
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Mon, 06 Apr 2026 12:44:59 GMT</lastBuildDate>
        <item>
            <title><![CDATA[An Internet traffic analysis during Iran's April 13, 2024, attack on Israel]]></title>
            <link>https://blog.cloudflare.com/internet-traffic-analysis-iran-israel-april-attack/</link>
            <pubDate>Sun, 14 Apr 2024 21:23:15 GMT</pubDate>
            <description><![CDATA[ On April 13, 2024, Iran launched a retaliatory attack on Israel. We examined its potential impact on Internet traffic and attacks. While there were some shifts in traffic, we haven't observed any large-scale cyberattacks on Israeli domains protected by Cloudflare. ]]></description>
            <content:encoded><![CDATA[ <p><i>(UPDATED on April 15, 2024, with information regarding the Palestinian territories.)</i></p><p>As <a href="https://en.wikipedia.org/wiki/2024_Iranian_strikes_in_Israel">news came</a> on Saturday, April 13, 2024, that Iran was launching a coordinated retaliatory attack on Israel, we took a closer look at the potential impact on Internet traffic and attacks. So far, we have seen some traffic shifts in both Israel and Iran, but we haven’t seen a coordinated large cyberattack on Israeli domains protected by Cloudflare.</p><p>First, let’s discuss general Internet traffic patterns. Following <a href="https://www.reuters.com/world/middle-east/iran-launches-drones-israel-retaliatory-attack-live-coverage-2024-04-13/">reports</a> of attacks with drones, cruise missiles, and ballistic missiles, confirmed by Israeli and US authorities, Internet traffic in <a href="https://radar.cloudflare.com/il">Israel</a> surged after 02:00 local time on Saturday, April 13 (23:00 UTC on April 12), peaking at 75% higher than in the previous week around 02:30 (23:30 UTC) as people sought news updates. This traffic spike was predominantly driven by mobile device usage, accounting for 62% of all traffic from Israel at that time. Traffic remained higher than usual during Sunday.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1KY6IvR0UPVYLfVZNp4lvg/274dacd4956e0f000918b5846469ea2e/cloudflare-radar-traffic-trends-xy-20240414-20240414--3-.png" />
            
            </figure><p>Around that time, at 02:00 local time (23:00 UTC), the IDF (Israel Defense Forces) <a href="https://x.com/IDF/status/1779280803677036803">posted on X</a> that sirens were sounding across Israel because of an imminent attack from Iran.</p><blockquote><p>🚨Sirens sounding across Israel🚨 <a href="https://t.co/BuDasagr10">pic.twitter.com/BuDasagr10</a></p><p>— Israel Defense Forces (@IDF) <a href="https://twitter.com/IDF/status/1779280803677036803?ref_src=twsrc%5Etfw">April 13, 2024</a></p></blockquote><p><i>(April 15 UPDATE: the Palestinian territories related part).</i> At around the same time, 01:25 local time (22:45 UTC), when the sirens were sounding in Israel, we observed not an increase, but a clear drop in traffic in <a href="https://radar.cloudflare.com/ps">Palestinian territories</a>. The noticeable drop was seen in all of the Palestinian governorates, although it was a bigger drop in the West Bank, than in the <a href="/internet-traffic-patterns-in-israel-and-palestine-following-the-october-2023-attacks">Gaza Strip</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6BeE2T4sgdeVX3zSgYnL5j/b94ba54e7cd2951bd5a3ba031b142f58/cloudflare-radar-traffic-trends-xy-20240415-20240415--1-.png" />
            
            </figure><p>Usually, based on our past observations, drops in traffic unrelated to connectivity issues can occur when people pause their online activities for some reason (an <a href="/total-eclipse-internet-traffic-impacts-mexico-us-canada">eclipse</a> or <a href="/one-year-of-war-in-ukraine">war</a>, for example) or turn to television for news updates instead of the Internet (common during <a href="/pt-br/how-the-brazilian-presidential-elections-affected-internet-traffic">election days</a> when TVs broadcast the latest exit polls).</p><p>Here’s the noticeable HTTP requests drop in Hebron, one of the most populated states of the Palestinian territories, part of the West Bank. The noticeable drops in the blue line from the previous week are related to the <a href="/how-ramadan-shows-up-in-internet-trends/">Ramadan</a>, and the <a href="https://en.wikipedia.org/wiki/Iftar">Iftar,</a> the first meal after sunset that breaks the fast and often also a family or community event. Ramadan ended on Tuesday, April 9, 2024.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2zZviojHzyAXruFRL052Or/1d7deaca4a43bfed8eacc5cb96ed418b/Screenshot-2024-04-15-at-11.03.02.png" />
            
            </figure><p>Meanwhile, in <a href="https://radar.cloudflare.com/ir">Iran</a>, there has been a noticeable decline in traffic over the past few days in the early morning hours, around 04:30 local time (01:00 UTC), as compared to the previous week. However, this decline appears to be linked to the conclusion of Ramadan, which ended April 9. As we have <a href="/easter-passover-ramadan-internet-trends-2023">written</a> <a href="/how-ramadan-shows-up-in-internet-trends/">before</a>, during Ramadan, there is typically an increase in traffic around 04:00 in most Muslim countries for <a href="https://en.wikipedia.org/wiki/Suhur">Suhur</a>, the pre-dawn meal. Nevertheless, traffic was higher in Iran early in the morning of Sunday, April 14 than the previous day, between 02:30 local time (23:00 UTC on April 13) and 07:00 (03:30 UTC).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3RpGY2Tk4Rmr6RlhPpdYfI/200c39ebdf43320863832be5aa4175ef/cloudflare-radar-traffic-trends-xy-20240414-20240414--2-.png" />
            
            </figure><p>When analyzing <a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">application layer</a> attacks, we haven’t observed any significant changes in those targeting Israel over the past few days. However, over the past month, the Government Administration sector emerged as the most targeted industry, with blocked DDoS requests accounting for 46% of all traffic directed towards it.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2MuXBOuFapDbKiVye3g2yE/9117dc3af573b4a711b21a8f8cf1d12c/Screenshot-2024-04-14-at-08.08.21.png" />
            
            </figure><p>Based on Cloudflare data, we have not yet seen a coordinated cyberattack campaign targeting Israel. However, we saw a <a href="/cyber-attacks-in-the-israel-hamas-war">clear uptick in attacks</a> back in October 2023, after the Israel-Hamas war started, as we noted in a blog post at that time.</p><p>We will continue to monitor the situation in the Middle East, and you can keep track of by country up-to-date trends visiting <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>, and following us on social media at <a href="https://twitter.com/CloudflareRadar">@CloudflareRadar</a> (X), <a href="https://noc.social/@cloudflareradar">https://noc.social/@cloudflareradar</a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com">radar.cloudflare.com</a> (Bluesky).</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Israel]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">3Y70Ro8FCFFV0JdO4k4X8U</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2023 Q4]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-2023-q4/</link>
            <pubDate>Tue, 09 Jan 2024 14:00:25 GMT</pubDate>
            <description><![CDATA[ Welcome to the sixteenth edition of Cloudflare’s DDoS Threat Report. This edition covers DDoS trends and key findings for the fourth and final quarter of the year 2023, complete with a review of major trends throughout the year ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1dLcyHxuJpOmtuilCdmlMv/226d5f6d0704e7ef443e924750799873/image14-1.png" />
            
            </figure><p>Welcome to the sixteenth edition of Cloudflare’s DDoS Threat Report. This edition covers DDoS trends and key findings for the fourth and final quarter of the year 2023, complete with a review of major trends throughout the year.</p>
    <div>
      <h2>What are DDoS attacks?</h2>
      <a href="#what-are-ddos-attacks">
        
      </a>
    </div>
    <p>DDoS attacks, or <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">distributed denial-of-service attacks</a>, are a type of cyber attack that aims to disrupt websites and online services for users, making them unavailable by overwhelming them with more traffic than they can handle. They are similar to car gridlocks that jam roads, preventing drivers from getting to their destination.</p><p>There are three main types of DDoS attacks that we will cover in this report. The first is an <a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/">HTTP request</a> intensive DDoS attack that aims to overwhelm HTTP servers with more requests than they can handle to cause a denial of service event. The second is an <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-packet/">IP packet</a> intensive DDoS attack that aims to overwhelm in-line appliances such as routers, firewalls, and servers with more packets than they can handle. The third is a bit-intensive attack that aims to saturate and clog the Internet link causing that ‘gridlock’ that we discussed. In this report, we will highlight various techniques and insights on all three types of attacks.</p><p>Previous editions of the report can be found <a href="/tag/ddos-reports">here</a>, and are also available on our interactive hub, <a href="https://radar.cloudflare.com/reports?q=DDoS">Cloudflare Radar</a>. Cloudflare Radar showcases global Internet traffic, attacks, and technology trends and insights, with drill-down and filtering capabilities for zooming in on insights of specific countries, industries, and service providers. Cloudflare Radar also offers a <a href="https://developers.cloudflare.com/radar/">free API</a> allowing academics, data sleuths, and other web enthusiasts to investigate Internet usage across the globe.</p><p>To learn how we prepare this report, refer to our <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/">Methodologies</a>.</p>
    <div>
      <h2>Key findings</h2>
      <a href="#key-findings">
        
      </a>
    </div>
    <ol><li><p>In Q4, we observed a 117% year-over-year increase in network-layer DDoS attacks, and overall increased DDoS activity targeting retail, shipment and public relations websites during and around Black Friday and the holiday season.</p></li><li><p>In Q4, DDoS attack traffic targeting Taiwan registered a 3,370% growth, compared to the previous year, amidst the upcoming general election and reported tensions with China. The percentage of DDoS attack traffic targeting Israeli websites grew by 27% quarter-over-quarter, and the percentage of DDoS attack traffic targeting Palestinian websites grew by 1,126% quarter-over-quarter — as the military conflict between Israel and Hamas continues.</p></li><li><p>In Q4, there was a staggering 61,839% surge in DDoS attack traffic targeting Environmental Services websites compared to the previous year, coinciding with the 28th United Nations Climate Change Conference (COP 28).</p></li></ol><p>For an in-depth analysis of these key findings and additional insights that could redefine your understanding of current cybersecurity challenges, read on!</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2UZbT93S5MJZLC4lm3oEFA/2beb24271129aabf3ca98b66f69f92cb/image1.png" />
            
            </figure><p>Illustration of a DDoS attack</p>
    <div>
      <h2>Hyper-volumetric HTTP DDoS attacks</h2>
      <a href="#hyper-volumetric-http-ddos-attacks">
        
      </a>
    </div>
    <p>2023 was the year of uncharted territories. DDoS attacks reached new heights — in size and sophistication. The wider Internet community, including Cloudflare, faced a persistent and deliberately engineered campaign of thousands of hyper-volumetric DDoS attacks at never before seen rates.</p><p>These attacks were highly complex and exploited an <a href="/technical-breakdown-http2-rapid-reset-ddos-attack">HTTP/2 vulnerability</a>. Cloudflare developed purpose-built technology to mitigate the vulnerability’s effect and worked with others in the industry to responsibly disclose it.</p><p>As part of this DDoS campaign, in Q3 our systems mitigated the largest attack we’ve ever seen — 201 million requests per second (rps). That’s almost 8 times larger than our previous 2022 record of 26 million rps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/49CXz2EGW8rzgjsaRcSFyT/f6f06108590316e1a3bdf0e0f69dbc89/pasted-image-0.png" />
            
            </figure><p>Largest HTTP DDoS attacks as seen by Cloudflare, by year</p>
    <div>
      <h2>Growth in network-layer DDoS attacks</h2>
      <a href="#growth-in-network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>After the hyper-volumetric campaign subsided, we saw an unexpected drop in HTTP DDoS attacks. Overall in 2023, our automated defenses mitigated over 5.2 million HTTP DDoS attacks consisting of over 26 trillion requests. That averages at 594 HTTP DDoS attacks and 3 billion mitigated requests every hour.</p><p>Despite these astronomical figures, the amount of HTTP DDoS attack requests actually declined by 20% compared to 2022. This decline was not just annual but was also observed in 2023 Q4 where the number of HTTP DDoS attack requests decreased by 7% YoY and 18% QoQ.</p><p>On the network-layer, we saw a completely different trend. Our automated defenses mitigated 8.7 million network-layer DDoS attacks in 2023. This represents an 85% increase compared to 2022.</p><p>In 2023 Q4, Cloudflare’s automated defenses mitigated over 80 petabytes of network-layer attacks. On average, our systems auto-mitigated 996 network-layer DDoS attacks and 27 terabytes every hour. The number of network-layer DDoS attacks in 2023 Q4 increased by 175% YoY and 25% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Da5bEJbgh9FT5UQb6qPWo/4cf631e2688ca806bcbe996a357e5d5f/HTTP-and-Network-layer-DDoS-attacks-by-quarter-1.png" />
            
            </figure><p>HTTP and Network-layer DDoS attacks by quarter</p>
    <div>
      <h3>DDoS attacks increase during and around COP 28</h3>
      <a href="#ddos-attacks-increase-during-and-around-cop-28">
        
      </a>
    </div>
    <p>In the final quarter of 2023, the landscape of cyber threats witnessed a significant shift. While the Cryptocurrency sector was initially leading in terms of the volume of HTTP DDoS attack requests, a new target emerged as a primary victim. The Environmental Services industry experienced an unprecedented surge in HTTP DDoS attacks, with these attacks constituting half of all its HTTP traffic. This marked a staggering 618-fold increase compared to the previous year, highlighting a disturbing trend in the cyber threat landscape.</p><p>This surge in cyber attacks coincided with COP 28, which ran from November 30th to December 12th, 2023. The conference was a pivotal event, signaling what many considered the <a href="https://unfccc.int/news/cop28-agreement-signals-beginning-of-the-end-of-the-fossil-fuel-era">'beginning of the end' for the fossil fuel era</a>. It was observed that in the period leading up to COP 28, there was a noticeable spike in HTTP attacks targeting Environmental Services websites. This pattern wasn't isolated to this event alone.</p><p>Looking back at historical data, particularly during COP 26 and COP 27, as well as other UN environment-related resolutions or announcements, a similar pattern emerges. Each of these events was accompanied by a corresponding increase in cyber attacks aimed at Environmental Services websites.</p><p>In February and March 2023, significant environmental events like the UN's resolution on <a href="https://www.unep.org/news-and-stories/story/un-resolution-billed-turning-point-climate-justice">climate justice</a> and the launch of United Nations Environment Programme’s <a href="https://www.unep.org/news-and-stories/press-release/largest-river-and-wetland-restoration-initiative-history-launched-un">Freshwater Challenge</a> potentially heightened the profile of environmental websites, possibly correlating with an increase in attacks on these sites​​​​.</p><p>This recurring pattern underscores the growing intersection between environmental issues and cyber security, a nexus that is increasingly becoming a focal point for attackers in the digital age.</p>
    <div>
      <h2>DDoS attacks and Iron Swords</h2>
      <a href="#ddos-attacks-and-iron-swords">
        
      </a>
    </div>
    <p>It’s not just UN resolutions that trigger DDoS attacks. Cyber attacks, and particularly DDoS attacks, have long been a tool of war and disruption. We witnessed an increase in DDoS attack activity in the Ukraine-Russia war, and now we’re also witnessing it in the Israel-Hamas war. We first reported the cyber activity in our report <a href="/cyber-attacks-in-the-israel-hamas-war/">Cyber attacks in the Israel-Hamas war</a>, and we continued to monitor the activity throughout Q4.</p><p>Operation “Iron Swords” is the <a href="https://en.wikipedia.org/wiki/2023_Israel%E2%80%93Hamas_war#Israeli_response">military offensive launched by Israel against Hamas</a> following the <a href="https://en.wikipedia.org/wiki/2023_Hamas-led_attack_on_Israel">Hamas-led 7 October attack</a>. During this ongoing armed conflict, we continue to see DDoS attacks targeting both sides.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/31johknCeQ8F1pbczj7Neq/2f91e03e355a539043c734e7c5140ff1/pasted-image-0--1-.png" />
            
            </figure><p>DDoS attacks targeting Israeli and Palestinian websites, by industry</p><p>Relative to each region's traffic, the Palestinian territories was the second most attacked region by HTTP DDoS attacks in Q4. Over 10% of all HTTP requests towards Palestinian websites were DDoS attacks, a total of 1.3 billion DDoS requests — representing a 1,126% increase in QoQ. 90% of these DDoS attacks targeted Palestinian Banking websites. Another 8% targeted Information Technology and Internet platforms.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6uYrGNHSPfp3nEmFkhTGpa/317d1cb4ead40504677565360d836641/pasted-image-0--2-.png" />
            
            </figure><p>Top attacked Palestinian industries</p><p>Similarly, our systems automatically mitigated over 2.2 billion HTTP DDoS requests targeting Israeli websites. While 2.2 billion represents a decrease compared to the previous quarter and year, it did amount to a larger percentage out of the total Israel-bound traffic. This normalized figure represents a 27% increase QoQ but a 92% decrease YoY. Notwithstanding the larger amount of attack traffic, Israel was the 77th most attacked region relative to its own traffic. It was also the 33rd most attacked by total volume of attacks, whereas the Palestinian territories was 42nd.</p><p>Of those Israeli websites attacked, Newspaper &amp; Media were the main target — receiving almost 40% of all Israel-bound HTTP DDoS attacks. The second most attacked industry was the Computer Software industry. The Banking, Financial Institutions, and Insurance (BFSI) industry came in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2N6E8K9fZJZUFID7t0liAB/c0e58eb814bd8f6ee51319c6fa9ac97d/pasted-image-0--3-.png" />
            
            </figure><p>Top attacked Israeli industries</p><p>On the network layer, we see the same trend. Palestinian networks were targeted by 470 terabytes of attack traffic — accounting for over 68% of all traffic towards Palestinian networks. Surpassed only by China, this figure placed the Palestinian territories as the second most attacked region in the world, by network-layer DDoS attack, relative to all Palestinian territories-bound traffic. By absolute volume of traffic, it came in third. Those 470 terabytes accounted for approximately 1% of all DDoS traffic that Cloudflare mitigated.</p><p>Israeli networks, though, were targeted by only 2.4 terabytes of attack traffic, placing it as the 8th most attacked country by network-layer DDoS attacks (normalized). Those 2.4 terabytes accounted for almost 10% of all traffic towards Israeli networks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Fk4fxxDf20Wt6BmMTDPNq/bf0d999fc9f6b4ca98eb3f4c5b819432/pasted-image-0--5-.png" />
            
            </figure><p>Top attacked countries</p><p>When we turned the picture around, we saw that 3% of all bytes that were ingested in our Israeli-based data centers were network-layer DDoS attacks. In our Palestinian-based data centers, that figure was significantly higher — approximately 17% of all bytes.</p><p>On the application layer, we saw that 4% of HTTP requests originating from Palestinian IP addresses were DDoS attacks, and almost 2% of HTTP requests originating from Israeli IP addresses were DDoS attacks as well.</p>
    <div>
      <h2>Main sources of DDoS attacks</h2>
      <a href="#main-sources-of-ddos-attacks">
        
      </a>
    </div>
    <p>In the third quarter of 2022, China was the largest source of HTTP DDoS attack traffic. However, since the fourth quarter of 2022, the US took the first place as the largest source of HTTP DDoS attacks and has maintained that undesirable position for five consecutive quarters. Similarly, our data centers in the US are the ones ingesting the most network-layer DDoS attack traffic — over 38% of all attack bytes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1LQRkEFpGgYH1o7Ld5m3LH/6e3452323058567ed6e244024644a379/imageLikeEmbed.png" />
            
            </figure><p>HTTP DDoS attacks originating from China and the US by quarter</p><p>Together, China and the US account for a little over a quarter of all HTTP DDoS attack traffic in the world. Brazil, Germany, Indonesia, and Argentina account for the next twenty-five percent.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4OJH3XgpVKTtd93Lhv9pQd/1a4d6d5fb7d6349609c62c9ed5524471/pasted-image-0--6-.png" />
            
            </figure><p>Top source of HTTP DDoS attacks</p><p>These large figures usually correspond to large markets. For this reason, we also normalize the attack traffic originating from each country by comparing their outbound traffic. When we do this, we often get small island nations or smaller market countries that a disproportionate amount of attack traffic originates from. In Q4, 40% of Saint Helena’s outbound traffic were HTTP DDoS attacks — placing it at the top. Following the ‘<a href="https://en.wikipedia.org/wiki/Saint_Helena">remote volcanic tropical island</a>’, Libya came in second, <a href="https://en.wikipedia.org/wiki/Eswatini">Swaziland</a> (also known as Eswatini) in third. Argentina and Egypt follow in fourth and fifth place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4hyX9SLpTS3ncRB5QZnR9R/447df8e913314ab249c0d5a430efcdcc/pasted-image-0--7-.png" />
            
            </figure><p>Top source of HTTP DDoS attacks with respect to each country’s traffic</p><p>On the network layer, Zimbabwe came in first place. Almost 80% of all traffic we ingested in our Zimbabwe-based data center was malicious. In second place, Paraguay, and Madagascar in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7sln1Hbv1Wz7j4oCCL9XRA/56f1f5fa42ab7846b0a0dc33c796afd0/pasted-image-0--8-.png" />
            
            </figure><p>Top source of Network-layer DDoS attacks with respect to each country’s traffic</p>
    <div>
      <h2>Most attacked industries</h2>
      <a href="#most-attacked-industries">
        
      </a>
    </div>
    <p>By volume of attack traffic, Cryptocurrency was the most attacked industry in Q4. Over 330 billion HTTP requests targeted it. This figure accounts for over 4% of all HTTP DDoS traffic for the quarter. The second most attacked industry was Gaming &amp; Gambling. These industries are known for being coveted targets and attract a lot of traffic and attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5UoOV6PIx9DqJ0monxhfwu/20411132ba585c3314941bc2aec93e43/pasted-image-0--9-.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks</p><p>On the network layer, the Information Technology and Internet industry was the most attacked — over 45% of all network-layer DDoS attack traffic was aimed at it. Following far behind were the Banking, Financial Services and Insurance (BFSI), Gaming &amp; Gambling, and Telecommunications industries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/tlGK3k5YutHhSEbvm1va0/5842c447cbb6c8dd18630bbb0c63db1f/pasted-image-0--10-.png" />
            
            </figure><p>Top industries targeted by Network-layer DDoS attacks</p><p>To change perspectives, here too, we normalized the attack traffic by the total traffic for a specific industry. When we do that, we get a different picture.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6DxEla6GwSvU7OBnjGmhJX/dc12c491f1444662e00636b63cf92637/Top-Attacked-Industry-by-Region-Q4-2023.png" />
            
            </figure><p>Top attacked industries by HTTP DDoS attacks, by region</p><p>We already mentioned in the beginning of this report that the Environmental Services industry was the most attacked relative to its own traffic. In second place was the Packaging and Freight Delivery industry, which is interesting because of its timely correlation with online shopping during Black Friday and the winter holiday season. Purchased gifts and goods need to get to their destination somehow, and it seems as though attackers tried to interfere with that. On a similar note, DDoS attacks on retail companies increased by 16% compared to the previous year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/14CXtsmUxjRwOB1kmYHA6Q/9c8b079ac33d94f8494e53d1ef50c4a6/pasted-image-0--11-.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks with respect to each industry’s traffic</p><p>On the network layer, Public Relations and Communications was the most targeted industry — 36% of its traffic was malicious. This too is very interesting given its timing. Public Relations and Communications companies are usually linked to managing public perception and communication. Disrupting their operations can have immediate and widespread reputational impacts which becomes even more critical during the Q4 holiday season. This quarter often sees increased PR and communication activities due to holidays, end-of-year summaries, and preparation for the new year, making it a critical operational period — one that some may want to disrupt.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2NLJAkykpHhrRuFA2OVuKg/a6ca3bebb6f29c610292cd630a6746cc/pasted-image-0--12-.png" />
            
            </figure><p>Top industries targeted by Network-layer DDoS attacks with respect to each industry’s traffic</p>
    <div>
      <h2>Most attacked countries and regions</h2>
      <a href="#most-attacked-countries-and-regions">
        
      </a>
    </div>
    <p>Singapore was the main target of HTTP DDoS attacks in Q4. Over 317 billion HTTP requests, 4% of all global DDoS traffic, were aimed at Singaporean websites. The US followed closely in second and Canada in third. Taiwan came in as the fourth most attacked region — amidst the upcoming <a href="https://www.bbc.co.uk/news/world-asia-67770782">general elections and the tensions with China</a>. Taiwan-bound attacks in Q4 traffic increased by 847% compared to the previous year, and 2,858% compared to the previous quarter. This increase is not limited to the absolute values. When normalized, the percentage of HTTP DDoS attack traffic targeting Taiwan relative to all Taiwan-bound traffic also significantly increased. It increased by 624% quarter-over-quarter and 3,370% year-over-year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/730lynQatPwtsRfi10TXOi/fc993988b6f38b8d00501f3451a16c18/pasted-image-0--13-.png" />
            
            </figure><p>Top targeted countries by HTTP DDoS attacks</p><p>While China came in as the ninth most attacked country by HTTP DDoS attacks, it's the number one most attacked country by network-layer attacks. 45% of all network-layer DDoS traffic that Cloudflare mitigated globally was China-bound. The rest of the countries were so far behind that it is almost negligible.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5MIf27g0zSIEZYQxUsFlTh/62c50ec1d0c25ae82045a71cd41c24c2/pasted-image-0--14-.png" />
            
            </figure><p>Top targeted countries by Network-layer DDoS attacks</p><p>When normalizing the data, Iraq, Palestinian territories, and Morocco take the lead as the most attacked regions with respect to their total inbound traffic. What’s interesting is that Singapore comes up as fourth. So not only did Singapore face the largest amount of HTTP DDoS attack traffic, but that traffic also made up a significant amount of the total Singapore-bound traffic. By contrast, the US was second most attacked by volume (per the application-layer graph above), but came in the fiftieth place with respect to the total US-bound traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4LX2zl13YVM9hZB60Ucedg/1b2ba78c2aeac99a3d9725ea4e418bd4/pasted-image-0--15-.png" />
            
            </figure><p>Top targeted countries by HTTP DDoS attacks with respect to each country’s traffic</p><p>Similar to Singapore, but arguably more dramatic, China is both the number one most attacked country by network-layer DDoS attack traffic, and also with respect to all China-bound traffic. Almost 86% of all China-bound traffic was mitigated by Cloudflare as network-layer DDoS attacks. The Palestinian territories, Brazil, Norway, and again Singapore followed with large percentages of attack traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2n9rHcScBY63Q4yX01yKu5/d19a7fc7ccd43c72911897245cc91dc3/pasted-image-0--16-.png" />
            
            </figure><p>Top targeted countries by Network-layer DDoS attacks with respect to each country’s traffic</p>
    <div>
      <h2>Attack vectors and attributes</h2>
      <a href="#attack-vectors-and-attributes">
        
      </a>
    </div>
    <p>The majority of DDoS attacks are short and small relative to Cloudflare’s scale. However, unprotected websites and networks can still suffer disruption from short and small attacks without proper inline automated protection — underscoring the need for organizations to be proactive in <a href="https://www.cloudflare.com/cybersecurity-risk-management/">adopting a robust security posture</a>.</p><p>In 2023 Q4, 91% of attacks ended within 10 minutes, 97% peaked below 500 megabits per second (mbps), and 88% never exceeded 50 thousand packets per second (pps).</p><p>Two out of every 100 network-layer DDoS attacks lasted more than an hour, and exceeded 1 gigabit per second (gbps). One out of every 100 attacks exceeded 1 million packets per second. Furthermore, the amount of network-layer DDoS attacks exceeding 100 million packets per second increased by 15% quarter-over-quarter.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YPOZlyzEHc5u5DeFbQXqW/d8dc22556a3f9510ee075b507b699a42/DDoS-attacks-stats-2023-Q4_a.png" />
            
            </figure><p>DDoS attack stats you should know</p><p>One of those large attacks was a Mirai-botnet attack that peaked at 160 million packets per second. The packet per second rate was not the largest we’ve ever seen. The largest we’ve ever seen was <a href="/mitigating-a-754-million-pps-ddos-attack-automatically">754 million packets per second</a>. That attack occurred in 2020, and we have yet to see anything larger.</p><p>This more recent attack, though, was unique in its bits per second rate. This was the largest network-layer DDoS attack we’ve seen in Q4. It peaked at 1.9 terabits per second and originated from a <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai botnet</a>. It was a multi-vector attack, meaning it combined multiple attack methods. Some of those methods included UDP fragments flood, UDP/Echo flood, SYN Flood, ACK Flood, and TCP malformed flags.</p><p>This attack targeted a known European Cloud Provider and originated from over 18 thousand unique IP addresses that are assumed to be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a>. It was automatically detected and mitigated by Cloudflare’s defenses.</p><p>This goes to show that even the largest attacks end very quickly. Previous large attacks we’ve seen ended within seconds — underlining the need for an in-line automated defense system. Though still rare, attacks in the terabit range are becoming more and more prominent.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/10QBHlFJPubkFIG1R2uPf1/06c522bfa3aca7713d823d44d9f6c002/pasted-image-0--17-.png" />
            
            </figure><p>1.9 Terabit per second Mirai DDoS attacks</p><p>The use of Mirai-variant botnets is still very common. In Q4, almost 3% of all attacks originate from Mirai. Though, of all attack methods, DNS-based attacks remain the attackers’ favorite. Together, DNS Floods and DNS Amplification attacks account for almost 53% of all attacks in Q4. <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN Flood</a> follows in second and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP floods</a> in third. We’ll cover the two DNS attack types here, and you can visit the hyperlinks to learn more about UDP and SYN floods in our Learning Center.</p>
    <div>
      <h3>DNS floods and amplification attacks</h3>
      <a href="#dns-floods-and-amplification-attacks">
        
      </a>
    </div>
    <p>DNS floods and DNS amplification attacks both exploit the <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">Domain Name System (DNS)</a>, but they operate differently. DNS is like a phone book for the Internet, translating human-friendly domain names like "<a href="http://www.cloudflare.com">www.cloudflare.com</a>" into numerical IP addresses that computers use to identify each other on the network.</p><p>Simply put, DNS-based DDoS attacks comprise the method computers and servers used to identify one another to cause an outage or disruption, without actually ‘taking down’ a server. For example, a server may be up and running, but the DNS server is down. So clients won't be able to connect to it and will experience it as an outage.</p><p>A <b>DNS flood</b> attack bombards a DNS server with an overwhelming number of DNS queries. This is usually done using a <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">DDoS botnet</a>. The sheer volume of queries can overwhelm the DNS server, making it difficult or impossible for it to respond to legitimate queries. This can result in the aforementioned service disruptions, delays or even an outage for those trying to access the websites or services that rely on the targeted DNS server.</p><p>On the other hand, a <b>DNS amplification</b> attack involves sending a small query with a spoofed IP address (the address of the victim) to a DNS server. The trick here is that the DNS response is significantly larger than the request. The server then sends this large response to the victim's IP address. By exploiting open DNS resolvers, the attacker can amplify the volume of traffic sent to the victim, leading to a much more significant impact. This type of attack not only disrupts the victim but also can congest entire networks.</p><p>In both cases, the attacks exploit the critical role of DNS in network operations. Mitigation strategies typically include securing DNS servers against misuse, implementing rate limiting to manage traffic, and filtering DNS traffic to identify and block malicious requests.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5UolIGOVG2jx7ST3CeoF0j/2b78eeb7eb633c49394390086a641dc5/pasted-image-0--18--1.png" />
            
            </figure><p>Top attack vectors</p><p>Amongst the emerging threats we track, we recorded a 1,161% increase in ACK-RST Floods as well as a 515% increase in CLDAP floods, and a 243% increase in SPSS floods, in each case as compared to last quarter. Let’s walk through some of these attacks and how they’re meant to cause disruption.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ac5D51H55vXbKPbWnSGEx/c4c12e4aadc06d6843f7d4c33b60679f/pasted-image-0--19-.png" />
            
            </figure><p>Top emerging attack vectors</p>
    <div>
      <h3>ACK-RST floods</h3>
      <a href="#ack-rst-floods">
        
      </a>
    </div>
    <p>An ACK-RST Flood exploits the <a href="https://www.cloudflare.com/learning/ddos/glossary/tcp-ip/">Transmission Control Protocol (TCP)</a> by sending numerous ACK and RST packets to the victim. This overwhelms the victim's ability to process and respond to these packets, leading to service disruption. The attack is effective because each ACK or RST packet prompts a response from the victim’s system, consuming its resources. ACK-RST Floods are often difficult to filter since they mimic legitimate traffic, making detection and mitigation challenging.</p>
    <div>
      <h3>CLDAP floods</h3>
      <a href="#cldap-floods">
        
      </a>
    </div>
    <p>CLDAP (Connectionless Lightweight Directory Access Protocol) is a variant of LDAP (Lightweight Directory Access Protocol). It's used for querying and modifying directory services running over IP networks. CLDAP is connectionless, using UDP instead of TCP, making it faster but less reliable. Because it uses UDP, there’s no handshake requirement which allows attackers to spoof the IP address thus allowing attackers to exploit it as a reflection vector. In these attacks, small queries are sent with a spoofed source IP address (the victim's IP), causing servers to send large responses to the victim, overwhelming it. Mitigation involves filtering and monitoring unusual CLDAP traffic.</p>
    <div>
      <h3>SPSS floods</h3>
      <a href="#spss-floods">
        
      </a>
    </div>
    <p>Floods abusing the SPSS (Source Port Service Sweep) protocol is a network attack method that involves sending packets from numerous random or spoofed source ports to various destination ports on a targeted system or network. The aim of this attack is two-fold: first, to overwhelm the victim's processing capabilities, causing service disruptions or network outages, and second, it can be used to scan for open ports and identify vulnerable services. The flood is achieved by sending a large volume of packets, which can saturate the victim's network resources and exhaust the capacities of its firewalls and intrusion detection systems. To mitigate such attacks, it's essential to leverage in-line automated detection capabilities.</p>
    <div>
      <h2>Cloudflare is here to help - no matter the attack type, size, or duration</h2>
      <a href="#cloudflare-is-here-to-help-no-matter-the-attack-type-size-or-duration">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet, and we believe that a better Internet is one that is secure, performant, and available to all. No matter the attack type, the attack size, the attack duration or the motivation behind the attack, Cloudflare’s defenses stand strong. Since we pioneered <a href="/unmetered-mitigation">unmetered DDoS Protection in 2017</a>, we’ve made and kept our commitment to make enterprise-grade DDoS protection free for all organizations alike — and of course, without compromising performance. This is made possible by our <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">unique technology</a> and robust network architecture.</p><p>It’s important to remember that security is a process, not a single product or flip of a switch. Atop of our automated DDoS protection systems, we offer comprehensive bundled features such as <a href="https://developers.cloudflare.com/waf/">firewall</a>, <a href="https://developers.cloudflare.com/bots/">bot detection</a>, <a href="https://developers.cloudflare.com/api-shield/">API protection</a>, and <a href="https://developers.cloudflare.com/cache/">caching</a> to bolster your defenses. Our multi-layered approach optimizes your security posture and minimizes potential impact. We’ve also put together a <a href="https://developers.cloudflare.com/ddos-protection/best-practices/respond-to-ddos-attacks/">list of recommendations</a> to help you optimize your defenses against DDoS attacks, and you can follow our step-by-step wizards to <a href="https://developers.cloudflare.com/learning-paths/application-security/">secure your applications</a> and <a href="https://developers.cloudflare.com/learning-paths/prevent-ddos-attacks/">prevent DDoS attacks</a>. And, if you’d like to benefit from our easy to use, best-in-class protection against DDoS and other attacks on the Internet, you can sign up — for free! — at <a href="https://www.cloudflare.com/plans/">cloudflare.com</a>. If you’re under attack, register or call the <a href="https://www.cloudflare.com/under-attack-hotline/">cyber emergency hotline number</a> for a rapid response.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Black Friday]]></category>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[China]]></category>
            <category><![CDATA[Israel]]></category>
            <guid isPermaLink="false">78R5sLaHmAgKy9ndDVHkN7</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cyber attacks in the Israel-Hamas war]]></title>
            <link>https://blog.cloudflare.com/cyber-attacks-in-the-israel-hamas-war/</link>
            <pubDate>Mon, 23 Oct 2023 13:32:05 GMT</pubDate>
            <description><![CDATA[ Since the October 7 Hamas attack, DDoS attackers have been targeting Israeli newspaper and media websites as well as software companies and financial institutions.  ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5hPpyyUgUESidx85xM0vwS/b9caf55d788a9ea08a485760f94484b9/image11-1.png" />
            
            </figure><p>On October 7, 2023, at 03:30 GMT (06:30 AM local time), Hamas attacked Israeli cities and fired thousands of rockets toward populous locations in southern and central Israel, including Tel Aviv and Jerusalem. Air raid sirens began sounding, instructing civilians to take cover.</p><p>Approximately twelve minutes later, Cloudflare systems automatically detected and mitigated DDoS attacks that targeted websites that provide critical information and alerts to civilians on rocket attacks. The initial attack peaked at 100k requests per second (rps) and lasted ten minutes. Forty-five minutes later, a second much larger attack struck and peaked at 1M rps. It lasted six minutes. Additional smaller DDoS attacks continued hitting the websites in the next hours.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5T9nPeyiDM1nkxIzzsXRtD/c9fbbff0ae332fc16d2fe9bc2592338c/image9.png" />
            
            </figure><p>DDoS attacks against Israeli websites that provide civilians information and alerts on rocket attacks</p>
    <div>
      <h3>Not just DDoS attacks</h3>
      <a href="#not-just-ddos-attacks">
        
      </a>
    </div>
    <p>Multiple Israeli websites and mobile apps have become targets of various pro-Palestinian hacktivist groups. According to <a href="https://cybernews.com/cyber-war/israel-redalert-breached-anonghost-hamas/">Cybernews</a>, one of those groups, AnonGhost, exploited a vulnerability in a mobile app that alerts Israeli civilians of incoming rockets, “Red Alert: Israel”. The exploit allowed them to intercept requests, expose servers and APIs, and send fake alerts to some app users, including a message that a “<a href="https://www.bitdefender.co.uk/blog/hotforsecurity/hacktivists-send-fake-nuclear-attack-warning-via-israeli-red-alert-app/">nuclear bomb is coming</a>”. AnonGhost also claimed to have attacked various other rocket alert apps.</p><p>On October 14, we revealed the findings of one of our investigations that was conducted by the <a href="/introducing-cloudforce-one-threat-operations-and-threat-research/">Cloudforce One</a> Threat Operations team, who identified malicious Android mobile applications impersonating the legitimate RedAlert - Rocket Alerts application. The malicious apps obtained access to sensitive user information such as mobile phone’s contacts list, SMS messages, phone call logs, installed applications, and information about the phone and SIM card themselves. More technical information about our investigation can be found <a href="/malicious-redalert-rocket-alerts-application-targets-israeli-phone-calls-sms-and-user-information/">here</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Kg7GPzXQFxZ9SdCs32vLW/974a879ec6252d7103f7a26cdddbd912/image10.png" />
            
            </figure><p>Screenshot of the malicious site linking to malicious mobile apps</p><p>Furthermore, Cloudflare has identified an Israeli website that was partially defaced by AnonGhost. This website was not using Cloudflare, but we have reached out to the organization to offer support.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1F8LCkvQVy1UfmnJRYjnfT/0960e99927d0e76f20cb2552d2243707/image1-7.png" />
            
            </figure><p>“Death to all Jews” in a part of a website that was hacked and defaced by AnonGhost</p>
    <div>
      <h3>Continued DDoS bombardment</h3>
      <a href="#continued-ddos-bombardment">
        
      </a>
    </div>
    <p>In the days following the October 7 attack, Israeli websites have been heavily targeted by DDoS attacks. Cloudflare has been helping onboard and <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protect</a> many of them.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2lycz9VOEUzaHsy2NaePa5/c33b76468cc3efba8ed141934adb4bac/pasted-image-0--7-.png" />
            
            </figure><p>HTTP DDoS attacks against Israeli websites using Cloudflare</p><p>Since the October 7, 2023, attack, Newspaper and Media websites have been the main target of DDoS attacks — accounting for 56% of all attacks against Israeli websites. We saw the same trends when Russia attacked Ukraine. Ukrainian media and broadcasting websites were highly targeted. The war on the ground is often accompanied by cyber attacks on websites that provide crucial information for civilians.</p><p>The second most targeted industry in Israel was the Computer Software industry. Almost 34% of all DDoS attacks targeted computer software companies. In third place, and more significantly, Banking, Financial Services and Insurance (BFSI) companies were attacked. Government Administration websites came in fourth place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3FRvEJoNnw3qEgW32epI50/9e1332d2c1da54e22dbcafab6ec4ede6/pasted-image-0.png" />
            
            </figure><p>Top Israeli industries targeted by HTTP DDoS attacks</p><p>We can also see that Israeli newspaper and media websites were targeted immediately after the October 7 attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5c1zBhgtBTLzcvUHZP700N/9a8e47ecc5c725e7ddd75a01c6b8e308/pasted-image-0--1-.png" />
            
            </figure><p>HTTP DDoS attacks against Israeli websites using Cloudflare by industry</p><p>Since October 1, 2023, Cloudflare automatically detected and mitigated over 5 billion HTTP requests that were part of DDoS attacks. Before October 7, there were barely any HTTP DDoS attack requests towards Israeli websites using Cloudflare.</p><p>However, on the day of the Hamas attack, the percentage of DDoS attack traffic increased. Nearly 1 out of every 100 requests towards Israeli websites using Cloudflare were part of an HTTP DDoS attack. That figure quadrupled on October 8.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6IpDQo3fmSaSxChpOjuueC/4dd8aa2ce801bf9957e68de2557ae746/pasted-image-0--2-.png" />
            
            </figure><p>Percentage of DDoS requests out of all requests towards Israeli websites using Cloudflare</p>
    <div>
      <h3>Cyber attacks against Palestinian websites</h3>
      <a href="#cyber-attacks-against-palestinian-websites">
        
      </a>
    </div>
    <p>During the same time frame, from October 1, Cloudflare automatically detected and mitigated over 454 million HTTP DDoS attack requests that targeted Palestinian websites using Cloudflare. While that figure is barely a tenth of the amount of attack requests we saw against Israeli websites using Cloudflare, it represented a proportionately larger portion of the overall traffic towards Palestinian websites using Cloudflare.</p><p>On the days before the Hamas attack, we didn't see any DDoS attacks against Palestinian websites using Cloudflare. That changed on October 7; over 46% of all traffic to Palestinian websites using Cloudflare were part of HTTP DDoS attacks.</p><p>On October 9, that figure increased to almost 60%. Nearly 6 out of every 10 HTTP requests towards Palestinian websites using Cloudflare were part of DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5FkzbFNIWGQUCcBTgqFwcs/57093f7c528e7f5ce1b51d5362324fba/pasted-image-0--3-.png" />
            
            </figure><p>Percentage of DDoS requests out of all requests towards Palestinian websites using Cloudflare</p><p>We can also see these attacks represented in the spikes in the graph below after the Hamas attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/29mYQeyKRvU9rIfMUQV4bl/c30752bae7e014c370582e81acb093c2/pasted-image-0--4-.png" />
            
            </figure><p>HTTP DDoS attacks against Palestinian websites using Cloudflare</p><p>There were three Palestinian industries that were attacked in the past weeks. The absolute majority of HTTP DDoS attacks were against Banking websites — nearly 76% of all attacks. The second most attacked industry was the Internet industry with a share of 24% of all DDoS attacks. Another small share targeted Media Production websites.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/XrX9Uu8Gl5RyDkbA7JTTS/8041903f4aaef7e89f81b2bc6b8869d0/pasted-image-0--5-.png" />
            
            </figure><p>HTTP DDoS attacks against Palestinian websites using Cloudflare by industry</p>
    <div>
      <h3>Securing your applications and preventing DDoS attacks</h3>
      <a href="#securing-your-applications-and-preventing-ddos-attacks">
        
      </a>
    </div>
    <p>As we’ve seen in recent years, real-world conflicts and wars are always accompanied by cyberattacks. We’ve put together a <a href="https://developers.cloudflare.com/ddos-protection/best-practices/respond-to-ddos-attacks/">list of recommendations</a> to optimize your defenses against DDoS attacks. You can also follow our step-by-step wizards to <a href="https://developers.cloudflare.com/learning-paths/application-security/">secure your applications</a> and <a href="https://developers.cloudflare.com/learning-paths/prevent-ddos-attacks/">prevent DDoS attacks</a>.</p><p>Readers are also invited to dive in deeper in the Radar dashboard to view traffic and attack insights and trends in <a href="https://radar.cloudflare.com/il?dateRange=28d">Israel</a> and <a href="https://radar.cloudflare.com/ps?dateRange=28d">Palestine</a>. You can also read more about the <a href="/internet-traffic-patterns-in-israel-and-palestine-following-the-october-2023-attacks/">Internet traffic and attack trend in Israel and Palestine</a> following the October 7 attack.</p><p><b><i>Under attack or need additional protection?</i></b> <a href="https://www.cloudflare.com/under-attack-hotline/"><b><i>Click here to get help</i></b></a><b><i>.</i></b></p><p><a href="https://1.1.1.1/family/"><b><i>Click here</i></b></a> <b><i>to protect against malicious mobile apps</i></b></p>
    <div>
      <h3>A note about our methodologies</h3>
      <a href="#a-note-about-our-methodologies">
        
      </a>
    </div>
    <p>The insights that we provide is based on traffic and attacks that we see against websites that are using Cloudflare, unless otherwise stated or referenced to a third party source. More information about our methodologies can be found <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#quarterly-ddos-threat-reports">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Israel]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">6noA0WeFtBLBNoUMidTP92</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cyberattacks on Holocaust educational websites increased in 2022]]></title>
            <link>https://blog.cloudflare.com/cyberattacks-on-holocaust-educational-websites-increased-in-2022/</link>
            <pubDate>Fri, 27 Jan 2023 14:00:00 GMT</pubDate>
            <description><![CDATA[ Today, 78 years after the liberation of the Auschwitz death camp, we mark the International Holocaust Remembrance Day.
With Cloudflare’s Project Galileo, we protect Holocaust educational websites and at risk public interest groups. Read more to see how attacks on these groups increased in 2022. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6yDaaDMU4LXNbyd7bfDT92/87c846fbb6f7d52d90e40e025e081c00/image2-38.png" />
            
            </figure><p>Today we mark the <a href="https://en.wikipedia.org/wiki/International_Holocaust_Remembrance_Day">International Holocaust Remembrance Day</a>. We commemorate the victims that were robbed of their possessions, stripped of their rights, deported, starved, dehumanized and murdered by the Nazis and their accomplices. During the <a href="https://en.wikipedia.org/wiki/The_Holocaust">Holocaust</a> and in the events that led to it, the Nazis exterminated one third of the European Jewish population. Six million Jews, along with countless other members of minority and disability groups, were murdered because the Nazis believed they were inferior.</p><p>Seventy eight years later, after the liberation of the infamous <a href="https://www.auschwitz.org/en/">Auschwitz</a> death camp, antisemitism still burns with hatred. According to a study performed by the <a href="https://antisemitism.org/jews-over-five-times-more-likely-to-be-targets-of-hate-crimes-than-other-faith-group-caa-analysis-of-home-office-stats-shows/">Campaign Against Antisemitism</a> organization on data provided by the <a href="https://www.gov.uk/government/statistics/hate-crime-england-and-wales-2021-to-2022/hate-crime-england-and-wales-2021-to-2022">UK Home Office</a>, Jews are 500% more likely to be targeted by hate crime than any other faith group per capita.</p>
    <div>
      <h3>Cyberattacks targeting Holocaust educational websites</h3>
      <a href="#cyberattacks-targeting-holocaust-educational-websites">
        
      </a>
    </div>
    <p>From Cloudflare’s vantage point we can point to distressing findings as well. In 2021, cyberattacks on Holocaust educational websites doubled year over year. In 2021, one out of every 100 HTTP requests sent to Holocaust educational websites behind Cloudflare was part of an attack. In 2022, the share of those cyber attacks grew again by 49% YoY. Cyberattacks represented 1.6% of all traffic to Holocaust educational websites (almost 1 out of every 50 HTTP requests), as can be seen in the chart below in 2022.</p><p>We’re representing cyberattacks as a percentage to normalize natural growth of traffic to websites, mitigation methods and other potential data biases. But even if we look at the raw numbers, between 2021 and 2022, the absolute cyberattack traffic (in HTTP requests) that targeted Holocaust education websites behind Cloudflare grew by 640% in contrast to the total growth of 397% in the number of all requests (attack and non-attack HTTP requests).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5WDwobtq8IOpYHBbhHYMLL/b524efcb12b055d8e2499242fcab4ae6/image1-42.png" />
            
            </figure><p>Share of cyberattack targeting Holocaust education websites</p><p>(Please note that the graph starts in 95% in order to provide better visibility into the share of attacks)</p><p>The threat that Holocaust educational websites face is one that many other non-profit organizations face. In fact, in our most recent <a href="/ddos-threat-report-2022-q4/">DDoS Trends report</a>, non-profit organizations were the sixth most targeted <i>industry</i>. Ten percent of all traffic to non-profit websites behind Cloudflare was DDoS attack traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/66jm1bNcwIVSBu6JMzqU21/ab5e9aed6a08f2700f918eefedf7aa9e/image4-20.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks in 2022 Q4</p><p>However, nonprofits such as Holocaust educational organizations might not always have the resources to fend off attacks. For this reason, we provide free protection to at-risk groups across the world. We do this through <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>. It helps keep vulnerable websites online. It provides free <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cyber security</a> services for groups working in the arts, human rights, civil society, journalism, or democracy. As detailed in our recent <a href="https://www.cloudflare.com/impact/">Impact Report</a>, in 2022, through Project Galileo, we <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protected vulnerable websites</a> from an average of 59M cyber threats every day.</p><p>If you’re representing a vulnerable public interest group and want to protect your website with Project Galileo, please follow the steps and apply <a href="https://www.cloudflare.com/galileo/#galileoapplication">here</a>. While you wait to hear back, you can also get started with our <a href="https://www.cloudflare.com/plans/">Free plan</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1OYQ7W5ozTUtyDiQZPvdM6/ff2e0b593e75bfb587980b3ad435cb70/image3-26.png" />
            
            </figure>
    <div>
      <h3>At Cloudflare, we remember and never forget.</h3>
      <a href="#at-cloudflare-we-remember-and-never-forget">
        
      </a>
    </div>
    <p>Here at Cloudflare, some of us are descendants of Holocaust survivors. My grandparents escaped Nazi-occupied Poland after the German invasion. Sadly, my grandparents — as other elderly survivors, have already passed. I grew up hearing about their stories of bravery — and of deep torment. It’s not always easy to hear these stories, but we must — especially in times like these when war in Europe has been ongoing for almost a year now. We have the responsibility to ensure the world remembers and never forgets the atrocities of the Holocaust and what antisemitism, racism and hatred in general can lead to.</p><p>To this extent, a few months ago, here at the Cloudflare London office, we had the honor of hosting <a href="https://www.het.org.uk/survivors-janine-webber">Janine Webber</a>, recipient of the <a href="https://en.wikipedia.org/wiki/British_Empire_Medal">British Empire Medal (BEM)</a> in an event hosted by Judeoflare, Cloudflare's Jewish employee resource group. The event was made possible due to our partnership with the <a href="https://www.het.org.uk/">Holocaust Education Trust</a>. And so in a fully packed auditorium and an oversubscribed Zoom call, we listen to Janine’s story of survival and bravery first hand. We asked questions and we learned.</p><p>We’re privileged to be able to share her story here with all of you via <a href="https://cloudflare.tv/event/fireside-chat-with-janine-webber-holocaust-survivor/Mg6QQDZl">Cloudflare TV</a>.</p>
    <div>
      <h3>Watch on Cloudflare TV</h3>
      <a href="#watch-on-cloudflare-tv">
        
      </a>
    </div>
    <div></div><p></p> ]]></content:encoded>
            <category><![CDATA[Holocaust]]></category>
            <category><![CDATA[Project Galileo]]></category>
            <category><![CDATA[Judeoflare]]></category>
            <category><![CDATA[Israel]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">7LS8QxKLJqZ7yn8aCWDyHd</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Protecting Holocaust educational websites]]></title>
            <link>https://blog.cloudflare.com/protecting-holocaust-educational-websites/</link>
            <pubDate>Thu, 27 Jan 2022 17:21:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s Project Galileo provides free protection to at-risk groups across the world including Holocaust educational and remembrance websites ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4MJVdXVmNgsOwOpJk3jlxx/1079b17226f9fc139370bab555e200d8/image1-23.png" />
            
            </figure><p>Today is the <a href="https://en.wikipedia.org/wiki/International_Holocaust_Remembrance_Day">International Holocaust Remembrance Day</a>. On this day, we commemorate the victims that were murdered by the Nazis and their accomplices.</p><p>During the <a href="https://en.wikipedia.org/wiki/The_Holocaust">Holocaust</a>, and in the events that led to it, the Nazis exterminated one third of the European Jewish population. Six million Jews, along with countless other members of minority and disability groups, were murdered because the Nazis believed they were inferior.</p><p>Cloudflare’s <a href="https://www.cloudflare.com/galileo/">Project Galileo</a> provides free protection to at-risk groups across the world including Holocaust educational and remembrance websites. During the past year alone, Cloudflare mitigated over a quarter of a million cyber threats launched against Holocaust-related websites.</p>
    <div>
      <h3>Antisemitism and the Final Solution</h3>
      <a href="#antisemitism-and-the-final-solution">
        
      </a>
    </div>
    <p>In the Second World War and the years leading up to it, <a href="https://en.wikipedia.org/wiki/Antisemitism">antisemitism</a> served as the foundation of <a href="https://en.wikipedia.org/wiki/Nuremberg_Laws">racist laws</a> and fueled violent <a href="https://en.wikipedia.org/wiki/Pogrom">Pogroms</a> against Jews. The tipping point was a night of violence known as the <a href="https://en.wikipedia.org/wiki/Kristallnacht">Kristallnacht ("Night of Broken Glass")</a>. Jews and other minority groups were outlawed, dehumanized, persecuted and killed. Jewish businesses were boycotted, Jewish books burned and synagogues destroyed. Jews, Roma and other “enemies of the Reich'' were forced into closed <a href="https://en.wikipedia.org/wiki/Nazi_ghettos">ghettos</a> and <a href="https://en.wikipedia.org/wiki/Nazi_concentration_camps">concentration camps</a>. Finally, as part of the <a href="https://en.wikipedia.org/wiki/Final_Solution">Final Solution for the Jewish Question</a>, Germany outlined a policy to deliberately and systematically exterminate the Jewish race in what came to be known as the <a href="https://en.wikipedia.org/wiki/The_Holocaust">Holocaust</a>.</p><p>As part of the Final Solution, the Nazis deployed <a href="https://en.wikipedia.org/wiki/Einsatzgruppen">mobile killing units</a>. Jews were taken to forests near their villages, forced to dig mass graves, undress, and then shot — falling into the mass graves they dug. This was the first step. However, this was “inefficient”. More “efficient” solutions were engineered using deadly gas. Eventually, <a href="https://en.wikipedia.org/wiki/Extermination_camp">six main extermination camps</a> were established. They were extremely “efficient” at exterminating humans. Initially, the Nazis experimented with <a href="https://en.wikipedia.org/wiki/Gas_van">gas vans</a> for mass extermination. Later, they built and operated <a href="https://en.wikipedia.org/wiki/Gas_chamber">gas chambers</a> which could kill more humans and do it faster. After being gassed, prisoners would load the bodies into <a href="https://en.wikipedia.org/wiki/Auschwitz_concentration_camp#Crematorium_I,_first_gassings">ovens in crematoriums</a> to be burned. In one of the larger death camps, <a href="https://en.wikipedia.org/wiki/Auschwitz_concentration_camp#Auschwitz_II-Birkenau">Auschwitz-Birkenau</a>, more than one million Jews were murdered — some 865,000 were gassed and burned on arrival.</p>
    <div>
      <h3>Fighting racism with education</h3>
      <a href="#fighting-racism-with-education">
        
      </a>
    </div>
    <p>Seventy-seven years later, sadly, racism and antisemitism are once again on the rise and <a href="https://www.independent.co.uk/news/charles-michel-jewish-auschwitz-moshe-kantor-brussels-b2001332.html">have gained traction across Europe during the pandemic</a> and <a href="https://www.forbes.com/sites/nickmorrison/2022/01/26/pledge-to-tackle-campus-antisemitism-in-uk/">across UK university campuses</a>. Earlier this week, <a href="https://www.timesofisrael.com/un-chief-decries-antisemitism-urges-to-stand-firm-against-hatred-and-bigotry/">United Nations Secretary-General António Guterres decried the resurgence of antisemitism</a> and said that “<i>...the rise in antisemitism — the oldest form of hate and prejudice — has seen new reports of physical attacks, verbal abuse, the desecration of Jewish cemeteries, synagogues vandalized, and last week the</i> <a href="https://www.nytimes.com/live/2022/01/15/us/synagogue-hostage-texas-colleyville"><i>hostage-taking of the rabbi and members of Beth Israel Congregation in Colleyville, Texas</i></a><i>.</i>”</p><p>It is through education that we will defeat bigotry and racism, and we will do our part at Cloudflare — through education and by supporting Holocaust educational organizations.</p><blockquote><p><b><i>“Our response to ignorance must be education”</i></b>- United Nations Secretary-General António Guterres</p></blockquote>
    <div>
      <h3>Supporting Holocaust educational organizations with Project Galileo</h3>
      <a href="#supporting-holocaust-educational-organizations-with-project-galileo">
        
      </a>
    </div>
    <p>As part of <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>, we currently provide free security and performance products to more than 1,500 organizations in 111 countries. These organizations are targeted by cyber attacks due to their critical work. These groups include human rights defenders, independent media and journalists, and organizations that work in strengthening democracy. Among them are organizations dedicated to educating about the horrors of the Holocaust, and preserving and telling the stories of the victims and survivors of the Holocaust to younger and future generations.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3qbNw0Cujl08aAX1OSy0FG/3fc4754b8ea52f53eea48dd4d4bf665a/image2-26.png" />
            
            </figure>
    <div>
      <h3>Cyber attacks on Holocaust-related websites</h3>
      <a href="#cyber-attacks-on-holocaust-related-websites">
        
      </a>
    </div>
    <p>Over the past year, we’ve seen cyber attacks on Holocaust-related websites gradually increase throughout the year. These attacks include mostly application-layer attacks that were automatically detected and mitigated by Cloudflare’s <a href="https://www.cloudflare.com/waf/">Web Application Firewall</a> and <a href="https://www.cloudflare.com/ddos/">DDoS Protection</a> systems.</p><p>In May 2021, cyber attacks on Holocaust-related websites peaked as they increased by 263% compared to their monthly average.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2NDY117GktS74UDP5Z8I3Z/97132f6f5ac5eacc628b43a133fbbb56/image3-33.png" />
            
            </figure>
    <div>
      <h3>Applying to Project Galileo</h3>
      <a href="#applying-to-project-galileo">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet. Part of this mission includes protecting free expression online for vulnerable groups.</p><p>The Internet can be a powerful tool in this matter. However, organizations often face attacks from powerful and entrenched opponents, yet operate on limited budgets and lack the resources to secure themselves against malicious traffic intended to silence them. If they are silenced, the Internet stops fulfilling its promise.</p><p>To combat the threats, Cloudflare’s Project Galileo provides robust security and performance products for at-risk public interest websites at no cost. Application to Project Galileo is open to any vulnerable public interest website. You can <a href="https://www.cloudflare.com/galileo/#:~:text=Visit%20our%20partners%20for%20sponsorship%20opportunities">apply via our partners</a> or <a href="https://www.cloudflare.com/galileo/#apply">apply directly to Project Galileo</a> if you don’t have any affiliation with our trusted partners.</p>
    <div>
      <h3>A note from Cloudflare’s Jewish employees</h3>
      <a href="#a-note-from-cloudflares-jewish-employees">
        
      </a>
    </div>
    <p>Many of us, like myself, are descendants of Holocaust survivors. My grandparents fled from Nazi-occupied Poland to survive. Sadly, my grandparents — as other elderly survivors, are no longer with us. Many of us have faced antisemitism in various forms. Together, we are part of <a href="/how-employee-resource-groups-ergs-can-change-an-organization/">Cloudflare’s Employee Resource Group</a> for Cloudflare’s Jewish community: Judeoflare. We have a responsibility to make sure the world remembers and never forgets the atrocities of the Holocaust and what racism and antisemitism can lead to.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/37VGvzx3DLPt832SKMzSkX/314fd9c807d68734b9097daa30d81fff/image4-18.png" />
            
            </figure> ]]></content:encoded>
            <category><![CDATA[Holocaust]]></category>
            <category><![CDATA[Project Galileo]]></category>
            <category><![CDATA[Judeoflare]]></category>
            <category><![CDATA[Israel]]></category>
            <category><![CDATA[Employee Resource Groups]]></category>
            <category><![CDATA[History]]></category>
            <guid isPermaLink="false">3rK9g1VjgtwL1vx65pRPOk</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
    </channel>
</rss>