000 antisemitic incidents from October 7, 2023 to September 24, 2024, representing an over 200-percent increase compared to the incidents reported during the same period a year before. As we’ve seen, the digital world is often a mirror to the real world. As a result, it is not surprising that websites dedicated to sharing information about the Holocaust, as well as Jewish memorial and education platforms, are now increasingly being targeted online. </p>
    <div>
      <h2>Cyberattacks against Jewish and Holocaust educational websites </h2>
      <a href="#cyberattacks-against-jewish-and-holocaust-educational-websites">
        
      </a>
    </div>
    <p>For the years 2020, 2021, and 2022, the number of cyberthreats targeting Holocaust and Jewish educational and memorial websites protected by Cloudflare was, on average, 736,339 malicious HTTP requests annually.</p><p>After the October 7 Hamas-led attack, cyberattacks skyrocketed. In 2023, the amount of blocked HTTP requests surged by 872% to 35.7 million compared to 2022. Most of these cyberattacks occurred after October 7, 2023. </p><p>In 2024, the number of blocked HTTP requests exceeded 47 million — representing a 30% increase compared to 2023. Over 3 out of every 100 HTTP requests towards Holocaust and Jewish memorial and education websites protected by Cloudflare were malicious and blocked. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6p2NxGtyK3jDccp2G0MMvF/c7777304675f36f8cbe301f92a6dc5ec/BLOG-2659_3.png" />
          </figure><p><sup><i>Cyber threats against Holocaust and Jewish memorial and educational websites by year</i></sup></p>
    <div>
      <h3>Cyberattacks by quarter</h3>
      <a href="#cyberattacks-by-quarter">
        
      </a>
    </div>
    <p>In the fourth quarter of 2023, the volume of malicious requests exceeded 27 million. Throughout the first three quarters of 2024, we saw a gradual decrease in the quantity of malicious requests. But in the fourth quarter of 2024, cyberattacks spiked by 33%, to 36 million requests, following the one-year anniversary of the October 7 assault.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1YFVY3jTbMYsgbenBdor1P/6634fdf6edce5a5f3d44f34fdf017b3d/BLOG-2659_4.png" />
          </figure><p><sup><i>Cyber threats against Holocaust and Jewish memorial and educational websites by quarter</i></sup></p>
    <div>
      <h3>Cyberattacks by month</h3>
      <a href="#cyberattacks-by-month">
        
      </a>
    </div>
    <p>Breaking down the quarters into months, we can see an initial peak in October 2023 after the October 7 Hamas-led attack. The volume of cyberattacks remained elevated during November and December 2023.</p><p>Afterward, as we entered 2024, the quantity and percentage of cyberattacks against these websites significantly decreased. In November, over a third (34%) of all requests towards these websites were blocked, with over 36 million requests blocked that month alone.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5JGzGCm49GBBZMYfriSTpl/1f47b7b90bb5607461216fd2788c2f34/BLOG-2659_5.png" />
          </figure><p><sup><i>Cyber threats against Holocaust and Jewish memorial and educational websites by month</i></sup></p>
    <div>
      <h2>Helping build a safer Internet and a better world</h2>
      <a href="#helping-build-a-safer-internet-and-a-better-world">
        
      </a>
    </div>
    <p>On the International Holocaust Remembrance Day, we reflect on the importance of standing against both antisemitism and cyber threats — issues that have escalated since the October 7, 2023, Hamas-led attack. </p><p>At Cloudflare, we are unwavering in our commitment to create a safer, more inclusive Internet. The rise in antisemitism has made it even more critical to protect educational websites and communities from harmful cyber attacks. We invite everyone to join us in this fight. Even with our <a href="https://www.cloudflare.com/en-gb/plans/"><u>free plan</u></a>, we offer strong security and performance, ensuring that vital resources and websites remain safe and accessible. By working together, we can protect the lessons of history and foster a more secure digital world for all.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Network Services]]></category>
            <category><![CDATA[Judeoflare]]></category>
            <category><![CDATA[Holocaust]]></category>
            <guid isPermaLink="false">4tycw0mGr6bpp3AbV17wEK</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2024-q4/</link>
            <pubDate>Tue, 21 Jan 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ 2024 ended with a bang. Cloudflare mitigated another record-breaking DDoS attack peaking at 5.6 Tbps. ]]></description>
            <content:encoded><![CDATA[ <p>Welcome to the 20th edition of the Cloudflare DDoS Threat Report, marking five years since our first report in 2020.</p><p>Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of <a href="https://www.cloudflare.com/en-gb/learning/ddos/glossary/denial-of-service/"><u>Distributed Denial of Service (DDoS) attacks</u></a> based on data from the <a href="https://www.cloudflare.com/network/"><u>Cloudflare network</u></a>. In this edition, we focus on the fourth quarter of 2024 and look back at the year as a whole.</p>
    <div>
      <h2>Cloudflare’s unique vantage point</h2>
      <a href="#cloudflares-unique-vantage-point">
        
      </a>
    </div>
    <p>When we published our <a href="https://blog.cloudflare.com/network-layer-ddos-attack-trends-for-q1-2020/"><u>first report</u></a>, Cloudflare’s global network capacity was 35 Terabits per second (Tbps). Since then, our network’s capacity has grown by 817% to 321 Tbps. We also significantly expanded our global presence by 65% from 200 cities in the beginning of 2020 to 330 cities by the end of 2024.</p><p>Using this massive network, we now serve and protect nearly <a href="https://w3techs.com/technologies/overview/proxy"><u>20% of all websites</u></a> and close to 18,000 unique Cloudflare customer <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-subnet/"><u>IP networks</u></a>. This extensive infrastructure and customer base uniquely positions us to provide key insights and trends that benefit the wider Internet community.</p>
    <div>
      <h2>Key DDoS insights</h2>
      <a href="#key-ddos-insights">
        
      </a>
    </div>
    <ul><li><p>In 2024, Cloudflare’s autonomous DDoS defense systems blocked around 21.3 million DDoS attacks, representing a 53% increase compared to 2023. On average, in 2024, Cloudflare blocked 4,870 DDoS attacks every hour.</p></li><li><p>In the fourth quarter, over 420 of those attacks were hyper-volumetric, exceeding rates of 1 billion packets per second (pps) and 1 Tbps. Moreover, the amount of attacks exceeding 1 Tbps grew by a staggering 1,885% quarter-over-quarter.</p></li><li><p>During the week of Halloween 2024, Cloudflare’s DDoS defense systems successfully and autonomously detected and blocked a 5.6 Terabit per second (Tbps) DDoS attack — the largest attack ever reported.</p></li></ul><p><i>To learn more about DDoS attacks and other types of cyber threats, visit our </i><a href="https://www.cloudflare.com/learning/"><i><u>Learning Center</u></i></a><i>, access </i><a href="https://blog.cloudflare.com/tag/ddos-reports"><i><u>previous DDoS threat reports</u></i></a><i> on the Cloudflare blog, or visit our interactive hub, </i><a href="https://radar.cloudflare.com/reports?q=DDoS"><i><u>Cloudflare Radar</u></i></a><i>. There's also a </i><a href="https://developers.cloudflare.com/radar/"><i><u>free API</u></i></a><i> for those interested in investigating these and other Internet trends. You can also learn more about the </i><a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/"><i><u>methodologies</u></i></a><i> used in preparing these reports.</i></p>
    <div>
      <h2>Anatomy of a DDoS attack</h2>
      <a href="#anatomy-of-a-ddos-attack">
        
      </a>
    </div>
    <p>In 2024 Q4 alone, Cloudflare mitigated 6.9 million DDoS attacks. This represents a 16% increase quarter-over-quarter (QoQ) and 83% year-over-year (YoY).</p><p>Of the 2024 Q4 DDoS attacks, 49% (3.4 million) were <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/"><u>Layer 3</u></a>/<a href="https://www.cloudflare.com/learning/network-layer/what-is-the-network-layer/"><u>Layer 4</u></a> DDoS attacks and 51% (3.5 million) were HTTP DDoS attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/33qc2yEBIE4Tmq6ke3dOIY/398216db2fb03e6093f55dac35394568/image13.png" />
          </figure><p><sup><i>Distribution of 6.9 million DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>HTTP DDoS attacks</h2>
      <a href="#http-ddos-attacks">
        
      </a>
    </div>
    <p>The majority of the HTTP DDoS attacks (73%) were launched by known <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">botnets</a>. Rapid detection and blocking of these attacks were made possible as a result of operating a massive network and seeing many types of attacks and botnets. In turn, this allows our security engineers and researchers to craft heuristics to increase mitigation efficacy against these attacks.</p><p>An additional 11% were HTTP DDoS attacks that were caught pretending to be a legitimate browser. Another 10% were attacks which contained suspicious or unusual HTTP attributes. The remaining 8% “Other” were generic <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/"><u>HTTP floods</u></a>, volumetric cache busting attacks, and volumetric attacks targeting login endpoints.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/27nsCB9HReu48XtiJKufwg/cb8814d1cc390e4cd1ffea9316fd589e/image19.png" />
          </figure><p><sup><i>Top HTTP DDoS attack vectors: 2024 Q4</i></sup></p><p>These <a href="https://www.cloudflare.com/learning/security/glossary/attack-vector/">attack vectors</a>, or attack groups, are not necessarily exclusive. For example, known botnets also impersonate browsers and have suspicious HTTP attributes, but this breakdown is our attempt to categorize the HTTP DDoS attacks in a meaningful way.</p>
    <div>
      <h3>Top user agents</h3>
      <a href="#top-user-agents">
        
      </a>
    </div>
    <p>As of this report’s publication, the current stable version of Chrome for Windows, Mac, iOS, and Android is 132, according to Google’s <a href="https://chromereleases.googleblog.com/"><u>release notes</u></a>. However, it seems that threat actors are still behind, as thirteen of the top user agents that appeared most frequently in DDoS attacks were Chrome versions ranging from 118 to 129.</p><p>The HITV_ST_PLATFORM user agent had the highest share of DDoS requests out of total requests (99.9%), making it the user agent that’s used almost exclusively in DDoS attacks. In other words, if you see traffic coming from the HITV_ST_PLATFORM user agent, there is a 0.1% chance that it is legitimate traffic.</p><p>Threat actors often avoid using uncommon user agents, favoring more common ones like Chrome to blend in with regular traffic. The presence of the HITV_ST_PLATFORM user agent, which is associated with smart TVs and set-top boxes, suggests that the devices involved in certain cyberattacks are compromised smart TVs or set-top boxes. This observation highlights the importance of securing all Internet-connected devices, including smart TVs and set-top boxes, to prevent them from being exploited in cyberattacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5uUCjjPdGu63u7OmgRE6Yw/4b15c1e88cfe86ae0bc5824346908b24/image18.png" />
          </figure><p><sup><i>Top user agents abused in DDoS attacks: 2024 Q4</i></sup></p><p>The user agent <a href="https://github.com/benoitc/hackney"><u>hackney</u></a> came in second place, with 93% of requests containing this user agent being part of a DDoS attack. If you encounter traffic coming from the hackney user agent, there is a 7% chance that it is legitimate traffic. Hackney is an HTTP client library for Erlang, used for making HTTP requests and is popular in Erlang/Elixir ecosystems.</p><p>Additional user agents that were used in DDoS attacks are <a href="https://www.utorrent.com/"><u>uTorrent</u></a>, which is associated with a popular BitTorrent client for downloading files. <a href="https://pkg.go.dev/net/http"><u>Go-http-client</u></a> and <a href="https://github.com/valyala/fasthttp"><u>fasthttp</u></a> were also commonly used in DDoS attacks. The former is the default HTTP client in Go’s standard library and the latter is a high-performance alternative. fasthttp is used to build fast web applications, but is often exploited for DDoS attacks and <a href="https://www.cloudflare.com/learning/ai/how-to-prevent-web-scraping/">web scraping</a> too.</p>
    <div>
      <h2>HTTP attributes commonly used in DDoS attacks</h2>
      <a href="#http-attributes-commonly-used-in-ddos-attacks">
        
      </a>
    </div>
    
    <div>
      <h3>HTTP methods</h3>
      <a href="#http-methods">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/"><u>HTTP methods</u></a> (also called HTTP verbs) define the action to be performed on a resource on a server. They are part of the HTTP protocol and allow communication between clients (such as browsers) and servers.</p><p>The GET method is most commonly used. Almost 70% of legitimate HTTP requests made use of the GET method. In second place is the POST method with a share of 27%.</p><p>With DDoS attacks, we see a different picture. Almost 14% of HTTP requests using the HEAD method were part of a DDoS attack, despite it hardly being present in legitimate HTTP requests (0.75% of all requests). The DELETE method came in second place, with around 7% of its usage being for DDoS purposes.</p><p>The disproportion between methods commonly seen in DDoS attacks versus their presence in legitimate traffic definitely stands out. Security administrators can use this information to optimize their security posture based on these headers.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1fD5aUHaIkRMUNPZJI0LKW/d5856e7ce13cb7d1e28727401b885b1a/image10.png" />
          </figure><p><sup><i>Distribution of HTTP methods in DDoS attacks and legitimate traffic: 2024 Q4</i></sup></p>
    <div>
      <h3>HTTP paths</h3>
      <a href="#http-paths">
        
      </a>
    </div>
    <p>An HTTP path describes a specific server resource. Along with the HTTP method, the server will perform the action on the resource.</p><p>For example, GET <a href="https://developers.cloudflare.com/ddos-protection/"><u>https://developers.cloudflare.com/ddos-protection/</u></a> will instruct the server to retrieve the content for the resource /ddos-protection/.</p><p>DDoS attacks often target the root of the website (“/”), but in other cases, they can target specific paths. In 2024 Q4, 98% of HTTP requests towards the /wp-admin/ path were part of DDoS attacks. The /wp-admin/ path is the default <a href="https://wordpress.com/support/dashboard/"><u>administrator dashboard for WordPress websites</u></a>.</p><p>Obviously, many paths are unique to the specific website, but in the graph below, we’ve provided the top <i>generic</i> paths that were attacked the most. Security administrators can use this data to strengthen their protection on these endpoints, as applicable. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/I9SweJVs4sLYjgHy469NN/b7d0e76648b0ec26af32143a45dc1dd6/image21.png" />
          </figure><p> <sup><i>Top HTTP paths targeted by HTTP DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>HTTP vs. HTTPS</h2>
      <a href="#http-vs-https">
        
      </a>
    </div>
    <p>In Q4, almost 94% of legitimate traffic was <a href="https://www.cloudflare.com/en-gb/learning/ssl/what-is-https/"><u>HTTPS</u></a>. Only 6% was plaintext HTTP (not encrypted). Looking at DDoS attack traffic, around 92% of HTTP DDoS attack requests were over HTTPS and almost 8% were over plaintext HTTP.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1grfbkXvzjh8nXJYtrhiJP/8ff46ac59d296fcad89475f2bc242184/unnamed__2_.png" />
          </figure><p><sup><i>HTTP vs. HTTPS in legitimate traffic and DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>Layer 3/Layer 4 DDoS attacks</h2>
      <a href="#layer-3-layer-4-ddos-attacks">
        
      </a>
    </div>
    <p>The top three most common Layer 3/Layer 4 (network layer) attack vectors were <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/"><u>SYN flood</u></a> (38%), <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/"><u>DNS flood attacks</u></a> (16%), and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/"><u>UDP floods</u></a> (14%).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1hXTXtKe2kVD9fjw26aIN8/7bbd5ef01b04a3bba28232cdcf876c3a/image1.png" />
          </figure><p><sup><i>Top L3/4 DDoS attack vectors: 2024 Q4</i></sup></p><p>An additional common attack vector, or rather, botnet type, is <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/"><u>Mirai</u></a>. Mirai attacks accounted for 6% of all network layer DDoS attacks — a 131% increase QoQ. In 2024 Q4, a Mirai-variant botnet was responsible for the largest DDoS attack on record, but we’ll discuss that further in the <a href="#the-largest-ddos-attack-on-record"><u>next section</u></a>.</p>
    <div>
      <h2>Emerging attack vectors</h2>
      <a href="#emerging-attack-vectors">
        
      </a>
    </div>
    <p>Before moving on to the next section, it’s worthwhile to discuss the growth in additional attack vectors that were observed this quarter. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Hz074MxtzzdG4uvCM8P93/af6c86b023160f66acf0fe209386acf7/image8.png" />
          </figure><p><sup><i>Top emerging threats: 2024 Q4</i></sup></p><p><sup><i></i></sup><a href="https://www.cloudflare.com/learning/ddos/memcached-ddos-attack/"><u>Memcached DDoS attacks</u></a> saw the largest growth, with a 314% QoQ increase. <a href="https://memcached.org/"><u>Memcached</u></a> is a database caching system for speeding up websites and networks. Memcached servers that support <a href="https://www.cloudflare.com/learning/ddos/glossary/user-datagram-protocol-udp/">UDP</a> can be abused to launch amplification or reflection DDoS attacks. In this case, the attacker would request content from the caching system and spoof the victim's IP address as the source IP in the UDP packets. The victim will be flooded with the Memcache responses, which can be up to 51,200x larger than the initial request.</p><p>BitTorrent DDoS attacks also surged this quarter by 304%. The <a href="https://en.wikipedia.org/wiki/BitTorrent"><u>BitTorrent protocol</u></a> is a communication protocol used for peer-to-peer file sharing. To help the BitTorrent clients find and download the files efficiently, BitTorrent clients may utilize <a href="https://en.wikipedia.org/wiki/BitTorrent_tracker"><u>BitTorrent Trackers</u></a> or <a href="https://en.wikipedia.org/wiki/Distributed_hash_table"><u>Distributed Hash Tables (DHT)</u></a> to identify the peers that are <a href="https://en.wikipedia.org/wiki/Glossary_of_BitTorrent_terms#Seed_/_seeding"><u>seeding</u></a> the desired file. This concept can be abused to launch DDoS attacks. A malicious actor can <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/"><u>spoof</u></a> the victim’s IP address as a seeder IP address within Trackers and DHT systems. Then clients would request the files from those IP addresses. Given a sufficient number of clients requesting the file, it can flood the victim with more traffic than it can handle.</p>
    <div>
      <h2>The largest DDoS attack on record</h2>
      <a href="#the-largest-ddos-attack-on-record">
        
      </a>
    </div>
    <p>On October 29, a 5.6 Tbps <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/"><u>UDP DDoS attack</u></a> launched by a Mirai-variant botnet targeted a Cloudflare <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Magic Transit</u></a> customer, an Internet service provider (ISP) from Eastern Asia. The attack lasted only 80 seconds and originated from over 13,000 <a href="https://www.cloudflare.com/learning/ddos/glossary/internet-of-things-iot/"><u>IoT</u></a> devices. Detection and mitigation were fully autonomous by Cloudflare’s distributed defense systems. It required no human intervention, didn’t trigger any alerts, and didn’t cause any performance degradation. The systems worked as intended.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/kx3Uj4y4G4KZ6yNritxg4/d47e8f1b51a630bce28e8b036a4e7b64/image16.png" />
          </figure><p><sup><i>Cloudflare’s autonomous DDoS defenses mitigate a 5.6 Tbps Mirai DDoS attack without human intervention</i></sup></p><p>While the total number of unique source IP addresses was around 13,000, the average unique source IP addresses per second was 5,500. We also saw a similar number of unique source ports per second. In the graph below, each line represents one of the 13,000 different source IP addresses, and as portrayed, each contributed less than 8 Gbps per second. The average contribution of each IP address per second was around 1 Gbps (~0.012% of 5.6 Tbps).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2biclYyny81QnJxQpP3PcF/8e1ec9c4b227043b1bd05914c1f543b1/image14.png" />
          </figure><p><sup><i>The 13,000 source IP addresses that launched the 5.6 Tbps DDoS attack</i></sup></p>
    <div>
      <h2>Hyper-volumetric DDoS attacks</h2>
      <a href="#hyper-volumetric-ddos-attacks">
        
      </a>
    </div>
    <p>In 2024 Q3, we started seeing a rise in hyper-volumetric network layer DDoS attacks. In 2024 Q4, the amount of attacks exceeding 1 Tbps increased by 1,885% QoQ and attacks exceeding 100 Million pps (packets per second) increased by 175% QoQ. 16% of the attacks that exceeded 100 Million pps also exceeded 1 Billion pps.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3L3X48ztfIeGRVe3Su009z/b6798328b8926b33ea78b0617ee3aad5/image6.png" />
          </figure><p><sup><i>Distribution of hyper-volumetric L3/4 DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>Attack size</h2>
      <a href="#attack-size">
        
      </a>
    </div>
    <p>The majority of HTTP DDoS attacks (63%) did not exceed 50,000 requests per second. On the other side of the spectrum, 3% of HTTP DDoS attacks exceeded 100 million requests per second.</p><p>Similarly, the majority of network layer DDoS attacks are also small. 93% did not exceed 500 Mbps and 87% did not exceed 50,000 packets per second. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/25TQ7mayQOrr3ZpG1yLADa/ce08756eec2fbb2b213aad1668d59b4f/unnamed.png" />
          </figure><p><sup><i>QoQ change in attack size by packet rate: 2024 Q4</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1eNqV8gIxZgukwropBeyvs/23f128993b6573a3acb6e2a33306813d/unnamed__1_.png" />
          </figure><p><sup><i>QoQ change in attack size by bit rate: 2024 Q4</i></sup></p>
    <div>
      <h2>Attack duration</h2>
      <a href="#attack-duration">
        
      </a>
    </div>
    <p>The majority of HTTP DDoS attacks (72%) end in under ten minutes. Approximately 22% of HTTP DDoS attacks last over one hour, and 11% last over 24 hours.</p><p>Similarly, 91% of network layer DDoS attacks also end within ten minutes. Only 2% last over an hour.</p><p>Overall, there was a significant QoQ decrease in the duration of DDoS attacks. Because the duration of most attacks is so short, it is not feasible, in most cases, for a human to respond to an alert, analyze the traffic, and apply mitigation. The short duration of attacks emphasizes the need for an <a href="https://www.cloudflare.com/ddos/">in-line, always-on, automated DDoS protection service</a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Yfb7JGpZ2GTXR2HYK5pAS/55a1dbf4eec229e7154cf223d542e3bf/unnamed__3_.png" />
          </figure><p><sup><i>QoQ change in attack duration: 2024 Q4</i></sup></p>
    <div>
      <h2>Attack sources</h2>
      <a href="#attack-sources">
        
      </a>
    </div>
    <p>In the last quarter of 2024, Indonesia remained the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#source-country"><u>largest source of DDoS attacks</u></a> worldwide for the second consecutive quarter. To understand where attacks are coming from, we map the source IP addresses launching HTTP DDoS attacks because they cannot be spoofed, and for Layer 3/Layer 4 DDoS attacks, we use the location of our data centers where the DDoS packets were ingested. This lets us overcome the spoofability that is possible in Layer 3/Layer 4. We’re able to achieve geographical accuracy due to our extensive network spanning over 330 cities around the world.</p><p>Hong Kong came in second, having moved up five spots from the previous quarter. Singapore advanced three spots, coming in third place.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Z7DgqDBlKbd3eDRv7ZVmL/49aabaee6301a3c93bb40851e645dd42/image2.png" />
          </figure><p><sup><i>Top 10 largest sources of DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h3>Top source networks</h3>
      <a href="#top-source-networks">
        
      </a>
    </div>
    <p>An <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system</u></a> (AS) is a large network or group of networks that has a unified routing policy. Every computer or device that connects to the Internet is connected to an AS. To find out what your AS is, visit <a href="https://radar.cloudflare.com/ip">https://radar.cloudflare.com/ip</a>.</p><p>When looking at where the DDoS attacks originate from, specifically HTTP DDoS attacks, there are a few autonomous systems that stand out.</p><p>The AS that we saw the most HTTP DDoS attack traffic from in 2024 Q4 was German-based <a href="https://radar.cloudflare.com/security-and-attacks/as24940"><u>Hetzner (AS24940)</u></a>. Almost 5% of all HTTP DDoS requests originated from Hetzer’s network, or in other words, 5 out of every 100 HTTP DDoS requests that Cloudflare blocked originated from Hetzner.</p><p>In second place we have the US-based <a href="https://radar.cloudflare.com/security-and-attacks/as14061"><u>Digital Ocean (AS14061)</u></a>, followed by France-based <a href="https://radar.cloudflare.com/security-and-attacks/as16276"><u>OVH (AS16276)</u></a> in third place.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7pQUunzZ0ioH48lTOJOLVe/8dc42b7904b0f0b838f117ce5f35a35a/image12.png" />
          </figure><p><sup><i>Top 10 largest source networks of DDoS attacks: 2024 Q4</i></sup></p><p>For many network operators such as the ones listed above, it can be hard to identify the malicious actors that abuse their infrastructure for launching attacks. To help network operators and service providers crack down on the abuse, we provide a <b>free</b> <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/"><u>DDoS Botnet threat intelligence feed</u></a> that provides ASN owners a list of their IP addresses that we’ve seen participating in DDoS attacks. </p>
    <div>
      <h2>Top threat actors</h2>
      <a href="#top-threat-actors">
        
      </a>
    </div>
    <p>When surveying Cloudflare customers that were targeted by DDoS attacks, the majority said they didn’t know who attacked them. The ones that did know reported their competitors as the number one threat actor behind the attacks (40%). Another 17% reported that a state-level or state-sponsored threat actor was behind the attack, and a similar percentage reported that a disgruntled user or customer was behind the attack.</p><p>Another 14% reported that an extortionist was behind the attacks. 7% claimed it was a self-inflicted DDoS, 2% reported hacktivism as the cause of the attack, and another 2% reported that the attacks were launched by former employees.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gThccj4k75gfFoGBn301W/403bd5cf3984611490e7d90f3435f3c1/image15.png" />
          </figure><p><sup><i>Top threat actors: 2024 Q4</i></sup></p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>In the final quarter of 2024, as anticipated, we observed a surge in <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/"><u>Ransom DDoS attacks</u></a>. This spike was predictable, given that Q4 is a prime time for cybercriminals, with increased online shopping, travel arrangements, and holiday activities. Disrupting these services during peak times can significantly impact organizations' revenues and cause real-world disruptions, such as flight delays and cancellations.</p><p>In Q4, 12% of Cloudflare customers that were targeted by DDoS attacks reported being threatened or extorted for a ransom payment. This represents a 78% QoQ increase and 25% YoY growth compared to 2023 Q4.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1BV3NoLbxwzO0ShVyCwQ97/7ccb684195b6efef0db209aefffff476/image17.png" />
          </figure><p><sup><i>Reported Ransom DDoS attacks by quarter: 2024</i></sup></p><p>Looking back at the entire year of 2024, Cloudflare received the most reports of Ransom DDoS attacks in May. In Q4, we can see the gradual increase starting from October (10%), November (13%), and December (14%) — a seven-month-high.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/EllNHd6iUWkQ6Z481gLss/a20b10f96d4f7a649dfa23beceebad8e/image9.png" />
          </figure><p><sup><i>Reported Ransom DDoS attacks by month: 2024</i></sup></p>
    <div>
      <h2>Target of attacks</h2>
      <a href="#target-of-attacks">
        
      </a>
    </div>
    <p>In 2024 Q4, China maintained its position as the most <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-country"><u>attacked country</u></a>. To understand which countries are subject to more attacks, we group DDoS attacks by our customers’ billing country. </p><p>Philippines makes its first appearance as the second most attacked country in the top 10. Taiwan jumped to third place, up seven spots compared to last quarter.</p><p>In the map below, you can see the top 10 most attacked locations and their ranking change compared to the previous quarter.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4TosbZ02NmNGbgpwkskUNs/6f96885b4de89c34403551a03a01e634/image5.png" />
          </figure><p><sup><i>Top 10 most attacked locations by DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>Most attacked industries</h2>
      <a href="#most-attacked-industries">
        
      </a>
    </div>
    <p>In the fourth quarter of 2024, the <i>Telecommunications, Service Providers and Carriers</i> industry jumped from the third place (last quarter) to the first place as the most <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-industry"><u>attacked industry</u></a>. To understand which industries are subject to more attacks, we group DDoS attacks by our customers’ industry. The <i>Internet</i> industry came in second, followed by <i>Marketing and Advertising</i> in third.</p><p>The <i>Banking &amp; Financial Services</i> industry dropped seven places from number one in 2024 Q3 to number eight in Q4.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/444JREdNrmb6yePqqfGI4B/a268a1d3d3cd1dd7d9e076ffcf5b06c5/image7.png" />
          </figure><p><sup><i>Top 10 most attacked industries by DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>Our commitment to unmetered DDoS protection</h2>
      <a href="#our-commitment-to-unmetered-ddos-protection">
        
      </a>
    </div>
    <p>The fourth quarter of 2024 saw a surge in hyper-volumetric Layer 3/Layer 4 DDoS attacks, with the largest one breaking our previous record, peaking at 5.6 Tbps. This rise in attack size renders capacity-limited cloud DDoS protection services or on-premise DDoS appliances obsolete.</p><p>The growing use of powerful botnets, driven by geopolitical factors, has broadened the range of vulnerable targets. A rise in Ransom DDoS attacks is also a growing concern.</p><p>Too many organizations only implement DDoS protection after suffering an attack. Our observations show that organizations with proactive security strategies are more resilient. At Cloudflare, we invest in automated defenses and a comprehensive security portfolio to provide proactive protection against both current and emerging threats.</p><p>With our 321 Tbps network spanning 330 cities globally, we remain committed to providing <a href="https://www.cloudflare.com/ddos/">unmetered and unlimited DDoS protection</a> no matter the size, duration and quantity of the attacks.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[DDoS Alerts]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Mirai]]></category>
            <category><![CDATA[Attacks]]></category>
            <guid isPermaLink="false">1qstsc71dUKtPimn2nGewc</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[4.2 Tbps of bad packets and a whole lot more: Cloudflare's Q3 DDoS report]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2024-q3/</link>
            <pubDate>Wed, 23 Oct 2024 13:05:00 GMT</pubDate>
            <description><![CDATA[ The number of DDoS attacks spiked in the third quarter of 2024. Cloudflare mitigated nearly 6 million DDoS attacks, representing a 49% increase QoQ and 55% increase YoY. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Welcome to the 19th edition of the Cloudflare DDoS Threat Report. Released <a href="https://blog.cloudflare.com/tag/ddos-reports"><u>quarterly</u></a>, these reports provide an in-depth analysis of the DDoS threat landscape as observed across the <a href="https://www.cloudflare.com/en-gb/network/"><u>Cloudflare network</u></a>. This edition focuses on the third quarter of 2024.</p><p>With a 296 Terabit per second (Tbps) network located in over 330 cities worldwide, Cloudflare is used as a reverse proxy by <a href="https://w3techs.com/technologies/overview/proxy"><u>nearly 20% of all websites</u></a>. Cloudflare holds a unique vantage point to provide valuable insights and trends to the broader Internet community.</p>
    <div>
      <h2>Key insights </h2>
      <a href="#key-insights">
        
      </a>
    </div>
    <ul><li><p>The number of DDoS attacks spiked in the third quarter of 2024. Cloudflare mitigated nearly 6 million DDoS attacks, representing a 49% increase QoQ and 55% increase YoY.</p></li><li><p>Out of those 6 million, Cloudflare’s autonomous DDoS defense systems detected and mitigated over 200 hyper-volumetric DDoS attacks exceeding rates of 3 terabits per second (Tbps) and 2 billion packets per second (Bpps). The largest attack peaked at 4.2 Tbps and lasted just a minute.</p></li><li><p>The Banking &amp; Financial Services industry was subjected to the most DDoS attacks. China was the country most targeted by DDoS attacks, and Indonesia was the largest source of DDoS attacks.</p></li></ul><p>To learn more about DDoS attacks and other types of cyber threats, visit our <a href="https://www.cloudflare.com/learning/"><u>Learning Center</u></a>, access <a href="https://blog.cloudflare.com/tag/ddos-reports"><u>previous DDoS threat reports</u></a> on the Cloudflare blog, or visit our interactive hub, <a href="https://radar.cloudflare.com/reports?q=DDoS"><u>Cloudflare Radar</u></a>. There's also a <a href="https://developers.cloudflare.com/radar/"><u>free API</u></a> for those interested in investigating these and other Internet trends. You can also learn more about the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/"><u>methodologies</u></a> used in preparing these reports.</p>
    <div>
      <h2>Hyper-volumetric campaign</h2>
      <a href="#hyper-volumetric-campaign">
        
      </a>
    </div>
    <p>In the first half of 2024, Cloudflare’s autonomous DDoS defense systems automatically detected and mitigated 8.5 million DDoS attacks: 4.5 million in Q1 and 4 million in Q2. In Q3, our systems mitigated nearly 6 million DDoS attacks bringing it to a total of 14.5 million DDoS attacks year-to-date. That’s an average of around 2,200 DDoS attacks every hour.</p><p>Of those attacks, Cloudflare mitigated over 200 hyper-volumetric network-layer DDoS attacks that exceeded 1 Tbps or 1 Bpps. The largest attacks peaked at 3.8 Tbps and 2.2 Bpps. <a href="https://blog.cloudflare.com/how-cloudflare-auto-mitigated-world-record-3-8-tbps-ddos-attack"><u>Read more</u></a> about these attacks and how our DDoS defense systems mitigated them autonomously.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2rcAeeVUGfBh72wYAdw3Ji/61403965d12e1da947ddb17bca5994a3/image6.png" />
          </figure><p><sup>Distribution of hyper-volumetric DDoS attacks over time</sup></p><p>As we were writing this blog post, our systems continued to detect and mitigate these massive attacks and a new record has just been broken again, only three weeks after our last disclosure. On October 21, 2024, Cloudflare’s systems autonomously detected and mitigated a 4.2 Tbps DDoS attack that lasted around a minute.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4PwoLat6XaxJkiSjQg6H8Y/f6c358ab5fbb7bce0c9167bfc5f8dcb7/image13.png" />
          </figure><p><sup><i>4.2 Tbps DDoS attack mitigated autonomously by Cloudflare</i></sup></p>
    <div>
      <h2>DDoS attack types and characteristics</h2>
      <a href="#ddos-attack-types-and-characteristics">
        
      </a>
    </div>
    <p>Of the 6 million DDoS attacks, half were HTTP (application layer) DDoS attacks and half were network layer DDoS attacks. Network layer DDoS attacks increased by 51% QoQ and 45% YoY, and HTTP DDoS attacks increased by 61% QoQ and 68% YoY.</p>
    <div>
      <h3>Attack duration</h3>
      <a href="#attack-duration">
        
      </a>
    </div>
    <p>90% of DDoS attacks, including the largest of attacks, were very short-lived. We did see, however, a slight increase (7%) in attacks lasting more than an hour. These longer attacks accounted for 3% of all attacks.</p>
    <div>
      <h3>Attack vectors</h3>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p>In Q3, we saw an even distribution in the number of network-layer DDoS attacks compared to HTTP DDoS attacks. Of the network-layer DDoS attacks, <a href="https://www.cloudflare.com/en-gb/learning/ddos/syn-flood-ddos-attack/"><u>SYN flood</u></a> was the top attack vector followed by <a href="https://www.cloudflare.com/en-gb/learning/ddos/dns-flood-ddos-attack/"><u>DNS flood attacks</u></a>, <a href="https://www.cloudflare.com/en-gb/learning/ddos/udp-flood-ddos-attack/"><u>UDP floods</u></a>, <a href="https://www.cloudflare.com/en-gb/learning/ddos/ssdp-ddos-attack/"><u>SSDP reflection attacks</u></a>, and <a href="https://www.cloudflare.com/en-gb/learning/ddos/ping-icmp-flood-ddos-attack/"><u>ICMP reflection attacks</u></a>.</p><p>On the application layer, 72% of HTTP DDoS attacks were launched by known botnets and automatically mitigated by our proprietary heuristics. The fact that 72% of DDoS attacks were mitigated by our home-grown heuristics showcases the advantages of operating a large network. The volume of traffic and attacks that we see let us craft, test, and deploy robust defenses against botnets.</p><p>Another 13% of HTTP DDoS attacks were mitigated due to their suspicious or unusual HTTP attributes, and another 9% were HTTP DDoS attacks launched by fake browsers or browser impersonators. The remaining 6% of “Other” includes attacks that targeted login endpoints and cache busting attacks.</p><p>One thing to note is that these attack vectors, or attack groups, are not necessarily exclusive. For example, known botnets also impersonate browsers and have suspicious HTTP attributes, but this breakdown is our attempt to categorize the HTTP DDoS attacks in a meaningful way.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7s2ClnOzWZcefqsiNRrs85/560a7cc1f256c24f733a6d784c2a6b83/image3.png" />
          </figure><p><sup><i>Distribution of DDoS attacks in 2024 Q3</i></sup></p><p>In Q3, we observed a 4,000% increase in <a href="https://www.cloudflare.com/en-gb/learning/ddos/ssdp-ddos-attack/"><u>SSDP amplification attacks</u></a> compared to the previous quarter. An SSDP (Simple Service Discovery Protocol) attack is a type of reflection and amplification DDoS attack that exploits the <a href="https://en.wikipedia.org/wiki/Universal_Plug_and_Play"><u>UPnP (Universal Plug and Play) protocol</u></a>. Attackers send SSDP requests to vulnerable UPnP-enabled devices such as routers, printers, and IP-enabled cameras, and <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/"><u>spoof</u></a> the source IP address to be the victim’s IP address. These devices respond to the victim’s IP address with large amounts of traffic, overwhelming the victim’s infrastructure. The amplification effect allows attackers to generate massive traffic from small requests, causing the victim’s service to go offline. Disabling UPnP on unnecessary devices and using DDoS mitigation strategies can help defend against this attack.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5hK3wMmUM2m7QbEi9zkNJe/fa4ba3f7d8c7a6e35a681ad068694cfd/image5.png" />
          </figure><p><sup><i>Illustration of an SSDP amplification attack</i></sup></p>
    <div>
      <h3>User agents used in HTTP DDoS attacks</h3>
      <a href="#user-agents-used-in-http-ddos-attacks">
        
      </a>
    </div>
    <p>When launching HTTP DDoS attacks, threat actors want to blend in to avoid detection. One tactic to achieve this is to spoof the user agent. This lets them appear as a legitimate browser or client if done successfully.</p><p>In Q3, 80% of HTTP DDoS attack traffic impersonated the <i>Google Chrome</i> browser, which was the most common user agent observed in attacks. More specifically, Chrome 118, 119, 120, and 121 were the most common versions.</p><p>In second place, no user agent was seen for 9% of HTTP DDoS attack traffic.</p><p>In third and fourth place, we observed attacks using the <a href="https://pkg.go.dev/net/http"><i><u>Go-http-client</u></i></a> and <a href="https://github.com/valyala/fasthttp"><i><u>fasthttp</u></i></a> user agents. The former is the default HTTP client in Go’s standard library and the latter is a high-performance alternative. <i>fasthttp</i> is used to build fast web applications, but is often used for DDoS attacks and web scraping too.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5KuRumdhH8nJkSHAddb0G/c22915c1a931a50304879d359f52e2b0/image11.png" />
          </figure><p><i><sup>Top user agents used in DDoS attacks</sup></i></p><p>The user agent <a href="https://github.com/benoitc/hackney"><i><u>hackney</u></i></a> came in fifth place. It’s an HTTP client library for Erlang. It's used for making HTTP requests and is popular in Erlang/Elixir ecosystems.</p><p>An interesting user agent shows up in the sixth place: <i>HITV_ST_PLATFORM</i>. This user agent appears to be associated with smart TVs or set-top boxes. Threat actors typically avoid using uncommon user agents, as evidenced by the frequent use of Chrome user agents in cyberattacks. Therefore, the presence of <i>HITV_ST_PLATFORM</i> likely suggests that the devices in question are indeed compromised smart TVs or set-top boxes.</p><p>In seventh place, we saw the <a href="https://www.utorrent.com/"><i><u>uTorrent</u></i></a> user agent being used in attacks. This user agent is associated with a popular BitTorrent client that’s used for downloading files.</p><p>Lastly, <a href="https://square.github.io/okhttp/"><i><u>okhttp</u></i></a> was the least common user agent in DDoS attacks despite its popularity as an HTTP client for Java and Android applications. </p>
    <div>
      <h3>HTTP attack attributes</h3>
      <a href="#http-attack-attributes">
        
      </a>
    </div>
    <p>While 89% of HTTP DDoS attack traffic used the GET method, it is also the most commonly used HTTP method. So when we normalize the attack traffic by dividing the number of attack requests by total request per HTTP method, we get a different picture.</p><p>Almost 12% of all requests that used the DELETE method were part of an HTTP DDoS attack. After DELETE, we see that HEAD, PATCH and GET are the methods most commonly used in DDoS attack requests.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2iJMmknCh32vPIdeCPAeyf/a526d605c7737de6f427fef2fa7cddcd/image15.png" />
          </figure><p>While 80% of DDoS attack requests were over HTTP/2 and 19% were over HTTP/1.1, they represented a much smaller portion when normalized by the total traffic by version. When we normalize the attack requests by all requests by version, we see a different picture. Over half of traffic to the non-standard or mislabeled “HTTP/1.2” version was malicious and part of DDoS attacks. It's important to note that “HTTP/1.2” is not an official version of the protocol.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1hyoIhxiRPFoyCWfReFrP4/eae8d02173b6d88d0310ca0c2769d3d9/image12.png" />
          </figure><p><sup><i>The vast majority of HTTP DDoS attacks are actually encrypted — almost 94% — using HTTPS.</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6w76h72BQxMQgFS5LyQGaC/bc2ce6cedbfd7ba59b7972f5d00096da/image8.png" />
          </figure>
    <div>
      <h2>Targets of DDoS attacks</h2>
      <a href="#targets-of-ddos-attacks">
        
      </a>
    </div>
    
    <div>
      <h3>Top attacked locations</h3>
      <a href="#top-attacked-locations">
        
      </a>
    </div>
    <p>China was the most attacked location in the third quarter of 2024. The United Arab Emirates was ranked second, with Hong Kong in third place, followed closely by Singapore, Germany, and Brazil.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7kxDlG9Rl6unfi1mXRmcN7/13ea1212c9a750b521fc0178ad982540/image7.png" />
          </figure><p>Canada was ranked seventh, followed by South Korea, the United States, and Taiwan as number ten.</p>
    <div>
      <h3>Top attacked industries</h3>
      <a href="#top-attacked-industries">
        
      </a>
    </div>
    <p>In the third quarter of 2024, Banking &amp; Financial Services was the most targeted by DDoS attacks. Information Technology &amp; Services was ranked in second place, followed by the Telecommunications, Service Providers, and Carriers sector.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1gKofo0gDvfX8CiOwL80pI/31a6b9bb9f0a6cfe2819cc16ba0e0acd/image4.png" />
          </figure><p>Cryptocurrency, Internet, Gambling &amp; Casinos, and Gaming followed closely behind as the next most targeted industries. Consumer Electronics, Construction &amp; Civil Engineering, and the Retail industries rounded out the top ten most attacked industries.</p>
    <div>
      <h2>Sources of DDoS attacks</h2>
      <a href="#sources-of-ddos-attacks">
        
      </a>
    </div>
    
    <div>
      <h3>Threat actors</h3>
      <a href="#threat-actors">
        
      </a>
    </div>
    <p>For a few years now, we’ve been surveying our customers that have been subjected to DDoS attacks. The survey covers various factors, such as the nature of the attack and the threat actors. In the case of threat actors, while 80% of survey respondents said that they don’t know who attacked them, 20% said they did. Of those, 32% said that the threat actors were extortionists. Another 25% said a competitor attacked them, and another 21% said that a disgruntled customer or user was behind the attack. 14% of respondents said that the attacks were carried out by a state or a state-sponsored group. Lastly, 7% said that they mistakenly attacked themselves. One example of when a self-DDoS attack occurs is a post-firmware update for IoT devices that causes all devices to <i>phone home</i> at the same time, resulting in a flood of traffic.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1F9u4X57yFohLq6qvLg2qd/cea67346e9b787a42b221fb9e242c61b/image2.png" />
          </figure><p><sup><i>Distribution of the top threat actors</i></sup></p><p>While extortionists were the most common threat actor, overall, reports of <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/"><u>Ransom DDoS attacks</u></a> decreased by 42% QoQ, but increased 17% YoY. A total of 7% of respondents reported being subjected to a Ransom DDoS attack or threatened by the attacker. In August, however, that figure increased to 10% — that’s one out of ten.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ImW8Gfe4c2WaASshJVDDf/fc715b31d347dc19ae198fcaac17787f/image10.png" />
          </figure><p><sup><i>Reports of Ransom DDoS attacks by quarter</i></sup></p>
    <div>
      <h3>Top source locations of DDoS attacks</h3>
      <a href="#top-source-locations-of-ddos-attacks">
        
      </a>
    </div>
    <p>Indonesia was the largest source of DDoS attacks in the third quarter of 2024. The Netherlands was the second-largest source, followed by Germany, Argentina, and Colombia.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/uWeX1HJBO9Omb2GpEODij/88ffec73cba860ca393b49df1fa0df36/image1.png" />
          </figure><p>The next five largest sources included Singapore, Hong Kong, Russia, Finland, and Ukraine.</p>
    <div>
      <h3>Top source networks of DDoS attacks</h3>
      <a href="#top-source-networks-of-ddos-attacks">
        
      </a>
    </div>
    <p>For service providers that operate their own networks and infrastructure, it can be difficult to identify who is using their infrastructure for malicious intent, such as generating DDoS attacks. For this reason, we provide a <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/"><u>free threat intelligence feed to network operators</u></a>. This feed provides service providers information on IP addresses from within their networks that we’ve seen participate in subsequent DDoS attacks.</p><p>On that note, <a href="https://radar.cloudflare.com/as24940"><u>Hetzner (AS24940)</u></a>, a German-based IT provider, was the largest source of HTTP DDoS attacks in the third quarter of 2024. <a href="https://radar.cloudflare.com/as63949"><u>Linode (AS63949)</u></a>, a cloud computing platform acquired by Akamai in 2022, was the second-largest source of HTTP DDoS attacks. <a href="https://radar.cloudflare.com/as64515"><u>Vultr (AS64515)</u></a>, a Florida-based service provider, came in third place.</p><p><a href="https://radar.cloudflare.com/as197540"><u>Netcup (AS197540)</u></a>, another German-based IT provider, came in fourth place. <a href="https://radar.cloudflare.com/as15169"><u>Google Cloud Platform (AS15169)</u></a> followed in fifth place. <a href="https://radar.cloudflare.com/as14061"><u>DigitalOcean (AS14061)</u></a> came in sixth place, followed by French provider <a href="https://radar.cloudflare.com/as16276"><u>OVH (AS16276)</u></a>, <a href="https://radar.cloudflare.com/as44477"><u>Stark Industries (AS44477)</u></a>, <a href="https://radar.cloudflare.com/as16509"><u>Amazon Web Services (AS16509)</u></a>, and <a href="https://radar.cloudflare.com/as8075"><u>Microsoft (AS8075)</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2pomZ3ggzXm6RJBOqBCnHN/638c7e3523dd78376c5de607dc34ad0f/image9.png" />
          </figure><p><sup><i>Networks that were that largest sources of HTTP DDoS attacks in 2024 Q3</i></sup></p>
    <div>
      <h2>Key takeaways</h2>
      <a href="#key-takeaways">
        
      </a>
    </div>
    <p>This quarter, we observed an unprecedented surge in hyper-volumetric DDoS attacks, with peaks reaching 3.8 Tbps and 2.2 Bpps. This mirrors a similar trend from the same period last year, when application layer attacks in the <a href="https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack"><u>HTTP/2 Rapid Reset</u></a> campaign exceeded 200 million requests per second (Mrps). These massive attacks are capable of overwhelming Internet properties, particularly those relying on capacity-limited cloud services or on-premise solutions.</p><p>The increasing use of powerful botnets, fueled by geopolitical tensions and global events, is expanding the range of organizations at risk — many of which were not traditionally considered prime targets for DDoS attacks. Unfortunately, too many organizations reactively deploy DDoS protections after an attack has already caused significant damage.</p><p>Our observations confirm that businesses with well-prepared, comprehensive security strategies are far more resilient against these cyberthreats. At Cloudflare, we’re committed to safeguarding your Internet presence. Through significant investment in our automated defenses and a robust portfolio of security products, we ensure proactive protection against both current and emerging threats — so you don’t have to.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Advanced DDoS]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Attacks]]></category>
            <guid isPermaLink="false">1JcMVeEAlLozSywoEbjGoV</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2024 Q2]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2024-q2/</link>
            <pubDate>Tue, 09 Jul 2024 13:00:32 GMT</pubDate>
            <description><![CDATA[ Welcome to the 18th edition of the Cloudflare DDoS Threat Report. Released quarterly, these reports provide an in-depth analysis of the DDoS threat landscape as observed across the Cloudflare network. This edition focuses on the second quarter of 2024 ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6H7tZjcmMtTkqI4vnZh1cU/57e3e3bcf83b65ac75c5fcaa72389270/image13-1.png" />
            
            </figure><p>Welcome to the 18th edition of the Cloudflare DDoS Threat Report. Released quarterly, these reports provide an in-depth analysis of the DDoS threat landscape as observed across the <a href="https://www.cloudflare.com/en-gb/network/">Cloudflare network</a>. This edition focuses on the second quarter of 2024.</p><p>With a 280 terabit per second network located across over 320 cities worldwide, <a href="https://w3techs.com/technologies/details/cn-cloudflare">serving 19% of all websites</a>, Cloudflare holds a unique vantage point that enables us to provide valuable insights and trends to the broader Internet community.</p>
    <div>
      <h2>Key insights for 2024 Q2</h2>
      <a href="#key-insights-for-2024-q2">
        
      </a>
    </div>
    <ul><li><p>Cloudflare recorded a 20% year-over-year increase in DDoS attacks.</p></li><li><p>1 out of every 25 survey respondents said that DDoS attacks against them were carried out by state-level or state-sponsored threat actors.</p></li><li><p>Threat actor capabilities reached an all-time high as our automated defenses generated 10 times more fingerprints to counter and mitigate the ultrasophisticated DDoS attacks.</p></li></ul><p>View the interactive version of this report on <a href="https://radar.cloudflare.com/reports/ddos-2024-q2">Cloudflare Radar</a>.</p>
    <div>
      <h3>Quick recap - what is a DDoS attack?</h3>
      <a href="#quick-recap-what-is-a-ddos-attack">
        
      </a>
    </div>
    <p>Before diving in deeper, let's recap what a DDoS attack is. Short for <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service</a>, a DDoS attack is a type of cyber attack designed to take down or disrupt Internet services, such as websites or mobile apps, making them unavailable to users. This is typically achieved by overwhelming the victim's server with more traffic than it can handle — usually from multiple sources across the Internet, rendering it unable to handle legitimate user traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2S7TgrtK197L1YGvjBgZm2/0664811e82a92b1c9c1a178458f75550/unnamed-4.png" />
            
            </figure><p>Diagram of a DDoS attack</p><p>To learn more about DDoS attacks and other types of cyber threats, visit our <a href="https://www.cloudflare.com/learning/">Learning Center</a>, access <a href="/tag/ddos-reports">previous DDoS threat reports</a> on the Cloudflare blog or visit our interactive hub, <a href="https://radar.cloudflare.com/reports?q=DDoS">Cloudflare Radar</a>. There's also a <a href="https://developers.cloudflare.com/radar/">free API</a> for those interested in investigating these and other Internet trends.</p><p>To learn about our report preparation, refer to our <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/">Methodologies</a>.</p>
    <div>
      <h3>Threat actor sophistication fuels the continued increase in DDoS attacks</h3>
      <a href="#threat-actor-sophistication-fuels-the-continued-increase-in-ddos-attacks">
        
      </a>
    </div>
    <p>In the first half of 2024, we mitigated 8.5 million DDoS attacks: 4.5 million in Q1 and 4 million in Q2. Overall, the number of DDoS attacks in Q2 decreased by 11% quarter-over-quarter, but increased 20% year-over-year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ctaeSKgnNEYe46W7UEKGs/fa4f515c4ed4fcbeac3e685ebc9a721f/unnamed--1--3.png" />
            
            </figure><p>Distribution of DDoS attacks by types and vectors</p><p>For context, in the entire year of 2023, we mitigated 14 million DDoS attacks, and halfway through 2024, we have already mitigated 60% of last year’s figure.</p><p>Cloudflare successfully mitigated 10.2 trillion HTTP DDoS requests and 57 petabytes of network-layer DDoS attack traffic, preventing it from reaching our customers’ origin servers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/WyUYhLUD166Po7ah6ZEQp/16f3d7d1c48488ae6d4dc3475329a432/unnamed--2--2.png" />
            
            </figure><p>DDoS attacks stats for 2024 Q2</p><p>When we break it down further, those 4 million DDoS attacks were composed of 2.2 million network-layer DDoS attacks and 1.8 million HTTP DDoS attacks. This number of 1.8 million HTTP DDoS attacks has been normalized to compensate for the explosion in sophisticated and randomized HTTP DDoS attacks. Our automated mitigation systems generate real-time fingerprints for DDoS attacks, and due to the randomized nature of these sophisticated attacks, we observed many fingerprints being generated for single attacks. The actual number of fingerprints that was generated was closer to 19 million – over ten times larger than the normalized figure of 1.8 million. The millions of fingerprints that were generated to deal with the randomization stemmed from a few single rules. These rules did their job to stop attacks, but they inflated the numbers, so we excluded them from the calculation.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3NbYriDgdvtAormXB1spNP/c8ef433d3386dd7f44ee72c7625fd980/unnamed--3--2.png" />
            
            </figure><p>HTTP DDoS attacks by quarter, with the excluded fingerprints</p><p>This ten-fold difference underscores the dramatic change in the threat landscape. The tools and capabilities that allowed threat actors to carry out such randomized and sophisticated attacks were previously associated with capabilities reserved for state-level actors or state-sponsored actors. But, coinciding with the rise of generative AI and autopilot systems that can help actors write better code faster, these capabilities have made their way to the common cyber criminal.</p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>In May 2024, the percentage of attacked Cloudflare customers that reported being threatened by a DDoS attack threat actor, or subjected to a <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attack</a> reached 16% – the highest it’s been in the past 12 months. The quarter started relatively low, at 7% of customers reporting a threat or a ransom attack. That quickly jumped to 16% in May and slightly dipped in June to 14%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16Ppdz9v4IcH0Xgii7EhdM/5551f7fdf2b2d8db252ea7a9cf845dc9/unnamed--4--2.png" />
            
            </figure><p>Percentage of customers reporting DDoS threats or ransom extortion (by month)</p><p>Overall, ransom DDoS attacks have been increasing quarter over quarter throughout the past year. In Q2 2024, the percentage of customers that reported being threatened or extorted was 12.3%, slightly higher than the previous quarter (10.2%) but similar to the percentage of the year before (also 12.0%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/WxCgT7fCSV3btCf6PmAIw/212c7d54d431c8b0c4aef091b68eda25/unnamed--5--2.png" />
            
            </figure><p>Percentage of customers reporting DDoS threats or ransom extortion (by quarter)</p>
    <div>
      <h2>Threat actors</h2>
      <a href="#threat-actors">
        
      </a>
    </div>
    <p>75% of respondents reported that they did not know who attacked them or why. These respondents are Cloudflare customers that were targeted by HTTP DDoS attacks.</p><p>Of the respondents that claim they did know, 59% said it was a competitor who attacked them. Another 21% said the DDoS attack was carried out by a disgruntled customer or user, and another 17% said that the attacks were carried out by state-level or state-sponsored threat actors. The remaining 3% reported it being a self-inflicted DDoS attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2fktInA0cQbth4up5dPB6M/366eda36e7c414c4e114c9a1f3e2cb27/unnamed--6--2.png" />
            
            </figure><p>Percentage of threat actor type reported by Cloudflare customers, excluding unknown attackers and outliers</p>
    <div>
      <h2>Top attacked countries and regions</h2>
      <a href="#top-attacked-countries-and-regions">
        
      </a>
    </div>
    <p>In the second quarter of 2024, China was ranked the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#countries-as-source-or-target-of-attacks">most attacked country</a> in the world. This ranking takes into consideration HTTP DDoS attacks, network-layer DDoS attacks, the total volume and the percentage of DDoS attack traffic out of the total traffic, and the graphs show this overall DDoS attack activity per country or region. A longer bar in the chart means more attack activity.</p><p>After China, Turkey came in second place, followed by Singapore, Hong Kong, Russia, Brazil, and Thailand. The remaining countries and regions comprising the top 15 most attacked countries are provided in the chart below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6C3FspFSjHCEwIuauYTQYg/bcc283b99df5eb93428f138eea18a676/unnamed--7--2.png" />
            
            </figure><p>15 most attacked countries and regions in 2024 Q2</p>
    <div>
      <h2>Most attacked industries</h2>
      <a href="#most-attacked-industries">
        
      </a>
    </div>
    <p>The Information Technology &amp; Services was ranked as the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-industry">most targeted industry</a> in the second quarter of 2024. The ranking methodologies that we’ve used here follow the same principles as previously described to distill the total volume and relative attack traffic for both HTTP and network-layer DDoS attacks into one single DDoS attack activity ranking.</p><p>The Telecommunications, Services Providers and Carrier sector came in second. Consumer Goods came in third place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/M7x6hcaQ3rq20x0SZ61y9/a370d20f43aa968efd1892dd4e8619c6/unnamed--8--1.png" />
            
            </figure><p>15 most attacked industries in 2024 Q2</p><p>When analyzing only the HTTP DDoS attacks, we see a different picture. Gaming and Gambling saw the most attacks in terms of HTTP DDoS attack request volume. The per-region breakdown is provided below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ElWJHm7iaazkMY0i3FbAY/438d6fb1fd9f515cc8961c88770039c9/unnamed--9--1.png" />
            
            </figure><p>Top attacked industries by region (HTTP DDoS attacks)</p>
    <div>
      <h2>Largest sources of DDoS attacks</h2>
      <a href="#largest-sources-of-ddos-attacks">
        
      </a>
    </div>
    <p>Argentina was ranked as the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#countries-as-source-or-target-of-attacks">largest source</a> of DDoS attacks in the second quarter of 2024. The ranking methodologies that we’ve used here follow the same principles as previously described to distill the total volume and relative attack traffic for both HTTP and network-layer DDoS attacks into one single DDoS attack activity ranking.</p><p>Indonesia followed closely in second place, followed by the Netherlands in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5EsagO6GQdPElCwfU735Ed/ee71ca617bbd2281c45db36cebb6f0a8/unnamed--10--1.png" />
            
            </figure><p>15 largest sources of DDoS attacks in 2024 Q2</p>
    <div>
      <h2>DDoS attack characteristics</h2>
      <a href="#ddos-attack-characteristics">
        
      </a>
    </div>
    
    <div>
      <h3>Network-layer DDoS attack vectors</h3>
      <a href="#network-layer-ddos-attack-vectors">
        
      </a>
    </div>
    <p>Despite a 49% decrease quarter-over-quarter, DNS-based DDoS attacks remain the most common attack vector, with a combined share of 37% for <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/">DNS floods</a> and <a href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/">DNS amplification</a> attacks. <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> came in second place with a share of 23%, followed by RST floods accounting for a little over 10%. SYN floods and RST floods are both types of TCP-based DDoS attacks. Collectively, all types of TCP-based DDoS attacks accounted for 38% of all network-layer DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2C8gqiEuTXWaZJYOC4l29Z/eeb4e6734ec7c42f328c02dc46f3a0ba/unnamed--11--1.png" />
            
            </figure><p>Top attack vectors (network-layer)</p>
    <div>
      <h3>HTTP DDoS attack vectors</h3>
      <a href="#http-ddos-attack-vectors">
        
      </a>
    </div>
    <p>One of the advantages of operating a large network is that we see a lot of traffic and attacks. This helps us improve our detection and mitigation systems to protect our customers. In the last quarter, half of all <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/">HTTP DDoS attacks</a> were mitigated using proprietary heuristics that targeted botnets known to Cloudflare. These heuristics guide our systems on how to generate a real-time fingerprint to match against the attacks.</p><p>Another 29% were HTTP DDoS attacks that used fake user agents, impersonated browsers, or were from headless browsers. An additional 13% had suspicious HTTP attributes which triggered our automated system, and 7% were marked as generic floods. One thing to note is that these attack vectors, or attack groups, are not necessarily exclusive. For example, known botnets also impersonate browsers and have suspicious HTTP attributes, but this breakdown is our initial attempt to categorize the HTTP DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Q30Uxkud0qxOCbzTjgUjc/86ec3083a7d52167e143fd79ad847f77/unnamed--12-.png" />
            
            </figure><p>Top attack vectors (HTTP)</p>
    <div>
      <h3>HTTP versions used in DDoS attacks</h3>
      <a href="#http-versions-used-in-ddos-attacks">
        
      </a>
    </div>
    <p>In Q2, around half of all web traffic used HTTP/2, 29% used HTTP/1.1, an additional fifth used HTTP/3, nearly 0.62% used HTTP/1.0, and 0.01% for HTTP/1.2.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4iG2zFOZIR91P56H7DiNFw/30d39a97fadf6f974acc35f588418e5e/unnamed--13-.png" />
            
            </figure><p>Distribution of web traffic by HTTP version</p><p>HTTP DDoS attacks follow a similar pattern in terms of version adoption, albeit a larger bias towards HTTP/2. 76% of HTTP DDoS attack traffic was over the HTTP/2 version and nearly 22% over HTTP/1.1. HTTP/3, on the other hand, saw a much smaller usage. Only 0.86% of HTTP DDoS attack traffic were over HTTP/3 — as opposed to its much broader adoption of 20% by all web traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7qSkeg0USHPZn76shu5lAc/ce683586034c622a798326b4d8c05447/unnamed--14-.png" />
            
            </figure><p>Distribution of HTTP DDoS attack traffic by HTTP version</p>
    <div>
      <h3>DDoS attack duration</h3>
      <a href="#ddos-attack-duration">
        
      </a>
    </div>
    <p>The vast majority of DDoS attacks are short. Over 57% of HTTP DDoS attacks and 88% of network-layer DDoS attacks end within 10 minutes or less. This emphasizes the need for automated, in-line detection and mitigation systems. Ten minutes are hardly enough time for a human to respond to an alert, analyze the traffic, and apply manual mitigations.</p><p>On the other side of the graphs, we can see that approximately a quarter of HTTP DDoS attacks last over an hour, and almost a fifth last more than a day. On the network layer, longer attacks are significantly less common. Only 1% of network-layer DDoS attacks last more than 3 hours.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5THWXBww1SvjFhGz3faxvf/27b48ed6dac038a9342c84ec0661caa4/unnamed--15-.png" />
            
            </figure><p>HTTP DDoS attacks: distribution by duration</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1jCKPONG0sxuKYTVU1dne5/69f9f38dae5d46b0b2c5b40f9d97f2a3/unnamed--16-.png" />
            
            </figure><p>Network-layer DDoS attacks: distribution by duration</p>
    <div>
      <h3>DDoS attack size</h3>
      <a href="#ddos-attack-size">
        
      </a>
    </div>
    <p>Most DDoS attacks are relatively small. Over 95% of network-layer DDoS attacks stay below 500 megabits per second, and 86% stay below 50,000 packets per second.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6KtVJSY1wf4G0dcalUVRYu/7bf4d928903b3c69e29c251205046e79/unnamed--17-.png" />
            
            </figure><p>Distribution of network-layer DDoS attacks by bit rate</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Xdwy1icebxX20wmq3DE2g/8911a08a43185159155cf00317cc7dbd/unnamed--18-.png" />
            
            </figure><p>Distribution of network-layer DDoS attacks by packet rate</p><p>Similarly, 81% of HTTP DDoS attacks stay below 50,000 requests per second. Although these rates are small on Cloudflare’s scale, they can still be devastating for unprotected websites unaccustomed to such traffic levels.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1NMeVYFSRo9RKwnmPsqOBj/67655da4382355f8424a2525b2bf5f74/unnamed--19-.png" />
            
            </figure><p>Distribution of HTTP DDoS attacks by request rate</p><p>Despite the majority of attacks being small, the number of larger volumetric attacks has increased. One out of every 100 network-layer DDoS attacks exceed 1 million packets per second (pps), and two out of every 100 exceed 500 gigabits per second. On layer 7, four out of every 1,000 HTTP DDoS attacks exceed 1 million requests per second.</p>
    <div>
      <h2>Key takeaways</h2>
      <a href="#key-takeaways">
        
      </a>
    </div>
    <p>The majority of DDoS attacks are small and quick. However, even these attacks can disrupt online services that do not follow <a href="https://developers.cloudflare.com/ddos-protection/best-practices/respond-to-ddos-attacks/">best practices for DDoS defense</a>.</p><p>Furthermore, threat actor sophistication is increasing, perhaps due to the availability of Generative AI and developer copilot tools, resulting in attack code that delivers DDoS attacks that are harder to defend against. Even prior to the rise in attack sophistication, many organizations struggled to defend against these threats on their own. But they don’t need to. Cloudflare is here to help. We invest significant resources – so you don’t have to – to ensure our automated defenses, along with the entire portfolio of Cloudflare security products, to protect against existing and emerging threats.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[DNS Flood]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[SYN Flood]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">5zkxlKrbZNjy1jeKkohkyt</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2024 Q1]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2024-q1/</link>
            <pubDate>Tue, 16 Apr 2024 13:00:25 GMT</pubDate>
            <description><![CDATA[ 2024 started with a bang. Cloudflare’s autonomous systems mitigated over 4.5 million DDoS attacks in the first quarter of the year — a 50% increase compared to the previous year. 
Read the full coverage ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7CRUEQXjRjK9JCmDScvOe9/202241692c52e9b98d7c4609ae6a90b5/image13.png" />
            
            </figure><p>Welcome to the 17th edition of Cloudflare’s DDoS threat report. This edition covers the DDoS threat landscape along with key findings as observed from the <a href="https://www.cloudflare.com/network/">Cloudflare network</a> during the first quarter of 2024.</p>
    <div>
      <h3>What is a DDoS attack?</h3>
      <a href="#what-is-a-ddos-attack">
        
      </a>
    </div>
    <p>But first, a quick recap. A DDoS attack, short for <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service attack</a>, is a type of cyber attack that aims to take down or disrupt Internet services such as websites or mobile apps and make them unavailable for users. DDoS attacks are usually done by flooding the victim's server with more traffic than it can handle.</p><p>To learn more about DDoS attacks and other types of attacks, visit our <a href="https://www.cloudflare.com/learning/">Learning Center</a>.</p>
    <div>
      <h3>Accessing previous reports</h3>
      <a href="#accessing-previous-reports">
        
      </a>
    </div>
    <p>Quick reminder that you can access <a href="/tag/ddos-reports">previous editions of DDoS threat reports</a> on the Cloudflare blog. They are also available on our interactive hub, <a href="https://radar.cloudflare.com/reports?q=DDoS">Cloudflare Radar</a>. On Radar, you can find global Internet traffic, attacks, and technology trends and insights, with drill-down and filtering capabilities, so you can zoom in on specific countries, industries, and networks. There’s also a <a href="https://developers.cloudflare.com/radar/">free API</a> allowing academics, data sleuths, and other web enthusiasts to investigate Internet trends across the globe.</p><p>To learn how we prepare this report, refer to our <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/">Methodologies</a>.</p>
    <div>
      <h3>2024 Q1 key insights</h3>
      <a href="#2024-q1-key-insights">
        
      </a>
    </div>
    <p>Key insights from the first quarter of 2024 include:</p><ul><li><p>2024 started with a bang. Cloudflare’s defense systems automatically mitigated 4.5 million DDoS attacks during the first quarter — representing a 50% year-over-year (YoY) increase.</p></li><li><p>DNS-based DDoS attacks increased by 80% YoY and remain the most prominent attack vector.</p></li><li><p>DDoS attacks on Sweden surged by 466% after its acceptance to the NATO alliance, mirroring the pattern observed during Finland's NATO accession in 2023.</p></li></ul>
    <div>
      <h3>Starting 2024 with a bang</h3>
      <a href="#starting-2024-with-a-bang">
        
      </a>
    </div>
    <p>We’ve just wrapped up the first quarter of 2024, and, already, our automated defenses have mitigated 4.5 million DDoS attacks — an amount equivalent to 32% of all the DDoS attacks we mitigated in 2023.</p><p>Breaking it down to attack types, HTTP DDoS attacks increased by 93% YoY and 51% quarter-over-quarter (QoQ). Network-layer DDoS attacks, also known as L3/4 DDoS attacks, increased by 28% YoY and 5% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6QB3mXk7ACemlQBJcY05Wk/ecb4b32b415ac29a3c5fe673af3520da/image1-15.png" />
            
            </figure><p>2024 Q1: Cloudflare mitigated 4.5 million DDoS attacks</p><p>When comparing the combined number of HTTP DDoS attacks and L3/4 DDoS attacks, we can see that, overall, in the first quarter of 2024, the count increased by 50% YoY and 18% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3B6aKU9fQb6RGzcJYQmjVv/e8a91d10307dc429c47ca413cf134774/pasted-image-0--7--1.png" />
            
            </figure><p>DDoS attacks by year and quarter</p><p>In total, our systems mitigated 10.5 trillion HTTP DDoS attack requests in Q1. Our systems also mitigated over 59 petabytes of DDoS attack traffic — just on the network-layer.</p><p>Among those network-layer DDoS attacks, many of them exceeded the 1 terabit per second rate — almost on a weekly basis. The largest attack that we have mitigated so far in 2024 was launched by a Mirai-variant botnet. This attack reached 2 Tbps and was aimed at an Asian hosting provider protected by <a href="https://www.cloudflare.com/network-services/products/magic-transit/">Cloudflare Magic Transit</a>. Cloudflare’s systems automatically detected and mitigated the attack.</p><p>The <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai botnet</a>, infamous for its massive DDoS attacks, was primarily composed of infected IoT devices. It notably disrupted Internet access across the US in 2016 by targeting DNS service providers. Almost eight years later, Mirai attacks are still very common. Four out of every 100 HTTP DDoS attacks, and two out of every 100 L3/4 DDoS attacks are launched by a Mirai-variant botnet. The reason we say “variant” is that the Mirai source code was made public, and over the years there have been many permutations of the original.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2QN1Ndrb3e0EEiVNPu1chA/1c3a61ed355fd74c008955659d696661/pasted-image-0-3.png" />
            
            </figure><p>Mirai botnet targets Asian hosting provider with 2 Tbps DDoS attack</p>
    <div>
      <h3>DNS attacks surge by 80%</h3>
      <a href="#dns-attacks-surge-by-80">
        
      </a>
    </div>
    <p>In March 2024, we introduced one of our latest DDoS defense systems, the <a href="/advanced-dns-protection">Advanced DNS Protection</a> system. This system complements our existing systems, and is designed to protect against the most sophisticated DNS-based DDoS attacks.</p><p>It is not out of the blue that we decided to invest in this new system. DNS-based DDoS attacks have become the most prominent attack vector and its share among all network-layer attacks continues to grow. In the first quarter of 2024, the share of DNS-based DDoS attacks increased by 80% YoY, growing to approximately 54%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4eeimQquFTBhNCOKeGTcoe/d1ccde4a4468aa1a73ee7fb5711014ba/pasted-image-0--1--1.png" />
            
            </figure><p>DNS-based DDoS attacks by year and quarter</p><p>Despite the surge in DNS attacks and due to the overall increase in all types of DDoS attacks, the share of each attack type, remarkably, remains the same as seen in our previous report for the final quarter of 2023. HTTP DDoS attacks remain at 37% of all DDoS attacks, DNS DDoS attacks at 33%, and the remaining 30% is left for all other types of L3/4 attacks, such as <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN Flood</a> and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP Floods</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5lUZwA2pBOVNWP9nW5541d/c4460eeac1d3b5a40e84dbb1fb6cf89f/pasted-image-0--2-.png" />
            
            </figure><p>Attack type distribution</p><p>And in fact, SYN Floods were the second most common L3/4 attack. The third was RST Floods, another type of TCP-based DDoS attack. UDP Floods came in fourth with a 6% share.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6mQ0isNVD7dWQbtnq5DITg/0fb241b6fd61d552d3a579323e37f38b/pasted-image-0--3-.png" />
            
            </figure><p>Top attack vectors</p><p>When analyzing the most common attack vectors, we also check for the attack vectors that experienced the largest growth but didn’t necessarily make it into the top ten list. Among the top growing attack vectors (emerging threats), Jenkins Flood experienced the largest growth of over 826% QoQ.</p><p>Jenkins Flood is a DDoS attack that exploits vulnerabilities in the <a href="https://www.jenkins.io/">Jenkins automation server</a>, specifically through UDP multicast/broadcast and DNS multicast services. Attackers can send small, specially crafted requests to a publicly facing UDP port on Jenkins servers, causing them to respond with disproportionately large amounts of data. This can amplify the traffic volume significantly, overwhelming the target's network and leading to service disruption. Jenkins addressed this vulnerability (<a href="https://smartermsp.com/cybersecurity-threat-advisory-0013-20-jenkins-udp-ddos-attack-cve-2020-2100/">CVE-2020-2100</a>) in 2020 by disabling these services by default in later versions. However, as we can see, even 4 years later, this vulnerability is still being abused in the wild to launch DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/HZBbtghkPLvvRnFaTAw9d/f1030dfaed7500861fdbc83b1c4d02ab/pasted-image-0--4-.png" />
            
            </figure><p>Attack vectors that experienced the largest growth QoQ</p>
    <div>
      <h3>HTTP/2 Continuation Flood</h3>
      <a href="#http-2-continuation-flood">
        
      </a>
    </div>
    <p>Another attack vector that’s worth discussing is the HTTP/2 Continuation Flood. This attack vector is made possible by a vulnerability that was <a href="https://nowotarski.info/http2-continuation-flood-technical-details/">discovered and reported publicly by researcher Bartek Nowotarski</a> on April 3, 2024.</p><p>The HTTP/2 Continuation Flood vulnerability targets HTTP/2 protocol implementations that improperly handle HEADERS and multiple CONTINUATION frames. The threat actor sends a sequence of CONTINUATION frames without the END_HEADERS flag, leading to potential server issues such as out-of-memory crashes or CPU exhaustion. HTTP/2 Continuation Flood allows even a single machine to disrupt websites and APIs using HTTP/2, with the added challenge of difficult detection due to no visible requests in HTTP access logs.</p><p>This vulnerability poses a potentially severe threat more damaging than the previously known <a href="/technical-breakdown-http2-rapid-reset-ddos-attack/">HTTP/2 Rapid Reset</a>, which resulted in some of the largest HTTP/2 DDoS attack campaigns in recorded history. During that campaign, thousands of hyper-volumetric DDoS attacks targeted Cloudflare. The attacks were multi-million requests per second strong. The average attack rate in that campaign, recorded by Cloudflare, was 30M rps. Approximately 89 of the attacks peaked above 100M rps and the largest one we saw hit 201M rps. Additional coverage was published in our <a href="/ddos-threat-report-2023-q3/">2023 Q3 DDoS threat report</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/72mnC1iNyKm6RX3UAwsVG4/5d66586e5833ce492bd2cbfb1eb538eb/pasted-image-0--2--1.png" />
            
            </figure><p>HTTP/2 Rapid Reset campaign of hyper-volumetric DDoS attacks in 2023 Q3</p><p>Cloudflare's network, its HTTP/2 implementation, and customers using our <a href="https://www.cloudflare.com/application-services/products/waf/">WAF</a>/<a href="https://www.cloudflare.com/application-services/products/cdn/">CDN</a> services are not affected by this vulnerability. Furthermore, we are not currently aware of any threat actors exploiting this vulnerability in the wild.</p><p>Multiple CVEs have been assigned to the various implementations of HTTP/2 that are impacted by this vulnerability. A <a href="https://kb.cert.org/vuls/id/421644">CERT alert</a> published by Christopher Cullen at Carnegie Mellon University, which was covered by <a href="https://www.bleepingcomputer.com/news/security/new-http-2-dos-attack-can-crash-web-servers-with-a-single-connection/">Bleeping Computer</a>, lists the various CVEs:</p>
<table>
<colgroup>
<col></col>
<col></col>
<col></col>
</colgroup>
<thead>
  <tr>
    <th><span>Affected service </span></th>
    <th><span>CVE</span></th>
    <th><span>Details</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Node.js HTTP/2 server</span></td>
    <td><span>CVE-2024-27983</span></td>
    <td><span>Sending a few HTTP/2 frames can cause a race condition and memory leak, leading to a potential denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Envoy's oghttp codec</span></td>
    <td><span>CVE-2024-27919</span></td>
    <td><span>Not resetting a request when header map limits are exceeded can cause unlimited memory consumption which can potentially lead to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Tempesta FW</span></td>
    <td><span>CVE-2024-2758</span></td>
    <td><span>Its rate limits are not entirely effective against empty CONTINUATION frames flood, potentially leading to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>amphp/http</span></td>
    <td><span>CVE-2024-2653</span></td>
    <td><span>It collects CONTINUATION frames in an unbounded buffer, risking an out of memory (OOM) crash if the header size limit is exceeded, potentially resulting in a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Go's net/http and net/http2 packages</span></td>
    <td><span>CVE-2023-45288</span></td>
    <td><span>Allows an attacker to send an arbitrarily large set of headers, causing excessive CPU consumption, potentially leading to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>nghttp2 library</span></td>
    <td><span>CVE-2024-28182</span></td>
    <td><span>Involves an implementation using nghttp2 library, which continues to receive CONTINUATION frames, potentially leading to a denial of service event without proper stream reset callback.</span></td>
  </tr>
  <tr>
    <td><span>Apache Httpd</span></td>
    <td><span>CVE-2024-27316</span></td>
    <td><span>A flood of CONTINUATION frames without the END_HEADERS flag set can be sent, resulting in the improper termination of requests, potentially leading to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Apache Traffic Server</span></td>
    <td><span>CVE-2024-31309</span></td>
    <td><span>HTTP/2 CONTINUATION floods can cause excessive resource consumption on the server, potentially leading to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Envoy versions 1.29.2 or earlier</span></td>
    <td><span>CVE-2024-30255</span></td>
    <td><span>Consumption of significant server resources can lead to CPU exhaustion during a flood of CONTINUATION frames, which can potentially lead to a denial of service event.</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Top attacked industries</h3>
      <a href="#top-attacked-industries">
        
      </a>
    </div>
    <p>When analyzing attack statistics, we use our <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-industry">customer’s industry</a> as it is recorded in our systems to determine the most attacked industries. In the first quarter of 2024, the top attacked industry by HTTP DDoS attacks in North America was Marketing and Advertising. In Africa and Europe, the Information Technology and Internet industry was the most attacked. In the Middle East, the most attacked industry was Computer Software. In Asia, the most attacked industry was Gaming and Gambling. In South America, it was the Banking, Financial Services and Insurance (BFSI) industry. Last but not least, in Oceania, was the Telecommunications industry.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ntlfFKUUah6DeHSlwJSq6/f488dbd9e68e2822a16c448aa55d0c12/Top-Attacked-Industry-by-Region-Q1-2024.png" />
            
            </figure><p>Top attacked industries by HTTP DDoS attacks, by region</p><p>Globally, the Gaming and Gambling industry was the number one most targeted by HTTP DDoS attacks. Just over seven of every 100 DDoS requests that Cloudflare mitigated were aimed at the <a href="https://www.cloudflare.com/gaming/">Gaming</a> and Gambling industry. In second place, the Information Technology and Internet industry, and in third, Marketing and Advertising.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/LNYVB8cgZhctz3H84y4is/c952e53b1475adcebaac1df63fd71352/pasted-image-0--5-.png" />
            
            </figure><p>Top attacked industries by HTTP DDoS attacks</p><p>With a share of 75% of all network-layer DDoS attack bytes, the Information Technology and Internet industry was the most targeted by network-layer DDoS attacks. One possible explanation for this large share is that Information Technology and Internet companies may be “super aggregators” of attacks and receive DDoS attacks that are actually targeting their end customers. The Telecommunications industry, the <a href="https://www.cloudflare.com/financial-services/">Banking, Financial Services and Insurance (BFSI)</a> industry, the Gaming and Gambling industry and the Computer Software industry accounted for the next three percent.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/61FwNZ9kUUqXnHpcSmVRaC/479e12abb25cd38a3d302bb28efa51dc/pasted-image-0--6--1.png" />
            
            </figure><p>Top attacked industries by L3/4 DDoS attacks</p><p>When normalizing the data by dividing the attack traffic by the total traffic to a given industry, we get a completely different picture. On the HTTP front, Law Firms and Legal Services was the most attacked industry, as over 40% of their traffic was HTTP DDoS attack traffic. The Biotechnology industry came in second with a 20% share of HTTP DDoS attack traffic. In third place, <a href="https://www.cloudflare.com/galileo/">Nonprofits</a> had an HTTP DDoS attack share of 13%. In fourth, Aviation and Aerospace, followed by Transportation, Wholesale, <a href="https://www.cloudflare.com/public-sector/">Government Relations</a>, Motion Pictures and Film, Public Policy, and Adult Entertainment to complete the top ten.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4I2FKWUobGjuyukeip0K5U/6f62640b53a76e3807743ed0b1865d03/pasted-image-0--8--1.png" />
            
            </figure><p>Top attacked industries by HTTP DDoS attacks (normalized)</p><p>Back to the network layer, when normalized, Information Technology and Internet remained the number one most targeted industry by L3/4 DDoS attacks, as almost a third of their traffic were attacks. In second, Textiles had a 4% attack share. In third, Civil Engineering, followed by Banking Financial Services and Insurance (BFSI), Military, Construction, Medical Devices, Defense and Space, Gaming and Gambling, and lastly Retail to complete the top ten.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4KNGEFTvu7T1NQj3nO9Jqo/28d249aa64cd6d23789ce5b6ba738642/pasted-image-0--9--1.png" />
            
            </figure><p>Top attacked industries by L3/4 DDoS attacks (normalized)</p>
    <div>
      <h3>Largest sources of DDoS attacks</h3>
      <a href="#largest-sources-of-ddos-attacks">
        
      </a>
    </div>
    <p>When analyzing the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#source-country">sources of HTTP DDoS attacks</a>, we look at the source IP address to determine the origination location of those attacks. A country/region that's a large source of attacks indicates that there is most likely a large presence of botnet nodes behind <a href="https://www.cloudflare.com/learning/access-management/what-is-a-vpn/">Virtual Private Network (VPN)</a> or proxy endpoints that attackers may use to obfuscate their origin.</p><p>In the first quarter of 2024, the United States was the largest source of HTTP DDoS attack traffic, as a fifth of all DDoS attack requests originated from US IP addresses. China came in second, followed by Germany, Indonesia, Brazil, Russia, Iran, Singapore, India, and Argentina.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4wQLyRJrrtx54hGXPY2HHC/d6e9119a6d8996713f2f4d1befad518e/pasted-image-0--10-.png" />
            
            </figure><p>The top sources of HTTP DDoS attacks</p><p>At the network layer, source IP addresses can be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a>. So, instead of relying on IP addresses to understand the source, <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#source-country">we use the location of our data centers</a> where the attack traffic was ingested. We can gain geographical accuracy due to Cloudflare’s large global coverage in over 310 cities around the world.</p><p>Using the location of our data centers, we can see that in the first quarter of 2024, over 40% L3/4 DDoS attack traffic was ingested in our US data centers, making the US the largest source of L3/4 attacks. Far behind, in second, Germany at 6%, followed by Brazil, Singapore, Russia, South Korea, Hong Kong, United Kingdom, Netherlands, and Japan.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4vggccrQzkQy6yNuHMQboq/c4de452c39e00a1d38f4c1d7a114c585/pasted-image-0--11-.png" />
            
            </figure><p>The top sources of L3/4 DDoS attacks</p><p>When normalizing the data by dividing the attack traffic by the total traffic to a given country or region, we get a totally different lineup. Almost a third of the HTTP traffic originating from Gibraltar was DDoS attack traffic, making it the largest source. In second place, Saint Helena, followed by the British Virgin Islands, Libya, Paraguay, Mayotte, Equatorial Guinea, Argentina, and Angola.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1dYeSLU5tTKxZmMoqkF8y5/ac6ff10b445c97be9a1a5e07374b0643/pasted-image-0--12-.png" />
            
            </figure><p>The top sources of HTTP DDoS attacks (normalized)</p><p>Back to the network layer, normalized, things look rather different as well. Almost 89% of the traffic we ingested in our Zimbabwe-based data centers were L3/4 DDoS attacks. In Paraguay, it was over 56%, followed by Mongolia reaching nearly a 35% attack share. Additional top locations included Moldova, Democratic Republic of the Congo, Ecuador, Djibouti, Azerbaijan, Haiti, and Dominican Republic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/qpyO1vBpvAjoCe50RnZGT/2e6001062ff51ecc9f5bb2bb30e9cf6f/pasted-image-0--13-.png" />
            
            </figure><p>The top sources of L3/4 DDoS attacks (normalized)</p>
    <div>
      <h3>Most attacked locations</h3>
      <a href="#most-attacked-locations">
        
      </a>
    </div>
    <p>When analyzing DDoS attacks against our customers, we use their <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-country">billing country</a> to determine the “attacked country (or region)”. In the first quarter of 2024, the US was the most attacked by HTTP DDoS attacks. Approximately one out of every 10 DDoS requests that Cloudflare mitigated targeted the US. In second, China, followed by Canada, Vietnam, Indonesia, Singapore, Hong Kong, Taiwan, Cyprus, and Germany.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5cGyvb0ljLm8wOQTzLHYfV/b3650336a30e2bafb717e42fc5255098/pasted-image-0--14-.png" />
            
            </figure><p>Top attacked countries and regions by HTTP DDoS attacks</p><p>When normalizing the data by dividing the attack traffic by the total traffic to a given country or region, the list changes drastically. Over 63% of HTTP traffic to Nicaragua was DDoS attack traffic, making it the most attacked location. In second, Albania, followed by Jordan, Guinea, San Marino, Georgia, Indonesia, Cambodia, Bangladesh, and Afghanistan.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6if6kI4aS8Kph16cSCEWjf/20be20d9cfe02034bf123003042dfbbb/pasted-image-0--15-.png" />
            
            </figure><p>Top attacked countries and regions by HTTP DDoS attacks (normalized)</p><p>On the network layer, China was the number one most attacked location, as 39% of all DDoS bytes that Cloudflare mitigated during the first quarter of 2024 were aimed at Cloudflare’s Chinese customers. Hong Kong came in second place, followed by Taiwan, the United States, and Brazil.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Nzw0zyRFnxer3C1SQmeHI/ae2081521fd12b399c9776a5a54748c4/pasted-image-0--16-.png" />
            
            </figure><p>Top attacked countries and regions by L3/4 DDoS attacks</p><p>Back to the network layer, when normalized, Hong Kong takes the lead as the most targeted location. L3/4 DDoS attack traffic accounted for over 78% of all Hong Kong-bound traffic. In second place, China with a DDoS share of 75%, followed by Kazakhstan, Thailand, Saint Vincent and the Grenadines, Norway, Taiwan, Turkey, Singapore, and Brazil.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2sUX9I80bmFLo0vrTNRiDu/4a96fd8283f2a5156ff02cd95fcdbda5/pasted-image-0--17-.png" />
            
            </figure><p>Top attacked countries and regions by L3/4 DDoS attacks (normalized)</p>
    <div>
      <h3>Cloudflare is here to help - no matter the attack type, size, or duration</h3>
      <a href="#cloudflare-is-here-to-help-no-matter-the-attack-type-size-or-duration">
        
      </a>
    </div>
    <p>Cloudflare's mission is to help build a better Internet, a vision where it remains secure, performant, and accessible to everyone. With four out of every 10 HTTP DDoS attacks lasting over 10 minutes and approximately three out of 10 extending beyond an hour, the challenge is substantial. Yet, whether an attack involves over 100,000 requests per second, as is the case in one out of every 10 attacks, or even exceeds a million requests per second — a rarity seen in only four out of every 1,000 attacks — Cloudflare’s defenses remain impenetrable.</p><p>Since pioneering <a href="/unmetered-mitigation">unmetered DDoS Protection</a> in 2017, Cloudflare has steadfastly honored its promise to provide enterprise-grade <a href="https://www.cloudflare.com/ddos/">DDoS protection</a> at no cost to all organizations, ensuring that our advanced technology and robust network architecture do not just fend off attacks but also preserve performance without compromise.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Mirai]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[DNS Flood]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">bRA8E8DuG6NNpZ1vHZCwP</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2023 Q4]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-2023-q4/</link>
            <pubDate>Tue, 09 Jan 2024 14:00:25 GMT</pubDate>
            <description><![CDATA[ Welcome to the sixteenth edition of Cloudflare’s DDoS Threat Report. This edition covers DDoS trends and key findings for the fourth and final quarter of the year 2023, complete with a review of major trends throughout the year ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1dLcyHxuJpOmtuilCdmlMv/226d5f6d0704e7ef443e924750799873/image14-1.png" />
            
            </figure><p>Welcome to the sixteenth edition of Cloudflare’s DDoS Threat Report. This edition covers DDoS trends and key findings for the fourth and final quarter of the year 2023, complete with a review of major trends throughout the year.</p>
    <div>
      <h2>What are DDoS attacks?</h2>
      <a href="#what-are-ddos-attacks">
        
      </a>
    </div>
    <p>DDoS attacks, or <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">distributed denial-of-service attacks</a>, are a type of cyber attack that aims to disrupt websites and online services for users, making them unavailable by overwhelming them with more traffic than they can handle. They are similar to car gridlocks that jam roads, preventing drivers from getting to their destination.</p><p>There are three main types of DDoS attacks that we will cover in this report. The first is an <a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/">HTTP request</a> intensive DDoS attack that aims to overwhelm HTTP servers with more requests than they can handle to cause a denial of service event. The second is an <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-packet/">IP packet</a> intensive DDoS attack that aims to overwhelm in-line appliances such as routers, firewalls, and servers with more packets than they can handle. The third is a bit-intensive attack that aims to saturate and clog the Internet link causing that ‘gridlock’ that we discussed. In this report, we will highlight various techniques and insights on all three types of attacks.</p><p>Previous editions of the report can be found <a href="/tag/ddos-reports">here</a>, and are also available on our interactive hub, <a href="https://radar.cloudflare.com/reports?q=DDoS">Cloudflare Radar</a>. Cloudflare Radar showcases global Internet traffic, attacks, and technology trends and insights, with drill-down and filtering capabilities for zooming in on insights of specific countries, industries, and service providers. Cloudflare Radar also offers a <a href="https://developers.cloudflare.com/radar/">free API</a> allowing academics, data sleuths, and other web enthusiasts to investigate Internet usage across the globe.</p><p>To learn how we prepare this report, refer to our <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/">Methodologies</a>.</p>
    <div>
      <h2>Key findings</h2>
      <a href="#key-findings">
        
      </a>
    </div>
    <ol><li><p>In Q4, we observed a 117% year-over-year increase in network-layer DDoS attacks, and overall increased DDoS activity targeting retail, shipment and public relations websites during and around Black Friday and the holiday season.</p></li><li><p>In Q4, DDoS attack traffic targeting Taiwan registered a 3,370% growth, compared to the previous year, amidst the upcoming general election and reported tensions with China. The percentage of DDoS attack traffic targeting Israeli websites grew by 27% quarter-over-quarter, and the percentage of DDoS attack traffic targeting Palestinian websites grew by 1,126% quarter-over-quarter — as the military conflict between Israel and Hamas continues.</p></li><li><p>In Q4, there was a staggering 61,839% surge in DDoS attack traffic targeting Environmental Services websites compared to the previous year, coinciding with the 28th United Nations Climate Change Conference (COP 28).</p></li></ol><p>For an in-depth analysis of these key findings and additional insights that could redefine your understanding of current cybersecurity challenges, read on!</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2UZbT93S5MJZLC4lm3oEFA/2beb24271129aabf3ca98b66f69f92cb/image1.png" />
            
            </figure><p>Illustration of a DDoS attack</p>
    <div>
      <h2>Hyper-volumetric HTTP DDoS attacks</h2>
      <a href="#hyper-volumetric-http-ddos-attacks">
        
      </a>
    </div>
    <p>2023 was the year of uncharted territories. DDoS attacks reached new heights — in size and sophistication. The wider Internet community, including Cloudflare, faced a persistent and deliberately engineered campaign of thousands of hyper-volumetric DDoS attacks at never before seen rates.</p><p>These attacks were highly complex and exploited an <a href="/technical-breakdown-http2-rapid-reset-ddos-attack">HTTP/2 vulnerability</a>. Cloudflare developed purpose-built technology to mitigate the vulnerability’s effect and worked with others in the industry to responsibly disclose it.</p><p>As part of this DDoS campaign, in Q3 our systems mitigated the largest attack we’ve ever seen — 201 million requests per second (rps). That’s almost 8 times larger than our previous 2022 record of 26 million rps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/49CXz2EGW8rzgjsaRcSFyT/f6f06108590316e1a3bdf0e0f69dbc89/pasted-image-0.png" />
            
            </figure><p>Largest HTTP DDoS attacks as seen by Cloudflare, by year</p>
    <div>
      <h2>Growth in network-layer DDoS attacks</h2>
      <a href="#growth-in-network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>After the hyper-volumetric campaign subsided, we saw an unexpected drop in HTTP DDoS attacks. Overall in 2023, our automated defenses mitigated over 5.2 million HTTP DDoS attacks consisting of over 26 trillion requests. That averages at 594 HTTP DDoS attacks and 3 billion mitigated requests every hour.</p><p>Despite these astronomical figures, the amount of HTTP DDoS attack requests actually declined by 20% compared to 2022. This decline was not just annual but was also observed in 2023 Q4 where the number of HTTP DDoS attack requests decreased by 7% YoY and 18% QoQ.</p><p>On the network-layer, we saw a completely different trend. Our automated defenses mitigated 8.7 million network-layer DDoS attacks in 2023. This represents an 85% increase compared to 2022.</p><p>In 2023 Q4, Cloudflare’s automated defenses mitigated over 80 petabytes of network-layer attacks. On average, our systems auto-mitigated 996 network-layer DDoS attacks and 27 terabytes every hour. The number of network-layer DDoS attacks in 2023 Q4 increased by 175% YoY and 25% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Da5bEJbgh9FT5UQb6qPWo/4cf631e2688ca806bcbe996a357e5d5f/HTTP-and-Network-layer-DDoS-attacks-by-quarter-1.png" />
            
            </figure><p>HTTP and Network-layer DDoS attacks by quarter</p>
    <div>
      <h3>DDoS attacks increase during and around COP 28</h3>
      <a href="#ddos-attacks-increase-during-and-around-cop-28">
        
      </a>
    </div>
    <p>In the final quarter of 2023, the landscape of cyber threats witnessed a significant shift. While the Cryptocurrency sector was initially leading in terms of the volume of HTTP DDoS attack requests, a new target emerged as a primary victim. The Environmental Services industry experienced an unprecedented surge in HTTP DDoS attacks, with these attacks constituting half of all its HTTP traffic. This marked a staggering 618-fold increase compared to the previous year, highlighting a disturbing trend in the cyber threat landscape.</p><p>This surge in cyber attacks coincided with COP 28, which ran from November 30th to December 12th, 2023. The conference was a pivotal event, signaling what many considered the <a href="https://unfccc.int/news/cop28-agreement-signals-beginning-of-the-end-of-the-fossil-fuel-era">'beginning of the end' for the fossil fuel era</a>. It was observed that in the period leading up to COP 28, there was a noticeable spike in HTTP attacks targeting Environmental Services websites. This pattern wasn't isolated to this event alone.</p><p>Looking back at historical data, particularly during COP 26 and COP 27, as well as other UN environment-related resolutions or announcements, a similar pattern emerges. Each of these events was accompanied by a corresponding increase in cyber attacks aimed at Environmental Services websites.</p><p>In February and March 2023, significant environmental events like the UN's resolution on <a href="https://www.unep.org/news-and-stories/story/un-resolution-billed-turning-point-climate-justice">climate justice</a> and the launch of United Nations Environment Programme’s <a href="https://www.unep.org/news-and-stories/press-release/largest-river-and-wetland-restoration-initiative-history-launched-un">Freshwater Challenge</a> potentially heightened the profile of environmental websites, possibly correlating with an increase in attacks on these sites​​​​.</p><p>This recurring pattern underscores the growing intersection between environmental issues and cyber security, a nexus that is increasingly becoming a focal point for attackers in the digital age.</p>
    <div>
      <h2>DDoS attacks and Iron Swords</h2>
      <a href="#ddos-attacks-and-iron-swords">
        
      </a>
    </div>
    <p>It’s not just UN resolutions that trigger DDoS attacks. Cyber attacks, and particularly DDoS attacks, have long been a tool of war and disruption. We witnessed an increase in DDoS attack activity in the Ukraine-Russia war, and now we’re also witnessing it in the Israel-Hamas war. We first reported the cyber activity in our report <a href="/cyber-attacks-in-the-israel-hamas-war/">Cyber attacks in the Israel-Hamas war</a>, and we continued to monitor the activity throughout Q4.</p><p>Operation “Iron Swords” is the <a href="https://en.wikipedia.org/wiki/2023_Israel%E2%80%93Hamas_war#Israeli_response">military offensive launched by Israel against Hamas</a> following the <a href="https://en.wikipedia.org/wiki/2023_Hamas-led_attack_on_Israel">Hamas-led 7 October attack</a>. During this ongoing armed conflict, we continue to see DDoS attacks targeting both sides.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/31johknCeQ8F1pbczj7Neq/2f91e03e355a539043c734e7c5140ff1/pasted-image-0--1-.png" />
            
            </figure><p>DDoS attacks targeting Israeli and Palestinian websites, by industry</p><p>Relative to each region's traffic, the Palestinian territories was the second most attacked region by HTTP DDoS attacks in Q4. Over 10% of all HTTP requests towards Palestinian websites were DDoS attacks, a total of 1.3 billion DDoS requests — representing a 1,126% increase in QoQ. 90% of these DDoS attacks targeted Palestinian Banking websites. Another 8% targeted Information Technology and Internet platforms.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6uYrGNHSPfp3nEmFkhTGpa/317d1cb4ead40504677565360d836641/pasted-image-0--2-.png" />
            
            </figure><p>Top attacked Palestinian industries</p><p>Similarly, our systems automatically mitigated over 2.2 billion HTTP DDoS requests targeting Israeli websites. While 2.2 billion represents a decrease compared to the previous quarter and year, it did amount to a larger percentage out of the total Israel-bound traffic. This normalized figure represents a 27% increase QoQ but a 92% decrease YoY. Notwithstanding the larger amount of attack traffic, Israel was the 77th most attacked region relative to its own traffic. It was also the 33rd most attacked by total volume of attacks, whereas the Palestinian territories was 42nd.</p><p>Of those Israeli websites attacked, Newspaper &amp; Media were the main target — receiving almost 40% of all Israel-bound HTTP DDoS attacks. The second most attacked industry was the Computer Software industry. The Banking, Financial Institutions, and Insurance (BFSI) industry came in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2N6E8K9fZJZUFID7t0liAB/c0e58eb814bd8f6ee51319c6fa9ac97d/pasted-image-0--3-.png" />
            
            </figure><p>Top attacked Israeli industries</p><p>On the network layer, we see the same trend. Palestinian networks were targeted by 470 terabytes of attack traffic — accounting for over 68% of all traffic towards Palestinian networks. Surpassed only by China, this figure placed the Palestinian territories as the second most attacked region in the world, by network-layer DDoS attack, relative to all Palestinian territories-bound traffic. By absolute volume of traffic, it came in third. Those 470 terabytes accounted for approximately 1% of all DDoS traffic that Cloudflare mitigated.</p><p>Israeli networks, though, were targeted by only 2.4 terabytes of attack traffic, placing it as the 8th most attacked country by network-layer DDoS attacks (normalized). Those 2.4 terabytes accounted for almost 10% of all traffic towards Israeli networks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Fk4fxxDf20Wt6BmMTDPNq/bf0d999fc9f6b4ca98eb3f4c5b819432/pasted-image-0--5-.png" />
            
            </figure><p>Top attacked countries</p><p>When we turned the picture around, we saw that 3% of all bytes that were ingested in our Israeli-based data centers were network-layer DDoS attacks. In our Palestinian-based data centers, that figure was significantly higher — approximately 17% of all bytes.</p><p>On the application layer, we saw that 4% of HTTP requests originating from Palestinian IP addresses were DDoS attacks, and almost 2% of HTTP requests originating from Israeli IP addresses were DDoS attacks as well.</p>
    <div>
      <h2>Main sources of DDoS attacks</h2>
      <a href="#main-sources-of-ddos-attacks">
        
      </a>
    </div>
    <p>In the third quarter of 2022, China was the largest source of HTTP DDoS attack traffic. However, since the fourth quarter of 2022, the US took the first place as the largest source of HTTP DDoS attacks and has maintained that undesirable position for five consecutive quarters. Similarly, our data centers in the US are the ones ingesting the most network-layer DDoS attack traffic — over 38% of all attack bytes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1LQRkEFpGgYH1o7Ld5m3LH/6e3452323058567ed6e244024644a379/imageLikeEmbed.png" />
            
            </figure><p>HTTP DDoS attacks originating from China and the US by quarter</p><p>Together, China and the US account for a little over a quarter of all HTTP DDoS attack traffic in the world. Brazil, Germany, Indonesia, and Argentina account for the next twenty-five percent.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4OJH3XgpVKTtd93Lhv9pQd/1a4d6d5fb7d6349609c62c9ed5524471/pasted-image-0--6-.png" />
            
            </figure><p>Top source of HTTP DDoS attacks</p><p>These large figures usually correspond to large markets. For this reason, we also normalize the attack traffic originating from each country by comparing their outbound traffic. When we do this, we often get small island nations or smaller market countries that a disproportionate amount of attack traffic originates from. In Q4, 40% of Saint Helena’s outbound traffic were HTTP DDoS attacks — placing it at the top. Following the ‘<a href="https://en.wikipedia.org/wiki/Saint_Helena">remote volcanic tropical island</a>’, Libya came in second, <a href="https://en.wikipedia.org/wiki/Eswatini">Swaziland</a> (also known as Eswatini) in third. Argentina and Egypt follow in fourth and fifth place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4hyX9SLpTS3ncRB5QZnR9R/447df8e913314ab249c0d5a430efcdcc/pasted-image-0--7-.png" />
            
            </figure><p>Top source of HTTP DDoS attacks with respect to each country’s traffic</p><p>On the network layer, Zimbabwe came in first place. Almost 80% of all traffic we ingested in our Zimbabwe-based data center was malicious. In second place, Paraguay, and Madagascar in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7sln1Hbv1Wz7j4oCCL9XRA/56f1f5fa42ab7846b0a0dc33c796afd0/pasted-image-0--8-.png" />
            
            </figure><p>Top source of Network-layer DDoS attacks with respect to each country’s traffic</p>
    <div>
      <h2>Most attacked industries</h2>
      <a href="#most-attacked-industries">
        
      </a>
    </div>
    <p>By volume of attack traffic, Cryptocurrency was the most attacked industry in Q4. Over 330 billion HTTP requests targeted it. This figure accounts for over 4% of all HTTP DDoS traffic for the quarter. The second most attacked industry was Gaming &amp; Gambling. These industries are known for being coveted targets and attract a lot of traffic and attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5UoOV6PIx9DqJ0monxhfwu/20411132ba585c3314941bc2aec93e43/pasted-image-0--9-.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks</p><p>On the network layer, the Information Technology and Internet industry was the most attacked — over 45% of all network-layer DDoS attack traffic was aimed at it. Following far behind were the Banking, Financial Services and Insurance (BFSI), Gaming &amp; Gambling, and Telecommunications industries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/tlGK3k5YutHhSEbvm1va0/5842c447cbb6c8dd18630bbb0c63db1f/pasted-image-0--10-.png" />
            
            </figure><p>Top industries targeted by Network-layer DDoS attacks</p><p>To change perspectives, here too, we normalized the attack traffic by the total traffic for a specific industry. When we do that, we get a different picture.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6DxEla6GwSvU7OBnjGmhJX/dc12c491f1444662e00636b63cf92637/Top-Attacked-Industry-by-Region-Q4-2023.png" />
            
            </figure><p>Top attacked industries by HTTP DDoS attacks, by region</p><p>We already mentioned in the beginning of this report that the Environmental Services industry was the most attacked relative to its own traffic. In second place was the Packaging and Freight Delivery industry, which is interesting because of its timely correlation with online shopping during Black Friday and the winter holiday season. Purchased gifts and goods need to get to their destination somehow, and it seems as though attackers tried to interfere with that. On a similar note, DDoS attacks on retail companies increased by 16% compared to the previous year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/14CXtsmUxjRwOB1kmYHA6Q/9c8b079ac33d94f8494e53d1ef50c4a6/pasted-image-0--11-.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks with respect to each industry’s traffic</p><p>On the network layer, Public Relations and Communications was the most targeted industry — 36% of its traffic was malicious. This too is very interesting given its timing. Public Relations and Communications companies are usually linked to managing public perception and communication. Disrupting their operations can have immediate and widespread reputational impacts which becomes even more critical during the Q4 holiday season. This quarter often sees increased PR and communication activities due to holidays, end-of-year summaries, and preparation for the new year, making it a critical operational period — one that some may want to disrupt.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2NLJAkykpHhrRuFA2OVuKg/a6ca3bebb6f29c610292cd630a6746cc/pasted-image-0--12-.png" />
            
            </figure><p>Top industries targeted by Network-layer DDoS attacks with respect to each industry’s traffic</p>
    <div>
      <h2>Most attacked countries and regions</h2>
      <a href="#most-attacked-countries-and-regions">
        
      </a>
    </div>
    <p>Singapore was the main target of HTTP DDoS attacks in Q4. Over 317 billion HTTP requests, 4% of all global DDoS traffic, were aimed at Singaporean websites. The US followed closely in second and Canada in third. Taiwan came in as the fourth most attacked region — amidst the upcoming <a href="https://www.bbc.co.uk/news/world-asia-67770782">general elections and the tensions with China</a>. Taiwan-bound attacks in Q4 traffic increased by 847% compared to the previous year, and 2,858% compared to the previous quarter. This increase is not limited to the absolute values. When normalized, the percentage of HTTP DDoS attack traffic targeting Taiwan relative to all Taiwan-bound traffic also significantly increased. It increased by 624% quarter-over-quarter and 3,370% year-over-year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/730lynQatPwtsRfi10TXOi/fc993988b6f38b8d00501f3451a16c18/pasted-image-0--13-.png" />
            
            </figure><p>Top targeted countries by HTTP DDoS attacks</p><p>While China came in as the ninth most attacked country by HTTP DDoS attacks, it's the number one most attacked country by network-layer attacks. 45% of all network-layer DDoS traffic that Cloudflare mitigated globally was China-bound. The rest of the countries were so far behind that it is almost negligible.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5MIf27g0zSIEZYQxUsFlTh/62c50ec1d0c25ae82045a71cd41c24c2/pasted-image-0--14-.png" />
            
            </figure><p>Top targeted countries by Network-layer DDoS attacks</p><p>When normalizing the data, Iraq, Palestinian territories, and Morocco take the lead as the most attacked regions with respect to their total inbound traffic. What’s interesting is that Singapore comes up as fourth. So not only did Singapore face the largest amount of HTTP DDoS attack traffic, but that traffic also made up a significant amount of the total Singapore-bound traffic. By contrast, the US was second most attacked by volume (per the application-layer graph above), but came in the fiftieth place with respect to the total US-bound traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4LX2zl13YVM9hZB60Ucedg/1b2ba78c2aeac99a3d9725ea4e418bd4/pasted-image-0--15-.png" />
            
            </figure><p>Top targeted countries by HTTP DDoS attacks with respect to each country’s traffic</p><p>Similar to Singapore, but arguably more dramatic, China is both the number one most attacked country by network-layer DDoS attack traffic, and also with respect to all China-bound traffic. Almost 86% of all China-bound traffic was mitigated by Cloudflare as network-layer DDoS attacks. The Palestinian territories, Brazil, Norway, and again Singapore followed with large percentages of attack traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2n9rHcScBY63Q4yX01yKu5/d19a7fc7ccd43c72911897245cc91dc3/pasted-image-0--16-.png" />
            
            </figure><p>Top targeted countries by Network-layer DDoS attacks with respect to each country’s traffic</p>
    <div>
      <h2>Attack vectors and attributes</h2>
      <a href="#attack-vectors-and-attributes">
        
      </a>
    </div>
    <p>The majority of DDoS attacks are short and small relative to Cloudflare’s scale. However, unprotected websites and networks can still suffer disruption from short and small attacks without proper inline automated protection — underscoring the need for organizations to be proactive in <a href="https://www.cloudflare.com/cybersecurity-risk-management/">adopting a robust security posture</a>.</p><p>In 2023 Q4, 91% of attacks ended within 10 minutes, 97% peaked below 500 megabits per second (mbps), and 88% never exceeded 50 thousand packets per second (pps).</p><p>Two out of every 100 network-layer DDoS attacks lasted more than an hour, and exceeded 1 gigabit per second (gbps). One out of every 100 attacks exceeded 1 million packets per second. Furthermore, the amount of network-layer DDoS attacks exceeding 100 million packets per second increased by 15% quarter-over-quarter.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YPOZlyzEHc5u5DeFbQXqW/d8dc22556a3f9510ee075b507b699a42/DDoS-attacks-stats-2023-Q4_a.png" />
            
            </figure><p>DDoS attack stats you should know</p><p>One of those large attacks was a Mirai-botnet attack that peaked at 160 million packets per second. The packet per second rate was not the largest we’ve ever seen. The largest we’ve ever seen was <a href="/mitigating-a-754-million-pps-ddos-attack-automatically">754 million packets per second</a>. That attack occurred in 2020, and we have yet to see anything larger.</p><p>This more recent attack, though, was unique in its bits per second rate. This was the largest network-layer DDoS attack we’ve seen in Q4. It peaked at 1.9 terabits per second and originated from a <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai botnet</a>. It was a multi-vector attack, meaning it combined multiple attack methods. Some of those methods included UDP fragments flood, UDP/Echo flood, SYN Flood, ACK Flood, and TCP malformed flags.</p><p>This attack targeted a known European Cloud Provider and originated from over 18 thousand unique IP addresses that are assumed to be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a>. It was automatically detected and mitigated by Cloudflare’s defenses.</p><p>This goes to show that even the largest attacks end very quickly. Previous large attacks we’ve seen ended within seconds — underlining the need for an in-line automated defense system. Though still rare, attacks in the terabit range are becoming more and more prominent.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/10QBHlFJPubkFIG1R2uPf1/06c522bfa3aca7713d823d44d9f6c002/pasted-image-0--17-.png" />
            
            </figure><p>1.9 Terabit per second Mirai DDoS attacks</p><p>The use of Mirai-variant botnets is still very common. In Q4, almost 3% of all attacks originate from Mirai. Though, of all attack methods, DNS-based attacks remain the attackers’ favorite. Together, DNS Floods and DNS Amplification attacks account for almost 53% of all attacks in Q4. <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN Flood</a> follows in second and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP floods</a> in third. We’ll cover the two DNS attack types here, and you can visit the hyperlinks to learn more about UDP and SYN floods in our Learning Center.</p>
    <div>
      <h3>DNS floods and amplification attacks</h3>
      <a href="#dns-floods-and-amplification-attacks">
        
      </a>
    </div>
    <p>DNS floods and DNS amplification attacks both exploit the <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">Domain Name System (DNS)</a>, but they operate differently. DNS is like a phone book for the Internet, translating human-friendly domain names like "<a href="http://www.cloudflare.com">www.cloudflare.com</a>" into numerical IP addresses that computers use to identify each other on the network.</p><p>Simply put, DNS-based DDoS attacks comprise the method computers and servers used to identify one another to cause an outage or disruption, without actually ‘taking down’ a server. For example, a server may be up and running, but the DNS server is down. So clients won't be able to connect to it and will experience it as an outage.</p><p>A <b>DNS flood</b> attack bombards a DNS server with an overwhelming number of DNS queries. This is usually done using a <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">DDoS botnet</a>. The sheer volume of queries can overwhelm the DNS server, making it difficult or impossible for it to respond to legitimate queries. This can result in the aforementioned service disruptions, delays or even an outage for those trying to access the websites or services that rely on the targeted DNS server.</p><p>On the other hand, a <b>DNS amplification</b> attack involves sending a small query with a spoofed IP address (the address of the victim) to a DNS server. The trick here is that the DNS response is significantly larger than the request. The server then sends this large response to the victim's IP address. By exploiting open DNS resolvers, the attacker can amplify the volume of traffic sent to the victim, leading to a much more significant impact. This type of attack not only disrupts the victim but also can congest entire networks.</p><p>In both cases, the attacks exploit the critical role of DNS in network operations. Mitigation strategies typically include securing DNS servers against misuse, implementing rate limiting to manage traffic, and filtering DNS traffic to identify and block malicious requests.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5UolIGOVG2jx7ST3CeoF0j/2b78eeb7eb633c49394390086a641dc5/pasted-image-0--18--1.png" />
            
            </figure><p>Top attack vectors</p><p>Amongst the emerging threats we track, we recorded a 1,161% increase in ACK-RST Floods as well as a 515% increase in CLDAP floods, and a 243% increase in SPSS floods, in each case as compared to last quarter. Let’s walk through some of these attacks and how they’re meant to cause disruption.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ac5D51H55vXbKPbWnSGEx/c4c12e4aadc06d6843f7d4c33b60679f/pasted-image-0--19-.png" />
            
            </figure><p>Top emerging attack vectors</p>
    <div>
      <h3>ACK-RST floods</h3>
      <a href="#ack-rst-floods">
        
      </a>
    </div>
    <p>An ACK-RST Flood exploits the <a href="https://www.cloudflare.com/learning/ddos/glossary/tcp-ip/">Transmission Control Protocol (TCP)</a> by sending numerous ACK and RST packets to the victim. This overwhelms the victim's ability to process and respond to these packets, leading to service disruption. The attack is effective because each ACK or RST packet prompts a response from the victim’s system, consuming its resources. ACK-RST Floods are often difficult to filter since they mimic legitimate traffic, making detection and mitigation challenging.</p>
    <div>
      <h3>CLDAP floods</h3>
      <a href="#cldap-floods">
        
      </a>
    </div>
    <p>CLDAP (Connectionless Lightweight Directory Access Protocol) is a variant of LDAP (Lightweight Directory Access Protocol). It's used for querying and modifying directory services running over IP networks. CLDAP is connectionless, using UDP instead of TCP, making it faster but less reliable. Because it uses UDP, there’s no handshake requirement which allows attackers to spoof the IP address thus allowing attackers to exploit it as a reflection vector. In these attacks, small queries are sent with a spoofed source IP address (the victim's IP), causing servers to send large responses to the victim, overwhelming it. Mitigation involves filtering and monitoring unusual CLDAP traffic.</p>
    <div>
      <h3>SPSS floods</h3>
      <a href="#spss-floods">
        
      </a>
    </div>
    <p>Floods abusing the SPSS (Source Port Service Sweep) protocol is a network attack method that involves sending packets from numerous random or spoofed source ports to various destination ports on a targeted system or network. The aim of this attack is two-fold: first, to overwhelm the victim's processing capabilities, causing service disruptions or network outages, and second, it can be used to scan for open ports and identify vulnerable services. The flood is achieved by sending a large volume of packets, which can saturate the victim's network resources and exhaust the capacities of its firewalls and intrusion detection systems. To mitigate such attacks, it's essential to leverage in-line automated detection capabilities.</p>
    <div>
      <h2>Cloudflare is here to help - no matter the attack type, size, or duration</h2>
      <a href="#cloudflare-is-here-to-help-no-matter-the-attack-type-size-or-duration">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet, and we believe that a better Internet is one that is secure, performant, and available to all. No matter the attack type, the attack size, the attack duration or the motivation behind the attack, Cloudflare’s defenses stand strong. Since we pioneered <a href="/unmetered-mitigation">unmetered DDoS Protection in 2017</a>, we’ve made and kept our commitment to make enterprise-grade DDoS protection free for all organizations alike — and of course, without compromising performance. This is made possible by our <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">unique technology</a> and robust network architecture.</p><p>It’s important to remember that security is a process, not a single product or flip of a switch. Atop of our automated DDoS protection systems, we offer comprehensive bundled features such as <a href="https://developers.cloudflare.com/waf/">firewall</a>, <a href="https://developers.cloudflare.com/bots/">bot detection</a>, <a href="https://developers.cloudflare.com/api-shield/">API protection</a>, and <a href="https://developers.cloudflare.com/cache/">caching</a> to bolster your defenses. Our multi-layered approach optimizes your security posture and minimizes potential impact. We’ve also put together a <a href="https://developers.cloudflare.com/ddos-protection/best-practices/respond-to-ddos-attacks/">list of recommendations</a> to help you optimize your defenses against DDoS attacks, and you can follow our step-by-step wizards to <a href="https://developers.cloudflare.com/learning-paths/application-security/">secure your applications</a> and <a href="https://developers.cloudflare.com/learning-paths/prevent-ddos-attacks/">prevent DDoS attacks</a>. And, if you’d like to benefit from our easy to use, best-in-class protection against DDoS and other attacks on the Internet, you can sign up — for free! — at <a href="https://www.cloudflare.com/plans/">cloudflare.com</a>. If you’re under attack, register or call the <a href="https://www.cloudflare.com/under-attack-hotline/">cyber emergency hotline number</a> for a rapid response.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Black Friday]]></category>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[China]]></category>
            <category><![CDATA[Israel]]></category>
            <guid isPermaLink="false">78R5sLaHmAgKy9ndDVHkN7</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2023 Q3]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-2023-q3/</link>
            <pubDate>Thu, 26 Oct 2023 13:00:58 GMT</pubDate>
            <description><![CDATA[ In the past quarter, DDoS attacks surged by 65%. Gaming and Gambling companies were the most attacked and Cloudflare mitigated thousands of hyper-volumetric DDoS attacks. The largest attacks we saw peaked at 201 million rps and 2.6 Tbps. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7vJM3Cw70UHjDC2hq8rRqv/7d62354485355a253d2b997d3249df82/image19.png" />
            
            </figure><p>Welcome to the third DDoS threat report of 2023. DDoS attacks, or <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">distributed denial-of-service attacks</a>, are a type of cyber attack that aims to disrupt websites (and other types of Internet properties) to make them unavailable for legitimate users by overwhelming them with more traffic than they can handle — similar to a driver stuck in a traffic jam on the way to the grocery store.</p><p>We see a lot of DDoS attacks of all types and sizes, and our <a href="https://www.cloudflare.com/network/">network</a> is one of the largest in the world spanning more than 300 cities in over 100 countries. Through this network we serve over 64 million HTTP requests per second at peak and about 2.3 billion DNS queries every day. On average, we mitigate 140 billion cyber threats each day. This colossal amount of data gives us a unique vantage point to understand the threat landscape and provide the community access to insightful and actionable DDoS trends.</p><p>In recent weeks, we've also observed a surge in DDoS attacks and other cyber attacks against Israeli newspaper and media websites, as well as financial institutions and government websites. Palestinian websites have also seen a significant increase in DDoS attacks. View the full coverage <a href="/cyber-attacks-in-the-israel-hamas-war/">here</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ZyOmncoxhr4spfWrvzu4I/fb65af9e3364a5c9c10551e622f6acb2/pasted-image-0--7--1.png" />
            
            </figure><p>HTTP DDoS attacks against Israeli websites using Cloudflare</p>
    <div>
      <h2>The global DDoS threat landscape</h2>
      <a href="#the-global-ddos-threat-landscape">
        
      </a>
    </div>
    <p>In the third quarter of 2023, Cloudflare faced one of the most sophisticated and persistent DDoS attack campaigns in recorded history.</p><ol><li><p>Cloudflare mitigated thousands of hyper-volumetric HTTP DDoS attacks, 89 of which exceeded 100 million requests per second (rps) and with the largest peaking at 201 million rps — a figure three times higher than the previous <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/?">largest attack on record</a> (71M rps).</p></li><li><p>The campaign contributed to an overall increase of 65% in HTTP DDoS attack traffic in Q3 compared to the previous quarter. Similarly, L3/4 DDoS attacks also increased by 14% alongside numerous attacks in the terabit-per-second range — the largest attack targeted Cloudflare’s free DNS resolver <a href="https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/">1.1.1.1</a> and peaked at 2.6 Tbps.</p></li><li><p>Gaming and Gambling companies were bombarded with the largest volume of HTTP DDoS attack traffic, overtaking the Cryptocurrency industry from last quarter.</p></li></ol><p><i>Reminder: an interactive version of this report is also available as a</i> <a href="https://radar.cloudflare.com/reports/ddos-2023-q3"><i>Cloudflare Radar Report</i></a><i>. On</i> <a href="https://radar.cloudflare.com/"><i>Radar</i></a><i>, you can also dive deeper and explore traffic trends, attacks, outages and many more insights for your specific industry, network and country.</i></p>
    <div>
      <h3>HTTP DDoS attacks and hyper-volumetric attacks</h3>
      <a href="#http-ddos-attacks-and-hyper-volumetric-attacks">
        
      </a>
    </div>
    <p>An <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/">HTTP DDoS attack</a> is a DDoS attack over the <a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/">Hypertext Transfer Protocol (HTTP)</a>. It targets HTTP Internet properties such as mobile application servers, ecommerce websites, and API gateways.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4MzFZZekp5KTt2jQlOoG0M/69a332e07a45dcb6c922f7d7f7cc82c0/Untitled.png" />
            
            </figure><p>Illustration of an HTTP DDoS attack</p><p><a href="https://developers.cloudflare.com/support/network/understanding-cloudflare-http2-and-http3-support/#http2">HTTP/2</a>, which accounts for 62% of HTTP traffic, is a version of the protocol that’s meant to improve application performance. The downside is that HTTP/2 can also help <i>improve</i> a botnet’s performance.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gt0Zfq2TByTxHFxMJe6BP/ccba571bf7ffb3e37782e64ebaa5e0cf/pasted-image-0-1.png" />
            
            </figure><p>Distribution of HTTP versions by Radar</p>
    <div>
      <h3>Campaign of hyper-volumetric DDoS attacks exploiting HTTP/2 Rapid Resets</h3>
      <a href="#campaign-of-hyper-volumetric-ddos-attacks-exploiting-http-2-rapid-resets">
        
      </a>
    </div>
    <p>Starting in late August 2023, Cloudflare and various other vendors were subject to a sophisticated and persistent DDoS attack campaign that exploited the <a href="/zero-day-rapid-reset-http2-record-breaking-ddos-attack/">HTTP/2 Rapid Reset</a> vulnerability (<a href="https://www.cve.org/CVERecord?id=CVE-2023-44487">CVE-2023-44487</a>).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1zfCtXueNXLlsmlk7A8coq/84f13ed42f5dc510dfc9bad46ed7b8b3/pasted-image-0--1--1.png" />
            
            </figure><p>Illustration of an HTTP/2 Rapid Reset DDoS attack</p><p>The DDoS campaign included thousands of hyper-volumetric DDoS attacks over HTTP/2 that peaked in the range of millions of requests per second. The average attack rate was 30M rps. Approximately 89 of the attacks peaked above 100M rps and the largest one we saw hit 201M rps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6WoXAia8UYzUqUvdwsxuXW/eccf1cdae4f0cb46d709b89395004e6a/pasted-image-0--2--1.png" />
            
            </figure><p>HTTP/2 Rapid Reset campaign of hyper-volumetric DDoS attacks</p><p>Cloudflare’s systems automatically detected and mitigated the vast majority of attacks. We deployed emergency countermeasures and improved our mitigation systems’ efficacy and efficiency to ensure the availability of our network and of our customers’.</p><p>Check out our engineering blog that <a href="/technical-breakdown-http2-rapid-reset-ddos-attack/">dives deep into the land of HTTP/2</a>, what we learned and what actions we took to make the Internet safer.</p>
    <div>
      <h3>Hyper-volumetric DDoS attacks enabled by VM-based botnets</h3>
      <a href="#hyper-volumetric-ddos-attacks-enabled-by-vm-based-botnets">
        
      </a>
    </div>
    <p>As we’ve seen in this campaign and previous <a href="/ddos-threat-report-2023-q1/">ones</a>, botnets that leverage cloud computing platforms and exploit HTTP/2 are able to generate up to <b>x5,000</b> more force per botnet node. This allowed them to launch hyper-volumetric DDoS attacks with a small botnet ranging 5-20 thousand nodes alone. To put that into perspective, in the past, IoT based botnets consisted of fleets of millions of nodes and barely managed to reach a few million requests per second.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6aY3QDbXwT06ndT5ruv6Ms/4acf652835acec7f5bd28b0aca80bf32/pasted-image-0--3--1.png" />
            
            </figure><p>Comparison of an Internet of Things (IoT) based botnet and a Virtual Machine (VM) based botnet</p><p>When analyzing the two-month-long DDoS campaign, we can see that Cloudflare infrastructure was the main target of the attacks. More specifically, 19% of all attacks targeted Cloudflare websites and infrastructure. Another 18% targeted Gaming companies, and 10% targeted well known VoIP providers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5TsjdpB4iSwOB0brlTf454/b0dbbad2c5d475fc719d76423328337a/pasted-image-0--4--1.png" />
            
            </figure><p>Top industries targeted by the HTTP/2 Rapid Reset DDoS attacks</p>
    <div>
      <h3>HTTP DDoS attack traffic increased by 65%</h3>
      <a href="#http-ddos-attack-traffic-increased-by-65">
        
      </a>
    </div>
    <p>The attack campaign contributed to an overall increase in the amount of attack traffic. Last quarter, the volume of HTTP DDoS attacks increased by 15% QoQ. This quarter, it grew even more. Attacks volume increased by 65% QoQ to a total staggering figure of 8.9 trillion HTTP DDoS requests that Cloudflare systems automatically detected and mitigated.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3GZPXFg1uZKMn9HLpcTQSS/cb9d2cd146b5a2d68baa1b94651f315e/Untitled9.png" />
            
            </figure><p>Aggregated volume of HTTP DDoS attack requests by quarter</p><p>Alongside the 65% increase in HTTP DDoS attacks, we also saw a minor increase of 14% in L3/4 DDoS attacks — similar to the figures we saw in the first quarter of this year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/60R9Zo2MFYlW9w8KfNge4C/78c978588db6977529abebcfbb8221d3/pasted-image-0--5--1.png" />
            
            </figure><p>L3/4 DDoS attack by quarter</p><p>A rise in large volumetric DDoS attacks contributing to this increase. In Q3, our DDoS defenses automatically detected and mitigated numerous DDoS attacks in the terabit-per-second range. The largest attacks we saw peaked at 2.6 Tbps. This attack was part of a broader campaign that targeted Cloudflare’s free DNS resolver <a href="https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/">1.1.1.1</a>. It was a <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP flood</a> that was launched by a <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai-variant botnet</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Uxn6gNTYNEWO9KACtfKpN/8cc96fb699be51869db0691269335008/pasted-image-007.png" />
            
            </figure>
    <div>
      <h2>Top sources of HTTP DDoS attacks</h2>
      <a href="#top-sources-of-http-ddos-attacks">
        
      </a>
    </div>
    <p>When comparing the global and country-specific HTTP DDoS attack request volume, we see that the US remains the largest source of HTTP DDoS attacks. One out of every 25 HTTP DDoS requests originated from the US. China remains in second place. Brazil replaced Germany as the third-largest source of HTTP DDoS attacks, as Germany fell to fourth place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/50dCj8uTPa6ovls8JnBbeV/0e84a5263c930cb59616544d82bc91fd/pasted-image-0--6-.png" />
            
            </figure><p>HTTP DDoS attacks: Top sources compared to all attack traffic</p><p>Some countries naturally receive more traffic due to various factors such as the population and Internet usage, and therefore also receive/generate more attacks. So while it’s interesting to understand the total amount of attack traffic originating from or targeting a given country, it is also helpful to remove that bias by normalizing the attack traffic by all traffic to a given country.</p><p>When doing so, we see a different pattern. The US doesn’t even make it into the top ten. Instead, Mozambique is in first place (again). One out of every five HTTP requests that originated from Mozambique was part of an HTTP DDoS attack traffic.</p><p>Egypt remains in second place — approximately 13% of requests originating from Egypt were part of an HTTP DDoS attack. Libya and China follow as the third and fourth-largest source of HTTP DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/wuw45dUbZjsMYTpxcaFrv/b065d46bbfcbff8466a570a97d3c022b/pasted-image-0--8-.png" />
            
            </figure><p>HTTP DDoS attacks: Top sources compared to their own traffic</p>
    <div>
      <h2>Top sources of L3/4 DDoS attacks</h2>
      <a href="#top-sources-of-l3-4-ddos-attacks">
        
      </a>
    </div>
    <p>When we look at the origins of L3/4 DDoS attacks, we ignore the source IP address because it can be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a>. Instead, we rely on the location of Cloudflare’s data center where the traffic was ingested. Thanks to our large network and global coverage, we’re able to achieve geographical accuracy to understand where attacks come from.</p><p>In Q3, approximately 36% of all <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">L3/4 DDoS attack</a> traffic that we saw originated from the US. Far behind, Germany came in second place with 8% and the UK followed in third place with almost 5%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/RrBJ1xpV90NhBGOAmP3Au/bb3251e7566f5715b2e70737569efc75/pasted-image-0--9-.png" />
            
            </figure><p>L3/4 DDoS attacks: Top sources compared to all attack traffic</p><p>When normalizing the data, we see that Vietnam dropped to the second-largest source of L3/4 DDoS attacks after being first for two consecutive quarters. New Caledonia, a French territory comprising dozens of islands in the South Pacific, grabbed the first place. Two out of every four bytes ingested in Cloudflare’s data centers in New Caledonia were attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2m7OrC60ttRI190S1ripAi/acc86e9508f687fbb4e1d7afb2199994/pasted-image-0--10-.png" />
            
            </figure><p>L3/4 DDoS attacks: Top sources compared to their own traffic</p>
    <div>
      <h2>Top attacked industries by HTTP DDoS attacks</h2>
      <a href="#top-attacked-industries-by-http-ddos-attacks">
        
      </a>
    </div>
    <p>In terms of absolute volume of HTTP DDoS attack traffic, the Gaming and Gambling industry jumps to first place overtaking the Cryptocurrency industry. Over 5% of all HTTP DDoS attack traffic that Cloudflare saw targeted the Gaming and Gambling industry.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4g1US6Pgze6K9cktcoxExV/356942816a4b30030ba953059f5462e3/pasted-image-0--11--2.png" />
            
            </figure><p>HTTP DDoS attacks: Top attacked industries compared to all attack traffic</p><p>The Gaming and Gambling industry has long been one of the most attacked industries compared to others. But when we look at the HTTP DDoS attack traffic relative to each specific industry, we see a different picture. The Gaming and Gambling industry has so much user traffic that, despite being the most attacked industry <i>by volume</i>, it doesn’t even make it into the top ten when we put it into the per-industry context.</p><p>Instead, what we see is that the Mining and Metals industry was targeted by the most attacks compared to its total traffic — 17.46% of all traffic to Mining and Metals companies were DDoS attack traffic.</p><p>Following closely in second place, 17.41% of all traffic to Non-profits were HTTP DDoS attacks. Many of these attacks are directed at more than 2,400 Non-profit and independent media organizations in 111 countries that Cloudflare protects for free as part of Project Galileo, which celebrated its <a href="/nine-years-of-project-galileo-and-how-the-last-year-has-changed-it/">ninth anniversary</a> this year. Over the past quarter alone, Cloudflare mitigated an average of 180.5 million cyber threats against Galileo-protected websites every day.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4IdazsRvY8JcFF5ByZprTK/e7d3886bde7415b9ebca9509dc0d5b91/pasted-image-0--12--2.png" />
            
            </figure><p>HTTP DDoS attacks: Top attacked industries compared to their own traffic</p><p>Pharmaceuticals, Biotechnology and Health companies came in third, and US Federal Government websites in fourth place. Almost one out of every 10 HTTP requests to US Federal Government Internet properties were part of an attack. In fifth place, Cryptocurrency and then Farming and Fishery not far behind.</p>
    <div>
      <h3>Top attacked industries by region</h3>
      <a href="#top-attacked-industries-by-region">
        
      </a>
    </div>
    <p>Now let’s dive deeper to understand which industries were targeted the most in each region.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1SgX9S1bbrxWXAQHtWECiz/ec7a1d4c2cfc8c65aa82943d721249e2/Top-Attacked-Industry-by-Region-Q3-2023.png" />
            
            </figure><p>HTTP DDoS attacks: Top industries targeted by HTTP DDoS attacks by region</p>
    <div>
      <h2>Regional deepdives</h2>
      <a href="#regional-deepdives">
        
      </a>
    </div>
    
    <div>
      <h3>Africa</h3>
      <a href="#africa">
        
      </a>
    </div>
    <p>After two consecutive quarters as the most attacked industry, the Telecommunications industry dropped from first place to fourth. Media Production companies were the most attacked industry in Africa. The Banking, Financial Services and Insurance (BFSI) industry follows as the second most attacked. Gaming and Gambling companies in third.</p>
    <div>
      <h3>Asia</h3>
      <a href="#asia">
        
      </a>
    </div>
    <p>The Cryptocurrency industry remains the most attacked in APAC for the second consecutive quarter. Gaming and Gambling came in second place. Information Technology and Services companies in third.</p>
    <div>
      <h3>Europe</h3>
      <a href="#europe">
        
      </a>
    </div>
    <p>For the fourth consecutive quarter, the Gaming and Gambling industry remains the most attacked industry in Europe. Retail companies came in second, and Computer Software companies in third.</p>
    <div>
      <h3>Latin America</h3>
      <a href="#latin-america">
        
      </a>
    </div>
    <p>Farming was the most targeted industry in Latin America in Q3. It accounted for a whopping 53% of all attacks towards Latin America. Far behind, Gaming and Gambling companies were the second most targeted. Civic and Social Organizations were in third.</p>
    <div>
      <h3>Middle East</h3>
      <a href="#middle-east">
        
      </a>
    </div>
    <p>Retail companies were the most targeted in the Middle East in Q3. Computer Software companies came in second and the Gaming and Gambling industry in third.</p>
    <div>
      <h3>North America</h3>
      <a href="#north-america">
        
      </a>
    </div>
    <p>After two consecutive quarters, the Marketing and Advertising industry dropped from the first place to the second. Computer Software took the lead. In third place, Telecommunications companies.</p>
    <div>
      <h3>Oceania</h3>
      <a href="#oceania">
        
      </a>
    </div>
    <p>The Telecommunications industry was, by far, the most targeted in Oceania in Q3 — over 45% of all attacks to Oceania. Cryptocurrency and Computer Software companies came in second and third places respectively.</p>
    <div>
      <h2>Top attacked industries by L3/4 DDoS attacks</h2>
      <a href="#top-attacked-industries-by-l3-4-ddos-attacks">
        
      </a>
    </div>
    <p>When descending the layers of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>, the Internet networks and services that were most targeted belonged to the Information Technology and Services industry. Almost 35% of all L3/4 DDoS attack traffic (in bytes) targeted the Information Technology and Internet industry.</p><p>Far behind, Telecommunication companies came in second with a mere share of 3%. Gaming and Gambling came in third, Banking, Financial Services and Insurance companies (BFSI) in fourth.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2MfrOUrxk9nvOVu3UJz4VN/f8297c3bb90969df2b1a5530621c0fd5/pasted-image-0--13--1.png" />
            
            </figure><p>L3/4 DDoS attacks: Top attacked industries compared to all attack traffic</p><p>When comparing the attacks on industries to all traffic for that specific industry, we see that the Music industry jumps to the first place, followed by Computer and Network Security companies, Information Technology and Internet companies and Aviation and Aerospace.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3DfOZGUxDtZjNG32es9K4K/ecb5f8a71a998a896dfd71592c6f4896/pasted-image-0--14--1.png" />
            
            </figure><p>L3/4 DDoS attacks: Top attacked industries compared to their own traffic</p>
    <div>
      <h2>Top attacked countries by HTTP DDoS attacks</h2>
      <a href="#top-attacked-countries-by-http-ddos-attacks">
        
      </a>
    </div>
    <p>When examining the total volume of attack traffic, the US remains the main target of HTTP DDoS attacks. Almost 5% of all HTTP DDoS attack traffic targeted the US. Singapore came in second and China in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6UGa4GWaTX9dLLMudmE8x8/c781750cd8b72074946581454d350ed0/pasted-image-0--15--2.png" />
            
            </figure><p>HTTP DDoS attacks: Top attacked countries compared to all traffic</p><p>If we normalize the data per country and region and divide the attack traffic by the total traffic, we get a different picture. The top three most attacked countries are Island nations.</p><p>Anguilla, a small set of islands east of Puerto Rico, jumps to the first place as the most attacked country. Over 75% of all traffic to Anguilla websites were HTTP DDoS attacks. In second place, American Samoa, a group of islands east of Fiji. In third, the British Virgin Islands.</p><p>In fourth place, Algeria, and then Kenya, Russia, Vietnam, Singapore, Belize, and Japan.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4dKlIvgbduDoug2Zlxn49q/2f8fdf78b30024ddb05e7b2aedef3da3/pasted-image-0--16-.png" />
            
            </figure><p>HTTP DDoS attacks: Top attacked countries compared to their own traffic</p>
    <div>
      <h3>Top attacked countries by L3/4 DDoS attacks</h3>
      <a href="#top-attacked-countries-by-l3-4-ddos-attacks">
        
      </a>
    </div>
    <p>For the second consecutive quarter, Chinese Internet networks and services remain the most targeted by L3/4 DDoS attacks. These China-bound attacks account for 29% of all attacks we saw in Q3.</p><p>Far, far behind, the US came in second place (3.5%) and Taiwan in third place (3%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1MliH893yCW3CV3jqpjZmw/0ca7b37530fc93682052961774b52c19/pasted-image-0--17-.png" />
            
            </figure><p>L3/4 DDoS attacks: Top attacked countries compared to all traffic</p><p>When normalizing the amount of attack traffic compared to all traffic to a country, China remains in first place and the US disappears from the top ten. Cloudflare saw that 73% of traffic to China Internet networks were attacks. However, the normalized ranking changes from second place on, with the Netherlands receiving the second-highest proportion of attack traffic (representing 35% of the country’s overall traffic), closely followed by Thailand, Taiwan and Brazil.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2m9M6zzn5dSwaubzw5PXQG/a3b6cdff495954f94a9173206142d8c3/pasted-image-0--18-.png" />
            
            </figure><p>L3/4 DDoS attacks: Top attacked countries compared to their own traffic</p>
    <div>
      <h2>Top attack vectors</h2>
      <a href="#top-attack-vectors">
        
      </a>
    </div>
    <p>The Domain Name System, or <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a>, serves as the phone book of the Internet. DNS helps translate the human-friendly website address (e.g., <a href="https://www.cloudflare.com/">www.cloudflare.com</a>) to a machine-friendly IP address (e.g., 104.16.124.96). By disrupting DNS servers, attackers impact the machines’ ability to connect to a website, and by doing so making websites unavailable to users.</p><p>For the second consecutive quarter, <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/">DNS-based DDoS attacks</a> were the most common. Almost 47% of all attacks were DNS-based. This represents a 44% increase compared to the previous quarter. <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> remain in second place, followed by RST floods, <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP floods</a>, and <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai attacks</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5YGOLx5BKnhvVEXB8awpxU/2b651344c3572a0c0aa2e5fdf3dbf9f2/pasted-image-0--19-.png" />
            
            </figure><p>Top attack vectors</p>
    <div>
      <h3>Emerging threats - <i>reduced, reused and recycled</i></h3>
      <a href="#emerging-threats-reduced-reused-and-recycled">
        
      </a>
    </div>
    <p>Aside from the most common attack vectors, we also saw significant increases in lesser known attack vectors. These tend to be very volatile as threat actors try to <i>“reduce, reuse and recycle”</i> older attack vectors. These tend to be UDP-based protocols that can be exploited to launch amplification and reflection DDoS attacks.</p><p>One well-known tactic that we continue to see is the use of amplification/reflection attacks. In this attack method, the attacker bounces traffic off of servers, and aims the responses towards their victim. Attackers are able to aim the bounced traffic to their victim by various methods such as <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">IP spoofing</a>.</p><p>Another form of reflection can be achieved differently in an attack named ‘DNS Laundering attack’. In a DNS Laundering attack, the attacker will query subdomains of a domain that is managed by the victim’s DNS server. The prefix that defines the subdomain is randomized and is never used more than once or twice in such an attack. Due to the randomization element, recursive DNS servers will never have a cached response and will need to forward the query to the victim’s authoritative DNS server. The authoritative DNS server is then bombarded by so many queries until it cannot serve legitimate queries or even crashes all together.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7sMVuA99lvODrsKQNBXFqs/e67a7b2cc1c7f07ba0642b25768a7142/pasted-image-0--20-.png" />
            
            </figure><p>Illustration of a reflection and amplification attack</p><p>Overall in Q3, Multicast DNS (mDNS) based DDoS attacks was the attack method that increased the most. In second place were attacks that exploit the Constrained Application Protocol (CoAP), and in third, the Encapsulating Security Payload (ESP). Let’s get to know those attack vectors a little better.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7zpAljr3yzAfQXITi9rSnX/83db014c34690385fa4f09f15171b0af/pasted-image-0--21-.png" />
            
            </figure><p>Main emerging threats</p>
    <div>
      <h3>mDNS DDoS attacks increased by 456%</h3>
      <a href="#mdns-ddos-attacks-increased-by-456">
        
      </a>
    </div>
    <p>Multicast DNS (mDNS) is a UDP-based protocol that is used in local networks for service/device discovery. Vulnerable mDNS servers respond to unicast queries originating outside the local network, which are ‘spoofed’ (altered) with the victim's source address. This results in amplification attacks. In Q3, we noticed a large increase of mDNS attacks; a 456% increase compared to the previous quarter.</p>
    <div>
      <h3>CoAP DDoS attacks increased by 387%</h3>
      <a href="#coap-ddos-attacks-increased-by-387">
        
      </a>
    </div>
    <p>The Constrained Application Protocol (CoAP) is designed for use in simple electronics and enables communication between devices in a low-power and lightweight manner. However, it can be abused for DDoS attacks via <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">IP spoofing</a> or amplification, as malicious actors exploit its multicast support or leverage poorly configured CoAP devices to generate large amounts of unwanted network traffic. This can lead to service disruption or overloading of the targeted systems, making them unavailable to legitimate users.</p>
    <div>
      <h3>ESP DDoS attacks increased by 303%</h3>
      <a href="#esp-ddos-attacks-increased-by-303">
        
      </a>
    </div>
    <p>The Encapsulating Security Payload (<a href="https://www.cloudflare.com/learning/network-layer/what-is-ipsec/#:~:text=Encapsulating%20Security%20Protocol%20(ESP)">ESP</a>) protocol is part of <a href="https://www.cloudflare.com/learning/network-layer/what-is-ipsec/">IPsec</a> and provides confidentiality, authentication, and integrity to network communications. However, it could potentially be abused in DDoS attacks if malicious actors exploit misconfigured or vulnerable systems to reflect or amplify traffic towards a target, leading to service disruption. Like with other protocols, securing and properly configuring the systems using ESP is crucial to mitigate the risks of DDoS attacks.</p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>Occasionally, DDoS attacks are carried out to extort ransom payments. We’ve been surveying Cloudflare customers over three years now, and have been tracking the occurrence of <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attack</a> events.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/78OHC3lsv0ffsK9Yul14GD/d7006d3f770e766373d0c334204f668b/Untitled--1--1.png" />
            
            </figure><p>Comparison of Ransomware and Ransom DDoS attacks</p><p>Unlike <a href="https://www.cloudflare.com/learning/security/ransomware/what-is-ransomware/">Ransomware</a> attacks, where victims typically fall prey to downloading a malicious file or clicking on a compromised email link which locks, deletes, or leaks their files until a ransom is paid, <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attacks</a> can be much simpler for threat actors to execute. Ransom DDoS attacks bypass the need for deceptive tactics such as luring victims into opening dubious emails or clicking on fraudulent links, and they don't necessitate a breach into the network or access to corporate resources.</p><p>Over the past quarter, reports of Ransom DDoS attacks continue to decrease. Approximately 8% of respondents reported being threatened or subject to Random DDoS attacks, which continues a decline we've been tracking throughout the year. Hopefully it is because threat actors have realized that organizations will not pay them (which is our <a href="https://www.cloudflare.com/ransom-ddos/">recommendation</a>).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/19HOqqLzAWDtf28tnsQg5w/03bb32015896bb211edcb3f63e142e09/pasted-image-0--22-.png" />
            
            </figure><p>Ransom DDoS attacks by quarter</p><p>However, keep in mind that this is also very seasonal, and we can expect an increase in ransom DDoS attacks during the months of November and December. If we look at Q4 numbers from the past three years, we can see that Ransom DDoS attacks have been significantly increasing YoY in November. In previous Q4s, it reached a point where one out of every four respondents reported being subject to Ransom DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ch5GcIORAOzfXzBwd8XsM/3d881a3b619861bb82bb1d93d11f01f4/pasted-image-0--23-.png" />
            
            </figure>
    <div>
      <h2>Improving your defenses in the era of hyper-volumetric DDoS attacks</h2>
      <a href="#improving-your-defenses-in-the-era-of-hyper-volumetric-ddos-attacks">
        
      </a>
    </div>
    <p>In the past quarter, we saw an unprecedented surge in DDoS attack traffic. This surge was largely driven by the hyper-volumetric HTTP/2 DDoS attack campaign.</p><p>Cloudflare customers using our HTTP reverse proxy, i.e. our CDN/WAF services, are <a href="https://www.cloudflare.com/h2/">already protected</a> from these and other HTTP DDoS attacks. Cloudflare customers that are using non-HTTP services and organizations that are not using Cloudflare at all are strongly encouraged to use an automated, always-on HTTP DDoS Protection service for their HTTP applications.</p><p>It’s important to remember that security is a process, not a single product or flip of a switch. Atop of our automated DDoS protection systems, we offer comprehensive bundled features such as <a href="https://developers.cloudflare.com/firewall/cf-firewall-rules/">firewall</a>, <a href="https://developers.cloudflare.com/bots/">bot detection</a>, <a href="https://www.cloudflare.com/application-services/solutions/api-security/">API protection</a>, and <a href="https://developers.cloudflare.com/cache/">caching</a> to bolster your defenses. Our multi-layered approach optimizes your security posture and minimizes potential impact. We’ve also put together a <a href="https://developers.cloudflare.com/ddos-protection/best-practices/respond-to-ddos-attacks/">list of recommendations</a> to help you optimize your defenses against DDoS attacks, and you can follow our step-by-step wizards to <a href="https://developers.cloudflare.com/learning-paths/application-security/">secure your applications</a> and <a href="https://developers.cloudflare.com/learning-paths/prevent-ddos-attacks/">prevent DDoS attacks</a>.</p><p>...<b>Report methodologies</b>Learn more about our methodologies and how we generate these insights: <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports">https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports</a></p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[HTTP2]]></category>
            <category><![CDATA[Rapid Reset]]></category>
            <guid isPermaLink="false">M67SmSyk26u5hjiQgLBKv</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2023 Q2]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-2023-q2/</link>
            <pubDate>Tue, 18 Jul 2023 13:00:48 GMT</pubDate>
            <description><![CDATA[ Q2 2023 saw an unprecedented escalation in DDoS attack sophistication. Pro-Russian hacktivists REvil, Killnet and Anonymous Sudan joined forces to attack Western sites. Mitel vulnerability exploits surged by a whopping 532%, and attacks on crypto rocketed up by 600%. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1HtQ4ytFAGsXMwZQiVY67E/85094d21474f92fa10d86a3f2dbf45b5/image16-1.png" />
            
            </figure><p>Welcome to the second DDoS threat report of 2023. DDoS attacks, or <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">distributed denial-of-service attacks</a>, are a type of cyber attack that aims to disrupt websites (and other types of Internet properties) to make them unavailable for legitimate users by overwhelming them with more traffic than they can handle — similar to a driver stuck in a traffic jam on the way to the grocery store.</p><p>We see a lot of DDoS attacks of all types and sizes and our <a href="https://www.cloudflare.com/network/">network</a> is one of the largest in the world spanning more than 300 cities in over 100 countries. Through this network we serve over 63 million HTTP requests per second at peak and over 2 trillion DNS queries every day. This colossal amount of data gives us a unique vantage point to provide the community access to insightful DDoS trends.</p><p>For our regular readers, you might notice a change in the layout of this report. We used to follow a set pattern to share our insights and trends about DDoS attacks. But with the landscape of DDoS threats changing as DDoS attacks have become more powerful and sophisticated, we felt it's time for a change in how we present our findings. So, we'll kick things off with a quick global overview, and then dig into the major shifts we're seeing in the world of DDoS attacks.</p><p><i>Reminder: an interactive version of this report is also available on </i><a href="https://radar.cloudflare.com/reports/ddos-2023-q2"><i>Cloudflare Radar</i></a><i>. Furthermore, we’ve also added a new </i><a href="https://radar.cloudflare.com/security-and-attacks"><i>interactive component</i></a><i> that will allow you to dive deeper into attack activity in each country or region.</i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7xYYEEcCUAFlwSPNwEM8wq/0e845397981e98e555ba3af79df98745/pasted-image-0.png" />
            
            </figure><p>New interactive Radar graph to shed light on local DDoS activity</p>
    <div>
      <h2>The DDoS landscape: a look at global patterns</h2>
      <a href="#the-ddos-landscape-a-look-at-global-patterns">
        
      </a>
    </div>
    <p>The second quarter of 2023 was characterized by thought-out, tailored and persistent waves of DDoS attack campaigns on various fronts, including:</p><ol><li><p>Multiple DDoS offensives orchestrated by pro-Russian hacktivist groups REvil, Killnet and <a href="https://www.cloudflare.com/learning/ddos/glossary/anonymous-sudan/">Anonymous Sudan</a> against Western interest websites.</p></li><li><p>An increase in deliberately engineered and targeted DNS attacks alongside a 532% surge in DDoS attacks exploiting the Mitel vulnerability (<a href="/cve-2022-26143-amplification-attack/">CVE-2022-26143</a>). Cloudflare contributed to disclosing this zero-day vulnerability last year.</p></li><li><p>Attacks targeting Cryptocurrency companies increased by 600%, as a broader 15% increase in HTTP DDoS attacks was observed. Of these, we’ve noticed an alarming escalation in attack sophistication which we will cover more in depth.</p></li></ol><p>Additionally, one of the largest attacks we’ve seen this quarter was an <a href="https://www.cloudflare.com/learning/ddos/what-is-an-ack-flood/">ACK flood</a> DDoS attack which originated from a <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai-variant botnet</a> comprising approximately 11K IP addresses. The attack targeted an American Internet Service Provider. It peaked at 1.4 terabit per seconds (Tbps) and was automatically detected and mitigated by Cloudflare’s systems.</p><p>Despite general figures indicating an increase in overall attack durations, most of the attacks are short-lived and so was this one. This attack lasted only two minutes. However, more broadly, we’ve seen that <b>attacks exceeding 3 hours have increased by 103% QoQ.</b></p><p>Now having set the stage, let’s dive deeper into these shifts we’re seeing in the DDoS landscape.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7rQBJ0xu8GBZ0wIczlXXZM/6dde6624e6b6f1c390ffe9f4d4346983/pasted-image-0--1-.png" />
            
            </figure><p>Mirai botnet attacks an American Service Provider, peaks at 1.4 Tbps</p>
    <div>
      <h2>Hacktivist alliance dubbed “Darknet Parliament” aims at Western banks and SWIFT network</h2>
      <a href="#hacktivist-alliance-dubbed-darknet-parliament-aims-at-western-banks-and-swift-network">
        
      </a>
    </div>
    <p>On June 14, Pro-Russian hacktivist groups Killnet, a resurgence of REvil and Anonymous Sudan <a href="https://www.darkreading.com/risk/killnet-threatens-imminent-swift-world-banking-attacks">announced that they have joined forces to execute “massive” cyber attacks on the Western financial system</a> including European and US banks, and the US Federal Reserve System. The collective, dubbed “Darknet Parliament”, declared its first objective was to paralyze <a href="https://en.wikipedia.org/wiki/SWIFT">SWIFT</a> (Society for Worldwide Interbank Financial Telecommunication). A successful DDoS attack on SWIFT could have dire consequences because it's the main service used by financial institutions to conduct global financial transactions.</p><p>Beyond a handful of publicized events such as the <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-azure-outlook-outages-caused-by-ddos-attacks/">Microsoft outage</a> which was reported by the media, we haven’t observed any novel DDoS attacks or disruptions targeting our customers. Our systems have been automatically detecting and mitigating attacks associated with this campaign. Over the past weeks, as many as 10,000 of these DDoS attacks were launched by the Darknet Parliament against Cloudflare-protected websites (see graph below).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/24AFPX3ceQZ79oTM9Iyy5F/ee099e1d6a69490145a4f5940d50ef58/pasted-image-0-1.png" />
            
            </figure><p>REvil, Killnet and Anonymous Sudan attacks</p><p>Despite the hacktivists’ statements, Banking and Financial Services websites were only the ninth most attacked industry — based on attacks we’ve seen against our customers as part of this campaign.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/BjN8VAxmKmeHZYZfejF5m/878292c937a3c6349cc6479dbcd29cc1/pasted-image-0--2-.png" />
            
            </figure><p>Top industries attacked by the REvil, Killnet and Anonymous Sudan attack campaign</p><p>The most attacked industries were Computer Software, Gambling &amp; Casinos and Gaming. Telecommunications and Media outlets came in fourth and fifth, respectively. Overall, the largest attack we witnessed in this campaign peaked at 1.7 million requests per second (rps) and the average was 65,000 rps.</p><p>For perspective, earlier this year we mitigated the <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">largest attack in recorded history peaking at 71 million rps</a>. So these attacks were very small compared to <i>Cloudflare scale</i>, but not necessarily for an average website. Therefore, we shouldn’t underestimate the damage potential on unprotected or suboptimally configured websites.</p>
    <div>
      <h3>Sophisticated HTTP DDoS attacks</h3>
      <a href="#sophisticated-http-ddos-attacks">
        
      </a>
    </div>
    <p>An <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/">HTTP DDoS attack</a> is a DDoS attack over the <a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/">Hypertext Transfer Protocol (HTTP)</a>. It targets HTTP Internet properties such as websites and API gateways. Over the past quarter, HTTP DDoS attacks increased by 15% quarter-over-quarter (QoQ) despite a 35% decrease year-over-year (YoY).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4dW23GdkaXpftyb5Qvs1N5/6c60aee62af67bfc6e4e33879e7250e3/DDoS-HTTP-Application.png" />
            
            </figure><p>Illustration of an HTTP DDoS attack</p><p>Additionally, we've observed an alarming uptick in highly-randomized and sophisticated HTTP DDoS attacks over the past few months. It appears as though the threat actors behind these attacks have deliberately engineered the attacks to try and overcome mitigation systems by adeptly imitating browser behavior very accurately, in some cases, by introducing a high degree of randomization on various properties such as <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent">user agents</a> and <a href="https://developers.cloudflare.com/bots/concepts/ja3-fingerprint/">JA3 fingerprints</a> to name a few. An example of such an attack is provided below. Each different color represents a different randomization feature.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/64x6SSnpgH0Ep2pKPQMsoy/d1e751cc5887159ca6a48a272bf389a6/pasted-image-0--3-.png" />
            
            </figure><p>Example of a highly randomized HTTP DDoS attack</p><p>Furthermore, in many of these attacks, it seems that the threat actors try to keep their attack rates-per-second relatively low to try and avoid detection and hide amongst the legitimate traffic.</p><p>This level of sophistication has previously been associated with state-level and state-sponsored threat actors, and it seems these capabilities are now at the disposal of cyber criminals. Their operations have already targeted prominent businesses such as a large <a href="https://www.cloudflare.com/learning/video/what-is-voip/">VoIP</a> provider, a leading semiconductor company, and a major payment &amp; credit card provider to name a few.</p><p>Protecting websites against sophisticated HTTP DDoS attacks requires intelligent protection that is automated and fast, that leverages threat intelligence, traffic profiling and Machine Learning/statistical analysis to differentiate between attack traffic and user traffic. Moreover, even increasing <a href="https://developers.cloudflare.com/cache/">caching</a> where applicable can help reduce the risk of attack traffic impacting your origin. Read more about <a href="https://www.cloudflare.com/ddos/">DDoS protection</a> best practices <a href="https://developers.cloudflare.com/ddos-protection/best-practices/respond-to-ddos-attacks/">here</a>.</p>
    <div>
      <h3>DNS Laundering DDoS attacks</h3>
      <a href="#dns-laundering-ddos-attacks">
        
      </a>
    </div>
    <p>The Domain Name System, or <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a>, serves as the phone book of the Internet. DNS helps translate the human-friendly website address (e.g. <a href="http://www.cloudflare.com">www.cloudflare.com</a>) to a machine-friendly IP address (e.g. 104.16.124.96). By disrupting DNS servers, attackers impact the machines’ ability to connect to a website, and by doing so making websites unavailable to users.</p><p>Over the past quarter, the most common attack vector was <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/">DNS-based DDoS attacks</a> — 32% of all DDoS attacks were over the DNS protocol. Amongst these, one of the more concerning attack types we’ve seen increasing is the <i>DNS Laundering attack</i> which can pose severe challenges to organizations that operate their own <a href="https://www.cloudflare.com/learning/dns/dns-server-types/#:~:text=What%20is%20an%20authoritative%20nameserver%3F">authoritative DNS servers</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4suDM0V6shZ1D6QXG8HgJx/c7813fe912384694ebb8239e2b5348d3/pasted-image-0--4-.png" />
            
            </figure><p>Top DDoS attack vectors in 2023 Q2</p><p>The term “Laundering” in the DNS Laundering attack name refers to the analogy of money laundering, the devious process of making illegally-gained proceeds, often referred to as "dirty money," appear legal. Similarly, in the DDoS world, a DNS Laundering attack is the process of making bad, malicious traffic appear as good, legitimate traffic by laundering it via reputable <a href="https://www.cloudflare.com/learning/dns/dns-server-types/#:~:text=What%20is%20a%20DNS%20recursive%20resolver%3F">recursive DNS resolvers</a>.</p><p>In a DNS Laundering attack, the threat actor will query subdomains of a domain that is managed by the victim’s DNS server. The prefix that defines the subdomain is randomized and is never used more than once or twice in such an attack. Due to the randomization element, recursive DNS servers will never have a cached response and will need to forward the query to the victim’s authoritative DNS server. The authoritative DNS server is then bombarded by so many queries until it cannot serve legitimate queries or even crashes all together.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/35ih4bBRoWVOjaBul8pM3u/f415b410247eab186b6779be93f8980d/DNS-Laundering-attack.png" />
            
            </figure><p>Illustration of a DNS Laundering DDoS attack</p><p>From the protection point of view, the DNS administrators can’t block the attack source because the source includes reputable recursive DNS servers like Google’s 8.8.8.8 and Cloudflare’s 1.1.1.1. The administrators also cannot block all queries to the attacked domain because it is a valid domain that they want to preserve access to legitimate queries.</p><p>The above factors make it very challenging to distinguish legitimate queries from malicious ones. A large Asian financial institution and a North American DNS provider are amongst recent victims of such attacks. An example of such an attack is provided below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5syXqOfRwxilKlAODokApw/446686a8665bbf18ad2f69786072cede/pasted-image-0--5-.png" />
            
            </figure><p>Example of a DNS Laundering DDoS attack</p><p>Similar to the protection strategies outlined for HTTP applications, protecting DNS servers also requires a precise, fast, and automated approach. Leveraging a <a href="https://developers.cloudflare.com/dns/">managed DNS service</a> or a <a href="https://developers.cloudflare.com/dns/dns-firewall/">DNS reverse proxy</a> such as Cloudflare’s can help absorb and mitigate the attack traffic. For those more sophisticated DNS attacks, a more intelligent solution is required that leverages statistical analysis of historical data to be able to differentiate between legitimate queries and attack queries.</p>
    <div>
      <h2>The rise of the Virtual Machine Botnets</h2>
      <a href="#the-rise-of-the-virtual-machine-botnets">
        
      </a>
    </div>
    <p>As we’ve <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">previously disclosed</a>, we are witnessing an evolution in botnet <i>DNA</i>. The era of VM-based DDoS botnets has arrived and with it <i>hyper-volumetric</i> DDoS attacks. These botnets are comprised of Virtual Machines (VMs, or Virtual Private Servers, VPS) rather than Internet of Things (IoT) devices which makes them so much more powerful, up to 5,000 times stronger.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/70XmHWLipSPS279wzBJeVq/9ab463740bf2324e550c86e4dac8bb77/pasted-image-0--6-.png" />
            
            </figure><p>Illustration of an IoT botnet compared with a VM Botnet</p><p>Because of the computational and bandwidth resources that are at the disposal of these VM-based botnets, they’re able to generate hyper-volumetric attacks with a much smaller fleet size compared to IoT-based botnets.</p><p>These botnets have executed one largest recorded DDoS attacks including the <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">71 million request per second DDoS attack</a>. Multiple organizations including an industry-leading gaming platform provider have already been targeted by this new generation of botnets.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5HBf1qeb9Yhm5OITU2dSl9/70e3ce9e1c6756bc7eb713900f2ba631/image1-67.png" />
            
            </figure><p>Cloudflare has proactively collaborated with prominent cloud computing providers to combat these new botnets. Through the quick and dedicated actions of these providers, significant components of these botnets have been neutralized. Since this intervention, we have not observed any further hyper-volumetric attacks yet, a testament to the efficacy of our collaboration.</p><p>While we already enjoy a fruitful alliance with the cybersecurity community in countering botnets when we identify large-scale attacks, our goal is to streamline and automate this process further. We extend an invitation to cloud computing providers, hosting providers, and other general service providers to join <a href="https://www.cloudflare.com/lp/botnet-threat-feed/">Cloudflare’s free Botnet Threat Feed</a>. This would provide visibility into attacks originating within their networks, contributing to our collective efforts to dismantle botnets.</p>
    <div>
      <h2>“Startblast”: Exploiting Mitel vulnerabilities for DDoS attacks</h2>
      <a href="#startblast-exploiting-mitel-vulnerabilities-for-ddos-attacks">
        
      </a>
    </div>
    <p>In March 2022, we <a href="/cve-2022-26143-amplification-attack/">disclosed a zero-day vulnerability</a> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26143">CVE-2022-26143</a>), named TP240PhoneHome, which was identified in the <a href="https://www.mitel.com/products/applications/collaboration/micollab">Mitel MiCollab</a> business phone system, exposing the system to UDP amplification DDoS attacks.</p><p>This exploit operates by reflecting traffic off vulnerable servers, amplifying it in the process, with a factor as high as 220 billion percent. The vulnerability stems from an unauthenticated UDP port exposed to the public Internet, which could allow malicious actors to issue a 'startblast' debugging command, simulating a flurry of calls to test the system.</p><p>As a result, for each test call, two UDP packets are sent to the issuer, enabling an attacker to direct this traffic to any IP and port number to amplify a DDoS attack. Despite the vulnerability, only a few thousand of these devices are exposed, limiting the potential scale of attack, and attacks must run serially, meaning each device can only launch one attack at a time.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3APXynJxjsADpbHiOw2JtO/2f0142ac405c4d71883e91110578625e/pasted-image-0-2.png" />
            
            </figure><p>Top industries targeted by Startblast DDoS attacks</p><p>Overall, in the past quarter, we’ve seen additional emerging threats such as DDoS attacks abusing the TeamSpeak3 protocol. This attack vector increased by a staggering 403% this quarter.</p><p><a href="https://en.wikipedia.org/wiki/TeamSpeak">TeamSpeak</a>, a proprietary <a href="https://en.wikipedia.org/wiki/Voice_over_IP">voice-over-Internet Protocol (VoIP)</a> that runs over UDP to help gamers talk with other gamers in real time. Talking instead of just chatting can significantly improve a gaming team’s efficiency and help them win. DDoS attacks that target TeamSpeak servers may be launched by rival groups in an attempt to disrupt their communication path during real-time multiplayer games and thus impact their team’s performance.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3yxgaijJ7xzLbPDwDpBOZn/d9107db0c1e9afe1c7ddcbcb1646886b/pasted-image-0--1--1.png" />
            
            </figure>
    <div>
      <h2>DDoS hotspots: The origins of attacks</h2>
      <a href="#ddos-hotspots-the-origins-of-attacks">
        
      </a>
    </div>
    <p>Overall, HTTP DDoS attacks increased by 15% QoQ despite a 35% decrease YoY. Additionally, network-layer DDoS attacks decreased this quarter by approximately 14%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5qTRXwci5uW8mWQH0a3mZt/d2575f4369806161e817e5dfd0e69a32/pasted-image-0--9-.png" />
            
            </figure><p>HTTP DDoS attack requests by quarter</p><p>In terms of total volume of attack traffic, the US was the largest source of HTTP DDoS attacks. Three out of every thousand requests we saw were part of HTTP DDoS attacks originating from the US. China came in second place and Germany in third place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1B5pZE1C0uxIOnbtlHatrE/9bf193bd94e0db980574d8433975aac8/pasted-image-0--10-.png" />
            
            </figure><p>Top source countries of HTTP DDoS attacks (percentage of attack traffic out of the total traffic worldwide)</p><p>Some countries naturally receive more traffic due to various factors such as market size, and therefore more attacks. So while it’s interesting to understand the total amount of attack traffic originating from a given country, it is also helpful to remove that bias by normalizing the attack traffic by all traffic to a given country.</p><p>When doing so, we see a different pattern. The US doesn’t even make it into the top ten. Instead, Mozambique, Egypt and Finland take the lead as the source countries of the most HTTP DDoS attack traffic relative to all of their traffic. Almost a fifth of all HTTP traffic originating from Mozambique IP addresses were part of DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5X884kp83RsGMwuJHsADsd/3388c9f3a4e67aaf630d06a70fa55d73/pasted-image-0--11-.png" />
            
            </figure><p>Top source countries of HTTP DDoS attacks (percentage of attack traffic out of the total traffic per country)</p><p>Using the same calculation methodology but for bytes, Vietnam remains the largest source of network-layer DDoS attacks (aka <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">L3/4 DDoS attacks</a>) for the second consecutive quarter — and the amount even increased by 58% QoQ. Over 41% of all bytes that were ingested in Cloudflare’s Vietnam data centers were part of L3/4 DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7IWRTmxWDDC89sZGPlQS4V/de9425ede98bbfe4cb78df45933f62f0/pasted-image-0--12-.png" />
            
            </figure><p>Top source countries of L3/4 DDoS attacks (percentage of attack traffic out of the total traffic per country)</p>
    <div>
      <h2>Industries under attack: examining DDoS attack targets</h2>
      <a href="#industries-under-attack-examining-ddos-attack-targets">
        
      </a>
    </div>
    <p>When examining HTTP DDoS attack activity in Q2, Cryptocurrency websites were targeted with the largest amount of HTTP DDoS attack traffic. Six out of every ten thousand HTTP requests towards Cryptocurrency websites behind Cloudflare were part of these attacks. This represents a 600% increase compared to the previous quarter.</p><p>After Crypto, Gaming and Gambling websites came in second place as their attack share increased by 19% QoQ. Marketing and Advertising websites not far behind in third place with little change in their share of attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2oFe1eI3Lu2ZyMTtp7ciAY/3bf330b6c056c9d60f17ff1791946e33/pasted-image-0--13-.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks (percentage of attack traffic out of the total traffic for all industries)</p><p>However, when we look at the amount of attack traffic relative to all traffic for any given industry, the numbers paint a different picture. Last quarter, Non-profit organizations were attacked the most — 12% of traffic to Non-profits were HTTP DDoS attacks. Cloudflare protects more than 2,271 Non-profit organizations in 111 countries as part of <a href="/nine-years-of-project-galileo-and-how-the-last-year-has-changed-it/">Project Galileo which celebrated its ninth anniversary this year</a>. Over the past months, an average of 67.7 million cyber attacks targeted Non-profits on a daily basis.</p><p>Overall, the amount of DDoS attacks on Non-profits increased by 46% bringing the percentage of attack traffic to 17.6%. However, despite this growth, the Management Consulting industry jumped to the first place with 18.4% of its traffic being DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/74q0HaWh4jPxA2XfZpRCCv/19f8905e289a8cbe3aa6663fca9a5bb1/pasted-image-0--14-.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks (percentage of attack traffic out of the total traffic per industry)</p><p>When descending the layers of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>, the Internet networks that were most targeted belonged to the Information Technology and Services industry. Almost every third byte routed to them were part of L3/4 DDoS attacks.</p><p>Surprisingly enough, companies operating in the Music industry were the second most targeted industry, followed by Broadcast Media and Aviation &amp; Aerospace.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1xLyFLWq30409EwSqML24z/5bc31f8e496fc79172520991fcd268f8/pasted-image-0--15-.png" />
            
            </figure><p>Top industries targeted by L3/4 DDoS attacks (percentage of attack traffic out of the total traffic per industry)</p>
    <div>
      <h2>Top attacked industries: a regional perspective</h2>
      <a href="#top-attacked-industries-a-regional-perspective">
        
      </a>
    </div>
    <p>Cryptocurrency websites experienced the highest number of attacks worldwide, while Management Consulting and Non-profit sectors were the most targeted considering their total traffic. However, when we look at individual regions, the situation is a bit different.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2K70NI1kHUqCxExPgmedH5/cc762c50e6af2b82ab2cd77c344289b6/Top-Attacked-Industry-by-Region-Q1-2023.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks by region</p>
    <div>
      <h3>Africa</h3>
      <a href="#africa">
        
      </a>
    </div>
    <p>The Telecommunications industry remains the most attacked industry in Africa for the second consecutive quarter. The Banking, Financial Services and Insurance (BFSI) industry follows as the second most attacked. The majority of the attack traffic originated from Asia (35%) and Europe (25%).</p>
    <div>
      <h3>Asia</h3>
      <a href="#asia">
        
      </a>
    </div>
    <p>For the past two quarters, the Gaming and Gambling industry was the most targeted industry in Asia. In Q2, however, the Gaming and Gambling industry dropped to second place and Cryptocurrency took the lead as the most attacked industry (~50%). Substantial portions of the attack traffic originated from Asia itself (30%) and North America (30%).</p>
    <div>
      <h3>Europe</h3>
      <a href="#europe">
        
      </a>
    </div>
    <p>For the third consecutive quarter, the Gaming &amp; Gambling industry remains the most attacked industry in Europe. The Hospitality and Broadcast Media industries follow not too far behind as the second and third most attacked. Most of the attack traffic came from within Europe itself (40%) and from Asia (20%).</p>
    <div>
      <h3>Latin America</h3>
      <a href="#latin-america">
        
      </a>
    </div>
    <p>Surprisingly, half of all attack traffic targeting Latin America was aimed at the Sporting Goods industry. In the previous quarter, the BFSI was the most attacked industry. Approximately 35% of the attack traffic originated from Asia, and another 25% originated from Europe.</p>
    <div>
      <h3>Middle East</h3>
      <a href="#middle-east">
        
      </a>
    </div>
    <p>The Media &amp; Newspaper industries were the most attacked in the Middle East. The vast majority of attack traffic originated from Europe (74%).</p>
    <div>
      <h3>North America</h3>
      <a href="#north-america">
        
      </a>
    </div>
    <p>For the second consecutive quarter, Marketing &amp; Advertising companies were the most attacked in North America (approximately 35%). Manufacturing and Computer Software companies came in second and third places, respectively. The main sources of the attack traffic were Europe (42%) and the US itself (35%).</p>
    <div>
      <h3>Oceania</h3>
      <a href="#oceania">
        
      </a>
    </div>
    <p>This quarter, the Biotechnology industry was the most attacked. Previously, it was the Health &amp; Wellness industry. Most of the attack traffic originated from Asia (38%) and Europe (25%).</p>
    <div>
      <h2>Countries and regions under attack: examining DDoS attack targets</h2>
      <a href="#countries-and-regions-under-attack-examining-ddos-attack-targets">
        
      </a>
    </div>
    <p>When examining the total volume of attack traffic, last quarter, Israel leaped to the front as the most attacked country. This quarter, attacks targeting Israeli websites decreased by 33% bringing it to the fourth place. The US takes the lead again as the most attacked country, followed by Canada and Singapore.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5AJcPqRhLPSwVjz5bni7Xm/dc29ce9e6e58577aa01ecb23dd8496f7/pasted-image-0--16-.png" />
            
            </figure><p>Top countries and regions targeted by HTTP DDoS attacks (percentage of attack traffic out of the total traffic for all countries and regions)</p><p>If we normalize the data per country and region and divide the attack traffic by the total traffic, we get a different picture. Palestine jumps to the first place as the most attacked country. Almost 12% of all traffic to Palestinian websites were HTTP DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Iy2f7aBzWWkjUaMdjWeZr/b18180389ded0297142aa657d0e5edb0/pasted-image-0--17-.png" />
            
            </figure><p>Top countries and regions targeted by HTTP DDoS attacks (percentage of attack traffic out of the total traffic per country and region)</p><p>Last quarter, we observed a striking deviation at the network layer, with Finnish networks under Cloudflare's shield emerging as the primary target. This surge was likely correlated with the diplomatic talks that precipitated <a href="https://en.wikipedia.org/wiki/Finland%E2%80%93NATO_relations">Finland's formal integration into NATO</a>. Roughly 83% of all incoming traffic to Finland comprised cyberattacks, with China a close second at 68% attack traffic.</p><p>This quarter, however, paints a very different picture. Finland has receded from the top ten, and Chinese Internet networks behind Cloudflare have ascended to the first place. Almost two-thirds of the byte streams towards Chinese networks protected by Cloudflare were malicious. Following China, Switzerland saw half of its inbound traffic constituting attacks, and Turkey came third, with a quarter of its incoming traffic identified as hostile.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2xPzFgn9oydmh7fDRo7U4J/f18beb7d6edf266b8076a6428831f5b5/pasted-image-0--18-.png" />
            
            </figure><p>Top countries and regions targeted by L3/4 DDoS attacks (percentage of attack traffic out of the total traffic per country and region)</p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>Occasionally, DDoS attacks are carried out to extort ransom payments. We’ve been surveying Cloudflare customers over three years now, and have been tracking the occurrence of <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attack</a> events.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3oeVOpIFoox7wAH7rseTwN/5493495fbc4e02f39bf7428bba69f58e/pasted-image-0--19-.png" />
            
            </figure><p>High level comparison of Ransomware and Ransom DDoS attacks</p><p>Unlike <a href="https://www.cloudflare.com/learning/security/ransomware/what-is-ransomware/">Ransomware</a> attacks, where victims typically fall prey to downloading a malicious file or clicking on a compromised email link which locks, deletes or leaks their files until a ransom is paid, <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attacks</a> can be much simpler for threat actors to execute. Ransom DDoS attacks bypass the need for deceptive tactics such as luring victims into opening dubious emails or clicking on fraudulent links, and they don't necessitate a breach into the network or access to corporate resources.</p><p>Over the past quarter, reports of Ransom DDoS attacks decreased. One out of ten respondents reported being threatened or subject to Ransom DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1oajRNqBmeB4Ggm6FBOTgb/f35d9665f07c9eb0689f9373696cb8ad/pasted-image-0--20-.png" />
            
            </figure>
    <div>
      <h2>Wrapping up: the ever-evolving DDoS threat landscape</h2>
      <a href="#wrapping-up-the-ever-evolving-ddos-threat-landscape">
        
      </a>
    </div>
    <p>In recent months, there's been an alarming escalation in the sophistication of DDoS attacks. And even the largest and most sophisticated attacks that we’ve seen may only last a few minutes or even seconds — which doesn’t give a human sufficient time to respond. Before the PagerDuty alert is even sent, the attack may be over and the damage is done. Recovering from a DDoS attack can last much longer than the attack itself — just as a boxer might need a while to recover from a punch to the face that only lasts a fraction of a second.</p><p>Security is not one single product or a click of a button, but rather a process involving multiple layers of defense to reduce the risk of impact. Cloudflare's automated DDoS defense systems consistently safeguard our clients from DDoS attacks, freeing them up to focus on their core business operations. These systems are complemented by the vast breadth of Cloudflare capabilities such as <a href="https://developers.cloudflare.com/firewall/cf-firewall-rules/">firewall</a>, <a href="https://developers.cloudflare.com/bots/">bot detection</a>, <a href="https://developers.cloudflare.com/api-shield/">API protection</a> and even <a href="https://developers.cloudflare.com/cache/">caching</a> which can all contribute to reducing the risk of impact.</p><p>The DDoS threat landscape is evolving and increasingly complex, demanding more than just quick fixes. Thankfully, with Cloudflare's multi-layered defenses and automatic DDoS protections, our clients are equipped to navigate these challenges confidently. Our mission is to help build a better Internet, and so we continue to stand guard, ensuring a safer and more reliable digital realm for all.</p>
    <div>
      <h2>Methodologies</h2>
      <a href="#methodologies">
        
      </a>
    </div>
    
    <div>
      <h3>How we calculate Ransom DDoS attack insights</h3>
      <a href="#how-we-calculate-ransom-ddos-attack-insights">
        
      </a>
    </div>
    <p>Cloudflare’s systems constantly analyze traffic and automatically apply mitigation when DDoS attacks are detected. Each attacked customer is prompted with an automated survey to help us better understand the nature of the attack and the success of the mitigation. For over two years, Cloudflare has been surveying attacked customers. One of the questions in the survey asks the respondents if they received a threat or a ransom note. Over the past two years, on average, we collected 164 responses per quarter. The responses of this survey are used to calculate the percentage of Ransom DDoS attacks.</p>
    <div>
      <h3>How we calculate geographical and industry insights</h3>
      <a href="#how-we-calculate-geographical-and-industry-insights">
        
      </a>
    </div>
    <p><b>Source country</b>At the application-layer, we use the attacking IP addresses to understand the origin country of the attacks. That is because at that layer, IP addresses cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> (i.e., altered). However, at the network layer, source IP addresses can be spoofed. So, instead of relying on IP addresses to understand the source, we instead use the location of our data centers where the attack packets were ingested. We’re able to get geographical accuracy due to our large global coverage in over 285 locations around the world.</p><p><b>Target country</b>For both application-layer and network-layer DDoS attacks, we group attacks and traffic by our customers’ billing country. This lets us understand which countries are subject to more attacks.</p><p><b>Target industry</b>For both application-layer and network-layer DDoS attacks, we group attacks and traffic by our customers’ industry according to our customer relations management system. This lets us understand which industries are subject to more attacks.</p><p><b>Total volume vs. percentage</b>For both source and target insights, we look at the total volume of attack traffic compared to all traffic as one data point. Additionally, we also look at the percentage of attack traffic towards or from a specific country, to a specific country or to a specific industry. This gives us an “attack activity rate” for a given country/industry which is normalized by their total traffic levels. This helps us remove biases of a country or industry that normally receives a lot of traffic and therefore a lot of attack traffic as well.</p><p><b>How we calculate attack characteristics</b>To calculate the attack size, duration, attack vectors and emerging threats, we bucket attacks and then provide the share of each bucket out of the total amount for each dimension. On the new Radar component, these trends are calculated by number of bytes instead.  Since attacks may vary greatly in number of bytes from one another, this could lead to trends differing between the reports and the Radar component.</p>
    <div>
      <h3>General disclaimer and clarification</h3>
      <a href="#general-disclaimer-and-clarification">
        
      </a>
    </div>
    <p>When we describe ‘top countries’ as the source or target of attacks, it does not necessarily mean that that country was attacked as a country, but rather that organizations that use that country as their billing country were targeted by attacks. Similarly, attacks originating from a country does not mean that that country launched the attacks, but rather that the attack was launched from IP addresses that have been mapped to that country. Threat actors operate global botnets with nodes all over the world, and in many cases also use Virtual Private Networks and proxies to obfuscate their true location. So if anything, the source country could indicate the presence of exit nodes or botnet nodes within that country.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Killnet]]></category>
            <category><![CDATA[REvil]]></category>
            <category><![CDATA[Anonymous]]></category>
            <guid isPermaLink="false">4e8ZBP7BeuED4ngMqsgCLG</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2023 Q1]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-2023-q1/</link>
            <pubDate>Tue, 11 Apr 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ Threat actors kicked off 2023 with a bang. The start of the year was characterized by a series of hacktivist campaigns against Western targets, and record-breaking hyper volumetric attacks ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4uWhbRkCB07IIgsu2oHrmX/9a73fb5170250a2015d20d6a15140272/image1-9.png" />
            
            </figure><p>Welcome to the first DDoS threat report of 2023. DDoS attacks, or <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">distributed denial-of-service attacks</a>, are a type of cyber attack that aim to overwhelm Internet services such as websites with more traffic than they can handle, in order to disrupt them and make them unavailable to legitimate users. In this report, we cover the latest insights and trends about the DDoS attack landscape as we observed across our <a href="https://www.cloudflare.com/network/">global network</a>.</p>
    <div>
      <h2>Kicking off 2023 with a bang</h2>
      <a href="#kicking-off-2023-with-a-bang">
        
      </a>
    </div>
    <p>Threat actors kicked off 2023 with a bang. The start of the year was characterized by a series of hacktivist campaigns against Western targets including banking, airports, <a href="/uptick-in-healthcare-organizations-experiencing-targeted-ddos-attacks/">healthcare</a> and universities — mainly by the pro-Russian Telegram-organized groups <i>Killnet</i> and more recently by <a href="https://www.cloudflare.com/learning/ddos/glossary/anonymous-sudan/">AnonymousSudan</a>.</p><p>While Killnet-led and AnonymousSudan-led cyberattacks stole the spotlight, we haven’t witnessed any novel or exceedingly large attacks by them.</p>
    <div>
      <h2>Hyper-volumetric attacks</h2>
      <a href="#hyper-volumetric-attacks">
        
      </a>
    </div>
    <p>We did see, however, an increase of <i>hyper-volumetric</i> DDoS attacks launched by other threat actors — with the largest one peaking above <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">71 million requests per second</a> (rps) — exceeding Google’s previous world record of 46M rps by 55%.</p><p>Back to Killnet and AnonymousSudan, while no noteworthy attacks were reported, we shouldn't underestimate the potential risks. Unprotected Internet properties can still be, and have been, taken down by Killnet-led or AnonymousSudan-led cyber campaigns. Organizations should take proactive defensive measures to reduce the risks.</p>
    <div>
      <h2>Business as usual for South American Telco targeted by terabit-strong attacks thanks to Cloudflare</h2>
      <a href="#business-as-usual-for-south-american-telco-targeted-by-terabit-strong-attacks-thanks-to-cloudflare">
        
      </a>
    </div>
    <p>Another large attack we saw in Q1 was a 1.3 Tbps (terabits per second) DDoS attack that targeted a South American Telecommunications provider. The attack lasted only a minute. It was a multi-vector attack involving DNS and UDP attack traffic. The attack was part of a broader campaign which included multiple Terabit-strong attacks originating from a 20,000-strong Mirai-variant botnet. Most of the attack traffic originated from the US, Brazil, Japan, Hong Kong, and India. Cloudflare systems automatically detected and mitigated it without any impact to the customer’s networks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Y2qOZ1k9bPz9QkRACy2sZ/5eccf827bbcb192a5d1a2ec06b11bcd8/image2-6.png" />
            
            </figure><p>Cloudflare auto-mitigates a 1.3 Tbps Mirai DDoS attack</p>
    <div>
      <h2>High-performance botnets</h2>
      <a href="#high-performance-botnets">
        
      </a>
    </div>
    <p>Hyper-volumetric attacks leverage a new generation of botnets that are comprised of Virtual Private Servers (VPS) instead of <a href="https://www.cloudflare.com/learning/ddos/glossary/internet-of-things-iot/">Internet of Things</a> (IoT) devices.</p><p>Historically, large botnets relied on exploitable IoT devices such as smart security cameras to orchestrate their attacks. Despite the limited throughput of each IoT device, together — usually numbering in the hundreds of thousands or millions — they generated enough traffic to disrupt their targets.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/20cHerRftPJQJ0rG4doFtS/6359369665e4b017e442366df943f5df/image14.png" />
            
            </figure><p>The new generation of <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">botnets</a> uses a fraction of the amount of devices, but each device is substantially stronger. Cloud computing providers offer virtual private servers to allow start ups and businesses to create performant applications. The downside is that it also allows attackers to create high-<i>performance botnets</i> that can be as much as 5,000x stronger. Attackers gain access to virtual private servers by compromising unpatched servers and hacking into management consoles using leaked API credentials.</p><p>Cloudflare has been working with key cloud computing providers to crack down on these VPS-based botnets. Substantial portions of such botnets have been disabled thanks to the cloud computing providers’ rapid response and diligence. Since then, we have yet to see additional hyper-volumetric attacks — a testament to the fruitful collaboration.</p><p>We have excellent collaboration with the cyber-security community to take down botnets once we detect such large-scale attacks, but we want to make this process even simpler and more automated.</p><p>We invite Cloud computing providers, hosting providers and general service providers to sign up for <a href="https://www.cloudflare.com/lp/botnet-threat-feed/">Cloudflare’s free Botnet Threat Feed</a> to gain visibility on attacks launching from within their networks — and help us dismantle botnets.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2feopGKgNAdzjRsmyoZvQK/f3a52b064ccab375bd5cc9c51acac208/image10.png" />
            
            </figure>
    <div>
      <h2>Key highlights from this quarter</h2>
      <a href="#key-highlights-from-this-quarter">
        
      </a>
    </div>
    <ol><li><p>In Q1, 16% of surveyed customers reported a Ransom DDoS attack — remains steady compared to the previous quarter but represents a 60% increase YoY.</p></li><li><p>Non-profit organizations and Broadcast Media were two of the most targeted industries. Finland was the largest source of HTTP DDoS attacks in terms of percentage of attack traffic, and the main target of network-layer DDoS attacks. Israel was the top most attacked country worldwide by HTTP DDoS attacks.</p></li><li><p>Large scale volumetric DDoS attacks — attacks above 100 Gbps — increased by 6% QoQ. DNS-based attacks became the most popular vector. Similarly, we observed surges in SPSS-bas in ed DDoS attacks, DNS amplification attacks, and GRE-based DDoS attacks.</p></li></ol><p>View the <a href="https://radar.cloudflare.com/reports/ddos-2023-q1">interactive report on Cloudflare Radar</a>.</p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>Often, DDoS attacks are carried out to extort ransom payments. We continue to survey Cloudflare customers and track the ratio of DDoS events where the target received a ransom note. This number has been steadily rising through 2022 and currently stands at 16% - the same as in Q4 2022.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5MYdqgtGaD5J0QdYUmAEv4/2ef5575658610dd3d11f2a24ad7bb33f/pasted-image-0.png" />
            
            </figure><p>Percent of users reporting a Ransom DDoS attack or threat, per quarter</p><p>As opposed to <a href="https://www.cloudflare.com/learning/security/ransomware/what-is-ransomware/">Ransomware</a> attacks, where usually the victim is tricked into downloading a file or clicking on an email link that encrypts and locks their computer files until they pay a ransom fee, <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attacks</a> can be much easier for attackers to execute. Ransom DDoS attacks don't require tricking the victim into opening an email or clicking a link, nor do they require a network intrusion or a foothold into the corporate assets.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1pHr2pA0XLvqjiRdMZD2E2/8d759cf2c252e7ae26cfeaf227f44463/image23.png" />
            
            </figure><p>In a Ransom DDoS attack, the attacker doesn’t need access to the victim’s computer but rather just needs to bombard them with a sufficiently large amount of traffic to take down their websites, DNS servers, and any other type of Internet-connected property to make it unavailable or with poor performance to users. The attacker will demand a ransom payment, usually in the form of Bitcoin, to stop and/or avoid further attacks.</p><p>The months of January 2023 and March 2023 were the second highest in terms of Ransom DDoS activity as reported by our users. The highest month thus far remains November 2022 — the month of Black Friday, Thanksgiving, and Singles Day in China — a lucrative month for threat actors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4c3KVL175cApfuTB64WXEp/e7f3f0ad54a6b40a75d3a2598776e940/pasted-image-0--1-.png" />
            
            </figure><p>Percent of users reporting a Ransom DDoS attack or threat, per month</p>
    <div>
      <h2>Who and what are being attacked?</h2>
      <a href="#who-and-what-are-being-attacked">
        
      </a>
    </div>
    
    <div>
      <h3>Top targeted countries</h3>
      <a href="#top-targeted-countries">
        
      </a>
    </div>
    <p>Perhaps related to the <a href="https://www.jpost.com/breaking-news/article-736104">judicial reform and opposing protests</a>, or the ongoing tensions in the Westbank, in Q1, Israel jumps to the first place as the country targeted by the most HTTP DDoS attack traffic — even above the United States of America. This is an astonishing figure. Just short of a single percent of all HTTP traffic that Cloudflare processed in the first quarter of the year, was part of HTTP DDoS attacks that targeted Israeli websites. Following closely behind Israel are the US, Canada, and Turkey.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3foVRDFCptH7z4LR18ktlT/92eec8db9f045ce920f6bac2c5f88edd/pasted-image-0--2-.png" />
            
            </figure><p>Top countries targeted by HTTP DDoS attacks (percentage of attack traffic out of the total traffic worldwide)</p><p>In terms of the percentage of attack traffic compared to all traffic to a given country, Slovenia and Georgia came at the top. Approximately 20% of all traffic to Slovenian and Georgian websites were HTTP DDoS attacks. Next in line were the small Caribbean dual-island nation, Saint Kitts and Nevis, and Turkey. While Israel was the top in the previous graph, here it has found its placement as the ninth most attacked country — above Russia. Still high compared to previous quarters.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1bDLpaVgtVW7DOszQ0hV4g/8b5171e6cf0e5481bf09e3818f786430/pasted-image-0--3-.png" />
            
            </figure><p>Top countries targeted by HTTP DDoS attacks (percentage of attack traffic out of the total traffic per country)</p><p>Looking at the total amount of network-layer DDoS attack traffic, China came in first place. Almost 18% of all network-layer DDoS attack traffic came from China. Closely in second, Singapore came in second place with a 17% share. The US came in third, followed by Finland.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2kV7x9aPs5l4ep6nos9bFM/3e86bce86e969ff21ace7251898b0a5b/pasted-image-0--4-.png" />
            
            </figure><p>Top countries targeted by network-layer DDoS attacks (percentage of attack traffic out of the all DDoS traffic worldwide)</p><p>When we normalize attacks to a country by all traffic to that country, Finland jumps to the first place, perhaps due to its <a href="https://www.bbc.com/news/world-europe-65173043">newly approved NATO membership</a>. Nearly 83% of all traffic to Finland was network-layer attack traffic. China followed closely with 68% and Singapore again with 49%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1nfqeHVuj0SoDZNBEsLpDE/1f67313c6c711789e3101f02fd3971da/pasted-image-0--5-.png" />
            
            </figure><p>Top countries targeted by network-layer DDoS attacks (percentage of attack traffic out of the all traffic per country)</p>
    <div>
      <h3>Top targeted industries</h3>
      <a href="#top-targeted-industries">
        
      </a>
    </div>
    <p>In terms of overall bandwidth, globally, Internet companies saw the largest amount of HTTP DDoS attack traffic. Afterwards, it was the Marketing and Advertising industry, Computer Software industry, Gaming / Gambling and Telecommunications.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/203AL6ywi6HVc5OuZhrLgT/81f2d58ecc741221260473a8624bf73e/pasted-image-0--6-.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks (percentage of attack traffic out of the total traffic for all industries)</p><p>By percentage of attack traffic out of total traffic to an industry, Non-profits were the most targeted in the first quarter of the year, followed by Accounting firms. Despite the <a href="/uptick-in-healthcare-organizations-experiencing-targeted-ddos-attacks/">uptick of attacks on healthcare</a>, it didn’t make it into the top ten. Also up there in the top were Chemicals, Government, and Energy Utilities &amp; Waste industries. Looking at the US, almost 2% of all traffic to US Federal websites were part of DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6bVnziiM6JNcYlEstXR0Oy/03c365f0afab8499c0c852023f3a58b4/pasted-image-0--7-.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks (percentage of attack traffic out of the total traffic per industry)</p><p>On a regional scale, the Gaming &amp; Gambling industry was the most targeted in Asia, Europe, and the Middle East. In South and Central America, the Banking, Financial Services and Insurance (BFSI) industry was the most targeted. In North America it was the Marketing &amp; Advertising industry followed by Telecommunications — which was also the most attacked industry in Africa. Last by not least, in Oceania, the Health, Wellness and Fitness industry was the most targeted by HTTP DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5SS3dZ0HSHQlJ6LZMl0Ypm/f08aa670cd392351f9814c0413e00a33/image11.png" />
            
            </figure><p>Diving lower in the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI stack</a>, based on the total volume of L3/4 attack traffic, the most targeted industries were Information Technology and Services, Gaming / Gambling, and Telecommunications.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3dzKf7eX1bV0IHc8ZlhUcg/a52113e6b10866e5a0c68ce680385b96/pasted-image-0--8-.png" />
            
            </figure><p>Top industries targeted by L3/4 DDoS attacks (percentage of attack traffic out of the total DDoS traffic for all industries)</p><p>When comparing the attack traffic to the total traffic per industry, we see a different picture. Almost every second byte transmitted to Broadcast Media companies was L3/4 DDoS attack traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/DWxvGYuzMgkwT5i5sSwqH/106137e0e566730735527ce42cea6d78/pasted-image-0--9--1.png" />
            
            </figure><p>Top industries targeted by L3/4 DDoS attacks (percentage of attack traffic out of the total traffic per industry)</p>
    <div>
      <h2>Where attacks are coming from</h2>
      <a href="#where-attacks-are-coming-from">
        
      </a>
    </div>
    
    <div>
      <h3>Top source countries</h3>
      <a href="#top-source-countries">
        
      </a>
    </div>
    <p>In the first quarter of 2023, Finland was the largest source of HTTP DDoS attacks in terms of the percentage of attack traffic out of all traffic per country. Closely after Finland, the British Virgin Islands came in second place, followed by Libya and Barbados.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1R3DKszQHsB3B05keSb5Fi/20eeefb3667b89415f52ac5559819d03/pasted-image-0--10-.png" />
            
            </figure><p>Top source countries of HTTP DDoS attacks (percentage of attack traffic out of the total traffic per country)</p><p>In terms of absolute volumes, the most HTTP DDoS attack traffic came from US IP addresses. China came in second, followed by Germany, Indonesia, Brazil, and Finland.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Ocq11lLYbiFA67Hr2jERd/6c1fb00db575d6b186c7388c2b8317f0/pasted-image-0--11-.png" />
            
            </figure><p>Top source countries of HTTP DDoS attacks (percentage of attack traffic out of the total traffic worldwide)</p><p>On the L3/4 side of things, Vietnam was the largest source of L3/4 DDoS attack traffic. Almost a third of all L3/4 traffic we ingested in our Vietnam data centers was attack traffic. Following Vietnam were Paraguay, Moldova, and Jamaica.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2s979PCVFVMxwNx5VQ7ZQr/3519aa747848f3d1c15055d9585144d3/image13-2.png" />
            
            </figure><p>Top source countries of L3/4 DDoS attacks (percentage of attack traffic out of the total traffic per country)</p>
    <div>
      <h2>What attack types and sizes we see</h2>
      <a href="#what-attack-types-and-sizes-we-see">
        
      </a>
    </div>
    
    <div>
      <h3>Attack size and duration</h3>
      <a href="#attack-size-and-duration">
        
      </a>
    </div>
    <p>When looking at the types of attacks that are launched against our customers and our own network and applications, we can see that the majority of attacks are short and small; 86% of network-layer DDoS attacks end within 10 minutes, and 91% of attacks never exceed 500 Mbps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1chDQJ0KmBMer4vXgpqPXi/14f55f9cf49469b7aaf167f15c13b6fb/pasted-image-0--12-.png" />
            
            </figure><p>Network-layer DDoS attacks by duration</p><p>Only one out of every fifty attacks ever exceeds 10 Gbps, and only one out of every thousand attacks exceeds 100 Gbps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ZlSdjeI2ytqRM21IonBRo/a0482be01305b2ad3a2938b0e5200398/pasted-image-0--13-.png" />
            
            </figure><p>Network-layer DDoS attacks by bitrate</p><p>Having said that, larger attacks are slowly increasing in quantity and frequency. Last quarter, attacks exceeding 100 Gbps saw a 67% increase QoQ in their quantity. This quarter, the growth has slowed down a bit to 6%, but it's still growing. In fact, there was an increase in all volumetric attacks excluding the ‘small’ bucket where the majority fall into — as visualized in the graph below. The largest growth was in the 10-100 Gbps range; an 89% increase QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2q2OX4ltFPgGpGlSJisbLI/f1d2c6646f1ea168ff636610c9edff8d/pasted-image-0--14--1.png" />
            
            </figure><p>Network-layer DDoS attacks by size: quarter-over-quarter change</p>
    <div>
      <h3>Attack vectors</h3>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p>This quarter we saw a tectonic shift. With a 22% share, <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> scooched to the second place, making DNS-based DDoS attacks the most popular attack vector (30%). Almost a third of all L3/4 DDoS attacks were DNS-based; either <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/">DNS floods</a> or <a href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/">DNS amplification/reflection</a> attacks. Not far behind, <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP-based attacks</a> came in third with a 21% share.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1vDd1cfTVgZYLdWLruafce/c64918106b7fef484ddb90f7ede49f2a/pasted-image-0--15-.png" />
            
            </figure><p>Top DDoS attack vectors</p>
    <div>
      <h3>Emerging threats</h3>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>Every quarter we see the reemergence of old and sometimes even ancient attack vectors. What this tells us is that even decade-old vulnerabilities are still being exploited to launch attacks. Threat actors are recycling and reusing old methods — perhaps hoping that organizations have dropped those protections against older methods.</p><p>In the first quarter of 2023, there was a massive surge in SPSS-based DDoS attacks, DNS amplification attacks and GRE-based DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3cjg68wkVhs0W2IMmXiROB/e854a04f32d4c3dfaa6644035c556b11/pasted-image-0--16-.png" />
            
            </figure><p>Top DDoS emerging threats</p>
    <div>
      <h3>SPSS-based DDoS attacks increased by 1,565% QoQ</h3>
      <a href="#spss-based-ddos-attacks-increased-by-1-565-qoq">
        
      </a>
    </div>
    <p>The <i>Statistical Product and Service Solutions</i> (SPSS) is an IBM-developed software suite for use cases such as data management, business intelligence, and criminal investigation. The Sentinel RMS License Manager server is used to manage licensing for software products such as the IBM SPSS system. Back in 2021, two vulnerabilities (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-22713">CVE-2021-22713</a> and <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-38153">CVE-2021-38153</a>) were identified in the Sentinel RMS License Manager server which can be used to launch reflection DDoS attacks. Attackers can send large amounts of specially crafted license requests to the server, causing it to generate a response that is much larger than the original request. This response is sent back to the victim's IP address, effectively amplifying the size of the attack and overwhelming the victim's network with traffic. This type of attack is known as a reflection DDoS attack, and it can cause significant disruption to the availability of software products that rely on the Sentinel RMS License Manager, such as IBM SPSS Statistics. Applying the available patches to the license manager is essential to prevent these vulnerabilities from being exploited and to protect against reflection DDoS attacks.</p>
    <div>
      <h3>DNS amplification DDoS attacks increased by 958% QoQ</h3>
      <a href="#dns-amplification-ddos-attacks-increased-by-958-qoq">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/">DNS amplification attacks</a> are a type of DDoS attack that involves exploiting vulnerabilities in the <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">Domain Name System (DNS)</a> infrastructure to generate large amounts of traffic directed at a victim's network. Attackers send DNS requests to open DNS resolvers that have been misconfigured to allow recursive queries from any source, and use these requests to generate responses that are much larger than the original query. The attackers then spoof the victim's IP address, causing the large responses to be directed at the victim's network, overwhelming it with traffic and causing a denial of service. The challenge of mitigating DNS amplification attacks is that the attack traffic can be difficult to distinguish from legitimate traffic, making it difficult to block at the network level. To mitigate DNS amplification attacks, organizations can take steps such as properly configuring DNS resolvers, implementing rate-limiting techniques, and using traffic filtering tools to block traffic from known attack sources.</p>
    <div>
      <h3>GRE-based DDoS attacks increased by 835% QoQ</h3>
      <a href="#gre-based-ddos-attacks-increased-by-835-qoq">
        
      </a>
    </div>
    <p>GRE-based DDoS attacks involve using the <a href="https://www.cloudflare.com/learning/network-layer/what-is-gre-tunneling/">Generic Routing Encapsulation (GRE) protocol</a> to flood a victim's network with large amounts of traffic. Attackers create multiple GRE tunnels between compromised hosts to send traffic to the victim's network. These attacks are difficult to detect and filter, as the traffic appears as legitimate traffic on the victim's network. Attackers can also use source IP address spoofing to make it appear that the traffic is coming from legitimate sources, making it difficult to block at the network level. GRE-based DDoS attacks pose several risks to targeted organizations, including downtime, disruption of business operations, and potential data theft or network infiltration. Mitigating these attacks requires the use of advanced traffic filtering tools that can detect and block attack traffic based on its characteristics, as well as techniques such as rate limiting and source IP address filtering to block traffic from known attack sources.</p>
    <div>
      <h2>The DDoS threat landscape</h2>
      <a href="#the-ddos-threat-landscape">
        
      </a>
    </div>
    <p>In recent months, there has been an increase in longer and larger DDoS attacks across various industries, with volumetric attacks being particularly prominent. Non-profit and Broadcast Media companies were some of the top targeted industries. DNS DDoS attacks also became increasingly prevalent.</p><p>As DDoS attacks are typically carried out by bots, automated detection and mitigation are crucial for effective defense. Cloudflare's automated systems provide constant <a href="https://www.cloudflare.com/learning/ddos/how-to-prevent-ddos-attacks/">protection against DDoS attacks</a> for our customers, allowing them to focus on other aspects of their business. We believe that DDoS protection should be easily accessible to organizations of all sizes, and have been offering free and unlimited protection since 2017.</p><p>At Cloudflare, our mission is to help build a better Internet — one that is more secure and faster Internet for all.</p><p>We invite you to join our DDoS Trends Webinar to learn more about emerging threats and effective defense strategies.</p>
    <div>
      <h3><i>A note about methodologies</i></h3>
      <a href="#a-note-about-methodologies">
        
      </a>
    </div>
    <p><b><i>How we calculate Ransom DDoS attack insights</i></b><i>Cloudflare’s systems constantly analyze traffic and automatically apply mitigation when DDoS attacks are detected. Each attacked customer is prompted with an automated survey to help us better understand the nature of the attack and the success of the mitigation. For over two years, Cloudflare has been surveying attacked customers. One of the questions in the survey asks the respondents if they received a threat or a ransom note. Over the past two years, on average, we collected 164 responses per quarter. The responses of this survey are used to calculate the percentage of Ransom DDoS attacks.</i></p><p><b><i>How we calculate geographical and industry insightsSource country</i></b><i>At the application-layer, we use the attacking IP addresses to understand the origin country of the attacks. That is because at that layer, IP addresses cannot be</i> <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/"><i>spoofed</i></a> <i>(i.e., altered). However, at the network layer, source IP addresses can be spoofed. So, instead of relying on IP addresses to understand the source, we instead use the location of our data centers where the attack packets were ingested. We’re able to get geographical accuracy due to our large global coverage in over 285 locations around the world.</i></p><p><b><i>Target country</i></b><i>For both application-layer and network-layer DDoS attacks, we group attacks and traffic by our customers’ billing country. This lets us understand which countries are subject to more attacks.</i></p><p><b><i>Target industry</i></b><i>For both application-layer and network-layer DDoS attacks, we group attacks and traffic by our customers’ industry according to our customer relations management system. This lets us understand which industries are subject to more attacks.</i></p><p><b><i>Total volume vs. percentage</i></b><i>For both source and target insights, we look at the total volume of attack traffic compared to all traffic as one data point. Additionally, we also look at the percentage of attack traffic towards or from a specific country, to a specific country or to a specific industry. This gives us an “attack activity rate” for a given country/industry which is normalized by their total traffic levels. This helps us remove biases of a country or industry that normally receives a lot of traffic and therefore a lot of attack traffic as well.</i></p><p><b><i>How we calculate attack characteristics</i></b><i>To calculate the attack size, duration, attack vectors and emerging threats, we bucket attacks and then provide the share of each bucket out of the total amount for each dimension.</i></p><p><b><i>General disclaimer and clarification</i></b><i>When we describe ‘top countries’ as the source or target of attacks, it does not necessarily mean that that country was attacked as a country, but rather that organizations that use that country as their billing country were targeted by attacks. Similarly, attacks originating from a country does not mean that that country launched the attacks, but rather that the attack was launched from IP addresses that have been mapped to that country. Threat actors operate global botnets with nodes all over the world, and in many cases also use Virtual Private Networks and proxies to obfuscate their true location. So if anything, the source country could indicate the presence of exit nodes or botnet nodes within that country.</i></p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Killnet]]></category>
            <category><![CDATA[Anonymous]]></category>
            <guid isPermaLink="false">3QxUPPLUcVx3JLNqdgfaPe</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare DDoS threat report for 2022 Q4]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-2022-q4/</link>
            <pubDate>Tue, 10 Jan 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ In Q4, Cloudflare mitigated millions of DDoS attacks. Attack durations increase, volumetric attacks surged, and ransom DDoS attacks persist. Travel & events industries were hit hardest and over 90% of traffic to Chinese Internet properties were L3/4 DDoS attacks. Read more on our recent report. ]]></description>
            <content:encoded><![CDATA[ <p><i></i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/68k9YUlEDEpOJmxYCKbSur/6280347aea66faee11fb6a617aeb7600/image19-1.png" />
            
            </figure><p>Welcome to our DDoS Threat Report for the fourth and final quarter of 2022. This report includes insights and trends about the DDoS threat landscape - as observed across <a href="https://www.cloudflare.com/network/">Cloudflare’s global network</a>.</p><p>In the last quarter of the year, as billions around the world celebrated holidays and events such as Thanksgiving, Christmas, Hanukkah, Black Friday, Singles’ Day, and New Year, DDoS attacks persisted and even increased in size, frequency, and sophistication whilst attempting to disrupt our way of life.</p><p>Cloudflare’s automated DDoS defenses stood firm and mitigated millions of attacks in the last quarter alone. We’ve taken all of those attacks, aggregated, analyzed, and prepared the bottom lines to help you better understand the threat landscape.</p>
    <div>
      <h2>Global DDoS insights</h2>
      <a href="#global-ddos-insights">
        
      </a>
    </div>
    <p>In the last quarter of the year, despite a year-long decline, the amount of HTTP DDoS attack traffic still increased by 79% YoY. While most of these attacks were small, Cloudflare constantly saw terabit-strong attacks, DDoS attacks in the hundreds of millions of packets per second, and HTTP DDoS attacks peaking in the tens of millions of requests per second launched by sophisticated botnets.</p><ul><li><p>Volumetric attacks surged; the number of attacks exceeding rates of 100 gigabits per second (Gbps) grew by 67% quarter-over-quarter (QoQ), and the number of attacks lasting more than three hours increased by 87% QoQ.</p></li><li><p>Ransom DDoS attacks steadily increased this year. In Q4, over 16% of respondents reported receiving a threat or ransom demand as part of the DDoS attack that targeted their Internet properties.</p></li></ul>
    <div>
      <h2>Industries most targeted by DDoS attacks</h2>
      <a href="#industries-most-targeted-by-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>HTTP DDoS attacks constituted 35% of all traffic to Aviation and Aerospace Internet properties.</p></li><li><p>Similarly, over a third of all traffic to the Gaming/Gambling and Finance industries was network-layer DDoS attack traffic.</p></li><li><p>A whopping 92% of traffic to Education Management companies was part of network-layer DDoS attacks. Likewise, 73% of traffic to the Information Technology and Services and the Public Relations &amp; Communications industries were also network-layer DDoS attacks.</p></li></ul>
    <div>
      <h2>Source and targets of DDoS attacks</h2>
      <a href="#source-and-targets-of-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>In Q4, 93% of network-layer traffic to Chinese Internet properties behind Cloudflare were part of network-layer DDoS attacks. Similarly, over 86% of traffic to Cloudflare customers in Lithuania and 80% of traffic to Cloudflare customers in Finland was attack traffic.</p></li><li><p>On the application-layer, over 42% of all traffic to Georgian Internet properties behind Cloudflare was part of HTTP DDoS attacks, followed by Belize with 28%, and San Marino in third place with just below 20%. Almost 20% of all traffic from Libya that Cloudflare saw was application-layer DDoS attack traffic.</p></li><li><p>Over 52% of all traffic recorded in Cloudflare’s data centers in Botswana was network-layer DDoS attack traffic. Similarly, in Cloudflare’s data centers in Azerbaijan, Paraguay, and Palestine, network-layer DDoS attack traffic constituted approximately 40% of all traffic.</p></li></ul><p>Quick note: this quarter, we’ve made a change to our algorithms to improve the accuracy of our data which means that some of these data points are incomparable to previous quarters. Read more about these changes in the next section <i>Changes to the report methodologies.</i></p><p>To skip to the report, <a href="#ransomddosattacks">click here</a>.</p><p>Sign up to the <a href="https://gateway.on24.com/wcc/eh/2153307/lp/4075983/global-ddos-attack-trends-you-need-to-know">DDoS Trends Webinar</a> to learn more about the emerging threats and how to defend against them.</p>
    <div>
      <h2>Changes to the report methodologies</h2>
      <a href="#changes-to-the-report-methodologies">
        
      </a>
    </div>
    <p>Since our <a href="/network-layer-ddos-attack-trends-for-q1-2020/">first report</a> in 2020, we’ve always used percentages to represent attack traffic, i.e., the percentage of attack traffic out of all traffic including legitimate/user traffic. We did this to normalize the data, avoid data biases, and be more flexible when it comes to incorporating new mitigation system data into the report.</p><p>In this report, we’ve introduced changes to the methods used to calculate some of those percentages when we bucket attacks by certain <i>dimensions</i> such as <i>target country</i>, <i>source country</i>, or <i>target industry</i>. In the <i>application-layer</i> sections, we previously divided the amount of attack HTTP/S requests to a given dimension by all the HTTP/S requests to all dimensions. In the <i>network-layer</i> section, specifically in <i>Target industries</i> and <i>Target countries,</i> we used to divide the amount of attack IP packets to a given dimension by the total attack packets to all dimensions.</p><p>From this report onwards, we now divide the attack requests (or packets) to a given dimension only by the total requests (or packets) to that given dimension. We made these changes in order to align our calculation methods throughout the report and improve the data accuracy so it better represents the attack landscape.</p><p>For example, the top industry attacked by application-layer DDoS attacks using the previous method was the Gaming and Gambling industry. The attack requests towards that industry accounted for 0.084% of all traffic (attack and non-attack) to all industries. Using that same old method, the Aviation and Aerospace industry came in 12th place. Attack traffic towards the Aviation and Aerospace industry accounted for 0.0065% of all traffic (attack and non-attack) to all industries. However, using the new method, the Aviation and Aerospace industry came in as the number one most attacked industry — attack traffic formed 35% of all traffic (attack and non-attack) towards that industry alone. Again using the new method, the Gaming and Gambling industry came in 14th place — 2.4% of its traffic was attack traffic.</p><p>The old calculation method used in previous reports to calculate the percentage of attack traffic for each dimension was the following:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5KD6tiu5CGosB0PMkCOGC5/69a2bce09409962d82050de996e14447/Screenshot-2023-01-09-at-17.39.06.png" />
            
            </figure><p>The new calculation method used from this report onwards is the following:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1lIzK054oLzfg7a3QFKv37/c4f49acb347afb732a11e970aed2109d/Screenshot-2023-01-09-at-17.39.57.png" />
            
            </figure><p>The changes apply to the following metrics:</p><ol><li><p>Target industries of application-layer DDoS attacks</p></li><li><p>Target countries of application-layer DDoS attacks</p></li><li><p>Source of application-layer DDoS attacks</p></li><li><p>Target industries of network-layer DDoS attacks</p></li><li><p>Target countries of network-layer DDoS attacks</p></li></ol><p>No other changes were made in the report. The <i>Source of network-layer DDoS attacks</i> metrics already use this method since the first report. Also, no changes were made to the <i>Ransom DDoS attacks</i>, <i>DDoS attack rate</i>, <i>DDoS attack duration, DDoS attack vectors,</i> and <i>Top emerging threats</i> sections. These metrics do not take legitimate traffic into consideration and no methodology alignment was needed.</p>With that in mind, let’s dive in deeper and explore these insights and trends. You can also view an interactive version of this report on <a href="https://radar.cloudflare.com/reports/ddos-2022-q4">Cloudflare Radar.</a><a></a>
<p></p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>As opposed to <a href="https://www.cloudflare.com/learning/security/ransomware/what-is-ransomware/">Ransomware</a> attacks, where the victim is tricked into downloading a file or clicking on an email link that encrypts and locks their computer files until they pay a ransom fee, <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attacks</a> can be much easier for attackers to launch. Ransom DDoS attacks don't require tricking the victim into opening an email or clicking a link, nor do they require a network intrusion or a foothold to be carried out.</p><p>In a Ransom DDoS attack, the attacker doesn’t need access to the victim’s computer but rather just floods them with enough traffic to negatively impact their Internet services. The attacker will demand a ransom payment, usually in the form of Bitcoin, to stop and/or avoid further attacks.</p><p>In the last quarter of 2022, 16% of Cloudflare customers that responded to our survey reported being targeted by HTTP DDoS attacks accompanied by a threat or a ransom note. This represents a 14% increase QoQ but a 16% decrease YoY in reported Ransom DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4p7WfoRhZnvih6wSvfcEF5/eaa09189c775759ac0cfdeb3790616a6/1-3.png" />
            
            </figure><p>Distribution of Ransom DDoS attacks over 2021 and 2022 by quarter (each column represents the percentage of users reporting a ransom attack)</p><p><b>How we calculate Ransom DDoS attack trends</b>Cloudflare’s systems constantly analyze traffic and automatically apply mitigation when DDoS attacks are detected. Each DDoS'd customer is prompted with an automated survey to help us better understand the nature of the attack and the success of the mitigation. For over two years, Cloudflare has been surveying attacked customers. One of the questions in the survey asks the respondents if they received a threat or a ransom note. Over the past two years, on average, we collected 187 responses per quarter. The responses of this survey are used to calculate the percentage of Ransom DDoS attacks.</p>
    <div>
      <h2>Application-layer DDoS attack landscape</h2>
      <a href="#application-layer-ddos-attack-landscape">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, specifically HTTP/S DDoS attacks, are cyber attacks that usually aim to disrupt web servers by making them unable to process legitimate user requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests and - in some cases - crash, resulting in degraded performance or an outage for legitimate users.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7KRJTH9LSNLp5Y7xMPFaxf/da35891b6873ea264a241867ac82455d/2-2.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attack trends</h3>
      <a href="#application-layer-ddos-attack-trends">
        
      </a>
    </div>
    <p>When we look at the graph below, we can see a clear downward trend in attacks each quarter this year. However, despite the downward trend, HTTP DDoS attacks still increased by 79% when compared to the same quarter of previous year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6M5VDqlpoPOHsWTT7hzhLk/0ef5481310d14d6d6a7ce2cf78a912aa/3-2.png" />
            
            </figure><p>Distribution of HTTP DDoS attacks over the last year by quarter</p>
    <div>
      <h3>Target industries of application-layer DDoS attacks</h3>
      <a href="#target-industries-of-application-layer-ddos-attacks">
        
      </a>
    </div>
    <p>In the quarter where many people travel for the holidays, the Aviation and Aerospace was the most attacked industry. Approximately 35% of traffic to the industry was part of HTTP DDoS attacks. In second place, the Events Services industry saw over 16% of its traffic as HTTP DDoS attacks.</p><p>In the following places were the Media and Publishing, Wireless, Government Relations, and Non-profit industries. To learn more about how Cloudflare protects non-profit and human rights organizations, read our recent <a href="https://www.cloudflare.com/impact/">Impact Report</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/19dMUR1vriRC008FrKuLMd/381590c01afcc239f55143921ef13e6c/4-2.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks in 2022 Q4</p><p>When we break it down regionally, and after excluding generic industry buckets like <i>Internet</i> and <i>Software,</i> we can see that in North America and Oceania the Telecommunications industry was the most targeted. In South America and Africa, the Hospitality industry was the most targeted. In Europe and Asia, Gaming &amp; Gambling industries were the most targeted. And in the Middle East, the Education industry saw the most attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7zRfrafFijjMGPPKegkaNn/0f530de3af8293aaeb569520511493b3/5-1.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks in 2022 Q4, by region</p>
    <div>
      <h3>Target countries of application-layer DDoS attacks</h3>
      <a href="#target-countries-of-application-layer-ddos-attacks">
        
      </a>
    </div>
    <p>Bucketing attacks by our customers’ billing address helps us understand which countries are more frequently attacked. In Q4, over 42% of all traffic to Georgian HTTP applications behind Cloudflare was DDoS attack traffic.</p><p>In second place, Belize-based companies saw almost a third of their traffic as DDoS attacks, followed by San Marino in third with just below 20% of its traffic being DDoS attack traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Ukz2lfYblvcxRONS4LpmM/f28e5547374f1525108bd197d27b033f/6-2.png" />
            
            </figure><p>Top countries targeted by HTTP DDoS attacks in 2022 Q4</p>
    <div>
      <h3>Source of application-layer DDoS attacks</h3>
      <a href="#source-of-application-layer-ddos-attacks">
        
      </a>
    </div>
    <p>Quick note before we dive in. If a country is found to be a major source of DDoS attacks, it doesn’t necessarily mean that it is that country that launches the attacks. Most often with DDoS attacks, attackers are launching attacks remotely in an attempt to hide their true location. Top source countries are more often indicators that there are botnet nodes operating from within that country, perhaps hijacked servers or IoT devices.</p><p>In Q4, almost 20% of all HTTP traffic originating from Libya was part of HTTP DDoS attacks. Similarly, 18% of traffic originating from Timor-Leste, an island country in Southeast Asia just north of Australia, was attack traffic. DDoS attack traffic also accounted for 17% of all traffic originating from the British Virgin Islands and 14% of all traffic originating from Afghanistan.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ahDM08TMOU8CezzOdlTfM/7b3a9f23d9aed5b03b9039eb07844c6e/7-1.png" />
            
            </figure><p>Top source countries of HTTP DDoS attacks in 2022 Q4</p>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application-layer attacks target the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service that end users are trying to access (HTTP/S in our case), <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer DDoS attacks</a> aim to overwhelm network infrastructure, such as in-line routers and servers, and the Internet link itself.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/fBkKAjlBl9eLYXKfGBbm1/6288da168c95b08b3274477a82ac66fc/8-1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attack trends</h3>
      <a href="#network-layer-ddos-attack-trends">
        
      </a>
    </div>
    <p>After a year of steady increases in network-layer DDoS attacks, in the fourth and final quarter of the year, the amount of attacks actually decreased by 14% QoQ and 13% YoY.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/a89jN1YxW4fM1DXXszd5W/6433c49adacb2e8b863a929d3a10478a/9-1.png" />
            
            </figure><p>Distribution of Network-layer DDoS attacks over the last year by quarter</p><p>Now let’s dive a little deeper to understand the various attack properties such as the attack volumetric rates, durations, attack vectors, and emerging threats.</p><p><b>DDoS attack rate</b>While the vast majority of attacks are relatively short and small, we did see a spike in longer and larger attacks this quarter. The amount of volumetric network-layer DDoS attacks with a rate exceeding 100 Gbps increased by 67% QoQ. Similarly, attacks in the range of 1-100 Gbps increased by ~20% QoQ, and attacks in the range of 500 Mbps to 1 Gbps increased by 108% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6bdDrTUMOVRUaJGZn0N0QQ/26f6ed4d96ff102931878ffc150bee93/10-2.png" />
            
            </figure><p>QoQ change in DDoS attack rates in 2022 Q4</p><p>Below is an example of one of those attacks exceeding 100 Gbps that took place the week after Thanksgiving. This was a 1 Tbps DDoS attack targeted at a Korean-based hosting provider. This particular attack was an <a href="https://www.cloudflare.com/learning/ddos/what-is-an-ack-flood/">ACK flood</a>, and it lasted roughly one minute. Since the  hosting provider was using <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a>, Cloudflare’s L3 DDoS protection service, the attack was automatically detected and mitigated.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1oXCRx5qpl1bwhEtPUbjP9/ad75152fe994b4092964feac7d0470f7/11.png" />
            
            </figure><p>Graph of a 1 Tbps DDoS attack</p><p>While bit-intensive attacks usually aim to clog up the Internet connection to cause a denial of service event, packet-intensive attacks attempt to crash in-line devices. If an attack sends more packets than you can handle, the servers and other in-line appliances might not be able to process legitimate user traffic, or even crash altogether.</p><p><b>DDoS attack duration</b>In Q4, the amount of shorter attacks lasting less than 10 minutes decreased by 76% QoQ, and the amount of longer attacks increased. Most notably, attacks lasting 1-3 hours increased by 349% QoQ and the amount of attacks lasting more than three hours increased by 87% QoQ. Most of the attacks, over 67% of them, lasted 10-20 minutes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1iUmv6PEANaBFa2iiHwKhg/5f70e27033327aac5a0e85890ba69180/12.png" />
            
            </figure><p>QoQ change in the duration of DDoS attacks in 2022 Q4</p><p><b>DDoS attack vectors</b>The attack vector is a term used to describe the attack method. In Q4, SYN floods remained the attacker’s method of choice — in fact, almost half of all network-layer DDoS attacks were SYN floods.</p><p>As a recap, <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> are a flood of SYN packets (TCP packets with the <i>Synchronize</i> flag turned on, i.e., the bit set to 1). SYN floods take advantage of the statefulness of the <a href="https://www.cloudflare.com/learning/ddos/glossary/tcp-ip/">Three-way TCP handshake</a> — which is the way to establish a connection between a server and a client.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3s4qiqWPfzm7qjCvENsDyj/65b2cc8f635cc0188d53497d1a7b4496/13.png" />
            
            </figure><p>The Three-way TCP Handshake</p><p>The client starts off by sending a SYN packet, the server responds with a Synchronize-acknowledgement (SYN/ACK) packet and waits for the client’s Acknowledgement (ACK) packet. For every connection, a certain amount of memory is allocated. In the SYN flood, the source IP addresses may be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> (altered) by the attacker, causing the server to respond with the SYN/ACK packets to the spoofed IP addresses — which most likely ignore the packet. The server then naively waits for the never arriving ACK packets to complete the handshake. After a while, the server times out and releases those resources. However, given a sufficient amount of SYN packets in a short amount of time, they may be enough to drain the server’s resources and render it unable to handle legitimate user connections or even crash altogether.</p><p>After SYN floods, with a massive drop in share, DNS floods and amplification attacks came in second place, accounting for ~15% of all network-layer DDoS attacks. And in third UDP-based DDoS attacks and floods with a 9% share.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1uXMuSmIxJCkqYlWskjLUH/25c60395b8284d359c7ebb411c62b7c1/14.png" />
            
            </figure><p>Top attack vectors in 2022 Q4</p><p><b>Emerging DDoS threats</b>In Q4, Memcached-based DDoS attacks saw the highest growth — a 1,338% increase QoQ. <a href="https://www.cloudflare.com/learning/ddos/memcached-ddos-attack/">Memcached</a> is a database caching system for speeding up websites and networks. Memcached servers that support UDP can be abused to launch amplification/reflection DDoS attacks. In this case, the attacker would request content from the caching system and spoof the victim's IP address as the source IP in the UDP packets. The victim will be flooded with the Memcache responses which can be amplified by a factor of up to 51,200x.</p><p>In second place, SNMP-based DDoS attacks increased by 709% QoQ. <a href="https://en.wikipedia.org/wiki/Simple_Network_Management_Protocol">Simple Network Management Protocol (SNMP)</a> is a UDP-based protocol that is often used to discover and manage network devices such as printers, switches, routers, and firewalls of a home or <a href="https://www.cloudflare.com/learning/network-layer/enterprise-networking/">enterprise network</a> on UDP well-known port 161. In an SNMP reflection attack, the attacker sends out numerous SNMP queries while spoofing the source IP address in the packet as the targets to devices on the network that, in turn, reply to that target’s address. Numerous responses from the devices on the network results in the target network being DDoSed.</p><p>In third place, VxWorks-based DDoS attacks increased by 566% QoQ. <a href="https://en.wikipedia.org/wiki/VxWorks">VxWorks</a> is a real-time operating system (RTOS) often used in embedded systems such as <a href="/rethinking-internet-of-things-security/">Internet of Things (IoT)</a> devices. It also is used in networking and security devices, such as switches, routers, and firewalls. By default, it has a debug service enabled which not only allows anyone to do pretty much anything to those systems, but it can also be used for DDoS amplification attacks. This <a href="https://www.kb.cert.org/vuls/id/362332">exploit</a> (<a href="https://nvd.nist.gov/vuln/detail/CVE-2010-2965">CVE-2010-2965</a>) was exposed as early as 2010 and as we can see it is still being used in the wild to generate DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2MnZEAp20CoFmqcspA6HZe/ee21e20455900ab5f7d0eb9442a5321b/15.png" />
            
            </figure><p>Top emerging threats in 2022 Q4</p>
    <div>
      <h3>Target industries of network-layer DDoS attacks</h3>
      <a href="#target-industries-of-network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>In Q4, the Education Management industry saw the highest percentage of network-layer DDoS attack traffic — 92% of all traffic routed to the industry was network-layer DDoS attack traffic.</p><p>Not too far behind, in the second and third places, the Information Technology and Services alongside the Public Relations and Communications industries also saw a significant amount of network-layer DDoS attack traffic (~73%). With a high margin, the Finance, Gaming / Gambling, and Medical Practice industries came in next with approximately a third of their traffic flagged as attack traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3dfKGZrBYYgeKUCwlhlfr4/c68cf2d430b1984767d632b19808a0f8/16.png" />
            
            </figure><p>Top industries targeted by network-layer DDoS attacks in 2022 Q4</p>
    <div>
      <h3>Target countries of network-layer DDoS attacks</h3>
      <a href="#target-countries-of-network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>Grouping attacks by our customers’ billing country lets us understand which countries are subject to more attacks. In Q4, a staggering 93% of traffic to Chinese Internet properties behind Cloudflare was network-layer DDoS attack traffic.</p><p>In second place, Lithuanian Internet properties behind Cloudflare saw 87% of their traffic belonging to network-layer DDoS attack traffic. Following were Finland, Singapore, and Taiwan with the highest percentage of attack traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2bEfvLDWfkkRWqPThTtgV4/98c1efc79946123a57864211c16175b2/17.png" />
            
            </figure><p>Top countries targeted by network-layer DDoS attacks in 2022 Q4</p>
    <div>
      <h3>Source of network-layer DDoS attacks</h3>
      <a href="#source-of-network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>In the application-layer, we used the attacking IP addresses to understand the origin country of the attacks. That is because at that layer, IP addresses cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> (i.e., altered). However, in the network layer, source IP addresses <i>can</i> be spoofed. So, instead of relying on IP addresses to understand the source, we instead use the location of our data centers where the attack packets were ingested. We’re able to get geographical accuracy due to our large global coverage in over 275+ locations around the world.</p><p>In Q4, over 52% of the traffic we ingested in our Botswana-based data center was attack traffic. Not too far behind, over 43% of traffic in Azerbaijan was attack traffic, followed by Paraguay, Palestine, Laos, and Nepal.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3urasUfgMtZcJmVJ6QsEFa/cec4c34f796e096bcef4f8172c8fa816/18.png" />
            
            </figure><p>Top Cloudflare data center locations with the highest percentage of DDoS attack traffic in 2022 Q4</p><p>Please note: Internet Service Providers may sometimes route traffic differently which may skew results. For example, traffic from China may be hauled through California due to various operational considerations.</p>
    <div>
      <h3>Understanding the DDoS threat landscape</h3>
      <a href="#understanding-the-ddos-threat-landscape">
        
      </a>
    </div>
    <p>This quarter, longer and larger attacks became more frequent. Attack durations increased across the board, volumetric attacks surged, and Ransom DDoS attacks continued to rise. During the 2022 holiday season, the top targeted industries for DDoS attacks at the application-layer were Aviation/Aerospace and Events Services. Network-layer DDoS attacks targeted Gaming/Gambling, Finance, and Education Management companies. We also saw a shift in the top emerging threats, with Memcached-based DDoS attacks continuing to increase in prevalence.</p><p>Defending against DDoS attacks is critical for organizations of all sizes. While attacks may be initiated by humans, they are executed by bots — and to play to win, you must fight bots with bots. Detection and mitigation must be automated as much as possible, because relying solely on humans puts defenders at a disadvantage. Cloudflare’s automated systems constantly detect and mitigate DDoS attacks for our customers, so they don’t have to.</p><p>Over the years, it has become easier, cheaper, and more accessible for attackers and attackers-for-hire to launch DDoS attacks. But as easy as it has become for the attackers, we want to make sure that it is even easier - and free - for defenders of organizations of all sizes to protect themselves against DDoS attacks of all types. We've been providing <a href="/unmetered-mitigation/">unmetered and unlimited DDoS protection</a> for free to all of our customers since 2017 — when we pioneered the concept. Cloudflare's mission is to help build a better Internet. A better Internet is one that is more secure, faster, and reliable for everyone - even in the face of DDoS attacks.</p><p>Sign up to the <a href="https://gateway.on24.com/wcc/eh/2153307/lp/4075983/global-ddos-attack-trends-you-need-to-know">DDoS Trends Webinar</a> to learn more about the emerging threats and how to defend against them.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">3WvqLxYgZkX537TOAW4a1l</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare DDoS threat report 2022 Q3]]></title>
            <link>https://blog.cloudflare.com/cloudflare-ddos-threat-report-2022-q3/</link>
            <pubDate>Wed, 12 Oct 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ In Q3, DDoS attacks increased by 111% YoY, Cloudflare auto-mitigated a 2.5 Tbps attack targeting a Minecraft server as multi-terabit scale DDoS attacks become increasingly frequent. Read more in our 2022 Q3 DDoS Report ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Welcome to our DDoS Threat Report for the third quarter of 2022. This report includes insights and trends about the DDoS threat landscape - as observed across Cloudflare’s <a href="https://www.cloudflare.com/network/">global network</a>.</p><p>Multi-terabit strong DDoS attacks have become increasingly frequent. In Q3, Cloudflare automatically detected and mitigated multiple attacks that exceeded 1 Tbps. The largest attack was a 2.5 Tbps DDoS attack launched by a Mirai botnet variant, aimed at the Minecraft server, Wynncraft, that uses <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Cloudflare Spectrum</a>, a reverse-proxy for TCP/UDP applications. This is the largest attack we’ve ever seen from the bitrate perspective.</p><p>It was a multi-vector attack consisting of UDP and TCP floods. However, Wynncraft, a <a href="https://en.wikipedia.org/wiki/Massively_multiplayer_online_role-playing_game">massively multiplayer online role-playing game</a> Minecraft server where hundreds and thousands of users can play on the same server, didn’t even notice the attack, since Cloudflare filtered it out for them.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3TCFRo50VkVGAcKUdzVzYA/8c155dac69947d43ce326222089d3444/1.png" />
            
            </figure><p>The 2.5 Tbps DDoS attack that targeted Wynncraft — launched by Mirai</p>
    <div>
      <h2>General DDoS attack trends</h2>
      <a href="#general-ddos-attack-trends">
        
      </a>
    </div>
    <p>Overall this quarter, we've seen:</p><ul><li><p>An increase in DDoS attacks compared to last year.</p></li><li><p>Longer-lasting volumetric attacks, a spike in attacks generated by the <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai botnet</a> and its variants.</p></li><li><p>Surges in attacks targeting Taiwan and Japan.</p></li></ul>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>HTTP DDoS attacks increased by 111% YoY, but decreased by 10% QoQ.</p></li><li><p>HTTP DDoS attacks targeting Taiwan increased by 200% QoQ; attacks targeting Japan increased by 105% QoQ.</p></li><li><p>Reports of Ransom DDoS attacks increased by 67% YoY and 15% QoQ.</p></li></ul>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>L3/4 DDoS attacks increased by 97% YoY and 24% QoQ.</p></li><li><p>L3/4 DDoS attacks by Mirai botnets increased by 405% QoQ.</p></li><li><p>The Gaming / Gambling industry was the most targeted by L3/4 DDoS attacks including a massive 2.5 Tbps DDoS attack.</p></li></ul><p>This report is based on DDoS attacks that were automatically detected and mitigated by Cloudflare's DDoS Protection systems. To learn more about how it works, check out <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">this deep-dive blog post</a>.</p><p><b>View the interactive DDoS report on </b><a href="https://radar.cloudflare.com/reports/ddos-2022-q3"><b>Cloudflare Radar</b></a><b>.</b></p>
    <div>
      <h2>Ransom attacks</h2>
      <a href="#ransom-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attacks</a> are attacks where the attacker demands a ransom payment, usually in the form of Bitcoin, to stop/avoid the attack. In Q3, 15% of Cloudflare customers that responded to our survey reported being targeted by HTTP DDoS attacks accompanied by a threat or a ransom note. This represents a 15% increase QoQ and 67% increase YoY of reported ransom DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4xk4LgKdjcjOLv2LcKLqGv/46ef6d33079e56506741a75ff2d0aefc/2.png" />
            
            </figure><p>Distribution of Ransom DDoS attacks by quarter</p><p>Diving into Q3, we can see that since June 2022, there was a steady decline in reports of ransom attacks. However, in September, the reports of ransom attacks spiked again. In the month of September, almost one out of every four respondents reported receiving a ransom DDoS attack or threat — the highest month in 2022 so far.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/66X1MK8ygv5emJk860Wt88/f6d748b7635916687e0663f733cc7a7e/3.png" />
            
            </figure><p>Distribution of Ransom DDoS attacks by month</p><p><b>How we calculate Ransom DDoS attack trends</b>Our systems constantly analyze traffic and automatically apply mitigation when DDoS attacks are detected. Each DDoS'd customer is prompted with an automated survey to help us better understand the nature of the attack and the success of the mitigation. For over two years, Cloudflare has been surveying attacked customers. One of the questions in the survey asks the respondents if they received a threat or a ransom note demanding payment in exchange to stop the DDoS attack. Over the past year, on average, we collected 174 responses per quarter. The responses of this survey are used to calculate the percentage of Ransom DDoS attacks.</p>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, specifically HTTP DDoS attacks, are attacks that usually aim to disrupt a web server by making it unable to process legitimate user requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests and - in some cases - crash, resulting in degraded performance or an outage for legitimate users.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/289gStN2Ls0HO4cKxweF6R/418939b007250f3dcf9359daa35ecc84/4.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attack trends</h3>
      <a href="#application-layer-ddos-attack-trends">
        
      </a>
    </div>
    <p>When we look at the graph below, we can see a clear trend of approximately 8% decrease in attacks each quarter since 2022 Q1. However, despite the downward trend, when comparing Q3 of 2022 to Q3 of 2021, we can see that HTTP DDoS attacks still increased by 111% YoY.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7HC9JR8Ws6DUM4H5CYcSl8/c44460594297a1095019278fd2be64c8/5.png" />
            
            </figure><p>Distribution of HTTP DDoS attacks by quarter</p><p>When we dive into the months of the quarter, attacks in September and August were fairly evenly distributed; 36% and 34% respectively. In July, the amount of attacks was the lowest for the quarter (29%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/78JheIUhQ79FCTJ57Z6tau/11de4516c489d548db50480033a21608/001.png" />
            
            </figure><p>Distribution of HTTP DDoS attacks by month in 2022 Q3</p>
    <div>
      <h3>Application-layer DDoS attacks by industry</h3>
      <a href="#application-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p>By bucketing the attacks by our customers’ industry of operation, we can see that HTTP applications operated by Internet companies were the most targeted in Q3. Attacks on the Internet industry increased by 131% QoQ and 300% YoY.</p><p>The second most attacked industry was the Telecommunications industry with an increase of 93% QoQ and 2,317% (!) YoY. In third place was the Gaming / Gambling industry with a more conservative increase of 17% QoQ and 36% YoY.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3DOYRQeNnUFeATTqFjO9kW/a494995336ceba9c9208d9453c87f553/7.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks in 2022 Q3</p>
    <div>
      <h3>Application-layer DDoS attacks by target country</h3>
      <a href="#application-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>Bucketing attacks by our customers’ billing address gives us an understanding of which countries are more attacked. HTTP applications operated by US companies were the most targeted in Q3. US-based websites saw an increase of 60% QoQ and 105% YoY in attacks targeting them. After the US, was China with a 332% increase QoQ and an 800% increase YoY.</p><p>Looking at Ukraine, we can see that attacks targeting Ukrainian websites increased by 67% QoQ but decreased by 50% YoY. Furthermore, attacks targeting Russian websites increased by 31% QoQ and 2,400% (!) YoY.</p><p>In East Asia, we can see that attacks targeting Taiwanese companies increased by 200% QoQ and 60% YoY, and attacks targeting Japanese companies increased by 105% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/17Gqyu5nV7UXvxstWirOFS/2bbc95221e3a23c6796a503c47cfeabd/8.png" />
            
            </figure><p>Top countries targeted by HTTP DDoS attacks in 2022 Q3</p><p>When we zoom in on specific countries, we can identify the below trends that may reveal interesting insights regarding the war in Ukraine and geopolitical events in East Asia:</p><p><b>In Ukraine,</b> we see a surprising change in the attacked industries. Over the past two quarters, Broadcasting, Online Media and Publishing companies were targeted the most in what appeared to be an attempt to silence information and make it unavailable to civilians. However, this quarter, those industries dropped out of the top 10 list. Instead, the Marketing &amp; Advertising industry took the lead (40%), followed by Education companies (20%), and Government Administration (8%).</p><p><b>In Russia</b>, attacks on the Banking, Financial Services and Insurance (BFSI) industry continue to persist (25%). Be that as it may, attacks on the BFSI sector still decreased by 44% QoQ. In second place is the Events Services industry (20%), followed by Cryptocurrency (16%), Broadcast Media (13%), and Retail (11%). A significant portion of the attack traffic came from Germany-based IP addresses, and the rest were globally distributed.</p><p><b>In Taiwan,</b> the two most attacked industries were Online Media (50%) and Internet (23%). Attacks to those industries were globally distributed indicating the usage of botnets.</p><p><b>In Japan,</b> the most attacked industry was Internet/Media &amp; Internet (52%), Business Services (12%), and Government - National (11%).</p>
    <div>
      <h3>Application-layer DDoS attack traffic by source country</h3>
      <a href="#application-layer-ddos-attack-traffic-by-source-country">
        
      </a>
    </div>
    <p>Before digging into specific source country metrics, it is important to note that while country of origin is interesting, it is not necessarily indicative of where the attacker is located. Oftentimes with DDoS attacks, they are launched remotely, and attackers will go to great lengths to hide their actual location in an attempt to avoid being caught. If anything, it is indicative of where botnet nodes are located. With that being said, by mapping the attacking IP address to their location, we can understand where attack traffic is coming from.</p><p>After two consecutive quarters, China replaced the US as the main source of HTTP DDoS attack traffic. In Q3, China was the largest source of HTTP DDoS attack traffic. Attack traffic from China-registered IP addresses increased by 29% YoY and 19% QoQ. Following China was India as the second-largest source of HTTP DDoS attack traffic — an increase of 61% YoY. After India, the main sources were the US and Brazil.</p><p>Looking at Ukraine, we can see that this quarter there was a drop in attack traffic originating from Ukrainian and Russian IP addresses — a decrease of 29% and 11% QoQ, respectively. However, YoY, attack traffic from within those countries still increased by 47% and 18%, respectively.</p><p>Another interesting data point is that attack traffic originating from Japanese IP addresses increased by 130% YoY.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ihLfGt1e1B1cQMawFy1Yc/42dc81e462d9536625a0aac48ae15ad1/9.png" />
            
            </figure><p>Top source countries of HTTP DDoS attacks in 2022 Q3</p>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application-layer attacks target the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service that end users are trying to access (HTTP/S in our case), <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer attacks</a> aim to overwhelm network infrastructure (such as in-line routers and servers) and the Internet link itself.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2oVTzylydZrIo6F7vuPbTu/2f42818e1d25e7ac8eb59f1ddff01a13/10.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attack trends</h3>
      <a href="#network-layer-ddos-attack-trends">
        
      </a>
    </div>
    <p>In Q3, we saw a large surge in L3/4 DDoS attacks — an increase of 97% YoY and a 24% QoQ. Furthermore, when we look at the graph we can see a clear trend, over the past three quarters, of an increase in attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/U7MKUIp5xU4S9T5Jusncu/8fe90bb8a41694866616077171e4df04/11.png" />
            
            </figure><p>Distribution of L3/4 DDoS attacks by quarter</p><p>Drilling down into the quarter, it's apparent that the attacks were, for the most part, evenly distributed throughout the quarter — with a slightly larger share for July.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5s4xO4fduFcmXeTPISzRFl/07bc58a104d110ce261e0c2410c255e6/12.png" />
            
            </figure><p>Distribution of L3/4 DDoS attacks by month in 2022 Q3</p>
    <div>
      <h3>Network-layer DDoS attacks by Industry</h3>
      <a href="#network-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p>The Gaming / Gambling industry was hit by the most L3/4 DDoS attacks in Q3. Almost one out of every five bytes Cloudflare ingested towards Gaming / Gambling networks was part of a DDoS attack. This represents a whopping 381% increase QoQ.</p><p>The second most targeted industry was Telecommunications — almost 6% of bytes towards Telecommunications networks were part of DDoS attacks. This represents a 58% drop from the previous quarter where Telecommunications was the top most attacked industry by L3/4 DDoS attacks.</p><p>Following were the Information Technology and Services industry along with the Software industry. Both saw significant growth in attacks — 89% and 150% QoQ, respectively.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/wFEUduV2X1nGIX5qpNYVK/ec9fce0c933c127647ea6e089134d847/13.png" />
            
            </figure><p>Top industries targeted by L3/4 DDoS attacks in 2022 Q3</p>
    <div>
      <h3>Network-layer DDoS attacks by target country</h3>
      <a href="#network-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>In Q3, Singapore-based companies saw the most L3/4 DDoS attacks — over 15% of all bytes to their networks were associated with a DDoS attack. This represents a dramatic 1,175% increase QoQ.</p><p>The US comes in second after a 45% decrease QoQ in attack traffic targeting US networks. In third, China, with a 62% QoQ increase. Attacks on Taiwan companies also increased by 200% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5oh8VJHZb8o7Ip5zwzlZ4o/490b20366e5086f2ce43dc6c258d589a/14.png" />
            
            </figure><p>Top countries targeted by L3/4 DDoS attacks in 2022 Q3</p>
    <div>
      <h3>Network-layer DDoS attacks by ingress country</h3>
      <a href="#network-layer-ddos-attacks-by-ingress-country">
        
      </a>
    </div>
    <p>In Q3, Cloudflare’s data centers in Azerbaijan saw the largest percentage of attack traffic. More than a third of all packets ingested there were part of a L3/4 DDoS attack. This represents a 44% increase QoQ and a huge 59-fold increase YoY.</p><p>Similarly, our data centers in Tunisia saw a dramatic increase in attack packets - 173x the amount in the previous year. Zimbabwe and Germany also saw significant increases in attacks.</p><p>Zooming into East Asia, we can see that our data centers in Taiwan saw an increase of attacks — 207% QoQ and 1,989% YoY. We saw similar numbers in Japan where attacks increased by 278% QoQ and 1,921% YoY.</p><p>Looking at Ukraine, we actually see a dip in the amount of attack packets we observed in our Ukraine-based and Russia-based data centers — 49% and 16% QoQ, respectively.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/68AKBbKAANPEtoRCrTnHzk/8cb99bbcbb2d12e2cc884a9fa4c5f46f/0011.png" />
            
            </figure><p>Top Cloudflare data center locations with the highest percentage of DDoS attack traffic in 2022 Q3</p>
    <div>
      <h3>Attack vectors &amp; Emerging threats</h3>
      <a href="#attack-vectors-emerging-threats">
        
      </a>
    </div>
    <p>An attack vector is the method used to launch the attack or the method of attempting to achieve denial-of-service. With a combined share of 71%, <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> and <a href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/">DNS attacks</a> remain the most popular DDoS attack vectors in Q3.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5pDeQmJb7HLCYDaUZlRvwa/27ebff95921413137b9fccb992c55899/16.png" />
            
            </figure><p>Top attack vectors in 2022 Q3</p><p>Last quarter, <a href="https://classic.radar.cloudflare.com/notebooks/ddos-2022-q2#emerging-threats">we saw a resurgence</a> of attacks abusing the CHARGEN protocol, the Ubiquity Discovery Protocol, and Memcached reflection attacks. While the growth in Memcached DDoS attacks also slightly grew (48%), this quarter, there was a more dramatic increase in attacks abusing the BitTorrent protocol (1,221%), as well as attacks launched by the Mirai botnet and its variants.</p><p><b>BitTorrent DDoS attacks increased by 1,221% QoQ</b>The <a href="https://en.wikipedia.org/wiki/BitTorrent">BitTorrent protocol</a> is a communication protocol that’s used for peer to peer file sharing. To help the BitTorrent clients find and download the files efficiently, BitTorrent clients may use <a href="https://en.wikipedia.org/wiki/BitTorrent_tracker">BitTorrent Trackers</a> or <a href="https://en.wikipedia.org/wiki/Distributed_hash_table">Distributed Hash Tables (DHT)</a> to identify the peers that are <a href="https://en.wikipedia.org/wiki/Glossary_of_BitTorrent_terms#Seed_/_seeding">seeding</a> the desired file. This concept can be abused to launch DDoS attacks. A malicious actor can <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoof</a> the victim’s IP address as a seeder IP address within Trackers and DHT systems. Then clients would request the files from those IPs. Given a sufficient number of clients requesting the file, it can flood the victim with more traffic than it can handle.</p><p><b>Mirai DDoS attacks increased by 405% QoQ</b><a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai</a> is <a href="https://www.cloudflare.com/learning/ddos/glossary/malware/">malware</a> that infects smart devices that run on <a href="https://en.wikipedia.org/wiki/ARC_(processor)">ARC processors</a>, turning them into a network of bots that can be used to launch DDoS attacks. This processor runs a stripped-down version of the Linux operating system. If the default username-and-password combo is not changed, Mirai is able to log in to the device, infect it, and take over. The botnet operator can instruct the botnet to launch a flood of UDP packets at the victim’s IP address to bombard them.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6qWtJr9lH7oxal8kUrGfoG/e26e089e6fdc5be9fc3ed038587fe3bc/22.png" />
            
            </figure><p>Top emerging threats in 2022 Q3</p>
    <div>
      <h3>Network-layer DDoS attacks by Attack Rates &amp; Duration</h3>
      <a href="#network-layer-ddos-attacks-by-attack-rates-duration">
        
      </a>
    </div>
    <p>While Terabit-strong attacks are becoming more frequent, they are still the outliers. The majority of attacks are tiny (in terms of Cloudflare scale). Over 95% of attacks peaked below 50,000 packets per second (pps) and over 97% below 500 Megabits per second (Mbps). We call this “cyber vandalism”.</p><p>What is cyber vandalism? As opposed to “classic” vandalism where the purpose is to cause deliberate destruction of or damage to public or private <i>physical</i> property — such as graffiti on the side of a building — in the cyberworld, cyber vandalism is the act of causing deliberate damage to Internet properties. Today the source codes for various botnets are available online and there are a number of free tools that can be used to launch a flood of packets. By directing those tools to Internet properties, any <a href="https://en.wikipedia.org/wiki/Script_kiddie"><i>script-kid</i></a> can use those tools to launch attacks against their school during exam season or any other website they desire to take down or disrupt. This is as opposed to organized crime, <a href="https://de.wikipedia.org/wiki/Advanced_Persistent_Threat">Advanced Persistent Threat</a> actors, and state-level actors that can launch much larger and sophisticated attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4vPLRHd9pyptNQ01znsL3i/2de83530e156717fc9c908fd9a7b39e5/18.png" />
            
            </figure><p>Distribution of DDoS attacks by bitrate in 2022 Q3</p><p>Similarly, most of the attacks are very short and end within 20 minutes (94%). This quarter we did see an increase of 9% in attacks of 1-3 hours, and a 3% increase in attacks over 3 hours — but those are still the outliers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/34vW4g7X5wSjR5P9bJEsw0/6d45a0f6cc9bd44315057b8789fa2e0d/19.png" />
            
            </figure><p>QoQ change in the duration of DDoS attacks in 2022 Q3</p><p>Even with the largest attacks, such as the 2.5 Tbps attack we mitigated earlier this quarter, and the <a href="/26m-rps-ddos/">26M request per second attack</a> we mitigated back in the summer, the peak of the attacks were short-lived. The entire 2.5 Tbps attack lasted about 2 minutes, and the peak of the 26M rps attack only 15 seconds. This emphasizes the need for automated, always-on solutions. Security teams can’t respond quick enough. By the time the security engineer looks at the PagerDuty notification on their phone, the attack has subsided.</p>
    <div>
      <h2>Summary</h2>
      <a href="#summary">
        
      </a>
    </div>
    <p>Attacks may be initiated by humans, but they are executed by bots — and to play to win, you must fight bots with bots. Detection and mitigation must be automated as much as possible, because relying solely on humans puts defenders at a disadvantage. Cloudflare’s automated systems constantly detect and mitigate DDoS attacks for our customers, so they don’t have to.</p><p>Over the years, it has become easier, cheaper, and more accessible for attackers and attackers-for-hire to launch DDoS attacks. But as easy as it has become for the attackers, we want to make sure that it is even easier - and free - for defenders of organizations of all sizes to protect themselves against DDoS attacks of all types. We've been providing <a href="/unmetered-mitigation/">unmetered and unlimited DDoS protection</a> for free to all of our customers since 2017 — when we pioneered the concept.</p><p>Cloudflare's mission is to help build a better Internet. A better Internet is one that is more secure, faster, and reliable for everyone - even in the face of DDoS attacks.</p><p>To get the complete PDF version of this report, download it <a href="https://www.cloudflare.com/lp/ddos-trends-report/">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">29zFVSZYCZGoz6xYdUWnQj</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS attack trends for 2022 Q2]]></title>
            <link>https://blog.cloudflare.com/ddos-attack-trends-for-2022-q2/</link>
            <pubDate>Wed, 06 Jul 2022 12:55:42 GMT</pubDate>
            <description><![CDATA[ Welcome to our 2022 Q2 DDoS report. This report includes insights and trends about the DDoS threat landscape — as observed across the global Cloudflare network ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4PwTj2tCMoggQJjwZmRV1N/584391a0244ab593eed0d7843af68b62/image22-2.png" />
            
            </figure><p>Welcome to our 2022 Q2 DDoS report. This report includes insights and trends about the DDoS threat landscape — as observed across the global Cloudflare network. An interactive version of this report is also available on <a href="https://radar.cloudflare.com/notebooks/ddos-2022-q2">Radar</a>.</p><p>In Q2, we’ve seen some of the largest attacks the world has ever seen including a <a href="/26m-rps-ddos/">26 million request per second HTTPS DDoS attacks</a> that Cloudflare automatically detected and mitigated. Furthermore, attacks against Ukraine and Russia continue, whilst a new <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attack</a> campaign emerged.</p>
    <div>
      <h2>The Highlights</h2>
      <a href="#the-highlights">
        
      </a>
    </div>
    
    <div>
      <h3>Ukrainian and Russian Internet</h3>
      <a href="#ukrainian-and-russian-internet">
        
      </a>
    </div>
    <ul><li><p>The war on the ground is accompanied by attacks targeting the spread of information.</p></li><li><p>Broadcast Media companies in the Ukraine were the most targeted in Q2 by DDoS attacks. In fact, all the top five most attacked industries are all in online/Internet media, publishing, and broadcasting.</p></li><li><p>In Russia on the other hand, Online Media drops as the most attacked industry to the third place. Making their way to the top, Banking, Financial Services and Insurance (BFSI) companies in Russia were the most targeted in Q2; almost 45% of all application-layer DDoS attacks targeted the BFSI sector. Cryptocurrency companies in Russia were the second most attacked.</p></li></ul><p>Read more about <a href="/what-cloudflare-is-doing-to-keep-the-open-internet-flowing-into-russia-and-keep-attacks-from-getting-out/">what Cloudflare is doing to keep the Open Internet flowing into Russia and keep attacks from getting out</a>.</p>
    <div>
      <h3>Ransom DDoS attacks</h3>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>We’ve seen a new wave of Ransom DDoS attacks by entities claiming to be the Fancy Lazarus.</p></li><li><p>In June 2022, ransom attacks peaked to the highest of the year so far: one out of every five survey respondents who experienced a DDoS attack reported being subject to a Ransom DDoS attack or other threats.</p></li><li><p>Overall in Q2, the percent of Ransom DDoS attacks increased by 11% QoQ.</p></li></ul>
    <div>
      <h3>Application-layer DDoS attacks</h3>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>In 2022 Q2, application-layer DDoS attacks increased by 72% YoY.</p></li><li><p>Organizations in the US were the most targeted, followed by Cyprus, Hong Kong, and China. Attacks on organizations in Cyprus increased by 166% QoQ.</p></li><li><p>The Aviation &amp; Aerospace industry was the most targeted in Q2, followed by the Internet industry, Banking, Financial Services and Insurance, and Gaming / Gambling in fourth place.</p></li></ul>
    <div>
      <h3>Network-layer DDoS attacks</h3>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>In 2022 Q2, network-layer DDoS attacks increased by 109% YoY. Attacks of 100 Gbps and larger increased by 8% QoQ, and attacks lasting more than 3 hours increased by 12% QoQ.</p></li><li><p>The top attacked industries were Telecommunications, Gaming / Gambling and the Information Technology and Services industry.</p></li><li><p>Organizations in the US were the most targeted, followed by China, Singapore, and Germany.</p></li></ul><p>This report is based on DDoS attacks that were automatically detected and mitigated by Cloudflare’s DDoS Protection systems. To learn more about how it works, check out <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">this deep-dive blog post</a>.</p><p><b>A note on how we measure DDoS attacks observed over our network</b></p><p>To analyze attack trends, we calculate the “DDoS activity” rate, which is either the percentage of attack traffic out of the total traffic (attack + clean) observed over our global network, or in a specific location, or in a specific category (e.g., industry or billing country). Measuring the percentages allows us to normalize data points and avoid biases reflected in absolute numbers towards, for example, a Cloudflare data center that receives more total traffic and likely, also more attacks.</p>
    <div>
      <h2>Ransom Attacks</h2>
      <a href="#ransom-attacks">
        
      </a>
    </div>
    <p>Our systems constantly analyze traffic and automatically apply mitigation when DDoS attacks are detected. Each DDoS’d customer is prompted with an automated survey to help us better understand the nature of the attack and the success of the mitigation.</p><p>For over two years now, Cloudflare has been surveying attacked customers — one question on the survey being if they received a threat or a ransom note demanding payment in exchange to stop the DDoS attack.</p><p>The number of respondents reporting threats or ransom notes in Q2 increased by 11% QoQ and YoY. During this quarter, we’ve been mitigating Ransom DDoS attacks that have been launched by entities claiming to be the Advanced Persistent Threat (APT) group “Fancy Lazarus”. The campaign has been focusing on financial institutions and cryptocurrency companies.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3LekSaUnzoF3WKmsKWhnHu/81c93d5ab9c4cf77e5c39dab99f86729/image15-1.png" />
            
            </figure><p><b>The percentage of respondents reported being targeted by a ransom DDoS attack or that have received threats in advance of the attack.</b></p><p>Drilling down into Q2, we can see that in June one out of every five respondents reported receiving a ransom DDoS attack or threat — the highest month in 2022, and the highest since December 2021.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2eTKJ7CS0gEfyXbA3EUnJd/f4c1063607dca66844d4505e8fc8cb5e/image6-1.png" />
            
            </figure>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, specifically HTTP DDoS attacks, are attacks that usually aim to disrupt a web server by making it unable to process legitimate user requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests and — in some cases — crash, resulting in degraded performance or an outage for legitimate users.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2obOKJucCHHwfzjfSp15GA/4428ac204839e8c690f6e95c2262844b/image3-2.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by month</h3>
      <a href="#application-layer-ddos-attacks-by-month">
        
      </a>
    </div>
    <p><b>In Q2, application-layer DDoS attacks increased by 72% YoY.</b></p><p>Overall, in Q2, the volume of application-layer DDoS attacks increased by 72% YoY, but decreased 5% QoQ. May was the busiest month in the quarter. Almost 41% of all application-layer DDoS attacks took place in May, whereas the least number of attacks took place in June (28%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4qwd7buXAUhojmsIB3rOpU/852c9dfcd973cfe85c845ebee1da80ec/image20-1.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by industry</h3>
      <a href="#application-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p><b>Attacks on the Aviation and Aerospace industry increased by 493% QoQ.</b></p><p>In Q2, Aviation and Aerospace was the most targeted industry by application-layer DDoS attacks. After it, was the Internet industry, Banking, Financial Institutions and Insurance (BFSI) industry, and in fourth place the Gaming / Gambling industry.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6PKfB1M18FZ4GwzL59sqlM/4056f449d4c6f24de7abaae3f10386c3/image9-2.png" />
            
            </figure>
    <div>
      <h3>Ukraine and Russia cyberspace</h3>
      <a href="#ukraine-and-russia-cyberspace">
        
      </a>
    </div>
    <p><b>Media and publishing companies are the most targeted in Ukraine.</b></p><p>As the war in Ukraine continues on the ground, in the air and on the water, so does it continue in cyberspace. Entities targeting Ukrainian companies appear to be trying to silence information. The top five most attacked industries in the Ukraine are all in broadcasting, Internet, online media, and publishing — that’s almost 80% of all DDoS Attacks targeting Ukraine.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4hYnRS2MRBsydLh7HZ260z/5f66de712a1c4bf81a56bd51e7454aae/image1-2.png" />
            
            </figure><p>On the other side of the war, the Russian Banks, Financial Institutions and Insurance (BFSI) companies came under the most attacks. Almost 45% of all DDoS attacks targeted the BFSI sector. The second most targeted was the Cryptocurrency industry, followed by Online media.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2SuLnGNWkX83CMCh4Knqnj/13a11650cd2ec01eacd1cfc83527100a/image10.png" />
            
            </figure><p>In both sides of the war, we can see that the attacks are highly distributed, indicating the use of globally distributed botnets.</p>
    <div>
      <h3>Application-layer DDoS attacks by source country</h3>
      <a href="#application-layer-ddos-attacks-by-source-country">
        
      </a>
    </div>
    <p><b>In Q2, attacks from China shrank by 78%, and attacks from the US shrank by 43%.</b></p><p>To understand the origin of the HTTP attacks, we look at the geolocation of the source IP address belonging to the client that generated the attack HTTP requests. Unlike network-layer attacks, source IP addresses cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> in HTTP attacks. A high percentage of DDoS activity in a given country doesn’t mean that that specific country is launching the attacks but rather indicates the presence of botnets operating from within the country's borders.</p><p>For the second quarter in a row, the United States tops the charts as the main source of HTTP DDoS attacks. Following the US is China in second place, and India and Germany in the third and fourth. Even though the US remained in the first place, attacks originating from the US shrank by 48% QoQ while attacks from other regions grew; attacks from India grew by 87%, from Germany by 33%, and attacks from Brazil grew by 67%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2vk1N76Ouhfo9PnAmbGtrV/f8d860feae2044d2dcb515b1c8003072/image16-1.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by target country</h3>
      <a href="#application-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>In order to identify which countries are targeted by the most HTTP DDoS attacks, we bucket the DDoS attacks by our customers' billing countries and represent it as a percentage out of all DDoS attacks.</p><p>HTTP DDoS attacks on US-based countries increased by 67% QoQ pushing the US back to the first place as the main target of application-layer DDoS attacks. Attacks on Chinese companies plunged by 80% QoQ dropping it from the first place to the fourth. Attacks on Cyprus increase by 167% making it the second most attacked country in Q2. Following Cyprus is Hong Kong, China, and the Netherlands.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5FYRI0hCsXZZ4TVkyNNod2/c1d84b0c119f51d9adb18a96b4795b1e/image8-1.png" />
            
            </figure>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application-layer attacks target the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service that end users are trying to access (HTTP/S in our case), <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer attacks</a> aim to overwhelm network infrastructure (such as in-line routers and servers) and the Internet link itself.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/G9kSKRT459XrlobrASHLn/8f20afceb5d535d67c712185ea20948e/image23-1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by month</h3>
      <a href="#network-layer-ddos-attacks-by-month">
        
      </a>
    </div>
    <p><b>In Q2, network-layer DDoS attacks increased by 109% YoY, and volumetric attacks of 100 Gbps and larger increased by 8% QoQ.</b></p><p>In Q2, the total amount of network-layer DDoS attacks increased by 109% YoY and 15% QoQ. June was the busiest month of the quarter with almost 36% of the attacks occurring in June.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/63wvQwZOAcqCfuGWLIC4d7/7667284bf69186e8be1da375083ceceb/image12.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by industry</h3>
      <a href="#network-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p><b>In Q2, attacks on Telecommunication companies grew by 66% QoQ.</b></p><p>For the second consecutive quarter, the Telecommunications industry was the most targeted by network-layer DDoS attacks. Even more so, attacks on Telecommunication companies grew by 66% QoQ. The Gaming industry came in second place, followed by Information Technology and Services companies.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1AqUyyBbet85BZ804EmvXa/7afedf5fa21fe7782a7445e04f877fca/image2-2.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by target country</h3>
      <a href="#network-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p><b>Attacks on US networks grew by 95% QoQ.</b></p><p>In Q2, the US remains the most attacked country. After the US came China, Singapore and Germany.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/48CEVlhmbUEAVjFtztOrAa/bca783442c0a7570ed38ae94a19c2101/image17-1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by ingress country</h3>
      <a href="#network-layer-ddos-attacks-by-ingress-country">
        
      </a>
    </div>
    <p><b>In Q2, almost a third of the traffic Cloudflare observed in Palestine and a fourth in Azerbaijan was part of a network-layer DDoS attack.</b></p><p>When trying to understand where network-layer DDoS attacks originate, we cannot use the same method as we use for the application-layer attack analysis. To launch an application-layer DDoS attack, <a href="https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/">successful handshakes</a> must occur between the client and the server in order to establish an HTTP/S connection. For a successful handshake to occur, the attacks cannot spoof their source IP address. While the attacker may use botnets, proxies, and other methods to obfuscate their identity, the attacking client's source IP location does sufficiently represent the attack source of application-layer DDoS attacks.</p><p>On the other hand, to launch network-layer DDoS attacks, in most cases, no handshake is needed. Attackers can spoof the source IP address in order to obfuscate the attack source and introduce randomness into the attack properties, which can make it harder for simple DDoS protection systems to block the attack. So if we were to derive the source country based on a spoofed source IP, we would get a ‘spoofed country’.</p><p>For this reason, when analyzing network-layer DDoS attack sources, we bucket the traffic by the Cloudflare data center locations where the traffic was ingested, and not by the (potentially) spoofed source IP to get an understanding of where the attacks originate from. We are able to achieve geographical accuracy in our report because we have data centers in <a href="http://www.cloudflare.com/network">over 270 cities</a> around the world. However, even this method is not 100% accurate, as traffic may be back hauled and routed via various Internet Service Providers and countries for reasons that vary from cost reduction to congestion and failure management.</p><p>Palestine jumps from the second to the first place as the Cloudflare location with the highest percentage of network-layer DDoS attacks. Following Palestine is Azerbaijan, South Korea, and Angola.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7eLWg6GnqkwtT8se0EXZU2/c980e216deae547593d69bf478feb855/image21-1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/g7HPkqNU8zeuSzWnBmZdH/7d7efc3c21c4360765249627ab06cd52/image7-1.png" />
            
            </figure><p>To view all regions and countries, check out the <a href="https://radar.cloudflare.com/notebooks/ddos-2022-q2#network-layer-ddos-attacks-by-ingress-country">interactive map</a>.</p>
    <div>
      <h3>Attack vectors</h3>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p><b>In Q2, DNS attacks increased making it the second most frequent attack vector.</b></p><p>An attack vector is a term used to describe the method that the attacker uses to launch their DDoS attack, i.e., the IP protocol, packet attributes such as TCP flags, flooding method, and other criteria.</p><p>In Q2, 53% of all network-layer attacks were <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a>. SYN floods remain the most popular attack vector. They abuse the initial connection request of the stateful <a href="https://www.cloudflare.com/learning/ddos/glossary/tcp-ip/">TCP</a> handshake. During this initial connection request, servers don’t have any context about the TCP connection as it is new and without the proper protection may find it hard to mitigate a flood of initial connection requests. This makes it easier for the attacker to consume an unprotected server’s resources.</p><p>After the SYN floods are attacks targeting DNS infrastructure, RST floods again abusing TCP connection flow, and generic attacks over UDP.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3AKhwoAGSHqlrQLHjecZAZ/fb6f4f110b1f2da4a62f3354ed396aa0/image13-1.png" />
            
            </figure>
    <div>
      <h3>Emerging threats</h3>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p><b>In Q2, the top emerging threats included attacks over CHARGEN, Ubiquiti and Memcached.</b></p><p>Identifying the top attack vectors helps organizations understand the threat landscape. In turn, this may help them improve their security posture to protect against those threats. Similarly, learning about new emerging threats that may not yet account for a significant portion of attacks, can help mitigate them before they become a significant force.</p><p>In Q2, the top emerging threats were amplification attacks abusing the Character Generator Protocol (CHARGEN), amplification attacks reflecting traffic off of exposed Ubiquiti devices, and the notorious Memcached attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/60X75WXzKulAjLCdpDS55b/5cc5c20179acc847f8f96e991e032264/image5-2.png" />
            
            </figure>
    <div>
      <h3>Abusing the CHARGEN protocol to launch amplification attacks</h3>
      <a href="#abusing-the-chargen-protocol-to-launch-amplification-attacks">
        
      </a>
    </div>
    <p><b>In Q2, attacks abusing the CHARGEN protocol increased by 378% QoQ.</b></p><p>Initially defined in <a href="https://datatracker.ietf.org/doc/html/rfc864">RFC 864</a> (1983), the Character Generator (CHARGEN) protocol is a service of the <a href="https://en.wikipedia.org/wiki/Internet_protocol_suite">Internet Protocol Suite</a> that does exactly what it says it does - it generates characters arbitrarily, and it doesn’t stop sending them to the client until the client closes the connection. Its original intent was for testing and debugging. However, it’s rarely used because it can so easily be abused to generate amplification/reflection attacks.</p><p>An attacker can spoof the source IP of their victim and fool supporting servers around the world to direct a stream of arbitrary characters “back” to the victim’s servers. This type of attack is amplification/reflection. Given enough simultaneous CHARGEN streams, the victim’s servers, if unprotected, would be flooded and unable to cope with legitimate traffic — resulting in a denial of service event.</p>
    <div>
      <h3>Amplification attacks exploiting the Ubiquiti Discovery Protocol</h3>
      <a href="#amplification-attacks-exploiting-the-ubiquiti-discovery-protocol">
        
      </a>
    </div>
    <p><b>In Q2, attacks over Ubiquity increased by 327% QoQ.</b></p><p><a href="https://www.ui.com/">Ubiquiti</a> is a US-based company that provides networking and Internet of Things (IoT) devices for consumers and businesses. Ubiquiti devices can be discovered on a network using the <a href="https://help.ui.com/hc/en-us/articles/204976244-EdgeRouter-Ubiquiti-Device-Discovery">Ubiquiti Discovery protocol</a> over UDP/TCP port 10001.</p><p>Similarly to the CHARGEN attack vector, here too, attackers can spoof the source IP to be the victim’s IP address and spray IP addresses that have port 10001 open. Those would then respond to the victim and essentially flood it if the volume is sufficient.</p>
    <div>
      <h3>Memcached DDoS attacks</h3>
      <a href="#memcached-ddos-attacks">
        
      </a>
    </div>
    <p><b>In Q2, Memcached DDoS attacks increased by 287% QoQ.</b></p><p><a href="https://www.cloudflare.com/learning/ddos/memcached-ddos-attack/">Memcached</a> is a database caching system for speeding up websites and networks. Similarly to CHARGEN and Ubiquiti, Memcached servers that support UDP can be abused to launch amplification/reflection DDoS attacks. In this case, the attacker would request content from the caching system and spoof the victim's IP address as the source IP in the UDP packets. The victim will be flooded with the Memcache responses which can be amplified by a factor of up to 51,200x.</p>
    <div>
      <h2>Network-layer DDoS attacks by attack rate</h2>
      <a href="#network-layer-ddos-attacks-by-attack-rate">
        
      </a>
    </div>
    <p><b>Volumetric attacks of over 100 Gbps increase by 8% QoQ.</b></p><p>There are different ways of measuring the size of an L3/4 DDoS attack. One is the volume of traffic it delivers, measured as the bit rate (specifically, terabits per second or gigabits per second). Another is the number of packets it delivers, measured as the packet rate (specifically, millions of packets per second).</p><p>Attacks with high bit rates attempt to cause a denial-of-service event by clogging the Internet link, while attacks with high packet rates attempt to overwhelm the servers, routers, or other in-line hardware appliances. These devices dedicate a certain amount of memory and computation power to process each packet. Therefore, by bombarding it with many packets, the appliance can be left with no further processing resources. In such a case, packets are “dropped,” i.e., the appliance is unable to process them. For users, this results in service disruptions and denial of service.</p>
    <div>
      <h3>Distribution by packet rate</h3>
      <a href="#distribution-by-packet-rate">
        
      </a>
    </div>
    <p>The majority of network-layer DDoS attacks remain below 50,000 packets per second. While 50 kpps is on the lower side of the spectrum at Cloudflare scale, it can still easily take down unprotected Internet properties and congest even a standard Gigabit Ethernet connection.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5edVFCX1vigbfc2CfCDz6g/a2284f3bcb556fbae9d9ff3cdecdd265/image4-1.png" />
            
            </figure><p>When we look at the changes in the attack sizes, we can see that packet-intensive attacks above 50 kpps decreased in Q2, resulting in an increase of 4% in small attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/152vteTszixrwCKNzrszuw/b7a271ee46ad011fa917c228781086b1/image11-1.png" />
            
            </figure>
    <div>
      <h3>Distribution by bitrate</h3>
      <a href="#distribution-by-bitrate">
        
      </a>
    </div>
    <p>In Q2, most of the network-layer DDoS attacks remain below 500 Mbps. This too is a tiny drop in the water at <a href="https://www.cloudflare.com/network/">Cloudflare scale</a>, but can very quickly shut down unprotected Internet properties with less capacity or at the very least cause congestion for even a standard Gigabit Ethernet connection.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1lUj3pmi7Ch0uSG5ZCuURH/a83742d4796e39b27d1f9e8b84efba97/image18-1.png" />
            
            </figure><p>Interestingly enough, large attacks between 500 Mbps and 100 Gbps decreased by 20-40% QoQ, but volumetric attacks above 100 Gbps increased by 8%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2aCjsSBcyiqdAXY6ZDamo9/e50f145f845f57b7b72657bd4a010fa1/image24-1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by duration</h3>
      <a href="#network-layer-ddos-attacks-by-duration">
        
      </a>
    </div>
    <p><b>In Q2, attacks lasting over three hours increased by 9%.</b></p><p>We measure the duration of an attack by recording the difference between when it is first detected by our systems as an attack and the last packet we see with that attack signature towards that specific target.</p><p>In Q2, 52% of network-layer DDoS attacks lasted less than 10 minutes. Another 40% lasted 10-20 minutes. The remaining 8% include attacks ranging from 20 minutes to over three hours.</p><p>One important thing to keep in mind is that even if an attack lasts only a few minutes, if it is successful, the repercussions could last well beyond the initial attack duration. IT personnel responding to a successful attack may spend hours and even days restoring their services.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3emu9oLw9gcXbz5AZWAZtM/1014ae5d075f95cd7871755745a8d11c/image19-2.png" />
            
            </figure><p>While most of the attacks are indeed short, we can see an increase of over 15% in attacks ranging between 20-60 minutes, and a 12% increase of attacks lasting more than three hours.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4hSf9t1KjaWIMXy4roHCla/060fbfb13ec4ca106e7b0eb302d9b2bc/image14-1.png" />
            
            </figure><p>Short attacks can easily go undetected, especially burst attacks that, within seconds, bombard a target with a significant number of packets, bytes, or requests. In this case, DDoS protection services that rely on manual mitigation by security analysis have no chance in mitigating the attack in time. They can only learn from it in their post-attack analysis, then deploy a new rule that filters the attack fingerprint and hope to catch it next time. Similarly, using an “on-demand” service, where the security team will redirect traffic to a DDoS provider during the attack, is also inefficient because the attack will already be over before the traffic routes to the on-demand DDoS provider.</p><p>It’s recommended that companies use <a href="https://www.cloudflare.com/ddos/">automated, always-on DDoS protection services</a> that analyze traffic and apply real-time fingerprinting fast enough to block short-lived attacks.</p>
    <div>
      <h2>Summary</h2>
      <a href="#summary">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet. A better Internet is one that is more secure, faster, and reliable for everyone — even in the face of DDoS attacks. As part of our mission, since 2017, we’ve been providing <a href="/unmetered-mitigation/">unmetered and unlimited DDoS protection</a> for free to all of our customers. Over the years, it has become increasingly easier for attackers to launch DDoS attacks. But as easy as it has become, we want to make sure that it is even easier — and free — for organizations of all sizes to protect themselves against DDoS attacks of all types.</p><p>Not using Cloudflare yet? <a href="https://dash.cloudflare.com/sign-up">Start now</a> with our Free and <a href="https://www.cloudflare.com/plans/pro/">Pro plans</a> to protect your websites, or <a href="https://www.cloudflare.com/magic-transit/">contact us</a> for comprehensive DDoS protection for your entire network using Magic Transit.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <category><![CDATA[Ukraine]]></category>
            <category><![CDATA[Russia]]></category>
            <guid isPermaLink="false">i4xr8wP9XJwugHF1dG7F8</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS Attack Trends for 2022 Q1]]></title>
            <link>https://blog.cloudflare.com/ddos-attack-trends-for-2022-q1/</link>
            <pubDate>Tue, 12 Apr 2022 13:12:59 GMT</pubDate>
            <description><![CDATA[ Welcome to our first DDoS report of 2022, and the ninth in total so far. This report includes new data points and insights both in the application-layer and network-layer sections — as observed across the global Cloudflare network between January and March 2022 ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Welcome to our first DDoS report of 2022, and the ninth in <a href="/tag/ddos-reports/">total</a> so far. This report includes new data points and insights both in the application-layer and network-layer sections — as observed across the global Cloudflare network between January and March 2022.</p><p>The first quarter of 2022 saw a massive spike in application-layer DDoS attacks, but a decrease in the total number of network-layer DDoS attacks. Despite the decrease, we’ve seen volumetric DDoS attacks surge by up to 645% QoQ, and we mitigated a new zero-day reflection attack with an amplification factor of 220 billion percent.</p><p>In the Russian and Ukrainian cyberspace, the most targeted industries were Online Media and Broadcast Media. In our Azerbaijan and Palestinian Cloudflare data centers, we’ve seen enormous spikes in DDoS activity — indicating the presence of botnets operating from within.</p>
    <div>
      <h2>The Highlights</h2>
      <a href="#the-highlights">
        
      </a>
    </div>
    
    <div>
      <h3>The Russian and Ukrainian cyberspace</h3>
      <a href="#the-russian-and-ukrainian-cyberspace">
        
      </a>
    </div>
    <ul><li><p>Russian Online Media companies were the most targeted industries within Russia in Q1. The next most targeted was the Internet industry, then Cryptocurrency, and then Retail. While many attacks that targeted Russian Cryptocurrency companies originated in Ukraine or the US, another major source of attacks was from within Russia itself.</p></li><li><p>The majority of HTTP DDoS attacks that targeted Russian companies originated from Germany, the US, Singapore, Finland, India, the Netherlands, and Ukraine. It’s important to note that being able to identify where cyber attack traffic originates is not the same as being able to attribute where the attacker is located.</p></li><li><p>Attacks on Ukraine targeted Broadcast Media and Publishing websites and seem to have been more distributed, originating from more countries — which may indicate the use of global botnets. Still, most of the attack traffic originated from the US, Russia, Germany, China, the UK, and Thailand.</p></li></ul><p>Read more about <a href="/what-cloudflare-is-doing-to-keep-the-open-internet-flowing-into-russia-and-keep-attacks-from-getting-out/">what Cloudflare is doing to keep the Open Internet flowing into Russia and keep attacks from getting out</a>.</p>
    <div>
      <h3>Ransom DDoS attacks</h3>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>In January 2022, over 17% of under-attack respondents reported being targeted by ransom DDoS attacks or receiving a threat in advance.</p></li><li><p>That figure drastically dropped to 6% in February, and then to 3% in March.</p></li><li><p>When compared to previous quarters, we can see that in total, in Q1, only 10% of respondents reported a ransom DDoS attack; a 28% decrease YoY and 52% decrease QoQ.</p></li></ul>
    <div>
      <h3>Application-layer DDoS attacks</h3>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>2022 Q1 was the busiest quarter in the past 12 months for application-layer attacks. HTTP-layer DDoS attacks increased by 164% YoY and 135% QoQ.</p></li><li><p>Diving deeper into the quarter, in March 2022 there were more HTTP DDoS attacks than in all of Q4 combined (and Q3, and Q1).</p></li><li><p>After four consecutive quarters in a row with China as the top source of HTTP DDoS attacks, the US stepped into the lead this quarter. HTTP DDoS attacks originating from the US increased by a staggering 6,777% QoQ and 2,225% YoY.</p></li></ul>
    <div>
      <h3>Network-layer DDoS attacks</h3>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>Network-layer attacks in Q1 increased by 71% YoY but decreased 58% QoQ.</p></li><li><p>The Telecommunications industry was the most targeted by network-layer DDoS attacks, followed by Gaming and Gambling companies, and the Information Technology and Services industry.</p></li><li><p>Volumetric attacks increased in Q1. Attacks above 10 Mpps (million packets per second) grew by over 300% QoQ, and attacks over 100 Gbps grew by 645% QoQ.</p></li></ul><p>This report is based on DDoS attacks that were automatically detected and mitigated by <a href="https://www.cloudflare.com/ddos/">Cloudflare’s DDoS Protection systems</a>. To learn more about how it works, check out <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">this deep-dive blog post</a>.</p><p><b>A note on how we measure DDoS attacks observed over our network</b>To analyze attack trends, we calculate the “DDoS activity” rate, which is either the percentage of attack traffic out of the total traffic (attack + clean) observed over our global network, or in a specific location, or in a specific category (e.g., industry or billing country). Measuring the percentages allows us to normalize data points and avoid biases reflected in absolute numbers towards, for example, a Cloudflare data center that receives more total traffic and likely, also more attacks.</p><p>To view an interactive version of this report view it on <a href="https://radar.cloudflare.com/notebooks/ddos-2022-q1/">Cloudflare Radar</a>.</p>
    <div>
      <h2>Ransom Attacks</h2>
      <a href="#ransom-attacks">
        
      </a>
    </div>
    <p>Our systems constantly analyze traffic and automatically apply mitigation when DDoS attacks are detected. Each DDoS’d customer is prompted with an automated survey to help us better understand the nature of the attack and the success of the mitigation.</p><p>For over two years now, Cloudflare has been surveying attacked customers — one question on the survey being if they received a threat or a ransom note demanding payment in exchange to stop the DDoS attack. In the last quarter, 2021 Q4, we observed a record-breaking level of reported ransom DDoS attacks (one out of every five customers). This quarter, we’ve witnessed a drop in ransom DDoS attacks with only one out of 10 respondents reporting a ransom DDoS attack; a 28% decrease YoY and 52% decrease QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5UeSXC4RnHStQU21LcdFyu/dffdcd7b7d167b4da2d40034b48d6886/unnamed.png" />
            
            </figure><p>When we break it down by month, we can see that January 2022 saw the largest number of respondents reporting receiving a ransom letter in Q1. Almost one out of every five customers (17%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1VoQDMsbVqmsgWOVsZsVEd/879958b830e5e8047874591105f73603/unnamed--1-.png" />
            
            </figure>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, specifically HTTP DDoS attacks, are attacks that usually aim to disrupt a web server by making it unable to process legitimate user requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests and — in some cases — crash, resulting in degraded performance or an outage for legitimate users.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Nk5a1cd1TpBCMSBUshW5p/14f88e849feca723c3d59e4932f779db/unnamed1.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by month</h3>
      <a href="#application-layer-ddos-attacks-by-month">
        
      </a>
    </div>
    <p><b>In Q1, application-layer DDoS attacks soared by 164% YoY and 135% QoQ - the busiest quarter within the past year.</b></p><p>Application-layer DDoS attacks increased to new heights in the first quarter of 2022. In March alone, there were more HTTP DDoS attacks than in all of 2021 Q4 combined (and Q3, and Q1).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4pgSaMnY4YtuqRpgnED5aW/f7052e3619d760fcfcc913fc1f212143/image22-1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5WcHhOZ9taZfDfnBYhJie9/366c28db62edaec91a3375be935ac7d0/image23-1.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by industry</h3>
      <a href="#application-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p><b>Consumer Electronics was the most targeted industry in Q1.</b></p><p>Globally, the Consumer Electronics industry was the most attacked with an increase of 5,086% QoQ. Second was the Online Media industry with a 2,131% increase in attacks QoQ. Third were Computer Software companies, with an increase of 76% QoQ and 1,472 YoY.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Io8GidjMPtjAwO3IoJ5QM/4637de38a6b7e782eccd5a9ad89f7b46/image9-5.png" />
            
            </figure><p>However, if we focus only on Ukraine and Russia, we can see that Broadcast Media, Online Media companies, and Internet companies were the most targeted. Read more about <a href="/what-cloudflare-is-doing-to-keep-the-open-internet-flowing-into-russia-and-keep-attacks-from-getting-out/">what Cloudflare is doing to keep the Open Internet flowing into Russia and keep attacks from getting out</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3KxUaIFTe76sBVFWOr4gXg/37664c82befd30709059d7eba9d7b181/image14-1.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3OdQpFtzCfTo3kWylObvpC/e35a3cfa51e3518057011624993cb29d/image3-6.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by source country</h3>
      <a href="#application-layer-ddos-attacks-by-source-country">
        
      </a>
    </div>
    <p>To understand the origin of the HTTP attacks, we look at the geolocation of the source IP address belonging to the client that generated the attack HTTP requests. Unlike network-layer attacks, source IP addresses cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> in HTTP attacks. A high percentage of DDoS activity in a given country usually indicates the presence of botnets operating from within the country's borders.</p><p>After four consecutive quarters in a row with China as the top source of HTTP DDoS attacks, the US stepped into the lead this quarter. HTTP DDoS attacks originating from the US increased by a staggering 6,777% QoQ and 2,225% YoY. Following China in second place are India, Germany, Brazil, and Ukraine.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3s0SD9E8DoiJriR6chDTIt/0067c86db96706cfd906029d839e034c/unnamed--2-.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by target country</h3>
      <a href="#application-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>In order to identify which countries are targeted by the most HTTP DDoS attacks, we bucket the DDoS attacks by our customers' billing countries and represent it as a percentage out of all DDoS attacks.</p><p>The US drops to second place, after being first for three consecutive quarters. Organizations in China were targeted the most by HTTP DDoS attacks, followed by the US, Russia, and Cyprus.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4CunftrRkj2XkF5Osf3aKS/762f851d62e01c8ec00c9e76e2229f97/image7-4.png" />
            
            </figure>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application-layer attacks target the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service that end users are trying to access (HTTP/S in our case), <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer attacks</a> aim to overwhelm network infrastructure (such as in-line routers and servers) and the Internet link itself.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/30aPmdSMAbPwwyujWllA2X/351c3c9b05c09616ecdb47dd556c3f1f/unnamed--1--1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by month</h3>
      <a href="#network-layer-ddos-attacks-by-month">
        
      </a>
    </div>
    <p><b>While HTTP DDoS attacks soared in Q1, network-layer DDoS attacks actually decreased by 58% QoQ, but still increased by 71% YoY.</b></p><p>Diving deeper into Q1, we can see that the amount of network-layer DDoS attacks remained mostly consistent throughout the quarter with about a third of attacks occurring every month.</p><p>![Graph of the yearly distribution of network-layer DDoS attacks by month in the past 12 months]](<a href="/content/images/2022/04/image28.png_WIDE">http://staging.blog.mrk.cfdata.org/content/images/2022/04/image28.png_WIDE</a>)</p><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7aI8iiTHyjVCpvTv5UjDtU/9bc5f0cd32fe0d25333cf6d1355c64b2/image23-3.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7GyfQMcPOegM2kbtwRR794/1f38b461cce0f9583ac89a0471041da3/unnamed--3-.png" />
            
            </figure>
    <div>
      <h2>Cloudflare mitigates zero-day amplification DDoS attack</h2>
      <a href="#cloudflare-mitigates-zero-day-amplification-ddos-attack">
        
      </a>
    </div>
    <p>Amongst these network-layer DDoS attacks are also zero-day DDoS attacks that Cloudflare automatically detected and mitigated.</p><p>In the beginning of March, Cloudflare researchers helped investigate and expose a zero-day vulnerability in Mitel business phone systems that amongst other possible exploitations, also enables attackers to launch an amplification DDoS attack. This type of attack reflects traffic off vulnerable Mitel servers to victims, amplifying the amount of traffic sent in the process by <b>an amplification factor of 220 billion percent</b> in this specific case. You can read more about it in our recent <a href="/cve-2022-26143-amplification-attack/">blog post</a>.</p><p>We observed several of these attacks across our network. One of them targeted a North American cloud provider using the Cloudflare Magic Transit service. The attack originated from 100 source IPs mainly from the US, UK, Canada, Netherlands, Australia, and approximately 20 other countries. It peaked above 50 Mpps (~22 Gbps) and was automatically detected and mitigated by Cloudflare systems.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7LxY8T04AQZBMT0LGM6lzT/7c8b9be1a413998572d9400717f56cc4/image1-9.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by industry</h3>
      <a href="#network-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p>Many network-layer DDoS attacks target Cloudflare’s IP ranges directly. These IP ranges serve our <a href="https://www.cloudflare.com/cdn/">WAF/CDN customers</a>, <a href="https://www.cloudflare.com/dns/">Cloudflare authoritative DNS</a>, <a href="https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/">Cloudflare public DNS resolver 1.1.1.1</a>,  <a href="https://www.cloudflare.com/products/zero-trust/zero-trust-network-access/">Cloudflare Zero Trust</a> products, and our corporate offices, to name a few. Additionally, we also allocate dedicated IP addresses to customers via our <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Spectrum</a> product and advertise the IP prefixes of other companies via our <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a>, <a href="https://www.cloudflare.com/magic-wan/">Magic WAN</a>, and <a href="https://www.cloudflare.com/magic-firewall/">Magic Firewall</a> Products for L3/4 DDoS protection.</p><p>In this report, for the first time, we've begun classifying network-layer DDoS attacks according to the industries of our customers using the Spectrum and Magic products. This classification allows us to understand which industries are targeted the most by network-layer DDoS attacks.</p><p>When we look at Q1 statistics, we can see that in terms of attack packets and attack bytes launched towards Cloudflare customers, the Telecommunications industry was targeted the most.  More than 8% of all attack bytes and 10% of all attack packets that Cloudflare mitigated targeted Telecommunications companies.</p><p>Following not too far behind, in second and third place were the Gaming / Gambling and Information Technology and Services industries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2bxF8tqebY5nrdxlmuAsZl/3da1fe00d18114b891aacb91e3969d0d/image20-1.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/aznwW5V47dkzudjNlMvGy/7c30c79064d92257b489de4283eb6e5d/image5-7.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by target country</h3>
      <a href="#network-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>Similarly to the classification by our customers’ industry, we can also bucket attacks by our customers’ billing country as we do for application-layer DDoS attacks, to identify the top attacked countries.</p><p>Looking at Q1 numbers, we can see that the US was targeted by the highest percentage of DDoS attacks traffic — over 10% of all attack packets and almost 8% of all attack bytes. Following the US is China, Canada, and Singapore.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Gcrg06kwyMWELD73zMmWt/efc1553da6d4b8c237f5b9365eb8317d/image19-1.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4eqgGdsJNhmcn09tW5ZMOi/5f13ebd0ce40dd826b649a4fd4e363c6/image15-2.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by ingress country</h3>
      <a href="#network-layer-ddos-attacks-by-ingress-country">
        
      </a>
    </div>
    <p>When trying to understand where network-layer DDoS attacks originate, we cannot use the same method as we use for the application-layer attack analysis. To launch an application-layer DDoS attack, <a href="https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/">successful handshakes</a> must occur between the client and the server in order to establish an HTTP/S connection. For a successful handshake to occur, the attacker cannot <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoof</a> their source IP address. While the attacker may use botnets, proxies, and other methods to obfuscate their identity, the attacking client's source IP location does sufficiently represent the attack source of application-layer DDoS attacks.</p><p>On the other hand, to launch network-layer DDoS attacks, in most cases, no handshake is needed. Attackers can <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoof</a> the source IP address in order to obfuscate the attack source and introduce randomness into the attack properties, which can make it harder for simple DDoS protection systems to block the attack. So if we were to derive the source country based on a spoofed source IP, we would get a ‘spoofed country’.</p><p>For this reason, when analyzing network-layer DDoS attack sources, we bucket the traffic by the Cloudflare edge data center locations where the traffic was ingested, and not by the (potentially) spoofed source IP to get an understanding of where the attacks originate from. We are able to achieve geographical accuracy in our report because we have data centers in <a href="/mid-2022-new-cities/">over 270 cities</a> around the world. However, even this method is not 100% accurate, as traffic may be back hauled and routed via various Internet Service Providers and countries for reasons that vary from cost reduction to congestion and failure management.</p><p>In Q1, the percentage of attacks detected in Cloudflare’s data centers in Azerbaijan increased by 16,624% QoQ and 96,900% YoY, making it the country with the highest percentage of network-layer DDoS activity (48.5%).</p><p>Following our Azerbaijanian data center is our Palestinian data center where a staggering 41.9% of all traffic was DDoS traffic. This represents a 10,120% increase QoQ and 46,456% YoY.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4DnN5j4chxISRXppNIV6a1/f0c98f9454ee54b19e686410209ae9ad/image2-8.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/h4otwpiEvjRN9OFzyHgqp/2f0c9cf45c20a3d1a7aad667433675f1/image12-1.png" />
            
            </figure><p>To view all regions and countries, check out the <a href="https://radar.cloudflare.com/notebooks/ddos-2022-q1/">interactive map</a>.</p>
    <div>
      <h3>Attack vectors</h3>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p><b>SYN Floods remain the most popular DDoS attack vector, while use of generic UDP floods drops significantly in Q1.</b></p><p>An attack vector is a term used to describe the method that the attacker uses to launch their DDoS attack, i.e., the IP protocol, packet attributes such as TCP flags, flooding method, and other criteria.</p><p>In Q1, SYN floods accounted for 57% of all network-layer DDoS attacks, representing a 69% increase QoQ and a 13% increase YoY. In second place, attacks over SSDP surged by over 1,100% QoQ. Following were RST floods and attacks over UDP. Last quarter, generic UDP floods took the second place, but this time, generic UDP DDoS attacks plummeted by 87% QoQ from 32% to a mere 3.9%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3nIMdTOj9gYnulv2zn4qBf/265dc7b5b1f3d819ec027564d499630e/image11-1.png" />
            
            </figure>
    <div>
      <h2>Emerging threats</h2>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>Identifying the top attack vectors helps organizations understand the threat landscape. In turn, this may help them improve their security posture to protect against those threats. Similarly, learning about new emerging threats that may not yet account for a significant portion of attacks, can help mitigate them before they become a significant force.</p><p>When we look at new emerging attack vectors in Q1, we can see increases in DDoS attacks reflecting off of Lantronix services (+971% QoQ) and SSDP reflection attacks (+724% QoQ). Additionally, SYN-ACK attacks increased by 437% and attacks by Mirai botnets by 321% QoQ.</p>
    <div>
      <h3>Attacker reflecting traffic off of Lantronix Discovery Service</h3>
      <a href="#attacker-reflecting-traffic-off-of-lantronix-discovery-service">
        
      </a>
    </div>
    <p>Lantronix is a US-based software and hardware company that provides solutions for Internet of Things (IoT) management amongst their vast offering. One of the tools that they provide to manage their IoT components is the Lantronix Discovery Protocol. It is a command-line tool that helps to search and find Lantronix devices. The discovery tool is UDP-based, meaning that no handshake is required. The source IP can be spoofed. So an attacker can use the tool to search for publicly exposed Lantronix devices using a 4 byte request, which will then in turn respond with a 30 byte response from port 30718. By spoofing the source IP of the victim, all Lantronix devices will target their responses to the victim — resulting in a reflection/amplification attack.</p>
    <div>
      <h3>Simple Service Discovery Protocol used for reflection DDoS attacks</h3>
      <a href="#simple-service-discovery-protocol-used-for-reflection-ddos-attacks">
        
      </a>
    </div>
    <p>The Simple Service Discovery Protocol (SSDP) protocol works similarly to the Lantronix Discovery protocol, but for Universal Plug and Play (UPnP) devices such as network-connected printers. By abusing the SSDP protocol, attackers can generate a reflection-based DDoS attack overwhelming the target’s infrastructure and taking their Internet properties offline. Read more about <a href="https://www.cloudflare.com/learning/ddos/ssdp-ddos-attack/">SSDP-based DDoS attacks</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6vdleq21CxFyxVpMsuseIT/51eed46af450728ced3f01fe3b3da68a/image21.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by attack rate</h3>
      <a href="#network-layer-ddos-attacks-by-attack-rate">
        
      </a>
    </div>
    <p><b>In Q1, we observed a massive uptick in volumetric DDoS attacks — both from the packet rate and bitrate perspective. Attacks over 10 Mpps grew by over 300% QoQ, and attacks over 100 Gbps grew by 645% QoQ.</b></p><p>There are different ways of measuring the size of an L3/4 DDoS attack. One is the volume of traffic it delivers, measured as the bit rate (specifically, terabits per second or gigabits per second). Another is the number of packets it delivers, measured as the packet rate (specifically, millions of packets per second).</p><p>Attacks with high bit rates attempt to cause a denial-of-service event by clogging the Internet link, while attacks with high packet rates attempt to overwhelm the servers, routers, or other in-line hardware appliances. These devices dedicate a certain amount of memory and computation power to process each packet. Therefore, by bombarding it with many packets, the appliance can be left with no further processing resources. In such a case, packets are “dropped,” i.e., the appliance is unable to process them. For users, this results in service disruptions and denial of service.</p>
    <div>
      <h3>Distribution by packet rate</h3>
      <a href="#distribution-by-packet-rate">
        
      </a>
    </div>
    <p>The majority of network-layer DDoS attacks remain below 50,000 packets per second. While 50 kpps is on the lower side of the spectrum at Cloudflare scale, it can still easily take down unprotected Internet properties and congest even a standard Gigabit Ethernet connection.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/29AAghjmcak4dGQvIXvYh8/c6202035c934087213e7ac65d3aed349/image4-5.png" />
            
            </figure><p>When we look at the changes in the attack sizes, we can see that attacks of over 10 Mpps grew by over 300% QoQ. Similarly, attacks of 1-10 Mpps grew by almost 40% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6trkK6tXjwa2wmVpnnr9Ik/5e6aaa9ec3f1d678daddffd4ff3a57e0/image8-3.png" />
            
            </figure>
    <div>
      <h3>Distribution by bitrate</h3>
      <a href="#distribution-by-bitrate">
        
      </a>
    </div>
    <p>In Q1, most of the network-layer DDoS attacks remain below 500 Mbps. This too is a tiny drop in the water at <a href="https://www.cloudflare.com/network/">Cloudflare scale</a>, but can very quickly shut down unprotected Internet properties with less capacity or at the very least congest, even a standard Gigabit Ethernet connection.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5RNEoynAmbXZQU7VaZGFU7/58138c225812ae7dcc4a81c619f3985e/image6-4.png" />
            
            </figure><p><i>Graph of the distribution of network-layer DDoS attacks by bit rate in 2022 Q1</i></p><p>Similarly to the trends observed in the packet-per-second realm, here we can also see large increases. The amount of DDoS attacks that peaked over 100 Gbps increased by 645% QoQ; attacks peaking between 10 Gbps to 100 Gbps increased by 407%; attacks peaking between 1 Gbps to 10 Gbps increased by 88%; and even attacks peaking between 500 Mbps to 1 Gbps increased by almost 20% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2uUqHLuTg4lD8DbJmXXLFS/6dcad7d8c2769a8269de62751cd22488/image13-1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by duration</h3>
      <a href="#network-layer-ddos-attacks-by-duration">
        
      </a>
    </div>
    <p><b>Most attacks remain under one hour in duration, reiterating the need for automated always-on DDoS mitigation solutions.</b></p><p>We measure the duration of an attack by recording the difference between when it is first detected by our systems as an attack and the last packet we see with that attack signature towards that specific target.</p><p>In previous reports, we provided a breakdown of ‘attacks under an hour’, and larger time ranges. However, in most cases over 90 percent of attacks last less than an hour. So starting from this report, we broke down the short attacks and grouped them by shorter time ranges to provide better granularity.</p><p>One important thing to keep in mind is that even if an attack lasts only a few minutes, if it is successful, the repercussions could last well beyond the initial attack duration. IT personnel responding to a successful attack may spend hours and even days restoring their services.</p><p>In the first quarter of 2022, more than half of the attacks lasted 10-20 minutes, approximately 40% ended within 10 minutes, another ~5% lasted 20-40 minutes, and the remaining lasted longer than 40 minutes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4AAxMcs15Aguf4sdMfjYQ6/d5dcfa6bb8b62b7ab8eeaff3f8100de8/image27.png" />
            
            </figure><p>Short attacks can easily go undetected, especially burst attacks that, within seconds, bombard a target with a significant number of packets, bytes, or requests. In this case, DDoS protection services that rely on manual mitigation by security analysis have no chance in mitigating the attack in time. They can only learn from it in their post-attack analysis, then deploy a new rule that filters the attack fingerprint and hope to catch it next time. Similarly, using an “on-demand” service, where the security team will redirect traffic to a DDoS provider during the attack, is also inefficient because the attack will already be over before the traffic routes to the on-demand DDoS provider.</p><p>It’s recommended that companies use automated, always-on DDoS protection services that analyze traffic and apply real-time fingerprinting fast enough to block short-lived attacks.</p>
    <div>
      <h2>Summary</h2>
      <a href="#summary">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet. A better Internet is one that is more secure, faster, and reliable for everyone — even in the face of DDoS attacks. As part of our mission, since 2017, we’ve been providing <a href="/unmetered-mitigation/">unmetered and unlimited DDoS protection</a> for free to all of our customers. Over the years, it has become increasingly easier for attackers to launch DDoS attacks. But as easy as it has become, we want to make sure that it is even easier — and free — for organizations of all sizes to protect themselves against DDoS attacks of all types.</p><p>Not using Cloudflare yet? <a href="https://dash.cloudflare.com/sign-up">Start now</a> with our Free and <a href="https://www.cloudflare.com/plans/pro/">Pro plans</a> to protect your websites, or <a href="https://www.cloudflare.com/magic-transit/">contact us</a> for comprehensive DDoS protection for your entire network using Magic Transit.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Ukraine]]></category>
            <category><![CDATA[Russia]]></category>
            <category><![CDATA[Mitel]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">6u6Ais7xHBvpPuuxFf9yes</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS Attack Trends for Q4 2021]]></title>
            <link>https://blog.cloudflare.com/ddos-attack-trends-for-2021-q4/</link>
            <pubDate>Mon, 10 Jan 2022 13:58:20 GMT</pubDate>
            <description><![CDATA[ In Q4, we observed a 95% increase in L3/4 DDoS attacks and record-breaking levels of Ransom DDoS attacks. The Manufacturing industry was the most targeted alongside a 5,800% increase in SNMP-based DDoS attacks and massive campaigns against VoIP providers around the world ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1gkcJlZwljNNiInjszMhDS/3679e2af7a226546660265e0749f0ac2/image3-1.png" />
            
            </figure><p>The first half of 2021 witnessed massive ransomware and ransom DDoS attack campaigns that interrupted aspects of critical infrastructure around the world (including one of the largest petroleum pipeline system operators in the US) and a <a href="https://csirt.divd.nl/2021/07/03/Kaseya-Case-Update/">vulnerability in IT management software</a> that targeted schools, public sector, travel organizations, and credit unions, to name a few.</p><p>The second half of the year recorded a growing swarm of one of the most powerful botnets deployed (<a href="/meris-botnet/">Meris</a>) and <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">record-breaking HTTP DDoS attacks</a> and <a href="/cloudflare-blocks-an-almost-2-tbps-multi-vector-ddos-attack/">network-layer attacks</a> observed over the Cloudflare network. This besides the <a href="/inside-the-log4j2-vulnerability-cve-2021-44228/">Log4j2 vulnerability</a> (CVE-2021-44228) discovered in December that allows an attacker to execute code on a remote server — arguably one of the most severe vulnerabilities on the Internet since both <a href="/tag/heartbleed/">Heartbleed</a> and <a href="/inside-shellshock/">Shellshock</a>.</p><p>Prominent attacks such as the ones listed above are but a few examples that demonstrate a trend of intensifying cyber-insecurity that affected everyone, from tech firms and government organizations to wineries and meat processing plants.</p><p>Here are some <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attack</a> trends and highlights from 2021 and Q4 ‘21 specifically:</p>
    <div>
      <h3>Ransom DDoS attacks</h3>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>In Q4, <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">ransom DDoS attacks</a> increased by 29% YoY and 175% QoQ.</p></li><li><p>In December alone, one out of every three survey respondents reported being targeted by a ransom DDoS attack or threatened by the attacker.</p></li></ul>
    <div>
      <h3>Application-layer DDoS attacks</h3>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>The Manufacturing industry was the most attacked in Q4 ’21, recording a whopping 641% increase QoQ in the number of attacks. The Business Services and Gaming/Gambling industries were the second and third most targeted industries by application-layer DDoS attacks.</p></li><li><p>For the fourth time in a row this year, China topped the charts with the highest percentage of attack traffic originating from its networks.</p></li><li><p>A new botnet called the <a href="/meris-botnet/">Meris botnet</a> emerged in mid-2021 and continued to bombard organizations around the world, launching some of the largest HTTP attacks on record — including a <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">17.2M rps attack that Cloudflare automatically mitigated</a>.</p></li></ul>
    <div>
      <h3>Network-layer DDoS attacks</h3>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>Q4 ’21 was the busiest quarter for attackers in 2021. In December 2021 alone, there were more than all the attacks observed in Q1 and Q2 ’21 separately.</p></li><li><p>While the majority of attacks were small, terabit-strong attacks became the new norm in the second half of 2021. Cloudflare automatically mitigated dozens of attacks peaking over 1 Tbps, with the largest one peaking just under <a href="/cloudflare-blocks-an-almost-2-tbps-multi-vector-ddos-attack/">2 Tbps — the largest we’ve ever seen</a>.</p></li><li><p>Q4 ’21, and November specifically, recorded a persistent ransom <a href="/update-on-voip-attacks/">DDoS campaign against VoIP providers</a> around the world.</p></li><li><p>Attacks originating from Moldova quadrupled in Q4 ’21 QoQ, making it the country with the highest percentage of network-layer DDoS activity.</p></li><li><p><a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP floods</a> were the most frequent attack vectors while emerging threats such as SNMP attacks increased by nearly 5,800% QoQ.</p></li></ul><p>This report is based on DDoS attacks that were automatically detected and mitigated by Cloudflare’s DDoS Protection systems. To learn more about how it works, check out <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">this deep-dive blog post</a>.</p>
    <div>
      <h3>A note on how we measure DDoS attacks observed over our network</h3>
      <a href="#a-note-on-how-we-measure-ddos-attacks-observed-over-our-network">
        
      </a>
    </div>
    <p>To analyze attack trends, we calculate the “DDoS activity” rate, which is the percentage of attack traffic out of the total traffic (attack + clean) observed over our global network. Measuring attack numbers as a percentage of the total traffic observed allows us to normalize data points and avoid biases reflected in absolute numbers towards, for example, a Cloudflare data center that receives more total traffic and likely, also more attacks.</p><p>An interactive version of this report is available on <a href="https://radar.cloudflare.com/notebooks/ddos-2021-q4">Cloudflare Radar</a>.</p>
    <div>
      <h2>Ransom Attacks</h2>
      <a href="#ransom-attacks">
        
      </a>
    </div>
    <p>Our systems constantly analyze traffic and automatically apply mitigation when DDoS attacks are detected. Each DDoS’d customer is prompted with an automated survey to help us better understand the nature of the attack and the success of the mitigation.</p><p>For over two years now, Cloudflare has been surveying attacked customers — one question on the survey being if they received a ransom note demanding payment in exchange to stop the DDoS attack. Q4 ’21 recorded the highest survey responses ever that indicated ransom threats — ransom attacks increased by 29% YoY and 175% QoQ. More specifically, one out of every 4.5 respondents (22%) reported receiving a ransom letter demanding payment by the attacker.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6YXf8BjOc11hjAwLqsC3Ee/d9690fb0ee28b1c024b8bfceb425e82c/image9.png" />
            
            </figure><p>The percentage of respondents reported being targeted by a ransom DDoS attack or that have received threats in advance of the attack.</p><p>When we break it down by month, we can see that December 2021 topped the charts with 32% of respondents reporting receiving a ransom letter — that’s nearly one out of every three surveyed respondents.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2qNYRymdKC7OmMRlqYW6yP/95660390bf9c222518705aab2a871e8c/unnamed.png" />
            
            </figure>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, specifically HTTP DDoS attacks, are attacks that usually aim to disrupt a web server by making it unable to process legitimate user requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests and — in some cases — crash, resulting in degraded performance or an outage for legitimate users.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2rXJ2p6S40Qc709TT5Kabb/f4aa6e71713ec57142419a8acc59170e/image13.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by industry</h3>
      <a href="#application-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p><b>In Q4, DDoS attacks on Manufacturing companies increased by 641% QoQ, and DDoS attacks on the Business Services industry increased by 97%.</b></p><p>When we break down the application-layer attacks targeted by industry, the Manufacturing, Business Services, and Gaming/Gambling industries were the most targeted industries in Q4 ’21.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3VZPSeXuR577XbrkgkQKYW/c346c1c5a7a18f178ce4f388a4774919/image12.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by source country</h3>
      <a href="#application-layer-ddos-attacks-by-source-country">
        
      </a>
    </div>
    <p>To understand the origin of the HTTP attacks, we look at the geolocation of the source IP address belonging to the client that generated the attack HTTP requests. Unlike network-layer attacks, source IP addresses cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> in HTTP attacks. A high percentage of DDoS activity in a given country usually indicates the presence of botnets operating from within the country's borders.</p><p>For the fourth quarter in a row, China remains the country with the highest percentage of DDoS attacks originating from within its borders. More than three out of every thousand HTTP requests that originated from Chinese IP addresses were part of an HTTP DDoS attack. The US remained in second place, followed by Brazil and India.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4V0FXoJ0TWV5ZZfVsfJwvX/00483401590d51fde24ab76e1ce743bb/image18.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by target country</h3>
      <a href="#application-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>In order to identify which countries are targeted by the most HTTP DDoS attacks, we bucket the DDoS attacks by our customers' billing countries and represent it as a percentage out of all DDoS attacks.</p><p>For the third consecutive time this year, organizations in the United States were targeted by the most HTTP DDoS attacks, followed by Canada and Germany.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4f8B9aTjlObizqYK5FO0vA/20b782dba3e36f87f31a541664305f03/image8.png" />
            
            </figure>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application-layer attacks target the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service that end users are trying to access, <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer attacks</a> aim to overwhelm network infrastructure (such as in-line routers and servers) and the Internet link itself.</p>
    <div>
      <h3>Cloudflare thwarts an almost 2 Tbps attack</h3>
      <a href="#cloudflare-thwarts-an-almost-2-tbps-attack">
        
      </a>
    </div>
    <p>In November, our systems automatically detected and mitigated <a href="/cloudflare-blocks-an-almost-2-tbps-multi-vector-ddos-attack/">an almost 2 Tbps DDoS attack</a>. This was a multi-vector attack combining <a href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/">DNS amplification</a> attacks and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP floods</a>. The entire attack lasted just one minute. The attack was launched from approximately 15,000 bots running a variant of the original Mirai code on IoT devices and <a href="https://www.rapid7.com/blog/post/2021/11/01/gitlab-unauthenticated-remote-code-execution-cve-2021-22205-exploited-in-the-wild/">unpatched GitLab instances</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6CZbhxkxGHatqnmkf0rD8B/0c378dc0f652ffa379bef8c9e200edf7/image14.jpg" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by month</h3>
      <a href="#network-layer-ddos-attacks-by-month">
        
      </a>
    </div>
    <p><b>December was the busiest month for attackers in 2021.</b></p><p>Q4 ‘21 was the busiest quarter in 2021 for attackers. Over 43% of all network-layer DDoS attacks took place in the fourth quarter of 2021. While October was a relatively calmer month, in November, the month of the Chinese Singles' Day, the American Thanksgiving holiday, Black Friday, and Cyber Monday, the number of network-layer DDoS attacks nearly doubled. The number of observed attacks increased towards the final days of December ’21 as the world prepared to close out the year. In fact, the total number of attacks in December alone was higher than all the attacks in Q2 ’21 and almost equivalent to all attacks in Q1 ’21.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3M60fvAArNvQNb92QmXP59/273a191925bb3d77ae22c647edf8d973/image5.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by attack rate</h3>
      <a href="#network-layer-ddos-attacks-by-attack-rate">
        
      </a>
    </div>
    <p><b>While most attacks are still relatively ‘small’ in size, terabit-strong attacks are becoming the norm.</b></p><p>There are different ways of measuring the size of an L3/4 DDoS attack. One is the volume of traffic it delivers, measured as the bit rate (specifically, terabits per second or gigabits per second). Another is the number of packets it delivers, measured as the packet rate (specifically, millions of packets per second).</p><p>Attacks with high bit rates attempt to cause a denial-of-service event by clogging the Internet link, while attacks with high packet rates attempt to overwhelm the servers, routers, or other in-line hardware appliances. These devices dedicate a certain amount of memory and computation power to process each packet. Therefore, by bombarding it with many packets, the appliance can be left with no further processing resources. In such a case, packets are “dropped,” i.e., the appliance is unable to process them. For users, this results in service disruptions and denial of service.</p><p>The distribution of attacks by their size (in bit rate) and month is shown below. As seen in the graph above, the majority of attacks took place in December. However, the graph below illustrates that larger attacks, over 300 Gbps in size, took place in November. Most of the attacks between 5-20 Gbps took place in December.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3FDRn0pqTveatbegOoQqZR/88162e7e901ccd0fe1409258a62a58f6/image10.png" />
            
            </figure><p><b>Distribution by packet rate</b></p><p>An interesting correlation Cloudflare has observed is that when the number of attacks increases, their size and duration decrease. In the first two-thirds of 2021, the number of attacks was relatively small, and correspondingly, their rates increased, e.g., in Q3 ’21, attacks ranging from 1-10 million packets per second (mpps) increased by 196%. In Q4 ’21, the number of attacks increased and Cloudflare observed a decrease in the size of attacks. 91% of all attacks peaked below 50,000 packets per second (pps) — easily sufficient to take down unprotected Internet properties.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ckVnjxEu3spStObJuOkyb/d4f0fa003c675a1b224b79bbb59e1e87/image4.png" />
            
            </figure><p>Larger attacks of over 1 mpps decreased by 48% to 28% QoQ, while attacks peaking below 50K pps increased by 2.36% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Pq9PVHDkDpxA2Ao0lsk54/2b83c62b6881c5b9f65b7fcb28b50a4a/image19.png" />
            
            </figure>
    <div>
      <h3>Distribution by bit rate</h3>
      <a href="#distribution-by-bit-rate">
        
      </a>
    </div>
    <p>Similar to the trend observed in packet-intensive attacks, the amount of bit-intensive attacks shrunk as well. While attacks over 1 Tbps are becoming the norm, with the largest one we’ve ever seen peak just below 2 Tbps, the majority of attacks are still small and peaked below 500 Mbps (97.2%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16pVIsOgXI2wsHIRLv7naT/9a8c062f58e23a902eb79052e15a13f9/image17.png" />
            
            </figure><p>In Q4 ’21, larger attacks of all ranges above 500 Mbps saw massive decreases ranging from 35% to 57% for the larger 100+ Gbps attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3II1ZYySec9lPey8MzL4zu/c6faf71ae63de7801c7e90e7b21613d3/image1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by duration</h3>
      <a href="#network-layer-ddos-attacks-by-duration">
        
      </a>
    </div>
    <p><b>Most attacks remain under one hour in duration, reiterating the need for automated always-on DDoS mitigation solutions.</b></p><p>We measure the duration of an attack by recording the difference between when it is first detected by our systems as an attack and the last packet we see with that attack signature towards that specific target. In the last quarter of 2021, 98% of all network-layer attacks lasted less than one hour. This is very common as most of the attacks are short-lived. Even more so, a trend we’ve seen is that when the number of attacks increases, as in this quarter, their rate and duration decreases.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4rFMqwUHU7xE4JBesamLXP/2cc512dfab3837fa7e8b8431b4c4a529/image2.png" />
            
            </figure><p>Short attacks can easily go undetected, especially burst attacks that, within seconds, bombard a target with a significant number of packets, bytes, or requests. In this case, DDoS protection services that rely on manual mitigation by security analysis have no chance in mitigating the attack in time. They can only learn from it in their post-attack analysis, then deploy a new rule that filters the attack fingerprint and hope to catch it next time. Similarly, using an “on-demand” service, where the security team will redirect traffic to a DDoS provider during the attack, is also inefficient because the attack will already be over before the traffic routes to the on-demand DDoS provider.</p><p>It’s recommended that companies use <a href="https://www.cloudflare.com/ddos/">automated, always-on DDoS protection services</a> that analyze traffic and apply real-time fingerprinting fast enough to block short-lived attacks.</p>
    <div>
      <h2>Attack vectors</h2>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p><b>SYN floods remain attackers’ favorite method of attack, while attacks over SNMP saw a massive surge of almost 5,800% QoQ.</b></p><p>An attack vector is a term used to describe the method that the attacker uses to launch their DDoS attack, i.e., the IP protocol, packet attributes such as TCP flags, flooding method, and other criteria.</p><p>For the first time in 2021, the percentage of <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN flood</a> attacks significantly decreased. Throughout 2021, SYN floods accounted for 54% of all network-layer attacks on average. While still grabbing first place as the most frequent vector, its share dropped by 38% QoQ to 34%.</p><p>However, it was a close-run for SYN attacks and UDP attacks. A <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP flood</a> is a type of denial-of-service attack in which a large number of User Datagram Protocol (UDP) packets are sent to a targeted server with the aim of overwhelming that device’s ability to process and respond. Oftentimes, the firewall protecting the targeted server can also become exhausted as a result of UDP flooding, resulting in a denial-of-service to legitimate traffic. Attacks over UDP jumped from fourth place in Q3 ’21 to second place in Q4 ’21, with a share of 32% of all network-layer attacks — a 1,198% increase in QoQ.</p><p>In third place came the SNMP underdog that made a massive leap with its first time 2021 appearance in the top attack vectors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/lwbO8w5qu71J2zvndCsd4/b4c6479eb8f44192577a91c52f21585b/image7.png" />
            
            </figure>
    <div>
      <h2>Emerging threats</h2>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>When we look at emerging attack vectors — which helps us understand what new vectors attackers are deploying to launch attacks — we observe a massive spike in SNMP, MSSQL, and generic UDP-based DDoS attacks.</p><p>Both SNMP and MSSQL attacks are used to reflect and amplify traffic on the target by spoofing the target’s IP address as the source IP in the packets used to trigger the attack.</p><p>Simple Network Management Protocol (SNMP) is a UDP-based protocol that is often used to discover and manage network devices such as printers, switches, routers, and firewalls of a home or enterprise network on UDP well-known port 161. In an SNMP reflection attack, the attacker sends out a large number of SNMP queries while spoofing the source IP address in the packet as the targets to devices on the network that, in turn, reply to that target’s address. Numerous responses from the devices on the network results in the target network being DDoSed.</p><p>Similar to the SNMP amplification attack, the Microsoft SQL (MSSQL) attack is based on a technique that abuses the Microsoft SQL Server Resolution Protocol for the purpose of launching a reflection-based DDoS attack. The attack occurs when a <a href="https://en.wikipedia.org/wiki/Microsoft_SQL_Server">Microsoft SQL Server</a> responds to a client query or request, attempting to exploit the Microsoft SQL Server Resolution Protocol (MC-SQLR), listening on UDP port 1434.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7AtQXbK2LQzuoc0iLCHJpH/ab0c1aa0dfe437e5c53dee05ce75e078/unnamed-6.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by country</h3>
      <a href="#network-layer-ddos-attacks-by-country">
        
      </a>
    </div>
    <p><b>Attacks originating from Moldova quadrupled, making it the country with the highest percentage of network-layer DDoS activity.</b></p><p>When analyzing network-layer DDoS attacks, we bucket the traffic by the Cloudflare edge data center locations where the traffic was ingested, and not by the source IP. The reason for this is that, when attackers launch network-layer attacks, they can <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoof</a> the source IP address in order to obfuscate the attack source and introduce randomness into the attack properties, which can make it harder for simple DDoS protection systems to block the attack. Hence, if we were to derive the source country based on a spoofed source IP, we would get a spoofed country.</p><p>Cloudflare is able to overcome the challenges of spoofed IPs by displaying the attack data by the location of the Cloudflare data center in which the attack was observed. We are able to achieve geographical accuracy in our report because we have data centers in <a href="http://www.cloudflare.com/network">over 250 cities</a> around the world.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6aiutq5ecZcGT7DPuz29l8/679c95d7ce53e0242e31ee626ca4257e/image6.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1RVVsL8bBzMatBSldHMToC/9f07fc34b2fe114c4c598c2568457554/image16.png" />
            
            </figure><p>To view all regions and countries, check out the <a href="https://radar.cloudflare.com/notebooks/ddos-2021-q4#network-layer-ddos-attacks-by-country">interactive map</a>.</p>
    <div>
      <h2>Summary</h2>
      <a href="#summary">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet. A better Internet is one that is more secure, faster, and reliable for everyone — even in the face of DDoS attacks. As part of our mission, since 2017, we’ve been providing <a href="/unmetered-mitigation/">unmetered and unlimited DDoS protection</a> for free to all of our customers. Over the years, it has become increasingly easier for attackers to launch DDoS attacks. To counter the attacker’s advantage, we want to make sure that it is also easy and free for organizations of all sizes to protect themselves against DDoS attacks of all types.</p><p>Not using Cloudflare yet? <a href="https://dash.cloudflare.com/sign-up">Start now</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[RDDoS]]></category>
            <category><![CDATA[REvil]]></category>
            <category><![CDATA[VoIP]]></category>
            <category><![CDATA[Meris]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">19x0qmzhoEG72zCUibJD8Y</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Vivek Ganti</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS Attack Trends for Q3 2021]]></title>
            <link>https://blog.cloudflare.com/ddos-attack-trends-for-2021-q3/</link>
            <pubDate>Thu, 04 Nov 2021 12:58:40 GMT</pubDate>
            <description><![CDATA[ In Q3, 2021 we saw and mitigated record-setting HTTP DDoS attacks, terabit-strong network layer attacks, one of the largest botnets ever deployed (Meris), and more recently, ransom attacks on Voice-over-IP (VoIP) service providers. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>The third quarter of 2021 was a busy quarter for DDoS attackers. Cloudflare observed and mitigated <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">record-setting HTTP DDoS attacks</a>, <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/#:~:text=with%20a%20max%20peak%20of%20approximately%201.2%20Tbps">terabit-strong network-layer attacks</a>, one of the <a href="/meris-botnet/">largest botnets ever deployed (Meris)</a>, and more recently, <a href="/update-on-voip-attacks/">ransom DDoS attacks on voice over IP (VoIP) service providers</a> and their <a href="/attacks-on-voip-providers/">network infrastructure</a> around the world.</p><p>Here’s a summary of the trends observed in Q3 ‘21:</p>
    <div>
      <h4>Application-layer (L7) DDoS attack trends:</h4>
      <a href="#application-layer-l7-ddos-attack-trends">
        
      </a>
    </div>
    <ul><li><p>For the second consecutive quarter in 2021, US-based companies were the most targeted in the world.</p></li><li><p>For the first time in 2021, attacks on UK-based and Canada-based companies skyrocketed, making them the second and third most targeted countries, respectively.</p></li><li><p>Attacks on Computer Software, Gaming/ Gambling, IT, and Internet companies increased by an average of 573% compared to the previous quarter.</p></li><li><p>Meris, one of the most powerful botnets in history, aided in launching DDoS campaigns across various industries and countries.</p></li></ul>
    <div>
      <h4>Network-layer (L3/4) DDoS attack trends:</h4>
      <a href="#network-layer-l3-4-ddos-attack-trends">
        
      </a>
    </div>
    <ul><li><p>DDoS attacks increased by 44% worldwide compared to the previous quarter.</p></li><li><p>The Middle East and Africa recorded the largest average attack increase of approximately 80%.</p></li><li><p>Morocco recorded the highest DDoS activity in the third quarter globally — three out of every 100 packets were part of a DDoS attack.</p></li><li><p>While SYN and RST attacks remain the dominant attack method used by attackers, Cloudflare observed a surge in <a href="https://en.wikipedia.org/wiki/Datagram_Transport_Layer_Security">DTLS</a> amplification attacks — recording a 3,549% increase QoQ.</p></li><li><p>Attackers targeted (and continue to target going into the fourth quarter this year) VoIP service providers with massive DDoS attack campaigns in attempts to bring SIP infrastructure down.</p></li></ul><p><b>Note on avoiding data biases:</b> When we analyze attack trends, we calculate the “DDoS activity” rate, which is the percentage of attack traffic of the total traffic (attack + clean). When reporting application- and network-layer DDoS attack trends, we use this metric, which allows us to normalize the data points and avoid biases toward, for example, a larger Cloudflare data center that naturally handles more traffic and therefore also, possibly, more attacks compared to a smaller Cloudflare data center located elsewhere.</p>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, specifically HTTP DDoS attacks, are attacks that usually aim to disrupt a web server by making it unable to process legitimate user requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests and — in some cases — crash, resulting in degraded performance or an outage for legitimate users.</p>
    <div>
      <h4>Q3 ‘21 was the quarter of Meris — one of the most powerful botnets deployed to launch some of the largest HTTP DDoS attacks in history.</h4>
      <a href="#q3-21-was-the-quarter-of-meris-one-of-the-most-powerful-botnets-deployed-to-launch-some-of-the-largest-http-ddos-attacks-in-history">
        
      </a>
    </div>
    <p>This past quarter, we observed <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">one of the largest recorded HTTP attacks</a> — 17.2M rps (requests per second) — targeting a customer in the financial services industry. One of the most powerful botnets ever observed, called Meris, is known to be deployed in launching these attacks.</p><p>Meris (Latvian for plague) is a botnet behind recent DDoS attacks that have targeted networks or organizations around the world. The Meris botnet infected routers and other networking equipment manufactured by the Latvian company MikroTik. According to MikroTik’s blog, a vulnerability in the MikroTik RouterOS (that was patched after its detection back in 2018) was exploited in still unpatched devices to build a botnet and launch coordinated DDoS attacks by bad actors.</p><p>Similar to the <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai botnet</a> of 2016, Meris is one of the most powerful botnets recorded. While Mirai infected IoT devices with low computational power such as smart cameras, Meris is a growing swarm of networking infrastructure (such as routers and switches) with significantly higher processing power and data transfer capabilities than IoT devices — making them much more potent in causing harm at a larger scale. Be that as it may, Meris is an example of how the attack volume doesn’t necessarily guarantee damage to the target. As far as we know, Meris, despite its strength, was not able to cause significant impact or Internet outages. On the other hand, by tactically <a href="https://en.wikipedia.org/wiki/DDoS_attack_on_Dyn">targeting the DYN DNS service in 2016</a>, Mirai succeeded in causing significant Internet disruptions.</p>
    <div>
      <h3>Application-layer DDoS attacks by industry</h3>
      <a href="#application-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p><b>The tech and gaming industries were the most targeted industries in Q3 ‘21.</b></p><p>When we break down the application-layer attacks targeted by industry, Computer Software companies topped the charts. The Gaming/Gambling industry, also known to be regular targets of online attacks, was a close second, followed by the Internet and IT industries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/JPadNrIHstG6fM3Oxg6A7/22252c708bd8797a7d4be42348929b7a/image6-5.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by source country</h3>
      <a href="#application-layer-ddos-attacks-by-source-country">
        
      </a>
    </div>
    <p>To understand the origin of the HTTP attacks, we look at the geolocation of the source IP address belonging to the client that generated the attack HTTP requests. Unlike network-layer attacks, source IPs cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> in HTTP attacks. A high DDoS activity rate in a given country usually indicates the presence of botnets operating from within.</p><p>In the third quarter of 2021, most attacks originated from devices/servers in China, the United States, and India. While China remains in first place, the number of attacks originating from Chinese IPs actually decreased by 30% compared to the previous quarter. Almost one out of every 200 HTTP requests that originated from China was part of an HTTP DDoS attack.</p><p>Additionally, attacks from Brazil and Germany shrank by 38% compared to the previous quarter. Attacks originating from the US and Malaysia reduced by 40% and 45%, respectively.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ABqWAhmZCoG1eZ6RBNc9g/6a5bb8519048c6464df07a30876cdce7/image31.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by target country</h3>
      <a href="#application-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>In order to identify which countries are targeted the most by L7 attacks, we break down the DDoS activity by our customers’ billing countries.</p><p>For the second consecutive time this year, organizations in the United States were targeted the most by L7 DDoS attacks in the world, followed by those in the UK and Canada.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6T0eaxRVbixvISjvuFzNGG/79519d6af266fec7ee15e866df162c88/image10-7.png" />
            
            </figure>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application-layer attacks target the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service that end users are trying to access, <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer attacks</a> aim to overwhelm network infrastructure (such as in-line routers and servers) and the Internet link itself.</p>
    <div>
      <h4>Mirai-variant botnet strikes with a force of 1.2 Tbps.</h4>
      <a href="#mirai-variant-botnet-strikes-with-a-force-of-1-2-tbps">
        
      </a>
    </div>
    <p>Q3 ‘21 was also the quarter when the infamous Mirai made a resurgence. A Mirai-variant botnet launched over a dozen UDP- and TCP-based DDoS attacks that peaked multiple times above 1 Tbps, with a max peak of approximately 1.2 Tbps. These network-layer attacks targeted Cloudflare customers on the <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> and <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Spectrum</a> services. One of these targets was a major APAC-based Internet services, telecommunications, and hosting provider and the other was a gaming company. In all cases, the attacks were automatically detected and mitigated without human intervention.</p>
    <div>
      <h3>Network-layer DDoS attacks by month</h3>
      <a href="#network-layer-ddos-attacks-by-month">
        
      </a>
    </div>
    
    <div>
      <h4>September was, by far, the busiest month for attackers this year.</h4>
      <a href="#september-was-by-far-the-busiest-month-for-attackers-this-year">
        
      </a>
    </div>
    <p>Q3 ‘21 accounted for more than 38% of all attacks this year. September was the busiest month for attackers so far in 2021 — accounting for over 16% of all attacks this year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7rSRKsyrgPbljcg6EKZLAt/91e1b92d2ac5aa052a29936f7deca4e5/image20.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by attack rate</h3>
      <a href="#network-layer-ddos-attacks-by-attack-rate">
        
      </a>
    </div>
    <p><b>Most attacks are ‘small’ in size, but the number of larger attacks continues to rise.</b></p><p>There are different ways of measuring the size of a L3/4 DDoS attack. One is the volume of traffic it delivers, measured as the bit rate (specifically, terabits per second or gigabits per second). Another is the number of packets it delivers, measured as the packet rate (specifically, millions of packets per second).</p><p>Attacks with high bit rates attempt to cause a denial-of-service event by clogging the Internet link, while attacks with high packet rates attempt to overwhelm the servers, routers, or other in-line hardware appliances. Appliances dedicate a certain amount of memory and computation power to process each packet. Therefore, by bombarding it with many packets, the appliance can be left with no further processing resources. In such a case, packets are “dropped,” i.e., the appliance is unable to process them. For users, this results in service disruptions and denial of service.</p><p>The distribution of attacks by their size (in bit rate) and month is shown below. Interestingly enough, all attacks over 400 Gbps took place in August, including some of the largest attacks we have seen; multiple attacks peaked above 1 Tbps and reached as high as 1.2 Tbps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2gWdjNgw6dpUGm9dtwTl6m/7342a03af814d9530dfbb83a95c2fe58/image8-6.png" />
            
            </figure>
    <div>
      <h4>Packet rate</h4>
      <a href="#packet-rate">
        
      </a>
    </div>
    <p>As seen in previous quarters, the majority of attacks observed in Q3 ‘21 were relatively small in size — nearly 89% of all attacks peaked below 50K packets per second (pps). While a majority of attacks are smaller in size, we observed that the number of larger attacks is increasing QoQ — attacks that peaked above 10M pps increased by 142% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6l8ybFgUYfXl660WkGXssz/be1059d15032c3add6a75d125a1bb2cb/image16-1.png" />
            
            </figure><p>Attacks of packet rates ranging from 1-10 million packets per second increased by 196% compared to the previous quarter. This trend is similar to what we observed the last quarter as well, suggesting that larger attacks are increasing.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7dkSGlex98BjHJxLGMXc58/a91d6928dadb6f9e6aba034947d648b9/image22-1.png" />
            
            </figure>
    <div>
      <h4>Bit rate</h4>
      <a href="#bit-rate">
        
      </a>
    </div>
    <p>From the bit rate perspective, a similar trend was observed — a total of 95.4% of all attacks peaked below 500 Mbps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2O1tTLdcoHzRwGSSaj5Kl0/367783ca32926c29b7b9d619f219b403/image11-4.png" />
            
            </figure><p>QoQ data shows that the number of attacks of sizes ranging from 500 Mbps to 10 Gbps saw massive increases of 126% to 289% compared to the previous quarter. Attacks over 100 Gbps decreased by nearly 14%.</p><p>The number of larger bitrate attacks increased QoQ (with the one exception being attacks over 100 Gbps, which decreased by nearly 14% QoQ). In particular, attacks ranging from 500 Mbps to 1 Gbps saw a surge of 289% QoQ and those ranging from 1 Gbps to 100 Gbps surged by 126%.</p><p>This trend once again illustrates that, while (in general) a majority of the attacks are indeed smaller, the number of “larger” attacks is increasing. This suggests that more attackers are garnering more resources to launch larger attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ktaoC9RxCLuAKOxdrHZHx/ae793021eb74f2a9f10be3c14212926d/image2-3.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by duration</h3>
      <a href="#network-layer-ddos-attacks-by-duration">
        
      </a>
    </div>
    
    <div>
      <h4>Most attacks remain under one hour in duration, reiterating the need for automated always-on DDoS mitigation solutions.</h4>
      <a href="#most-attacks-remain-under-one-hour-in-duration-reiterating-the-need-for-automated-always-on-ddos-mitigation-solutions">
        
      </a>
    </div>
    <p>We measure the duration of an attack by recording the difference between when it is first detected by our systems as an attack and the last packet we see with that attack signature. As in previous quarters, most of the attacks are short-lived. To be specific, 94.4% of all DDoS attacks lasted less than an hour. On the other end of the axis, attacks over 6 hours accounted for less than 0.4% in Q3 ‘21, and we did see a QoQ increase of 165% in attacks ranging 1-2 hours. Be that as it may, a longer attack does not necessarily mean a more dangerous one.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4bpCM8AFhJhVr2SrzJLLY2/f46527826d0d7aa0b866ca343d641b96/image23-1.png" />
            
            </figure><p>Short attacks can easily go undetected, especially burst attacks that, within seconds, bombard a target with a significant number of packets, bytes, or requests. In this case, DDoS protection services that rely on manual mitigation by security analysis have no chance in mitigating the attack in time. They can only learn from it in their post-attack analysis, then deploy a new rule that filters the attack fingerprint and hope to catch it next time. Similarly, using an “on-demand” service, where the security team will redirect traffic to a DDoS provider during the attack, is also inefficient because the attack will already be over before the traffic routes to the on-demand DDoS provider.</p><p>Cloudflare recommends that companies use automated, always-on DDoS protection services that analyze traffic and apply real-time fingerprinting fast enough to block the short-lived attacks. Cloudflare analyzes traffic out-of-path, ensuring that DDoS mitigation does not add any latency to legitimate traffic, even in always-on deployments. Once an attack is identified, our autonomous edge DDoS protection system (<a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">dosd</a>) generates and applies a dynamically crafted rule with a real-time signature. Pre-configured firewall rules comprising allow/deny lists for known traffic patterns take effect immediately.</p>
    <div>
      <h3>Attack vectors</h3>
      <a href="#attack-vectors">
        
      </a>
    </div>
    
    <div>
      <h4>SYN floods remain attackers’ favorite method of attack, while attacks over DTLS saw a massive surge — 3,549% QoQ.</h4>
      <a href="#syn-floods-remain-attackers-favorite-method-of-attack-while-attacks-over-dtls-saw-a-massive-surge-3-549-qoq">
        
      </a>
    </div>
    <p>An attack vector is the term used to describe the method that the attacker utilizes in their attempt to cause a denial-of-service event.</p><p>As observed in previous quarters, attacks utilizing SYN floods remain the most popular method used by attackers.</p><p>A <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN flood</a> attack is a DDoS attack that works by exploiting the very foundation of the TCP protocol — the stateful TCP connection between a client and a server as a part of the 3-way TCP handshake. As a part of the TCP handshake, the client sends an initial connection request packet with a synchronize flag (SYN). The server responds with a packet that contains a synchronized acknowledgment flag (SYN-ACK). Finally, the client responds with an acknowledgment (ACK) packet. At this point, a connection is established and data can be exchanged until the connection is closed. This stateful process can be abused by attackers to cause denial-of-service events.</p><p>By repeatedly sending SYN packets, the attacker attempts to overwhelm a server or the router’s connection table that tracks the state of TCP connections. The server replies with a SYN-ACK packet, allocates a certain amount of memory for each given connection, and falsely waits for the client to respond with the final ACK. Given a sufficient number of connections occupying the server’s memory, the server is unable to allocate further memory for legitimate clients, causing the server to crash or preventing it from handling legitimate client connections, i.e., a denial-of-service event.</p><p>More than half of all attacks observed over our network were SYN floods. This was followed by RST, ACK, and UDP floods.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Vo4muJmB01yU0Qh88Ni35/1605e4b188335f8433a57368c39424f1/image4-3.png" />
            
            </figure>
    <div>
      <h3>Emerging threats</h3>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>While SYN and RST floods remain popular overall, when we look at emerging attack vectors — which helps us understand what new vectors attackers are deploying to launch attacks — we observed a massive spike in <a href="https://en.wikipedia.org/wiki/Datagram_Transport_Layer_Security">DTLS</a> amplification attacks. DTLS floods increased by 3,549% QoQ.</p><p>Datagram Transport Layer Security (DTLS) is a protocol similar to Transport Layer Security (<a href="https://www.cloudflare.com/learning/ssl/transport-layer-security-tls/">TLS</a>) designed to provide similar security guarantees to connectionless datagram-based applications to prevent message forgery, eavesdropping, or tampering. DTLS, being connectionless, is specifically useful for establishing VPN connections, without the <a href="https://openvpn.net/faq/what-is-tcp-meltdown/">TCP meltdown</a> problem. The application is responsible for reordering and other connection properties.</p><p>Just as with most UDP-based protocols, DTLS is spoofable and being used by attackers to generate reflection amplification attacks to overwhelm network gateways.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/73mUxKAOpch92qdR7CR6ZJ/530b32f08bbf9f4adae6f31e717f7197/image18-1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by country</h3>
      <a href="#network-layer-ddos-attacks-by-country">
        
      </a>
    </div>
    <p><b>While Morocco topped the charts in terms of the highest network attack rate observed, Asian countries closely followed.</b></p><p>When analyzing network-layer DDoS attacks, we bucket the traffic by the Cloudflare edge data center locations where the traffic was ingested, and not by the source IP. The reason for this is that, when attackers launch network-layer attacks, they can <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoof</a> the source IP address in order to obfuscate the attack source and introduce randomness into the attack properties, which may make it harder for simple DDoS protection systems to block the attack. Hence, if we were to derive the source country based on a spoofed source IP, we would get a spoofed country.</p><p>Cloudflare is able to overcome the challenges of spoofed IPs by displaying the attack data by the location of the Cloudflare data center in which the attack was observed. We are able to achieve geographical accuracy in our report because we have data centers in <a href="http://www.cloudflare.com/network">over 250 cities</a> around the world.</p>
    <div>
      <h4>Worldwide</h4>
      <a href="#worldwide">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2mpDYFQKy9GOIoJkGbnntr/d38114debdb65a05ef4e9b51e8570464/image12-7.png" />
            
            </figure><p>To view all regions and countries, check out the <a href="https://radar.cloudflare.com/notebooks/ddos-2021-q3#network-layer-ddos-attacks-by-country">Radar DDoS Report dashboard’s interactive map</a>.</p>
    <div>
      <h3>A note on recent attacks on voice over-IP service providers — and ransom DDoS attacks</h3>
      <a href="#a-note-on-recent-attacks-on-voice-over-ip-service-providers-and-ransom-ddos-attacks">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6EzEvtPaswPIEik7EsnQZq/327aba3e45924d43cf71dd629436bd88/image25-1.png" />
            
            </figure><p>We <a href="/attacks-on-voip-providers/">recently reported</a> and <a href="/update-on-voip-attacks/">provided an update</a> on the surge in DDoS attacks on VoIP service providers — some of who have also received ransom threats. As of early Q4 ‘21, this attack campaign is still ongoing and current. At Cloudflare, we continue to onboard VoIP service providers and shield their applications and networks against attacks.</p><p>HTTP attacks against <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api-gateway/">API gateways</a> and the corporate websites of the providers have been combined with network-layer and transport-layer attacks against VoIP infrastructures.</p><p>Examples include:</p><ol><li><p><b>TCP floods targeting stateful firewalls:</b> These are being used in “trial-and-error” type attacks. They are not very effective against telephony infrastructure specifically (because it is mostly UDP) but very effective at overwhelming stateful firewalls.</p></li><li><p><b>UDP floods targeting SIP infrastructure:</b> Floods of UDP traffic that have no well-known fingerprint, aimed at critical VoIP services. Generic floods like this may look like legitimate traffic to unsophisticated filtering systems.</p></li><li><p><b>UDP reflection targeting SIP infrastructure:</b> These methods, when targeted at SIP or RTP services, can easily overwhelm Session Border Controllers (SBCs) and other telephony infrastructure. The attacker seems to learn enough about the target’s infrastructure to target such services with high precision.</p></li><li><p><b>SIP protocol-specific attacks:</b> Attacks at the application layer are of particular concern because of the higher resource cost of generating application errors versus filtering on network devices.</p></li></ol><p>Organizations also continue to receive ransom notes that threaten attacks in exchange for bitcoin. <a href="https://www.cloudflare.com/learning/security/ransomware/what-is-ransomware/">Ransomware</a> and <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">ransom DDoS</a> attacks, for the fourth consecutive quarter, continue to be a germane threat to organizations all over the world.</p><p>Cloudflare products close off several threat vectors that can lead to a ransomware infection and ransom DDoS attacks:</p><ul><li><p>Cloudflare <a href="https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/">DNS filtering</a> blocks unsafe websites.</p></li><li><p>Cloudflare <a href="https://www.cloudflare.com/teams/browser-isolation/">Browser Isolation</a> prevents drive-by downloads and other browser-based attacks.</p></li><li><p>A <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> architecture can help <a href="https://www.cloudflare.com/learning/security/ransomware/how-to-prevent-ransomware/">prevent ransomware from spreading</a> within a network.</p></li><li><p><a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> protects organizations’ networks against <a href="https://www.cloudflare.com/learning/ddos/how-to-prevent-ddos-attacks/">DDoS attacks</a> using BGP route redistribution — without impacting latency.</p></li></ul>
    <div>
      <h2>Helping build a better Internet</h2>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>Cloudflare was founded on the mission to help build a better Internet. And part of that mission is to build an Internet where the impact of DDoS attacks is a thing of the past. Over the last 10 years, we have been unwavering in our efforts to protect our customers’ Internet properties from DDoS attacks of any size or kind. In <a href="/unmetered-mitigation/">2017</a>, we announced <a href="https://www.cloudflare.com/ddos/">unmetered DDoS protection</a> for free — as part of every Cloudflare service and plan, including the Free plan — to make sure every organization can stay protected and available. Organizations big and small have joined Cloudflare over the past several years to ensure their websites, applications, and networks are secure from DDoS attacks, and remain fast and reliable.</p><p>But cyberattacks come in various forms, not just DDoS attacks. Malicious bots, ransomware attacks, email phishing, and VPN / remote access hacks are some many attacks that continue to plague organizations of all sizes globally. These attacks target websites, APIs, applications, and entire networks — which form the lifeblood of any online business. That is why the <a href="https://www.cloudflare.com/security/">Cloudflare security portfolio</a> accounts for everything and everyone connected to the Internet.</p><p>To learn more about <a href="http://www.cloudflare.com/ddos">Cloudflare DDoS</a> or our <a href="https://www.cloudflare.com/network-services/">network services</a>, <a href="http://dash.cloudflare.com">create an account</a> or <a href="http://www.cloudflare.com/enterprise">reach out to us</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[RDDoS]]></category>
            <category><![CDATA[REvil]]></category>
            <category><![CDATA[VoIP]]></category>
            <category><![CDATA[Meris]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">7kwFdWfVmfPJD0WyuH6Bqu</guid>
            <dc:creator>Vivek Ganti</dc:creator>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
    </channel>
</rss>