
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Fri, 10 Apr 2026 00:54:17 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Targeted by 20.5 million DDoS attacks, up 358% year-over-year: Cloudflare’s 2025 Q1 DDoS Threat Report]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2025-q1/</link>
            <pubDate>Sun, 27 Apr 2025 23:00:00 GMT</pubDate>
            <description><![CDATA[ DDoS attacks are surging. In 2025 Q1, Cloudflare blocked +20M attacks (a 358% YoY spike) along with 5.6 Tbps and 4.8 Bpps record-breaking attacks. ]]></description>
            <content:encoded><![CDATA[ <p>Welcome to the 21st edition of the Cloudflare DDoS Threat Report. Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of <a href="https://www.cloudflare.com/learning/ddos/glossary/denial-of-service/"><u>Distributed Denial of Service (DDoS) attacks</u></a> based on data from the <a href="https://www.cloudflare.com/network/"><u>Cloudflare network</u></a>. In this edition, we focus on the first quarter of 2025. To view previous reports, visit <a href="http://www.ddosreport.com"><u>www.ddosreport.com</u></a>.</p><p>While this report primarily focuses on 2025 Q1, it also includes late-breaking data from a <a href="#hyper-volumetric-ddos-attacks">hyper-volumetric DDoS campaign observed in April 2025</a>, featuring some of the largest attacks ever publicly disclosed. In a historic surge of activity, we blocked the most intense packet rate attack on record, peaking at 4.8 billion packets per second (Bpps), 52% higher than the previous benchmark, and separately defended against a massive 6.5 terabits-per-second (Tbps) flood, matching the highest bandwidth attacks ever reported.</p>
    <div>
      <h2>Key DDoS insights</h2>
      <a href="#key-ddos-insights">
        
      </a>
    </div>
    <ul><li><p>In the first quarter of 2025, Cloudflare blocked 20.5 million DDoS attacks. That represents a 358% year-over-year (YoY) increase and a 198% quarter-over-quarter (QoQ) increase. </p></li><li><p>Around one third of those, 6.6 million, targeted the Cloudflare network infrastructure directly, as part of an 18-day multi-vector attack campaign.</p></li><li><p>Furthermore, in the first quarter of 2025, Cloudflare blocked approximately 700 hyper-volumetric DDoS attacks that exceeded 1 Tbps or 1 Bpps — an average of around 8 attacks per day.</p></li></ul><p>All the attacks were blocked by our <a href="https://www.cloudflare.com/ddos/"><u>autonomous defenses</u></a>.</p><p><i>To learn more about DDoS attacks and other types of cyber threats, refer to our </i><a href="https://www.cloudflare.com/learning/"><i><u>Learning Center</u></i></a><i>. Visit </i><a href="https://radar.cloudflare.com/reports?q=DDoS"><i><u>Cloudflare Radar</u></i></a><i> to view this report in its interactive version where you can drill down further. There's a </i><a href="https://developers.cloudflare.com/radar/"><i><u>free API</u></i></a><i> for those interested in investigating Internet trends. You can also learn more about the </i><a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/"><i><u>methodologies</u></i></a><i> used in preparing these reports.</i></p>
    <div>
      <h2>DDoS attacks in numbers</h2>
      <a href="#ddos-attacks-in-numbers">
        
      </a>
    </div>
    <p>In the first quarter of 2025, we blocked 20.5 million DDoS attacks. For comparison, during the calendar year 2024, we blocked 21.3 million DDoS attacks. In just this past quarter, we blocked 96% of what we blocked in 2024.</p><p>The most significant increase was in network-layer DDoS attacks. In 2025 Q1, we blocked 16.8M network-layer DDoS attacks. That’s a 397% QoQ increase and a 509% YoY increase. HTTP DDoS attacks also increased — a 7% QoQ increase and a 118% YoY increase.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4sBpHyhcmYaGxx6bYjGhIR/c257628e5f3c3f854f734c371192de00/image2.png" />
          </figure><p>We count DDoS attacks based on unique real-time fingerprints generated by our systems. In some instances, a single attack or campaign may generate multiple fingerprints, particularly when different mitigation strategies are applied. While this can occasionally lead to higher counts, the metric offers a strong overall indicator of attack activity during a given period.</p>
    <div>
      <h3>Attacks target the Cloudflare network and Internet infrastructure</h3>
      <a href="#attacks-target-the-cloudflare-network-and-internet-infrastructure">
        
      </a>
    </div>
    <p>Of the 20.5 million DDoS attacks blocked in Q1, 16.8 million were network-layer DDoS attacks, and of those, 6.6M targeted Cloudflare’s network infrastructure directly. Another 6.9 million targeted hosting providers and service providers protected by Cloudflare.</p><p>These attacks were part of an 18-day multi-vector DDoS campaign comprising <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/"><u>SYN flood attacks</u></a>, <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/"><u>Mirai-generated DDoS attacks</u></a>, and <a href="https://www.cloudflare.com/learning/ddos/ssdp-ddos-attack/"><u>SSDP amplification attacks</u></a> to name a few. These attacks, as with all of the 20.5 million, were autonomously detected and blocked by our DDoS defenses.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3vyRgcrWUTgw9aClvNaLE9/7afb403ff99c4565c3874fe252372961/image5.png" />
          </figure><p>In the graph below, daily aggregates of attacks against Cloudflare are represented by the blue line, and the other colors represent the various hosting providers and Internet service providers using Cloudflare’s <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Magic Transit</u></a> service that were attacked simultaneously.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3sh8O0seqxOmmQxYY0xO7F/c8563ea41e431b037a7312b60ed36fdc/image1.png" />
          </figure>
    <div>
      <h3>Hyper-volumetric DDoS attacks</h3>
      <a href="#hyper-volumetric-ddos-attacks">
        
      </a>
    </div>
    <p>Hyper-volumetric DDoS attacks are attacks that exceed 1-2 Tbps or 1 Bpps. In 2025 Q1, we blocked over 700 of these attacks. Approximately 4 out of every 100,000 network-layer DDoS attacks were hyper-volumetric. Hyper-volumetric DDoS attacks tend to take place over <a href="https://www.cloudflare.com/learning/ddos/glossary/user-datagram-protocol-udp/"><u>UDP</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4GtQgxuXLcOgXRabQadxb1/00dc9fbf694fd2ec5ada0ca222dc9a2f/image10.png" />
          </figure>
    <div>
      <h3>Hyper-volumetric attacks continue spill into Q2</h3>
      <a href="#hyper-volumetric-attacks-continue-spill-into-q2">
        
      </a>
    </div>
    <p>While this report primarily focuses on 2025 Q1, we believe it is important to also highlight the significant hyper-volumetric record-breaking DDoS attacks that continued into Q2. As such, we have included initial insights from that campaign.</p><p>In the second half of April 2025, Cloudflare’s systems automatically detected and blocked dozens of hyper-volumetric DDoS attacks as part of an intense campaign. The largest attacks peaked at 4.8 Bpps and 6.5 Tbps, with these massive surges typically lasting between 35 and 45 seconds. At 6.5 Tbps, this attack matches the <a href="https://www.wired.com/story/eleven11bot-botnet-record-size-ddos-attacks/"><u>largest publicly disclosed DDoS attack</u></a> to date. The 4.8 Bpps attack is the largest ever to be disclosed from the packet intensity perspective, approximately 52% larger than the previous 3.15 Bpps record.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1F1R0SBYghSqSPjiNYYK6W/c60c183589e9d554b9fb32e9553737a6/image17.png" />
          </figure><p>The attacks originated from 147 countries and targeted multiple IP addresses and ports of a hosting provider that is protected by Cloudflare <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Magic Transit</u></a>. All the attacks were successfully blocked by Cloudflare’s network.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5oqr2yW1zOQYx3tTUbUt93/b283fda3d65be0e9e37d2e786ff13f8a/image6.png" />
          </figure>
    <div>
      <h2>Threat actors</h2>
      <a href="#threat-actors">
        
      </a>
    </div>
    <p>When surveying Cloudflare customers that were targeted by DDoS attacks, the majority said they didn’t know who attacked them. The ones that did know reported their competitors as the number one threat actor behind the attacks (39%), which is similar to last quarter. This is quite common in the gaming and gambling industry.</p><p>Another 17% reported that a state-level or state-sponsored threat actor was behind the attack, and a similar percentage reported that a disgruntled user or customer was behind the attack. </p><p>Another 11% reported that they mistakenly inflicted the DDoS attack on themselves (self-DDoS) and a similar percentage said an extortionist was behind the attacks. 6% reported that the attacks were launched by disgruntled or former employees.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5M5hxvgMluwmP7m0SLaxMz/8ef0cb0d5788e036f7b476010fab9139/image9.png" />
          </figure>
    <div>
      <h2>Anatomy of a DDoS attack</h2>
      <a href="#anatomy-of-a-ddos-attack">
        
      </a>
    </div>
    <p>On the network-layer, <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/"><u>SYN flood</u></a> remains the most common Layer 3/4 DDoS attack vector, followed by <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/"><u>DNS flood</u></a> attacks. <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/"><u>Mirai</u></a>-launched DDoS attacks take the third place, replacing <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/"><u>UDP flood</u></a> attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2vo7n97mpZ9F3ms2evLTfr/cd41b34aac742ce542ceface04edfb47/image11.png" />
          </figure><p>In the HTTP realm, over 60% of the attacks were identified and blocked as known botnets, 21% were attacks with suspicious HTTP attributes, another 10% were launched by botnets impersonating browsers, and the remaining 8% were generic floods, attacks of unusual request patterns, and cache busting attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2X6OoIc5DeB9uBA43gmNAZ/bc438e6aa93820b68cde82b483e84c27/image12.png" />
          </figure>
    <div>
      <h3>Emerging threats</h3>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>In 2025 Q1, we saw a 3,488% QoQ increase in CLDAP reflection/amplification attacks. <a href="https://datatracker.ietf.org/doc/html/rfc1798"><u>CLDAP (Connectionless Lightweight Directory Access Protocol)</u></a> is a variant of <a href="https://datatracker.ietf.org/doc/html/rfc4511"><u>LDAP (Lightweight Directory Access Protocol)</u></a>, used for querying and modifying directory services running over IP networks. CLDAP is connectionless, using UDP instead of TCP, making it faster but less reliable. Because it uses UDP, there’s no handshake requirement, which allows attackers to spoof the source IP address, thus allowing attackers to exploit it as a reflection vector. In these attacks, small queries are sent with a spoofed source IP address (the victim's IP), causing servers to send large responses to the victim, overwhelming it. Mitigation involves filtering and monitoring unusual CLDAP traffic.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1TnoEpazSZJfAwYAkXIlTi/84c59434f17502d11eeea290e27ba4f4/image4.png" />
          </figure><p>We also saw a 2,301% QoQ increase in ESP reflection/amplification attacks. The ESP (Encapsulating Security Payload) protocol is part of <a href="https://www.cloudflare.com/learning/network-layer/what-is-ipsec/"><u>IPsec</u></a> and provides confidentiality, authentication, and integrity to network communications. However, it can be abused in DDoS attacks if malicious actors exploit misconfigured or vulnerable systems to reflect or amplify traffic towards a target, leading to service disruption. Like with other protocols, securing and properly configuring the systems using ESP is crucial to block the risks of DDoS attacks.</p>
    <div>
      <h2>Attack size &amp; duration</h2>
      <a href="#attack-size-duration">
        
      </a>
    </div>
    <p>Despite the increase in hyper-volumetric attacks, most DDoS attacks are small. In 2025 Q1, 99% of Layer 3/4 DDoS attacks were under 1 Gbps and 1 Mpps. Similarly, 94% of HTTP DDoS attacks were 1 million requests per second (rps). However, ‘small’ is a relative term and most Internet properties wouldn’t be able to withstand even those small attacks. They can easily saturate unprotected Internet links and crash unprotected servers.</p><p>Furthermore, most attacks are very short-lived. 89% of Layer 3/4 DDoS attacks and 75% of HTTP DDoS attacks end within 10 minutes. Even the largest, record-breaking, hyper-volumetric DDoS attacks can be very short, such as the 35-second attack seen in the examples above. 35 seconds, or even 10 minutes, is not a sufficient time for manual mitigation or activating an on-demand solution: by the time a security analyst receives the alert, and analyzes the attack, it’s already over. And while the attacks may be very short, the trickle effect of attack leads to network and applications failures that can take days to recover from — all whilst services are down or degraded. The current threat landscape leaves no time for human intervention. Detection and mitigation should be always-on, in-line and automated — with sufficient capacity and global coverage to handle the attack traffic along with legitimate peak time traffic.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Qb588RBcnkgWlTyqpP1gF/9b582d0a766be5e200b4a608a5fc2ee0/image7.png" />
          </figure><p>On the other hand, hyper-volumetric HTTP DDoS attacks that exceed 1 Mrps doubled their share. In 2025 Q1, 6 out of every 100 HTTP DDoS attacks exceeded 1 Mrps. On the network-layer, 1 out of every 100,000 attacks exceeded 1 Tbps or 1 Bpps.</p>
    <div>
      <h3>Attack example</h3>
      <a href="#attack-example">
        
      </a>
    </div>
    <p>One example of such an attack targeted a <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> customer. The customer itself is a US-based hosting provider that offers web servers, <a href="https://www.cloudflare.com/learning/video/what-is-voip/"><u>Voice over IP (VoIP)</u></a> servers, and game servers amongst its solutions. This specific attack targeted port 27015. This port is most commonly associated with multiplayer gaming servers, especially Valve's Source engine games, such as Counter-Strike: Global Offensive (CS:GO), Team Fortress 2, Garry's Mod, Left 4 Dead, and Half-Life 2: Deathmatch.</p><p>It's used for the game server connection, letting clients connect to the server to play online. In many cases, this port is open for both UDP and TCP, depending on the game and what kind of communication it's doing. This customer was targeted with multiple hyper-volumetric attacks that were autonomously blocked by Cloudflare.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YQNMOEL84t0oPfNpYiSnF/ee44629d6a191c23eddc1bb36a66b879/image8.png" />
          </figure>
    <div>
      <h2>Top attacked locations</h2>
      <a href="#top-attacked-locations">
        
      </a>
    </div>
    <p>The first quarter of 2025 saw a significant shift in the top 10 <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-country"><u>most attacked locations</u></a> globally. Germany made a notable jump, climbing four spots — making it the most attacked country. In second place, Turkey also experienced a surge of 11 spots. In third, China, on the other hand, slipped two spots compared to the previous quarter, while Hong Kong remained unchanged. India rose four spots, and Brazil stayed the same. Taiwan dropped four positions. The Philippines experienced the largest decline, falling 6 spots. South Korea and Indonesia, however, both jumped up by two spots each.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1EZzoKCRJBdxvb4loWUImY/eb7ae5cf9c66b4fc551a8d60cf22b03b/image15.png" />
          </figure>
    <div>
      <h2>Top attacked industries</h2>
      <a href="#top-attacked-industries">
        
      </a>
    </div>
    <p>The top 10 <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-industry"><u>most attacked industries</u></a> in 2025 Q1 saw some notable changes. The Gambling &amp; Casinos industry jumped up four spots as the most attacked industry, while the Telecommunications, Service Providers and Carriers industry slid down one spot. The Information Technology &amp; Services and Internet industries both saw minor fluctuations, moving up one and down two spots, respectively. The Gaming and <a href="https://www.cloudflare.com/banking-and-financial-services/">Banking &amp; Financial Services industries</a> both saw a one-spot increase, while the Cyber Security industry made a massive leap of 37 spots compared to the previous quarter. Retail saw a slight decline of one spot, while the Manufacturing, Machinery, Technology &amp; Engineering industry surged 28 spots. The Airlines, Aviation &amp; Aerospace industry had the biggest jump of all, moving up 40 spots making it the tenth most attacked industry.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1G4wkWm6UVSR5sgPY3NjP6/fe1311ec9e7b8a2485fea2014346d65b/image16.png" />
          </figure>
    <div>
      <h2>Top attack sources</h2>
      <a href="#top-attack-sources">
        
      </a>
    </div>
    <p>The ranking of the top 10 <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#source-country"><u>largest sources of DDoS attacks</u></a> in 2025 Q1 also shifted notably. Hong Kong soared to the number one position, climbing three spots from the previous quarter. Indonesia edged down to second place, while Argentina rose two spots to third. Singapore slipped two spots to fourth, and Ukraine dropped one to fifth. Brazil made a striking leap, climbing seven places to land in sixth place, closely followed by Thailand, which also rose seven spots to seventh. Germany also increased, moving up two positions to eighth. Vietnam made the most dramatic climb, jumping 15 spots to claim ninth place, while Bulgaria rounded out the list, dipping two spots to tenth.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7tPgUpT7o7ifuMAu2aODrq/b19b39fc919f95b569a187f1ddf66ec0/image3.png" />
          </figure>
    <div>
      <h3>Top source ASNs</h3>
      <a href="#top-source-asns">
        
      </a>
    </div>
    <p>An <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>ASN (Autonomous System Number)</u></a> is a unique identifier assigned to a network or group of IP networks that operate under a single routing policy on the Internet. It’s used to exchange routing information between systems using protocols like <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/"><u>BGP (Border Gateway Protocol)</u></a>.</p><p>When looking at where the DDoS attacks originate from, specifically HTTP DDoS attacks, there are a few autonomous systems that stand out. In 2025 Q1, the German-based <a href="https://radar.cloudflare.com/as24940"><u>Hetzner (AS24940)</u></a> retained its position as the largest source of HTTP DDoS attacks. It was followed by the French-based <a href="https://radar.cloudflare.com/as16276"><u>OVH (AS16276)</u></a> in second, the US-based <a href="https://radar.cloudflare.com/as14061"><u>DigitalOcean (AS14061)</u></a> in third, and another German-based provider, <a href="https://radar.cloudflare.com/as51167"><u>Contabo (AS51167)</u></a>, in fourth. </p><p>Other major sources included the China-based <a href="https://radar.cloudflare.com/as4134"><u>ChinaNet Backbone (AS4134)</u></a> and <a href="https://radar.cloudflare.com/as132203"><u>Tencent (AS132203)</u></a>, the Austrian-based <a href="https://radar.cloudflare.com/as200373"><u>Drei (AS200373)</u></a>, and three US-based providers to wrap up the top 10 — <a href="https://radar.cloudflare.com/as8075"><u>Microsoft (AS8075)</u></a>, <a href="https://radar.cloudflare.com/as31898"><u>Oracle (AS31898)</u></a>, and <a href="https://radar.cloudflare.com/as396982"><u>Google Cloud Platform (AS396982)</u></a>. Most of the networks in this ranking are well-known cloud computing or hosting providers, highlighting how cloud infrastructure is frequently leveraged — either intentionally or through exploitation — for launching DDoS attacks.</p><p>To help hosting providers, cloud computing providers and any Internet service providers identify and take down the abusive accounts that launch these attacks, we leverage Cloudflare’s unique vantage point to provide a <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/"><u>free DDoS Botnet Threat Feed for Service Providers</u></a>. Over 600 organizations worldwide have already signed up for this feed. It gives service providers a list of offending IP addresses from within their ASN that we see launching HTTP DDoS attacks. It’s completely free and all it takes is opening a free Cloudflare account, authenticating the ASN via <a href="https://docs.peeringdb.com/howto/authenticate/"><u>PeeringDB</u></a>, and then <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/#get-full-report"><u>fetching the threat intelligence via API</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4AX4nalnfQuGKu7rea9HLM/7b2c0f6919aab8627ddcf0fff2a2449a/image13.png" />
          </figure>
    <div>
      <h2>Helping build a better Internet</h2>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>At Cloudflare, our mission is to help build a better Internet. A key part of that commitment is offering free protection against DDoS attacks, as well as supporting the broader Internet community by providing free tools to help other networks detect and dismantle botnets operating within their infrastructure.</p><p>As the threat landscape continues to evolve, we see that many organizations still adopt DDoS protection only after experiencing an attack or rely on outdated, on-demand solutions. In contrast, our data shows that those with proactive security strategies are far more resilient. That’s why we focus on automation and a comprehensive, always-on, in-line security approach to stay ahead of both existing and emerging threats.</p><p>Backed by our global network with 348 Tbps of capacity spanning 335 cities, we remain dedicated to delivering unmetered, unlimited DDoS protection, regardless of the size, duration, or frequency of attacks.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Mirai]]></category>
            <guid isPermaLink="false">4xYQnrTgTa1v8bY1lRyu4G</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2024 Q2]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2024-q2/</link>
            <pubDate>Tue, 09 Jul 2024 13:00:32 GMT</pubDate>
            <description><![CDATA[ Welcome to the 18th edition of the Cloudflare DDoS Threat Report. Released quarterly, these reports provide an in-depth analysis of the DDoS threat landscape as observed across the Cloudflare network. This edition focuses on the second quarter of 2024 ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6H7tZjcmMtTkqI4vnZh1cU/57e3e3bcf83b65ac75c5fcaa72389270/image13-1.png" />
            
            </figure><p>Welcome to the 18th edition of the Cloudflare DDoS Threat Report. Released quarterly, these reports provide an in-depth analysis of the DDoS threat landscape as observed across the <a href="https://www.cloudflare.com/en-gb/network/">Cloudflare network</a>. This edition focuses on the second quarter of 2024.</p><p>With a 280 terabit per second network located across over 320 cities worldwide, <a href="https://w3techs.com/technologies/details/cn-cloudflare">serving 19% of all websites</a>, Cloudflare holds a unique vantage point that enables us to provide valuable insights and trends to the broader Internet community.</p>
    <div>
      <h2>Key insights for 2024 Q2</h2>
      <a href="#key-insights-for-2024-q2">
        
      </a>
    </div>
    <ul><li><p>Cloudflare recorded a 20% year-over-year increase in DDoS attacks.</p></li><li><p>1 out of every 25 survey respondents said that DDoS attacks against them were carried out by state-level or state-sponsored threat actors.</p></li><li><p>Threat actor capabilities reached an all-time high as our automated defenses generated 10 times more fingerprints to counter and mitigate the ultrasophisticated DDoS attacks.</p></li></ul><p>View the interactive version of this report on <a href="https://radar.cloudflare.com/reports/ddos-2024-q2">Cloudflare Radar</a>.</p>
    <div>
      <h3>Quick recap - what is a DDoS attack?</h3>
      <a href="#quick-recap-what-is-a-ddos-attack">
        
      </a>
    </div>
    <p>Before diving in deeper, let's recap what a DDoS attack is. Short for <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service</a>, a DDoS attack is a type of cyber attack designed to take down or disrupt Internet services, such as websites or mobile apps, making them unavailable to users. This is typically achieved by overwhelming the victim's server with more traffic than it can handle — usually from multiple sources across the Internet, rendering it unable to handle legitimate user traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2S7TgrtK197L1YGvjBgZm2/0664811e82a92b1c9c1a178458f75550/unnamed-4.png" />
            
            </figure><p>Diagram of a DDoS attack</p><p>To learn more about DDoS attacks and other types of cyber threats, visit our <a href="https://www.cloudflare.com/learning/">Learning Center</a>, access <a href="/tag/ddos-reports">previous DDoS threat reports</a> on the Cloudflare blog or visit our interactive hub, <a href="https://radar.cloudflare.com/reports?q=DDoS">Cloudflare Radar</a>. There's also a <a href="https://developers.cloudflare.com/radar/">free API</a> for those interested in investigating these and other Internet trends.</p><p>To learn about our report preparation, refer to our <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/">Methodologies</a>.</p>
    <div>
      <h3>Threat actor sophistication fuels the continued increase in DDoS attacks</h3>
      <a href="#threat-actor-sophistication-fuels-the-continued-increase-in-ddos-attacks">
        
      </a>
    </div>
    <p>In the first half of 2024, we mitigated 8.5 million DDoS attacks: 4.5 million in Q1 and 4 million in Q2. Overall, the number of DDoS attacks in Q2 decreased by 11% quarter-over-quarter, but increased 20% year-over-year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ctaeSKgnNEYe46W7UEKGs/fa4f515c4ed4fcbeac3e685ebc9a721f/unnamed--1--3.png" />
            
            </figure><p>Distribution of DDoS attacks by types and vectors</p><p>For context, in the entire year of 2023, we mitigated 14 million DDoS attacks, and halfway through 2024, we have already mitigated 60% of last year’s figure.</p><p>Cloudflare successfully mitigated 10.2 trillion HTTP DDoS requests and 57 petabytes of network-layer DDoS attack traffic, preventing it from reaching our customers’ origin servers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/WyUYhLUD166Po7ah6ZEQp/16f3d7d1c48488ae6d4dc3475329a432/unnamed--2--2.png" />
            
            </figure><p>DDoS attacks stats for 2024 Q2</p><p>When we break it down further, those 4 million DDoS attacks were composed of 2.2 million network-layer DDoS attacks and 1.8 million HTTP DDoS attacks. This number of 1.8 million HTTP DDoS attacks has been normalized to compensate for the explosion in sophisticated and randomized HTTP DDoS attacks. Our automated mitigation systems generate real-time fingerprints for DDoS attacks, and due to the randomized nature of these sophisticated attacks, we observed many fingerprints being generated for single attacks. The actual number of fingerprints that was generated was closer to 19 million – over ten times larger than the normalized figure of 1.8 million. The millions of fingerprints that were generated to deal with the randomization stemmed from a few single rules. These rules did their job to stop attacks, but they inflated the numbers, so we excluded them from the calculation.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3NbYriDgdvtAormXB1spNP/c8ef433d3386dd7f44ee72c7625fd980/unnamed--3--2.png" />
            
            </figure><p>HTTP DDoS attacks by quarter, with the excluded fingerprints</p><p>This ten-fold difference underscores the dramatic change in the threat landscape. The tools and capabilities that allowed threat actors to carry out such randomized and sophisticated attacks were previously associated with capabilities reserved for state-level actors or state-sponsored actors. But, coinciding with the rise of generative AI and autopilot systems that can help actors write better code faster, these capabilities have made their way to the common cyber criminal.</p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>In May 2024, the percentage of attacked Cloudflare customers that reported being threatened by a DDoS attack threat actor, or subjected to a <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attack</a> reached 16% – the highest it’s been in the past 12 months. The quarter started relatively low, at 7% of customers reporting a threat or a ransom attack. That quickly jumped to 16% in May and slightly dipped in June to 14%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16Ppdz9v4IcH0Xgii7EhdM/5551f7fdf2b2d8db252ea7a9cf845dc9/unnamed--4--2.png" />
            
            </figure><p>Percentage of customers reporting DDoS threats or ransom extortion (by month)</p><p>Overall, ransom DDoS attacks have been increasing quarter over quarter throughout the past year. In Q2 2024, the percentage of customers that reported being threatened or extorted was 12.3%, slightly higher than the previous quarter (10.2%) but similar to the percentage of the year before (also 12.0%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/WxCgT7fCSV3btCf6PmAIw/212c7d54d431c8b0c4aef091b68eda25/unnamed--5--2.png" />
            
            </figure><p>Percentage of customers reporting DDoS threats or ransom extortion (by quarter)</p>
    <div>
      <h2>Threat actors</h2>
      <a href="#threat-actors">
        
      </a>
    </div>
    <p>75% of respondents reported that they did not know who attacked them or why. These respondents are Cloudflare customers that were targeted by HTTP DDoS attacks.</p><p>Of the respondents that claim they did know, 59% said it was a competitor who attacked them. Another 21% said the DDoS attack was carried out by a disgruntled customer or user, and another 17% said that the attacks were carried out by state-level or state-sponsored threat actors. The remaining 3% reported it being a self-inflicted DDoS attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2fktInA0cQbth4up5dPB6M/366eda36e7c414c4e114c9a1f3e2cb27/unnamed--6--2.png" />
            
            </figure><p>Percentage of threat actor type reported by Cloudflare customers, excluding unknown attackers and outliers</p>
    <div>
      <h2>Top attacked countries and regions</h2>
      <a href="#top-attacked-countries-and-regions">
        
      </a>
    </div>
    <p>In the second quarter of 2024, China was ranked the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#countries-as-source-or-target-of-attacks">most attacked country</a> in the world. This ranking takes into consideration HTTP DDoS attacks, network-layer DDoS attacks, the total volume and the percentage of DDoS attack traffic out of the total traffic, and the graphs show this overall DDoS attack activity per country or region. A longer bar in the chart means more attack activity.</p><p>After China, Turkey came in second place, followed by Singapore, Hong Kong, Russia, Brazil, and Thailand. The remaining countries and regions comprising the top 15 most attacked countries are provided in the chart below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6C3FspFSjHCEwIuauYTQYg/bcc283b99df5eb93428f138eea18a676/unnamed--7--2.png" />
            
            </figure><p>15 most attacked countries and regions in 2024 Q2</p>
    <div>
      <h2>Most attacked industries</h2>
      <a href="#most-attacked-industries">
        
      </a>
    </div>
    <p>The Information Technology &amp; Services was ranked as the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-industry">most targeted industry</a> in the second quarter of 2024. The ranking methodologies that we’ve used here follow the same principles as previously described to distill the total volume and relative attack traffic for both HTTP and network-layer DDoS attacks into one single DDoS attack activity ranking.</p><p>The Telecommunications, Services Providers and Carrier sector came in second. Consumer Goods came in third place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/M7x6hcaQ3rq20x0SZ61y9/a370d20f43aa968efd1892dd4e8619c6/unnamed--8--1.png" />
            
            </figure><p>15 most attacked industries in 2024 Q2</p><p>When analyzing only the HTTP DDoS attacks, we see a different picture. Gaming and Gambling saw the most attacks in terms of HTTP DDoS attack request volume. The per-region breakdown is provided below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ElWJHm7iaazkMY0i3FbAY/438d6fb1fd9f515cc8961c88770039c9/unnamed--9--1.png" />
            
            </figure><p>Top attacked industries by region (HTTP DDoS attacks)</p>
    <div>
      <h2>Largest sources of DDoS attacks</h2>
      <a href="#largest-sources-of-ddos-attacks">
        
      </a>
    </div>
    <p>Argentina was ranked as the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#countries-as-source-or-target-of-attacks">largest source</a> of DDoS attacks in the second quarter of 2024. The ranking methodologies that we’ve used here follow the same principles as previously described to distill the total volume and relative attack traffic for both HTTP and network-layer DDoS attacks into one single DDoS attack activity ranking.</p><p>Indonesia followed closely in second place, followed by the Netherlands in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5EsagO6GQdPElCwfU735Ed/ee71ca617bbd2281c45db36cebb6f0a8/unnamed--10--1.png" />
            
            </figure><p>15 largest sources of DDoS attacks in 2024 Q2</p>
    <div>
      <h2>DDoS attack characteristics</h2>
      <a href="#ddos-attack-characteristics">
        
      </a>
    </div>
    
    <div>
      <h3>Network-layer DDoS attack vectors</h3>
      <a href="#network-layer-ddos-attack-vectors">
        
      </a>
    </div>
    <p>Despite a 49% decrease quarter-over-quarter, DNS-based DDoS attacks remain the most common attack vector, with a combined share of 37% for <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/">DNS floods</a> and <a href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/">DNS amplification</a> attacks. <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> came in second place with a share of 23%, followed by RST floods accounting for a little over 10%. SYN floods and RST floods are both types of TCP-based DDoS attacks. Collectively, all types of TCP-based DDoS attacks accounted for 38% of all network-layer DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2C8gqiEuTXWaZJYOC4l29Z/eeb4e6734ec7c42f328c02dc46f3a0ba/unnamed--11--1.png" />
            
            </figure><p>Top attack vectors (network-layer)</p>
    <div>
      <h3>HTTP DDoS attack vectors</h3>
      <a href="#http-ddos-attack-vectors">
        
      </a>
    </div>
    <p>One of the advantages of operating a large network is that we see a lot of traffic and attacks. This helps us improve our detection and mitigation systems to protect our customers. In the last quarter, half of all <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/">HTTP DDoS attacks</a> were mitigated using proprietary heuristics that targeted botnets known to Cloudflare. These heuristics guide our systems on how to generate a real-time fingerprint to match against the attacks.</p><p>Another 29% were HTTP DDoS attacks that used fake user agents, impersonated browsers, or were from headless browsers. An additional 13% had suspicious HTTP attributes which triggered our automated system, and 7% were marked as generic floods. One thing to note is that these attack vectors, or attack groups, are not necessarily exclusive. For example, known botnets also impersonate browsers and have suspicious HTTP attributes, but this breakdown is our initial attempt to categorize the HTTP DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Q30Uxkud0qxOCbzTjgUjc/86ec3083a7d52167e143fd79ad847f77/unnamed--12-.png" />
            
            </figure><p>Top attack vectors (HTTP)</p>
    <div>
      <h3>HTTP versions used in DDoS attacks</h3>
      <a href="#http-versions-used-in-ddos-attacks">
        
      </a>
    </div>
    <p>In Q2, around half of all web traffic used HTTP/2, 29% used HTTP/1.1, an additional fifth used HTTP/3, nearly 0.62% used HTTP/1.0, and 0.01% for HTTP/1.2.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4iG2zFOZIR91P56H7DiNFw/30d39a97fadf6f974acc35f588418e5e/unnamed--13-.png" />
            
            </figure><p>Distribution of web traffic by HTTP version</p><p>HTTP DDoS attacks follow a similar pattern in terms of version adoption, albeit a larger bias towards HTTP/2. 76% of HTTP DDoS attack traffic was over the HTTP/2 version and nearly 22% over HTTP/1.1. HTTP/3, on the other hand, saw a much smaller usage. Only 0.86% of HTTP DDoS attack traffic were over HTTP/3 — as opposed to its much broader adoption of 20% by all web traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7qSkeg0USHPZn76shu5lAc/ce683586034c622a798326b4d8c05447/unnamed--14-.png" />
            
            </figure><p>Distribution of HTTP DDoS attack traffic by HTTP version</p>
    <div>
      <h3>DDoS attack duration</h3>
      <a href="#ddos-attack-duration">
        
      </a>
    </div>
    <p>The vast majority of DDoS attacks are short. Over 57% of HTTP DDoS attacks and 88% of network-layer DDoS attacks end within 10 minutes or less. This emphasizes the need for automated, in-line detection and mitigation systems. Ten minutes are hardly enough time for a human to respond to an alert, analyze the traffic, and apply manual mitigations.</p><p>On the other side of the graphs, we can see that approximately a quarter of HTTP DDoS attacks last over an hour, and almost a fifth last more than a day. On the network layer, longer attacks are significantly less common. Only 1% of network-layer DDoS attacks last more than 3 hours.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5THWXBww1SvjFhGz3faxvf/27b48ed6dac038a9342c84ec0661caa4/unnamed--15-.png" />
            
            </figure><p>HTTP DDoS attacks: distribution by duration</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1jCKPONG0sxuKYTVU1dne5/69f9f38dae5d46b0b2c5b40f9d97f2a3/unnamed--16-.png" />
            
            </figure><p>Network-layer DDoS attacks: distribution by duration</p>
    <div>
      <h3>DDoS attack size</h3>
      <a href="#ddos-attack-size">
        
      </a>
    </div>
    <p>Most DDoS attacks are relatively small. Over 95% of network-layer DDoS attacks stay below 500 megabits per second, and 86% stay below 50,000 packets per second.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6KtVJSY1wf4G0dcalUVRYu/7bf4d928903b3c69e29c251205046e79/unnamed--17-.png" />
            
            </figure><p>Distribution of network-layer DDoS attacks by bit rate</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Xdwy1icebxX20wmq3DE2g/8911a08a43185159155cf00317cc7dbd/unnamed--18-.png" />
            
            </figure><p>Distribution of network-layer DDoS attacks by packet rate</p><p>Similarly, 81% of HTTP DDoS attacks stay below 50,000 requests per second. Although these rates are small on Cloudflare’s scale, they can still be devastating for unprotected websites unaccustomed to such traffic levels.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1NMeVYFSRo9RKwnmPsqOBj/67655da4382355f8424a2525b2bf5f74/unnamed--19-.png" />
            
            </figure><p>Distribution of HTTP DDoS attacks by request rate</p><p>Despite the majority of attacks being small, the number of larger volumetric attacks has increased. One out of every 100 network-layer DDoS attacks exceed 1 million packets per second (pps), and two out of every 100 exceed 500 gigabits per second. On layer 7, four out of every 1,000 HTTP DDoS attacks exceed 1 million requests per second.</p>
    <div>
      <h2>Key takeaways</h2>
      <a href="#key-takeaways">
        
      </a>
    </div>
    <p>The majority of DDoS attacks are small and quick. However, even these attacks can disrupt online services that do not follow <a href="https://developers.cloudflare.com/ddos-protection/best-practices/respond-to-ddos-attacks/">best practices for DDoS defense</a>.</p><p>Furthermore, threat actor sophistication is increasing, perhaps due to the availability of Generative AI and developer copilot tools, resulting in attack code that delivers DDoS attacks that are harder to defend against. Even prior to the rise in attack sophistication, many organizations struggled to defend against these threats on their own. But they don’t need to. Cloudflare is here to help. We invest significant resources – so you don’t have to – to ensure our automated defenses, along with the entire portfolio of Cloudflare security products, to protect against existing and emerging threats.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[DNS Flood]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[SYN Flood]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">5zkxlKrbZNjy1jeKkohkyt</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[An August reading list about online security and 2023 attacks landscape]]></title>
            <link>https://blog.cloudflare.com/an-august-reading-list-about-online-security-and-2023-attacks-landscape/</link>
            <pubDate>Mon, 21 Aug 2023 13:00:57 GMT</pubDate>
            <description><![CDATA[ Here is a reading list with 2023 trends, what you need to know about attacks, and a guide on how to stay protected using Cloudflare ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5aNzvtLI3LV7ChtfG0YMXf/de9ec3ca711ba9a8196a42cda8e1b159/image1-18.png" />
            
            </figure><p>In 2023, cybersecurity continues to be in most cases a need-to-have for those who don’t want to take chances on getting caught in a cyberattack and its consequences. Attacks have gotten more sophisticated, while conflicts (online and offline, and at the same time) continue, including in <a href="/one-year-of-war-in-ukraine/">Ukraine</a>. Governments have heightened their cyber warnings and put together strategies, including around critical infrastructure (including health and education). All of this, at a time when there were never so many online risks, but also people online — over five billion in July 2023, <a href="https://datareportal.com/reports/digital-2023-july-global-statshot">64.5%</a> of the now <a href="https://population.un.org/dataportal/data/indicators/49/locations/900/start/1950/end/2100/line/linetimeplotsingle">eight billion</a> that are the world’s total population.</p><p>Here we take a look at what we’ve been discussing in 2023, so far, in our Cloudflare blog related to attacks and online security in general, with several August reading list suggestions. From new trends, products, initiatives or partnerships, including <a href="/tag/ai/">AI</a> service safety, to <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">record-breaking blocked cyberattacks</a>. On that note, our AI hub (<a href="https://ai.cloudflare.com/">ai.cloudflare.com</a>) was just launched.</p><p>Throughout the year, Cloudflare has continued to onboard customers while they were <a href="https://www.cloudflare.com/under-attack-hotline/">being attacked</a>, and we have provided protection to many others, including once.net, responsible for the <a href="/how-cloudflare-scaled-and-protected-eurovision-2023-voting/">2023 Eurovision Song Contest online voting system</a> — the European event reached 162 million people.</p><p>Our global network — a.k.a. <a href="/welcome-to-the-supercloud-and-developer-week-2022/">Supercloud</a> — gives us a unique vantage point. Cloudflare’s extensive scale also helps enhance security, with preventive services powered by machine learning, like our recent <a href="https://www.cloudflare.com/waf/">WAF</a> attack scoring system to <a href="/stop-attacks-before-they-are-known-making-the-cloudflare-waf-smarter/">stop attacks before they become known</a> or even <a href="/waf-content-scanning/">malware</a>.</p><p>Recently, we announced our presence in more than <a href="/cloudflare-connected-in-over-300-cities/">300 cities across over 100 countries</a>, with interconnections to over 12,000 networks and still growing. We provide services for around 20% of websites online and to millions of Internet properties.</p>
    <div>
      <h2>Attacks increasing. A readiness and trust game</h2>
      <a href="#attacks-increasing-a-readiness-and-trust-game">
        
      </a>
    </div>
    <p>Let’s start with providing some context. There are all sorts of attacks, but they have been, generally speaking, increasing. In Q2 2023, Cloudflare blocked an average of <b>140 billion</b> cyber threats per day. One year ago, when we wrote a <a href="/2022-attacks-an-august-reading-list-to-go-shields-up/">similar blog post</a>, it was 124 billion, a 13% increase year over year. Attackers are not holding back, with more sophisticated attacks rising, and sectors such as education or healthcare as the target.</p><p><a href="https://www.cloudflare.com/learning/ai/what-is-artificial-intelligence/">Artificial intelligence (AI)</a>, like machine learning, is not new, but it has been trending in 2023, and certain capabilities are more generally available. This has raised concerns about the <a href="https://www.reuters.com/technology/ai-being-used-hacking-misinfo-top-canadian-cyber-official-says-2023-07-20/">quality of deception</a> and even <a href="https://www.wired.com/story/artificial-intelligence-hacking-bruce-schneier/">AI hackers</a>.</p><p>This year, governments have also continued to release reports and warnings. In 2022, the US Cybersecurity and Infrastructure Security Agency (CISA) created the <a href="https://www.cisa.gov/shields-up">Shields Up</a> initiative in response to Russia's invasion of Ukraine. In March 2023, the Biden-Harris Administration released the <a href="https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf">National Cybersecurity Strategy</a> aimed at securing the Internet.</p><p>The <a href="https://www.gov.uk/government/publications/national-cyber-strategy-2022/national-cyber-security-strategy-2022">UK’s Cyber Strategy</a> was launched at the end of 2022, and in March of this year, a <a href="https://www.gov.uk/government/news/government-sets-out-strategy-to-protect-nhs-from-cyber-attacks">strategy</a> was released to specifically protect its National Health Service (NHS) from cyber attacks — in May it was time for the UK’s <a href="https://www.infosecurity-magazine.com/news/uk-military-security-by-design/">Ministry of Defence to do the same</a>. In Germany, the new <a href="https://www.auswaertiges-amt.de/en/aussenpolitik/digital-strategy/2551972">Digital Strategy</a> is from 2022, but the <a href="https://www.auswaertiges-amt.de/en/aussenpolitik/themen/-/2601730">Security Strategy</a> arrived in June. A similar scenario is seen in <a href="https://www.mofa.go.jp/fp/nsp/page1we_000081.html">Japan</a>, <a href="https://www.homeaffairs.gov.au/about-us/our-portfolios/cyber-security/strategy/2023-2030-australian-cyber-security-strategy">Australia</a>, and others.</p><p>That said, here are the reading suggestions related to more general country related attacks, but also policy and trust cybersecurity:</p>
    <div>
      <h3>One year of war in Ukraine: Internet trends, attacks, and resilience (<a href="/one-year-of-war-in-ukraine/">✍️</a>)</h3>
      <a href="#one-year-of-war-in-ukraine-internet-trends-attacks-and-resilience">
        
      </a>
    </div>
    <p>This blog <a href="/one-year-of-war-in-ukraine/">post</a> reports on Internet insights during the war in Europe, and discusses how Ukraine's Internet remained resilient in spite of dozens of attacks, and disruptions in three different stages of the conflict.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2u3okH81n3Jot9rjymcUbJ/0db8d140be0740ffba8c2168f92e1bb7/image4-7.png" />
            
            </figure><p>Application-layer cyber attacks in Ukraine <a href="/one-year-of-war-in-ukraine/">rose 1,300%</a> in early March 2022 compared to pre-war levels.</p>
    <div>
      <h3>The White House’s National Cybersecurity Strategy asks the private sector to step up to fight cyber attacks. Cloudflare is ready (<a href="/the-white-houses-national-cybersecurity-strategy-asks-the-private-sector-to-step-up-to-fight-cyber-attacks-cloudflare-is-ready/">✍️</a>)</h3>
      <a href="#the-white-houses-national-cybersecurity-strategy-asks-the-private-sector-to-step-up-to-fight-cyber-attacks-cloudflare-is-ready">
        
      </a>
    </div>
    <p>The White House released in March 2023 the National Cybersecurity Strategy aimed at preserving and extending the open, free, global, interoperable, reliable, and securing the Internet. Cloudflare welcomed the Strategy, and the much-needed policy initiative, highlighting the need of defending critical infrastructure, where Zero Trust plays a big role. In the same month, <a href="/cloudflare-commitment-to-the-2023-summit-for-democracy/">Cloudflare announced its commitment to the 2023 Summit for Democracy</a>. Also related to these initiatives, in March 2022, we launched our very own <a href="/announcing-critical-infrastructure-defense/">Critical Infrastructure Defense Project</a> (CIDP), and in December 2022, Cloudflare launched <a href="/project-safekeeping/">Project Safekeeping</a>, offering <a href="https://www.cloudflare.com/zero-trust/solutions/">Zero Trust solutions</a> to certain eligible entities in Australia, Japan, Germany, Portugal and the United Kingdom.</p>
    <div>
      <h3>Secure by default: recommendations from the CISA’s newest guide, and how Cloudflare follows these principles to keep you secure <a href="/investing-in-security-to-protect-data-privacy/">(</a><a href="/secure-by-default-understanding-new-cisa-guide/">✍️</a>)</h3>
      <a href="#secure-by-default-recommendations-from-the-cisas-newest-guide-and-how-cloudflare-follows-these-principles-to-keep-you-secure">
        
      </a>
    </div>
    <p>In <a href="/secure-by-default-understanding-new-cisa-guide/">this</a> April 2023 post we reviewed the “default secure” posture, and recommendations that were the focus of a <a href="https://www.cisa.gov/sites/default/files/2023-04/principles_approaches_for_security-by-design-default_508_0.pdf">recently published guide</a> jointly authored by several international agencies. It had US, UK, Australia, Canada, Germany, Netherlands, and New Zealand contributions. Long story short, using all sorts of tools, machine learning and a secure-by-default and by-design approach, and a few principles, will make all the difference.</p>
    <div>
      <h3>Nine years of Project Galileo and how the last year has changed it <a href="/investing-in-security-to-protect-data-privacy/">(</a><a href="/nine-years-of-project-galileo-and-how-the-last-year-has-changed-it/">✍️</a>) + Project Galileo Report <a href="/investing-in-security-to-protect-data-privacy/">(</a><a href="https://radar.cloudflare.com/reports/project-galileo-9th-anniv">✍️</a>)</h3>
      <a href="#nine-years-of-project-galileo-and-how-the-last-year-has-changed-it-project-galileo-report">
        
      </a>
    </div>
    <p>For the ninth anniversary of our <a href="https://www.cloudflare.com/galileo/">Project Galileo</a> in June 2023, the focus turned towards providing access to affordable cybersecurity tools and sharing our learnings from protecting the most vulnerable communities. There are also Project Galileo <a href="https://www.cloudflare.com/project-galileo-case-studies/?cf_target_id=1D3DEA8242B8DDE138D5C8B53C65A067">case studies</a> and how it has made a difference, including to those in <a href="https://www.cloudflare.com/case-studies/dream-girl-foundation/">education and health</a>, <a href="https://www.cloudflare.com/case-studies/muzeon/">cultural</a>, <a href="https://www.cloudflare.com/case-studies/veterans-brotherhood/">veterans</a>’ services, <a href="https://www.cloudflare.com/case-studies/internet-archive/">Internet archives</a>, and <a href="https://www.cloudflare.com/case-studies/sin-embargo/">investigative journalism</a>. A <a href="https://radar.cloudflare.com/reports/project-galileo-9th-anniv">Cloudflare Radar Project Galileo report</a> was also disclosed, with some highlights worth mentioning:</p><ul><li><p>Between July 1, 2022, and May 5, 2023, Cloudflare mitigated 20 billion attacks against organizations protected under Project Galileo. This is an average of nearly 67.7 million cyber attacks per day over the last 10 months.</p></li><li><p>For LGBTQ+ organizations, we saw an average of 790,000 attacks mitigated per day over the last 10 months, with a majority of those classified as <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS</a> attacks.</p></li><li><p>Attacks targeting civil society organizations are generally increasing. We have broken down an attack aimed at a prominent organization, with the request volume climbing as high as 667,000 requests per second. Before and after this time the organization saw little to no traffic.</p></li><li><p>In Ukraine, spikes in traffic to organizations that provide emergency response and disaster relief coincide with bombings of the country over the 10-month period.</p></li></ul>
    <div>
      <h3>Project Cybersafe Schools: bringing security tools for free to small K-12 school districts in the US (<a href="/project-cybersafe-schools/">✍️</a>)</h3>
      <a href="#project-cybersafe-schools-bringing-security-tools-for-free-to-small-k-12-school-districts-in-the-us">
        
      </a>
    </div>
    <p>Already in August 2023, Cloudflare introduced an initiative aimed at small K-12 public school districts: <a href="https://www.cloudflare.com/lp/cybersafe-schools/">Project Cybersafe Schools</a>. Announced as part of the Back to School Safely: <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/08/07/biden-harris-administration-launches-new-efforts-to-strengthen-americas-k-12-schools-cybersecurity/">K-12 Cybersecurity Summit</a> at the White House on August 7, Project Cybersafe Schools will support eligible K-12 public school districts with a package of <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> cybersecurity solutions — <i>for free</i>, and <i>with no time limit</i>. In Q2 2023, Cloudflare blocked an average of 70 million cyber threats each day targeting the U.S. education sector, and a 47%  increase in DDoS attacks quarter-over-quarter.</p><p>Privacy concerns also go hand in hand with security online, and we’ve provided further details on this topic earlier this year in relation to our investment in <a href="/investing-in-security-to-protect-data-privacy/">security to protect data privacy</a>. Cloudflare also <a href="/cloudflare-official-gdpr-code-of-conduct/">achieved</a> a new EU Cloud Code of Conduct privacy validation.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5PZvxmDRt4KAHlsn8cvb0A/da6b90441479e91b548b0bb979806191/image2-12.png" />
            
            </figure><p>This is what a record-breaking DDoS attack (exceeding <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">71 million requests</a> per second) looks like.</p>
    <div>
      <h2>1. DDoS attacks &amp; solutions</h2>
      <a href="#1-ddos-attacks-solutions">
        
      </a>
    </div>
    
    <div>
      <h3>DDoS threat report for 2023 Q2 (<a href="/ddos-threat-report-2023-q2/">✍️</a>)</h3>
      <a href="#ddos-threat-report-for-2023-q2">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attacks</a> (distributed denial-of-service) are not new, but they’re still one of the main tools used by attackers. In Q2 2023, Cloudflare witnessed an unprecedented escalation in DDoS attack sophistication, and our report delves into this phenomenon. Pro-Russian hacktivists REvil, Killnet and <a href="https://www.cloudflare.com/learning/ddos/glossary/anonymous-sudan/">Anonymous Sudan</a> joined forces to attack Western sites. Mitel vulnerability exploits surged by a whopping 532%, and attacks on crypto rocketed up by 600%. Also, more broadly, attacks exceeding three hours have increased by 103% quarter-over-quarter.</p><p><a href="/ddos-threat-report-2023-q2/">This</a> blog post and the corresponding <a href="https://radar.cloudflare.com/reports/ddos-2023-q2">Cloudflare Radar report</a> shed light on some of these trends. On the other hand, in our <a href="https://radar.cloudflare.com/reports/ddos-2023-q1">Q1 2023 DDoS threat report</a>, a surge in hyper-volumetric attacks that leverage a new generation of botnets that are comprised of Virtual Private Servers (VPS) was observed.</p>
    <div>
      <h3>Killnet and AnonymousSudan DDoS attack Australian university websites, and threaten more attacks — here’s what to do about it  (<a href="/ddos-attacks-on-australian-universities/">✍️</a>)</h3>
      <a href="#killnet-and-anonymoussudan-ddos-attack-australian-university-websites-and-threaten-more-attacks-heres-what-to-do-about-it">
        
      </a>
    </div>
    <p>In late March 2023, Cloudflare observed HTTP DDoS attacks targeting university websites in Australia. Universities were the first of several groups publicly targeted by the pro-Russian hacker group Killnet and their affiliate AnonymousSudan. This post not only shows a trend with these organized groups targeted attacks but also provides specific recommendations.</p><p>In January 2023, something similar was seen with increased cyberattacks to <a href="/cyberattacks-on-holocaust-educational-websites-increased-in-2022/">Holocaust educational websites</a> protected by Cloudflare’s Project Galileo.</p>
    <div>
      <h3>Uptick in healthcare organizations experiencing targeted DDoS attacks (<a href="/uptick-in-healthcare-organizations-experiencing-targeted-ddos-attacks/">✍️</a>)</h3>
      <a href="#uptick-in-healthcare-organizations-experiencing-targeted-ddos-attacks">
        
      </a>
    </div>
    <p>In early February 2023, Cloudflare, as well as other sources, observed an uptick in healthcare organizations targeted by a pro-Russian hacktivist group claiming to be Killnet. There was an increase in the number of these organizations seeking our help to defend against such attacks. Additionally, healthcare organizations that were already protected by Cloudflare experienced mitigated HTTP DDoS attacks.</p>
    <div>
      <h3>Cloudflare mitigates record-breaking 71 million request-per-second DDoS attack (<a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">✍️</a>)</h3>
      <a href="#cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack">
        
      </a>
    </div>
    <p>Also in early February, Cloudflare detected and mitigated dozens of hyper-volumetric DDoS attacks, one of those that became a record-breaking one. The majority of attacks peaked in the ballpark of 50-70 million requests per second (rps) with the largest exceeding 71Mrps. This was the largest reported HTTP DDoS attack on record to date, more than 54% higher than the previous reported record of 46M rps in June 2022.</p>
    <div>
      <h3>SLP: a new DDoS amplification vector in the wild (<a href="/slp-new-ddos-amplification-vector/">✍️</a>)</h3>
      <a href="#slp-a-new-ddos-amplification-vector-in-the-wild">
        
      </a>
    </div>
    <p>This blog post from April 2023 highlights how researchers have published the discovery of a new DDoS reflection/amplification attack vector leveraging the SLP protocol (<a href="https://en.wikipedia.org/wiki/Service_Location_Protocol">Service Location Protocol</a>). The prevalence of SLP-based DDoS attacks is also expected to rise, but our <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">automated DDoS protection system</a> keeps Cloudflare customers safe.</p><p>Additionally, this year, also in April, a new and <a href="/network-analytics-v2-announcement/">improved Network Analytics dashboard</a> was introduced, providing security professionals insights into their DDoS attack and traffic landscape.</p>
    <div>
      <h2>2. Application level attacks &amp; WAF</h2>
      <a href="#2-application-level-attacks-waf">
        
      </a>
    </div>
    
    <div>
      <h3>The state of application security in 2023 (<a href="/application-security-2023/">✍️</a>)</h3>
      <a href="#the-state-of-application-security-in-2023">
        
      </a>
    </div>
    <p>For the second year in a row we published our <a href="/application-security-2023/">Application Security Report</a>. There’s a lot to unpack here, in a year when, according to <a href="https://news.netcraft.com/archives/2023/02/28/february-2023-web-server-survey.html">Netcraft</a>, Cloudflare became the most commonly used web server vendor within the top million sites (it has now a 22% market share). Here are some highlights:</p><ul><li><p>6% of daily HTTP requests (proxied by the Cloudflare network) are mitigated on average. It’s down two percentage points compared to last year.</p></li><li><p>DDoS mitigation accounts for more than 50% of all mitigated traffic, so it’s still the largest contributor to mitigated layer 7 (application layer) HTTP requests.</p></li><li><p>Compared to last year, however, mitigation by the Cloudflare WAF (<a href="https://www.cloudflare.com/application-services/products/waf/">Web Application Firewall</a>) has grown significantly, and now accounts for nearly 41% of mitigated requests.</p></li><li><p>HTTP Anomaly (examples include malformed method names, null byte characters in headers, etc.) is the most frequent layer 7 attack vectors mitigated by the WAF.</p></li><li><p>30% of HTTP traffic is automated (bot traffic). 55% of dynamic (non cacheable) traffic is API related. 65% of global API traffic is generated by browsers.</p></li><li><p>16% of non-verified bot HTTP traffic is mitigated.</p></li><li><p>HTTP Anomaly surpasses <a href="https://www.cloudflare.com/learning/security/threats/sql-injection/">SQLi</a> (code injection technique used to attack data-driven applications) as the most common attack vector on API endpoints. Brute force <a href="https://www.cloudflare.com/zero-trust/solutions/account-takeover-prevention/">account takeover attacks</a> are increasing. Also, Microsoft Exchange is attacked more than WordPress.</p></li></ul>
    <div>
      <h3>How Cloudflare can help stop malware before it reaches your app (<a href="/waf-content-scanning/">✍️</a>)</h3>
      <a href="#how-cloudflare-can-help-stop-malware-before-it-reaches-your-app">
        
      </a>
    </div>
    <p>In April 2023, we made the job of application security teams easier, by providing a content scanning engine integrated with our Web Application Firewall (WAF), so that malicious files being uploaded by end users, never reach origin servers in the first place. Since September 2022, our <a href="/stop-attacks-before-they-are-known-making-the-cloudflare-waf-smarter/">Cloudflare WAF became smarter</a> in helping stop attacks before they are known.</p>
    <div>
      <h3>Announcing WAF Attack Score Lite and Security Analytics for business customers  (<a href="/waf-attack-score-for-business-plan/">✍️</a>)</h3>
      <a href="#announcing-waf-attack-score-lite-and-security-analytics-for-business-customers">
        
      </a>
    </div>
    <p>In March 2023, we <a href="/waf-attack-score-for-business-plan/">announced</a> that our machine learning <a href="/stop-attacks-before-they-are-known-making-the-cloudflare-waf-smarter/">empowered WAF and Security analytics</a> view were made available to our Business plan customers, to help detect and stop attacks before they are known. In a nutshell: Early detection + Powerful mitigation = Safer Internet. Or:</p>
            <pre><code>early_detection = True
powerful_mitigation = True
safer_internet = early_detection and powerful_mitigation</code></pre>
            
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/22VmDewiUvzDtIX0ZJ5bbn/7a638b27aea1488ca219ae738b9cc294/image5-6.png" />
            
            </figure>
    <div>
      <h2>3. Phishing (Area 1 and Zero Trust)</h2>
      <a href="#3-phishing-area-1-and-zero-trust">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">Phishing</a> remains the primary way to breach organizations. According to <a href="https://www.cisa.gov/stopransomware/general-information">CISA</a>, 90% of cyber attacks begin with it. The FBI has been publishing <a href="https://www.ic3.gov/">Internet Crime Reports</a>, and in the most <a href="https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf">recent</a>, phishing continues to be ranked #1 in the top five Internet crime types. Reported phishing crimes and victim losses increased by 1038% since 2018, reaching 300,497 incidents in 2022. The <a href="https://www.ic3.gov/Media/Y2022/PSA220504">FBI</a> also referred to <a href="https://www.cloudflare.com/learning/email-security/business-email-compromise-bec/">Business Email Compromise</a> as the $43 billion problem facing organizations, with complaints increasing by 127% in <a href="https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf">2022</a>, resulting in $3.31 billion in related losses, compared to 2021.</p><p>In 2022, Cloudflare Area 1 kept 2.3 billion unwanted messages out of customer inboxes. This year, that number will be easily surpassed.</p>
    <div>
      <h3>Introducing Cloudflare's 2023 phishing threats report (<a href="/2023-phishing-report/">✍️</a>)</h3>
      <a href="#introducing-cloudflares-2023-phishing-threats-report">
        
      </a>
    </div>
    <p>In August 2023, Cloudflare published its first <a href="/2023-phishing-report/">phishing threats report</a> — fully available <a href="https://www.cloudflare.com/lp/2023-phishing-report/">here</a>. The report explores key phishing trends and related recommendations, based on email security data from May 2022 to May 2023.</p><p>Some takeaways include how attackers using deceptive links was the #1 phishing tactic — and how they are evolving how they get you to click and when they weaponize the link. Also, identity deception takes multiple forms (including business email compromise (BEC) and brand impersonation), and can easily bypass email authentication standards.</p>
    <div>
      <h3>Cloudflare Area 1 earns SOC 2 report (<a href="/area-1-earns-soc-2-report/">✍️</a>)</h3>
      <a href="#cloudflare-area-1-earns-soc-2-report">
        
      </a>
    </div>
    <p>More than one year ago, Cloudflare <a href="/why-we-are-acquiring-area-1/">acquired</a> Area 1 Security, and with that we added to our <a href="https://www.cloudflare.com/zero-trust-hub/">Cloudflare Zero Trust platform</a> an essential cloud-native <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">email security</a> service that identifies and blocks attacks before they hit user inboxes. This year, we’ve obtained one of the best ways to provide customers assurance that the sensitive information they send to us can be kept safe: a <a href="https://us.aicpa.org/interestareas/frc/assuranceadvisoryservices/serviceorganization-smanagement">SOC 2 Type II report</a>.</p>
    <div>
      <h3>Email Link Isolation: your safety net for the latest phishing attacks (<a href="/area1-eli-ga">✍️</a>)</h3>
      <a href="#email-link-isolation-your-safety-net-for-the-latest-phishing-attacks">
        
      </a>
    </div>
    <p>Back in January, during our <a href="/tag/cio-week/">CIO Week</a>, Email Link Isolation was made generally available to all our customers. What is it? A safety net for the suspicious links that end up in inboxes and that users may click — anyone can click on the wrong link by mistake. This added protection turns <a href="https://www.cloudflare.com/products/zero-trust/email-security/">Cloudflare Area 1</a> into the most comprehensive <a href="https://www.cloudflare.com/zero-trust/solutions/email-security-services/">email security solution</a> when it comes to protecting against malware, <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">phishing attacks</a>, etc. Also, in true Cloudflare fashion, it’s a one-click deployment.</p><p>Additionally, from the same week, Cloudflare combined capabilities from <a href="/dlp-area1-to-protect-data-in-email/">Area 1 Email Security and Data Loss Prevention (DLP)</a> to provide complete data protection for corporate email, and also partnered with <a href="/knowbe4-emailsecurity-integration/">KnowBe4 to equip organizations with real-time security coaching to avoid phishing attacks.</a></p>
    <div>
      <h3>How to stay safe from phishing (<a href="/stay-safe-phishing-attacks/">✍️</a>)</h3>
      <a href="#how-to-stay-safe-from-phishing">
        
      </a>
    </div>
    <p>Phishing attacks come in all sorts of ways to fool people. <a href="/stay-safe-phishing-attacks/">This</a> high level “phish” guide, goes over the different types — while email is definitely the most common, there are others —, and provides some tips to help you catch these scams before you fall for them.</p>
    <div>
      <h3>Top 50 most impersonated brands in phishing attacks and new tools you can use to protect your employees from them (<a href="/50-most-impersonated-brands-protect-phishing/">✍️</a>)</h3>
      <a href="#top-50-most-impersonated-brands-in-phishing-attacks-and-new-tools-you-can-use-to-protect-your-employees-from-them">
        
      </a>
    </div>
    <p><a href="/50-most-impersonated-brands-protect-phishing/">Here</a> we go over arguably one of the hardest challenges any security team is constantly facing, detecting, blocking, and mitigating the risks of phishing attacks. During our <a href="/tag/security-week/">Security Week</a> in March, a Top 50 list of the most impersonated brands in phishing attacks was presented (spoiler alert: AT&amp;T Inc., PayPal, and Microsoft are on the podium).</p><p>Additionally, it was also announced the expansion of the phishing protections available to Cloudflare One customers by automatically identifying — and blocking — so-called “confusable” domains. What is <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a>? It’s our suite of products that provides a customizable, and integrated with what a company already uses, Zero Trust <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/">network-as-a-service</a> platform. It’s built for that already mentioned ease of mind and fearless online use. Cloudflare One, along with the use of physical security keys, was what <a href="/2022-07-sms-phishing-attacks/">thwarted the sophisticated “Oktapus” phishing attack targeting Cloudflare employees</a> last summer.</p><p>On the Zero Trust front, you can also find our recent PDF guide titled “<a href="https://cf-assets.www.cloudflare.com/slt3lc6tev37/4R2Wyj1ERPecMhbycOiPj8/c30f3e8502a04c6626e98072c48d4d7b/Zero_Trust_Roadmap_for_High-Risk_Organizations.pdf">Cloudflare Zero Trust: A roadmap for highrisk organizations”</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/lrCgf6J1UTCuibMo1ciaZ/32ee445ad7f038a8372860b1965ecac0/image3-6.png" />
            
            </figure>
    <div>
      <h2>4. AI/Malware/Ransomware &amp; other risks</h2>
      <a href="#4-ai-malware-ransomware-other-risks">
        
      </a>
    </div>
    <p>We have shown in previous years the role of our <a href="/security-center-investigate/">Cloudflare Security Center</a> to investigate threats, and the relevance of different types of risks, such as these two 2022 and 2021 examples: “<a href="/targeted-ransomware-attack/">Anatomy of a Targeted Ransomware Attack</a>” and “<a href="/ransom-ddos-attacks-target-a-fortune-global-500-company/">Ransom DDoS attacks target a Fortune Global 500 company</a>”. However, there are new risks in the 2023 horizon.</p>
    <div>
      <h3>How to secure Generative AI applications <a href="/investing-in-security-to-protect-data-privacy/">(</a><a href="/secure-generative-ai-applications/">✍️</a>)</h3>
      <a href="#how-to-secure-generative-ai-applications">
        
      </a>
    </div>
    <p>Groundbreaking technology brings groundbreaking challenges. Cloudflare has experience protecting some of the largest AI applications in the world, and in this <a href="/secure-generative-ai-applications/">blog post</a> there are some tips and best practices for securing <a href="https://www.cloudflare.com/learning/ai/what-is-generative-ai/">generative AI</a> applications. Success in consumer-facing applications inherently expose the underlying AI systems to millions of users, vastly increasing the potential <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">attack surface</a>.</p>
    <div>
      <h3>Using the power of Cloudflare’s global network to detect malicious domains using machine learning  <a href="/investing-in-security-to-protect-data-privacy/">(</a><a href="/threat-detection-machine-learning-models/">✍️</a>)</h3>
      <a href="#using-the-power-of-cloudflares-global-network-to-detect-malicious-domains-using-machine-learning">
        
      </a>
    </div>
    <p>Taking into account the objective of <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">preventing threats</a> before they create havoc, <a href="/threat-detection-machine-learning-models/">here</a> we go over that Cloudflare recently developed proprietary models leveraging machine learning and other advanced analytical techniques. These are able to detect security threats that take advantage of the domain name system (<a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a>), known as the phonebook of the Internet.</p>
    <div>
      <h3>How sophisticated scammers and phishers are preying on customers of Silicon Valley Bank <a href="/investing-in-security-to-protect-data-privacy/">(</a><a href="/how-sophisticated-scammers-and-phishers-are-preying-on-customers-of-silicon-valley-bank/">✍️</a>)</h3>
      <a href="#how-sophisticated-scammers-and-phishers-are-preying-on-customers-of-silicon-valley-bank">
        
      </a>
    </div>
    <p>In order to breach trust and trick unsuspecting victims, threat actors overwhelmingly use topical events as lures. The news about what happened at <a href="https://en.wikipedia.org/wiki/Collapse_of_Silicon_Valley_Bank">Silicon Valley Bank</a> earlier this year was one of the latest events to watch out for and stay vigilant against opportunistic phishing campaigns using SVB as the lure. At that time, <a href="/introducing-cloudforce-one-threat-operations-and-threat-research/">Cloudforce One</a> (Cloudflare’s threat operations and research team) significantly increased our brand monitoring focused on SVB’s digital presence.</p>
    <div>
      <h3>How Cloudflare can help stop malware before it reaches your app <a href="/investing-in-security-to-protect-data-privacy/">(</a><a href="/waf-content-scanning/">✍️</a>)</h3>
      <a href="#how-cloudflare-can-help-stop-malware-before-it-reaches-your-app">
        
      </a>
    </div>
    <p>In April 2023, Cloudflare <a href="/waf-content-scanning/">launched</a> a tool to make the job of application security teams easier, by providing a content scanning engine integrated with our Web Application Firewall (WAF), so that malicious files being uploaded by end users, never reach origin servers in the first place.</p>
    <div>
      <h3>Analyze any URL safely using the Cloudflare Radar URL Scanner  (<a href="/radar-url-scanner-early-access/">✍️</a>)</h3>
      <a href="#analyze-any-url-safely-using-the-cloudflare-radar-url-scanner">
        
      </a>
    </div>
    <p><a href="https://radar.cloudflare.com/">Cloudflare Radar</a> is our free platform for Internet insights. In <a href="/radar-url-scanner-early-access/">March</a>, our <a href="https://radar.cloudflare.com/scan">URL Scanner</a> was launched, allowing anyone to analyze a URL safely. The report that it creates contains a myriad of technical details, including a phishing scan. Many users have been using it for security reasons, but others are just exploring what’s under-the-hood look at any webpage.</p>
    <div>
      <h3>Unmasking the top exploited vulnerabilities of 2022 (<a href="/unmasking-the-top-exploited-vulnerabilities-of-2022/">✍️</a>)</h3>
      <a href="#unmasking-the-top-exploited-vulnerabilities-of-2022">
        
      </a>
    </div>
    <p>Last, but not least, already from August 2023, this <a href="/unmasking-the-top-exploited-vulnerabilities-of-2022/">blog post</a> focuses on the <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a">most commonly exploited vulnerabilities</a>, according to the Cybersecurity and Infrastructure Security Agency (CISA). Given Cloudflare’s role as a reverse proxy to a large portion of the Internet, we delve into how the Common Vulnerabilities and Exposures (CVEs) mentioned by CISA are being exploited on the Internet, and a bit of what has been learned.</p><p>If you want to <a href="https://www.cloudflare.com/learning/security/glossary/website-security-checklist/">learn about making a website more secure</a> (and faster) while loading third-party tools like Google Analytics 4, Facebook CAPI, TikTok, and others, you can get to know our <a href="https://developers.cloudflare.com/zaraz/">Cloudflare Zaraz</a> solution. It reached <a href="/cloudflare-zaraz-steps-up-general-availability-and-new-pricing/">general availability in July 2023</a>.</p>
    <div>
      <h2>Wrap up</h2>
      <a href="#wrap-up">
        
      </a>
    </div>
    <blockquote><p><b><i>“The Internet was not built for what it has become”.</i></b></p></blockquote><p>This is how one of <a href="https://www.sec.gov/Archives/edgar/data/1477333/000119312519222176/d735023ds1.htm">Cloudflare’s S-1 document</a> sections begins. It is also commonly <a href="/welcome-to-the-supercloud-and-developer-week-2022/">referenced</a> in our blog to show how this remarkable experiment, the network of networks, wasn’t designed for the role it now plays in our daily lives and work. Security, performance and privacy are crucial in a time when anyone can be the target of an attack, threat, or vulnerability. While AI can aid in mitigating attacks, it also adds complexity to attackers' tactics.</p><p>With that in mind, as we've highlighted in this 2023 reading list suggestions/online attacks guide, prioritizing the prevention of detrimental attack outcomes remains the optimal strategy. Hopefully, it will make some of the attacks on your company go unnoticed or be consequences-free, or even transform them into interesting stories to share when you access your security dashboard.</p><p>If you're interested in exploring specific examples, you can delve into case studies within our <a href="https://www.cloudflare.com/case-studies/">hub</a>, where you’ll find security related stories from different institutions. From a technology company like <a href="https://www.cloudflare.com/case-studies/sage/">Sage</a>, to the <a href="https://www.cloudflare.com/case-studies/state-of-arizona/">State of Arizona</a>, or the <a href="https://www.cloudflare.com/case-studies/republic-of-estonian-information-security-authority/">Republic of Estonia Information Security Authority</a>, and even <a href="https://www.cloudflare.com/case-studies/cybernews/">Cybernews</a>, a cybersecurity news media outlet.</p><p>And because the future of a private and secure Internet is also in our minds, it's worth mentioning that in March 2022, <a href="/post-quantum-for-all/">Cloudflare enabled post-quantum cryptography support</a> for all our customers. The topic of post-quantum cryptography, designed to be secure against the threat of quantum computers, is quite interesting and worth some <a href="/tag/post-quantum/">delving into</a>, but even without knowing what it is, it’s good to know that protection is already here.</p><p>If you want to try some security features mentioned, the <a href="https://www.cloudflare.com/securitycenter/">Cloudflare Security Center</a> is a good place to start (free plans included). The same applies to our <a href="https://www.cloudflare.com/plans/zero-trust-services/">Zero Trust ecosystem</a> (or <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> as our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a>, Secure Access Service Edge) that is available as self-serve, and also includes a free plan. This vendor-agnostic <a href="https://zerotrustroadmap.org/">roadmap</a> shows the general advantages of the Zero Trust architecture, and as we’ve seen, there’s also one focused on <a href="https://cf-assets.www.cloudflare.com/slt3lc6tev37/4R2Wyj1ERPecMhbycOiPj8/c30f3e8502a04c6626e98072c48d4d7b/Zero_Trust_Roadmap_for_High-Risk_Organizations.pdf">high risk organizations</a>.</p><p>Be cautious. Be <a href="https://support.cloudflare.com/hc/en-us/sections/360007347692-Attack-Preparation-and-Response">prepared</a>. Be safe.</p> ]]></content:encoded>
            <category><![CDATA[Reading List]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">4mxh0oGX2mtQSH1OHQ4lpK</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[2022 attacks! An August reading list to go “Shields Up”]]></title>
            <link>https://blog.cloudflare.com/2022-attacks-an-august-reading-list-to-go-shields-up/</link>
            <pubDate>Thu, 11 Aug 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ In 2022, cybersecurity, more than ever, is a must-have for those who don’t want to take chances on getting caught in a cyberattack with difficult to deal with consequences. Here’s a reading list what you need to know about attacks that is also a guide on how to be protected ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2WdxQhESmU4TimGkFrxvrP/283d2dc9985cf2c23bd725e5e94e8f35/image4-2.png" />
            
            </figure><p>In 2022, <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cybersecurity</a> is a must-have for those who don’t want to take chances on getting caught in a cyberattack with difficult to deal consequences. And with a war in Europe (<a href="/tag/ukraine/">Ukraine</a>) still going on, cyberwar also doesn’t show signs of stopping in a time when there never were so many people online, 4.95 billion in early 2022, 62.5% of the world’s total population (<a href="https://datareportal.com/reports/digital-2022-global-overview-report">estimates</a> say it grew around 4% during 2021 and <a href="https://datareportal.com/reports/digital-2021-global-overview-report">7.3%</a> in 2020).</p><p>Throughout the year we, at Cloudflare, have been making new announcements of products, solutions and initiatives that highlight the way we have been <a href="https://www.cloudflare.com/learning/ddos/how-to-prevent-ddos-attacks/">preventing</a>, mitigating and constantly learning, over the years, with several thousands of small and big cyberattacks. Right now, we block an average of 124 billion cyber threats per day. The more we deal with attacks, the more we know how to stop them, and the easier it gets to find and deal with new threats — and for customers to forget we’re there, protecting them.</p><p>In 2022, we have been onboarding many customers while they’re being attacked, something we know well from the past (<a href="https://www.cloudflare.com/case-studies/wikimedia-foundation/">Wikimedia/Wikipedia</a> or <a href="https://www.cloudflare.com/case-studies/eurovision/">Eurovision</a> are just two case-studies of <a href="https://www.cloudflare.com/case-studies">many</a>, and last year there was a Fortune Global 500 company example we <a href="/ransom-ddos-attacks-target-a-fortune-global-500-company/">wrote about</a>). Recently, we dealt and did a <a href="/2022-07-sms-phishing-attacks/">rundown</a> about an SMS phishing attack.</p><p>Providing services for <a href="https://w3techs.com/technologies/overview/proxy/all">almost 20%</a> of websites online and to millions of Internet properties and customers using our global network in more than <a href="/new-cities-april-2022-edition/">270 cities</a> (recently we arrived to <a href="/cloudflare-deployment-in-guam/">Guam</a>) also plays a big role. For example, in Q1’22 Cloudflare blocked an average of 117 billion cyber threats each day (much more than in previous quarters).</p><p>Now that August is here, and many in the Northern Hemisphere are enjoying the summer and vacations, let’s do a reading list that is also a sum up focused on cyberattacks that also gives, by itself, some 2022 guide on this more than ever relevant area.</p>
    <div>
      <h2>War &amp; Cyberwar: Attacks increasing</h2>
      <a href="#war-cyberwar-attacks-increasing">
        
      </a>
    </div>
    <p>But first, some context. There are all sorts of attacks, but they have been generally speaking increasing and just to give some of our data regarding <a href="/ddos-attack-trends-for-2022-q2/">DDoS attacks in 2022 Q2</a>: ​​application-layer attacks increased by 72% YoY (Year over Year) and network-layer DDoS attacks increased by 109% YoY.</p><p>The US government gave “warnings” back in March, after the war in Ukraine started, to all in the country but also allies and partners to be aware of the need to “enhance cybersecurity”. The US Cybersecurity and Infrastructure Security Agency (CISA) created the <a href="https://www.cisa.gov/shields-up">Shields Up</a> initiative, given how the “Russia’s invasion of Ukraine could impact organizations both within and beyond the region”. The <a href="/shields-up-free-cloudflare-services-to-improve-your-cyber-readiness/#:~:text=National%20Cyber%20Security%20Center">UK</a> and <a href="https://www.meti.go.jp/press/2021/02/20220221003/20220221003.html">Japan</a>, among others, also issued warnings.</p><p>That said, here are the two first and more general about attacks reading list suggestions:</p><p><b>Shields up: free Cloudflare services to improve your cyber readiness (</b><a href="/shields-up-free-cloudflare-services-to-improve-your-cyber-readiness/"><b>✍️</b></a><b>)</b>After the war started and governments released warnings, we did this free Cloudflare services cyber readiness sum up <a href="/shields-up-free-cloudflare-services-to-improve-your-cyber-readiness/">blog post</a>. If you’re a seasoned IT professional or a novice website operator, you can see a variety of services for websites, apps, or APIs, including DDoS mitigation and protection of teams or even personal devices (from phones to routers). If this resonates with you, this announcement of collaboration to simplify the adoption of Zero Trust for IT and security teams could also be useful: <a href="/cloudflare-crowdstrike-partnership/">CrowdStrike’s endpoint security meets Cloudflare’s Zero Trust Services</a>.</p><p><b>In Ukraine and beyond, what it takes to keep vulnerable groups online (</b><a href="/in-ukraine-and-beyond-what-it-takes-to-keep-vulnerable-groups-online/"><b>✍️</b></a><b>)</b>This <a href="/in-ukraine-and-beyond-what-it-takes-to-keep-vulnerable-groups-online/">blog post</a> is focused on the eighth anniversary of our <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>, that has been helping human-rights, journalism and non-profits public interest organizations or groups. We highlight the trends of the past year, including the dozens of organizations related to <a href="/tag/Ukraine">Ukraine</a> that were onboarded (many while being attacked) since the war started. Between July 2021 and May 2022, we’ve blocked an average of nearly 57.9 million cyberattacks per day, an increase of nearly 10% over last year in a total of 18 billion attacks.</p><p>In terms of attack methods to Galileo protected organizations, the largest fraction (28%) of mitigated requests were classified as “HTTP Anomaly”, with 20% of mitigated requests tagged as <a href="https://www.cloudflare.com/learning/security/threats/sql-injection/">SQL injection or SQLi attempts</a> (to target databases) and nearly 13% as attempts to exploit specific <a href="https://www.cve.org/">CVEs</a> (publicly disclosed cybersecurity vulnerabilities) — you can find more insights about those <a href="/tag/cve/">here</a>, including the <a href="/waf-mitigations-spring4shell/">Spring4Shell</a> vulnerability, the <a href="/tag/log4j/">Log4j</a> or the <a href="/cloudflare-customers-are-protected-from-the-atlassian-confluence-cve-2022-26134/">Atlassian</a> one.</p><p>And now, without further ado, here’s the full reading list/attacks guide where we highlight some blog posts around four main topics:</p>
    <div>
      <h2>1. DDoS attacks &amp; solutions</h2>
      <a href="#1-ddos-attacks-solutions">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2xhurw0Ra8EQ5RTgWXrEIz/efd281a15340a5e0765cdfb904fdd9c9/image5-2.png" />
            
            </figure><p>The most powerful botnet to date, <a href="/mantis-botnet/">Mantis</a>.</p><p><b>Cloudflare mitigates 26 million request per second DDoS attack (</b><a href="/26m-rps-ddos/"><b>✍️</b></a><b>)</b><a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service (DDoS)</a> are the bread and butter of <a href="https://portswigger.net/daily-swig/nation-state-threat-how-ddos-over-tcp-technique-could-amplify-attacks">state-based</a> attacks, and we’ve been <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">automatically</a> detecting and mitigating them. Regardless of which country initiates them, bots are all around the world and <a href="/26m-rps-ddos/">in this blog post</a> you can see a specific example on how big those attacks can be (in this case the attack targeted a customer website using Cloudflare’s Free plan). We’ve named this most powerful botnet to date, <a href="/mantis-botnet/">Mantis</a>.</p><p>That said, we also explain that although most of the attacks are small, e.g. cyber vandalism, even small attacks can severely impact unprotected Internet properties.</p><p><b>DDoS attack trends for 2022 Q2 (</b><a href="/ddos-attack-trends-for-2022-q2/"><b>✍️</b></a><b>)</b>We already mentioned how application (72%) and network-layer (109%) attacks have been growing year over year — in the latter, attacks of 100 Gbps and larger increased by 8% QoQ, and attacks lasting more than 3 hours increased by 12% QoQ. <a href="/ddos-attack-trends-for-2022-q2/"><b>Here</b></a> you can also find interesting trends, like how Broadcast Media companies in Ukraine were the most targeted in Q2 2022 by DDoS attacks. In fact, all the top five most attacked industries are all in online/Internet media, publishing, and broadcasting.</p><p><b>Cloudflare customers on Free plans can now also get real-time DDoS alerts</b> <b>(</b><a href="/free-ddos-alerts/"><b>✍️</b></a><b>)</b>A DDoS is cyber-attack that attempts to disrupt your online business and can be used in any type of Internet property, server, or network (whether it relies on <a href="/attacks-on-voip-providers/">VoIP</a> servers, UDP-based gaming servers, or HTTP servers). That said, our <a href="https://www.cloudflare.com/plans/free/">Free plan</a> can now get real-time alerts about HTTP DDoS attacks that were automatically detected and mitigated by us.</p><p>One of the benefits of Cloudflare is that all of our services and features can work together to protect your website and also improve its performance. Here’s our specialist, <a href="/author/omer/">Omer Yoachimik</a>, top 3 tips to leverage a <a href="https://www.cloudflare.com/plans/free/">Cloudflare free account</a> (and put your settings more efficient to deal with DDoS attacks):</p><ol><li><p>Put Cloudflare in front of your website:</p><ul><li><p><a href="https://developers.cloudflare.com/dns/zone-setups/full-setup/setup/">Onboard your website to Cloudflare</a> and ensure all of your HTTP traffic routes through Cloudflare. Lock down your origin server, so it only accepts traffic from <a href="https://developers.cloudflare.com/fundamentals/get-started/setup/allow-cloudflare-ip-addresses/">Cloudflare IPs</a>.</p></li></ul></li><li><p>Leverage Cloudflare’s free security features</p><ul><li><p><b>DDoS Protection</b>: it’s enabled by default, and if needed you can also <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/adjust-rules/false-negative/#incomplete-mitigations">override the action to Block</a> for rules that have a different default value.</p></li><li><p><b>Security Level</b>: this feature will automatically issue challenges to requests that originate from IP addresses with low IP reputation. Ensure it's <a href="https://support.cloudflare.com/hc/en-us/articles/200170056-Understanding-the-Cloudflare-Security-Level">set to Medium</a> at least.</p></li><li><p><b>Block bad bots</b> - Cloudflare’s free tier of <a href="https://developers.cloudflare.com/bots/plans/free/">bot protection</a> can help ward off simple bots (from cloud ASNs) and headless browsers by issuing a computationally expensive challenge.</p></li><li><p><b>Firewall rules</b>: you can create up to five free <a href="https://developers.cloudflare.com/firewall/">custom firewall rules</a> to block or challenge traffic that you never want to receive.</p></li><li><p><b>Managed Ruleset</b>: in addition to your custom rule, enable Cloudflare’s <a href="https://developers.cloudflare.com/waf/managed-rulesets/">Free Managed Ruleset</a> to protect against high and wide impacting vulnerabilities</p></li></ul></li><li><p>Move your content to the cloud</p><ul><li><p><a href="https://developers.cloudflare.com/cache/">Cache</a> as much of your content as possible on the Cloudflare network. The fewer requests that hit your origin, the better — including unwanted traffic.</p></li></ul></li></ol>
    <div>
      <h2>2. Application level attacks &amp; WAF</h2>
      <a href="#2-application-level-attacks-waf">
        
      </a>
    </div>
    <p><b>Application security: Cloudflare’s view (</b><a href="/application-security/"><b>✍️</b></a><b>)</b>Did you know that around 8% of all Cloudflare HTTP traffic is mitigated? That is something we explain in this application's general trends March 2022 <a href="/application-security/">blog post</a>. That means that overall, ~2.5 million requests per second are mitigated by our global network and never reach our caches or the origin servers, ensuring our customers’ bandwidth and compute power is only used for clean traffic.</p><p>You can also have a sense here of what the top mitigated traffic sources are — Layer 7 DDoS and Custom WAF (<a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewall</a>) rules are at the top — and what are the most common attacks. Other highlights include that at that time 38% of HTTP traffic we see is automated (right the number is actually lower, 31% — current trends can be seen on <a href="https://radar.cloudflare.com/">Radar</a>), and the already mentioned (about Galileo) SQLi is the most common attack vector on API endpoints.</p><p><b>WAF for everyone: protecting the web from high severity vulnerabilities (</b><a href="/waf-for-everyone/"><b>✍️</b></a><b>)</b>This <a href="/waf-for-everyone/">blog post</a> shares a relevant announcement that goes hand in hand with Cloudflare mission of "help build a better Internet" and that also includes giving some level of protection even without costs (something that also help us be better in preventing and mitigating attacks). So, since March we are providing a Cloudflare WAF Managed Ruleset that is running by default on all FREE zones, free of charge.</p><p>On this topic, there has also been a growing client side security number of threats that concerns CIOs and security professionals that we mention when we gave, in December, all paid plans access to <a href="/page-shield-generally-available/">Page Shield features</a> (last <a href="/making-page-shield-malicious-code-alerts-more-actionable/">month</a> we made Page Shield malicious code alerts more actionable. Another example is how we detect <a href="/detecting-magecart-style-attacks-for-pageshield/">Magecart-Style attacks</a> that have impacted large organizations like <a href="https://www.bbc.co.uk/news/technology-54568784">British Airways</a> and <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2020/11/ico-fines-ticketmaster-uk-limited-125million-for-failing-to-protect-customers-payment-details/">Ticketmaster</a>, resulting in substantial GDPR fines in both cases.</p>
    <div>
      <h2>3. Phishing (Area 1)</h2>
      <a href="#3-phishing-area-1">
        
      </a>
    </div>
    <p><b>Why we are acquiring Area 1 (</b><a href="/why-we-are-acquiring-area-1/"><b>✍️</b></a><b>)</b>Phishing remains the primary way to breach organizations. According to <a href="https://www.cisa.gov/stopransomware/general-information">CISA</a>, 90% of cyber attacks begin with it. And, in a recent report, the <a href="https://www.ic3.gov/Media/Y2022/PSA220504">FBI</a> referred to Business Email Compromise as the $43 Billion problem facing organizations.</p><p>It was in late February that it was announced that Cloudflare had agreed to acquire Area 1 Security to help organizations combat <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">advanced email attacks and phishing campaigns</a>. Our <a href="/why-we-are-acquiring-area-1/">blog post</a> explains that “Area 1’s team has built exceptional cloud-native technology to protect businesses from email-based security threats”. So, all that technology and expertise has been integrated since then with our global network to give customers the most complete Zero Trust security platform available.</p><p><b>The mechanics of a sophisticated phishing scam and how we stopped it (</b><a href="/2022-07-sms-phishing-attacks/"><b>✍️</b></a><b>)</b>What’s in a message? Possibly a sophisticated attack targeting employees and systems. On August 8, 2022, Twilio shared that they’d been compromised by a targeted SMS phishing attack. We saw an attack with very similar characteristics also targeting Cloudflare’s employees. <a href="/2022-07-sms-phishing-attacks/">Here</a>, we do a rundown on how we were able to thwart the attack that could have breached most organizations, by using our Cloudflare One products, and physical security keys. And how others can do the same. No Cloudflare systems were compromised.</p><p>Our <a href="/introducing-cloudforce-one-threat-operations-and-threat-research/">Cloudforce One</a> threat intelligence team dissected the attack and assisted in tracking down the attacker.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/br7n6YlxPChn033jKhwTR/321d5120fe7dbd0d8084d4c2f31b461e/image3-6.png" />
            
            </figure><p><b>Introducing browser isolation for email links to stop modern phishing threats (</b><a href="/email-link-isolation/"><b>✍️</b></a><b>)</b>Why do humans <a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7005690/">still click</a> on malicious links? It seems that it’s easier to do it than most people think (“human error is human”). <a href="/email-link-isolation/">Here</a> we explain how an organization nowadays can't truly have a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust security posture</a> without securing email; an application that end users implicitly trust and threat actors take advantage of that inherent trust.</p><p>As part of our journey to integrate Area 1 into our broader Zero Trust suite, Cloudflare Gateway customers can enable <a href="https://www.cloudflare.com/learning/access-management/what-is-browser-isolation/">Remote Browser Isolation</a> for email links. With that, we now give unmatched level of protection from modern multi-channel email-based attacks. While we’re at it, you can also learn <a href="/replace-your-email-gateway-with-area-1/">how to replace your email gateway with Cloudflare Area 1</a>.</p><p>About account takeovers, we explained back in March 2021 <a href="https://www.cloudflare.com/zero-trust/solutions/account-takeover-prevention/">how we prevent account takeovers</a> on our own applications (on the phishing side we were already using, as a customer, at the time, Area 1).</p><p>Also from last year, <a href="/research-directions-in-password-security/">here’s</a> our research in <b>password security</b> (and the problem of password reuse) — it gets technical. There’s a new password related protocol called OPAQUE (<a href="https://opaque-full.research.cloudflare.com/">we added a new demo about it on January 2022</a>) that could help better store secrets that our research team is excited about.</p>
    <div>
      <h2>4. Malware/Ransomware &amp; other risks</h2>
      <a href="#4-malware-ransomware-other-risks">
        
      </a>
    </div>
    <p><b>How Cloudflare Security does Zero Trust (</b><a href="/how-cloudflare-security-does-zero-trust/"><b>✍️</b></a><b>)</b>Security is more than ever part of an ecosystem that the more robust, the more efficient in avoiding or mitigating attacks. In this <a href="/how-cloudflare-security-does-zero-trust/">blog post</a> written for our <a href="https://www.cloudflare.com/cloudflare-one-week/">Cloudflare One week</a>, we explain how that ecosystem, in this case inside our Zero Trust services, can give protection from malware, ransomware, phishing, command &amp; control, shadow IT, and other Internet risks over all ports and protocols.</p><p>Since 2020, we launched <a href="/announcing-antivirus-in-cloudflare-gateway/">Cloudflare Gateway</a> focused on malware detection and prevention directly from the Cloudflare edge. Recently, we also include our new <a href="https://www.cloudflare.com/products/zero-trust/casb/">CASB</a> product (to secure workplace tools, personalize access, secure sensitive data).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4JXI6TtKH5z3SNlVUOM4P4/367b94a7e9e0f518374822ff2f8e7d97/image1-14.png" />
            
            </figure><p><b>Anatomy of a Targeted Ransomware Attack (</b><a href="/targeted-ransomware-attack/"><b>✍️</b></a><b>)</b>What a ransomware attack looks like for the victim:</p><blockquote><p><i>“Imagine your most critical systems suddenly stop operating. And then someone demands a ransom to get your systems working again. Or someone launches a DDoS against you and demands a ransom to make it stop. That’s the world of ransomware and ransom DDoS.”</i></p></blockquote><p>Ransomware attacks continue <a href="https://www.kroll.com/en/insights/publications/cyber/ransomware-attack-trends-2020">to be on the rise</a> and there’s no sign of them slowing down in the near future. That was true more than a year ago, when this <a href="/targeted-ransomware-attack/">blog post</a> was written and is still <a href="https://www.fitchratings.com/research/corporate-finance/ransomware-growing-cyber-risk-for-us-corporates-financials-govt-27-04-2022">ongoing</a>, up 105% YoY according to a Senate Committee March 2022 report. And the nature of ransomware attacks is changing. Here, we highlight how <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS (RDDoS)</a> attacks work, how Cloudflare onboarded and <a href="/ransom-ddos-attacks-target-a-fortune-global-500-company/">protected</a> a Fortune 500 customer from a targeted one, and how that <a href="/announcing-antivirus-in-cloudflare-gateway/">Gateway with antivirus</a> we mentioned before helps with just that.</p><p>We also show that with ransomware as a service (<a href="https://www.crowdstrike.com/cybersecurity-101/ransomware/ransomware-as-a-service-raas/">RaaS</a>) models, it’s even easier for inexperienced threat actors to get their hands on them today (“RaaS is essentially a franchise that allows criminals to rent ransomware from malware authors”). We also include some general recommendations to help you and your organization stay secure. Don’t want to click the link? Here they are:</p><ul><li><p>Use 2FA everywhere, especially on your remote access entry points. This is where Cloudflare Access really helps.</p></li><li><p>Maintain multiple redundant backups of critical systems and data, both onsite and offsite</p></li><li><p>Monitor and block malicious domains using Cloudflare Gateway + AV</p></li><li><p>Sandbox web browsing activity using Cloudflare RBI to isolate threats at the browser</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2A9QpWsLw6VCvL1l757YgV/9f4d71288d5920aeab4fe0b5f27c4091/image2-7.png" />
            
            </figure><p><b>Investigating threats using the Cloudflare Security Center (</b><a href="/security-center-investigate/"><b>✍️</b></a><b>)</b><a href="/security-center-investigate/">Here</a>, first we announce our new threat investigations portal, <i>Investigate</i>, right in the Cloudflare Security Center, that allows all customers to query directly our intelligence to streamline security workflows and tighten feedback loops.</p><p>That’s only possible because we have a global and in-depth view, given that we <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protect millions of Internet properties from attacks</a> (the free plans help us to have that insight). And the data we glean from these attacks trains our machine learning models and improves the efficacy of our network and <a href="https://www.cloudflare.com/application-services/solutions/">application security products</a>.</p><p><b>Steps we've taken around Cloudflare's services in Ukraine, Belarus, and Russia (</b><a href="/steps-taken-around-cloudflares-services-in-ukraine-belarus-and-russia/"><b>✍️</b></a><b>)</b>There’s an emergence of the known as <a href="https://en.wikipedia.org/wiki/Wiper_(malware)">wiper</a> malware attacks (intended to erase the computer it infects) and in this <a href="/steps-taken-around-cloudflares-services-in-ukraine-belarus-and-russia/">blog post</a>, among other things, we explain how when a wiper malware was identified in Ukraine (it took offline government agencies and a major bank), we successfully adapted our Zero Trust products to make sure our customers were protected. Those protections include many Ukrainian organizations, under our <a href="/in-ukraine-and-beyond-what-it-takes-to-keep-vulnerable-groups-online/">Project Galileo</a> that is having a busy year, and they were automatically put available to all our customers. More recently, the satellite provider Viasat was <a href="https://techcrunch.com/2022/05/10/russia-viasat-cyberattack/">affected</a>.</p><p><b>Zaraz use Workers to make third-party tools secure and fast (</b><a href="/zaraz-use-workers-to-make-third-party-tools-secure-and-fast/"><b>✍️</b></a><b>)</b>Cloudflare announced it acquired <a href="/cloudflare-acquires-zaraz-to-enable-cloud-loading-of-third-party-tools/">Zaraz</a> in December 2021 to help us enable cloud loading of third-party tools. Seems unrelated to attacks? Think again (this takes us back to the secure ecosystem I already mentioned). Among other things, <a href="/zaraz-use-workers-to-make-third-party-tools-secure-and-fast/"><b>here</b></a> you can learn how Zaraz can make your website more secure (and faster) by offloading third-party scripts.</p><p>That allows to avoid problems and attacks. Which? From code tampering to lose control over the data sent to third-parties. My colleague <a href="/author/yoav/">Yo'av Moshe</a> elaborates on what this solution prevents: “the third-party script can intentionally or unintentionally (due to being hacked) collect information it shouldn't collect, like credit card numbers, Personal Identifiers Information (PIIs), etc.”. You should definitely avoid those.</p><p><b>Introducing Cloudforce One: our new threat operations and research team (</b><a href="/introducing-cloudforce-one-threat-operations-and-threat-research/"><b>✍️</b></a><b>)</b><a href="/introducing-cloudforce-one-threat-operations-and-threat-research/">Meet</a> our new threat operations and research team: <b>Cloudforce One</b>. While this team will publish research, that’s not its reason for being. Its primary objective: track and disrupt threat actors. It’s all about being protected against a great flow of threats with minimal to no involvement.</p>
    <div>
      <h2>Wrap up</h2>
      <a href="#wrap-up">
        
      </a>
    </div>
    <p>The expression “if it ain't broke, don't fix it” doesn’t seem to apply to the fast pacing Internet industry, where attacks are also in the fast track. If you or your company and services aren’t properly protected, attackers (human or bots) will probably find you sooner than later (maybe they already did).</p><p>To end on a popular quote used in books, movies and in life: “You keep knocking on the devil's door long enough and sooner or later someone's going to answer you”. Although we have been onboarding many organizations while attacks are happening, that’s not the less hurtful solution — preventing and mitigating effectively and forget the protection is even there.</p><p>If you want to try some security features mentioned, the <a href="https://www.cloudflare.com/securitycenter/">Cloudflare Security Center</a> is a good place to start (free plans included). The same with our <a href="https://www.cloudflare.com/plans/zero-trust-services/">Zero Trust ecosystem</a> (or <a href="https://www.cloudflare.com/cloudflare-one/">Cloudflare One</a> as our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">SASE</a>, Secure Access Service Edge) that is available as self-serve, and also includes a free plan (this vendor-agnostic <a href="https://zerotrustroadmap.org/">roadmap</a> shows the general advantages of the Zero Trust architecture).</p><p>If trends are more your thing, <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> has a near real-time dedicated area about attacks, and you can browse and interact with our <a href="https://radar.cloudflare.com/notebooks/ddos-2022-q2">DDoS attack trends for 2022 Q2</a> report.</p> ]]></content:encoded>
            <category><![CDATA[Reading List]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <category><![CDATA[Phishing]]></category>
            <guid isPermaLink="false">5OwoJQTgAgPoadve5G7UsL</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS attack trends for 2022 Q2]]></title>
            <link>https://blog.cloudflare.com/ddos-attack-trends-for-2022-q2/</link>
            <pubDate>Wed, 06 Jul 2022 12:55:42 GMT</pubDate>
            <description><![CDATA[ Welcome to our 2022 Q2 DDoS report. This report includes insights and trends about the DDoS threat landscape — as observed across the global Cloudflare network ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4PwTj2tCMoggQJjwZmRV1N/584391a0244ab593eed0d7843af68b62/image22-2.png" />
            
            </figure><p>Welcome to our 2022 Q2 DDoS report. This report includes insights and trends about the DDoS threat landscape — as observed across the global Cloudflare network. An interactive version of this report is also available on <a href="https://radar.cloudflare.com/notebooks/ddos-2022-q2">Radar</a>.</p><p>In Q2, we’ve seen some of the largest attacks the world has ever seen including a <a href="/26m-rps-ddos/">26 million request per second HTTPS DDoS attacks</a> that Cloudflare automatically detected and mitigated. Furthermore, attacks against Ukraine and Russia continue, whilst a new <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attack</a> campaign emerged.</p>
    <div>
      <h2>The Highlights</h2>
      <a href="#the-highlights">
        
      </a>
    </div>
    
    <div>
      <h3>Ukrainian and Russian Internet</h3>
      <a href="#ukrainian-and-russian-internet">
        
      </a>
    </div>
    <ul><li><p>The war on the ground is accompanied by attacks targeting the spread of information.</p></li><li><p>Broadcast Media companies in the Ukraine were the most targeted in Q2 by DDoS attacks. In fact, all the top five most attacked industries are all in online/Internet media, publishing, and broadcasting.</p></li><li><p>In Russia on the other hand, Online Media drops as the most attacked industry to the third place. Making their way to the top, Banking, Financial Services and Insurance (BFSI) companies in Russia were the most targeted in Q2; almost 45% of all application-layer DDoS attacks targeted the BFSI sector. Cryptocurrency companies in Russia were the second most attacked.</p></li></ul><p>Read more about <a href="/what-cloudflare-is-doing-to-keep-the-open-internet-flowing-into-russia-and-keep-attacks-from-getting-out/">what Cloudflare is doing to keep the Open Internet flowing into Russia and keep attacks from getting out</a>.</p>
    <div>
      <h3>Ransom DDoS attacks</h3>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>We’ve seen a new wave of Ransom DDoS attacks by entities claiming to be the Fancy Lazarus.</p></li><li><p>In June 2022, ransom attacks peaked to the highest of the year so far: one out of every five survey respondents who experienced a DDoS attack reported being subject to a Ransom DDoS attack or other threats.</p></li><li><p>Overall in Q2, the percent of Ransom DDoS attacks increased by 11% QoQ.</p></li></ul>
    <div>
      <h3>Application-layer DDoS attacks</h3>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>In 2022 Q2, application-layer DDoS attacks increased by 72% YoY.</p></li><li><p>Organizations in the US were the most targeted, followed by Cyprus, Hong Kong, and China. Attacks on organizations in Cyprus increased by 166% QoQ.</p></li><li><p>The Aviation &amp; Aerospace industry was the most targeted in Q2, followed by the Internet industry, Banking, Financial Services and Insurance, and Gaming / Gambling in fourth place.</p></li></ul>
    <div>
      <h3>Network-layer DDoS attacks</h3>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>In 2022 Q2, network-layer DDoS attacks increased by 109% YoY. Attacks of 100 Gbps and larger increased by 8% QoQ, and attacks lasting more than 3 hours increased by 12% QoQ.</p></li><li><p>The top attacked industries were Telecommunications, Gaming / Gambling and the Information Technology and Services industry.</p></li><li><p>Organizations in the US were the most targeted, followed by China, Singapore, and Germany.</p></li></ul><p>This report is based on DDoS attacks that were automatically detected and mitigated by Cloudflare’s DDoS Protection systems. To learn more about how it works, check out <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">this deep-dive blog post</a>.</p><p><b>A note on how we measure DDoS attacks observed over our network</b></p><p>To analyze attack trends, we calculate the “DDoS activity” rate, which is either the percentage of attack traffic out of the total traffic (attack + clean) observed over our global network, or in a specific location, or in a specific category (e.g., industry or billing country). Measuring the percentages allows us to normalize data points and avoid biases reflected in absolute numbers towards, for example, a Cloudflare data center that receives more total traffic and likely, also more attacks.</p>
    <div>
      <h2>Ransom Attacks</h2>
      <a href="#ransom-attacks">
        
      </a>
    </div>
    <p>Our systems constantly analyze traffic and automatically apply mitigation when DDoS attacks are detected. Each DDoS’d customer is prompted with an automated survey to help us better understand the nature of the attack and the success of the mitigation.</p><p>For over two years now, Cloudflare has been surveying attacked customers — one question on the survey being if they received a threat or a ransom note demanding payment in exchange to stop the DDoS attack.</p><p>The number of respondents reporting threats or ransom notes in Q2 increased by 11% QoQ and YoY. During this quarter, we’ve been mitigating Ransom DDoS attacks that have been launched by entities claiming to be the Advanced Persistent Threat (APT) group “Fancy Lazarus”. The campaign has been focusing on financial institutions and cryptocurrency companies.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3LekSaUnzoF3WKmsKWhnHu/81c93d5ab9c4cf77e5c39dab99f86729/image15-1.png" />
            
            </figure><p><b>The percentage of respondents reported being targeted by a ransom DDoS attack or that have received threats in advance of the attack.</b></p><p>Drilling down into Q2, we can see that in June one out of every five respondents reported receiving a ransom DDoS attack or threat — the highest month in 2022, and the highest since December 2021.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2eTKJ7CS0gEfyXbA3EUnJd/f4c1063607dca66844d4505e8fc8cb5e/image6-1.png" />
            
            </figure>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, specifically HTTP DDoS attacks, are attacks that usually aim to disrupt a web server by making it unable to process legitimate user requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests and — in some cases — crash, resulting in degraded performance or an outage for legitimate users.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2obOKJucCHHwfzjfSp15GA/4428ac204839e8c690f6e95c2262844b/image3-2.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by month</h3>
      <a href="#application-layer-ddos-attacks-by-month">
        
      </a>
    </div>
    <p><b>In Q2, application-layer DDoS attacks increased by 72% YoY.</b></p><p>Overall, in Q2, the volume of application-layer DDoS attacks increased by 72% YoY, but decreased 5% QoQ. May was the busiest month in the quarter. Almost 41% of all application-layer DDoS attacks took place in May, whereas the least number of attacks took place in June (28%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4qwd7buXAUhojmsIB3rOpU/852c9dfcd973cfe85c845ebee1da80ec/image20-1.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by industry</h3>
      <a href="#application-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p><b>Attacks on the Aviation and Aerospace industry increased by 493% QoQ.</b></p><p>In Q2, Aviation and Aerospace was the most targeted industry by application-layer DDoS attacks. After it, was the Internet industry, Banking, Financial Institutions and Insurance (BFSI) industry, and in fourth place the Gaming / Gambling industry.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6PKfB1M18FZ4GwzL59sqlM/4056f449d4c6f24de7abaae3f10386c3/image9-2.png" />
            
            </figure>
    <div>
      <h3>Ukraine and Russia cyberspace</h3>
      <a href="#ukraine-and-russia-cyberspace">
        
      </a>
    </div>
    <p><b>Media and publishing companies are the most targeted in Ukraine.</b></p><p>As the war in Ukraine continues on the ground, in the air and on the water, so does it continue in cyberspace. Entities targeting Ukrainian companies appear to be trying to silence information. The top five most attacked industries in the Ukraine are all in broadcasting, Internet, online media, and publishing — that’s almost 80% of all DDoS Attacks targeting Ukraine.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4hYnRS2MRBsydLh7HZ260z/5f66de712a1c4bf81a56bd51e7454aae/image1-2.png" />
            
            </figure><p>On the other side of the war, the Russian Banks, Financial Institutions and Insurance (BFSI) companies came under the most attacks. Almost 45% of all DDoS attacks targeted the BFSI sector. The second most targeted was the Cryptocurrency industry, followed by Online media.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2SuLnGNWkX83CMCh4Knqnj/13a11650cd2ec01eacd1cfc83527100a/image10.png" />
            
            </figure><p>In both sides of the war, we can see that the attacks are highly distributed, indicating the use of globally distributed botnets.</p>
    <div>
      <h3>Application-layer DDoS attacks by source country</h3>
      <a href="#application-layer-ddos-attacks-by-source-country">
        
      </a>
    </div>
    <p><b>In Q2, attacks from China shrank by 78%, and attacks from the US shrank by 43%.</b></p><p>To understand the origin of the HTTP attacks, we look at the geolocation of the source IP address belonging to the client that generated the attack HTTP requests. Unlike network-layer attacks, source IP addresses cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> in HTTP attacks. A high percentage of DDoS activity in a given country doesn’t mean that that specific country is launching the attacks but rather indicates the presence of botnets operating from within the country's borders.</p><p>For the second quarter in a row, the United States tops the charts as the main source of HTTP DDoS attacks. Following the US is China in second place, and India and Germany in the third and fourth. Even though the US remained in the first place, attacks originating from the US shrank by 48% QoQ while attacks from other regions grew; attacks from India grew by 87%, from Germany by 33%, and attacks from Brazil grew by 67%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2vk1N76Ouhfo9PnAmbGtrV/f8d860feae2044d2dcb515b1c8003072/image16-1.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by target country</h3>
      <a href="#application-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>In order to identify which countries are targeted by the most HTTP DDoS attacks, we bucket the DDoS attacks by our customers' billing countries and represent it as a percentage out of all DDoS attacks.</p><p>HTTP DDoS attacks on US-based countries increased by 67% QoQ pushing the US back to the first place as the main target of application-layer DDoS attacks. Attacks on Chinese companies plunged by 80% QoQ dropping it from the first place to the fourth. Attacks on Cyprus increase by 167% making it the second most attacked country in Q2. Following Cyprus is Hong Kong, China, and the Netherlands.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5FYRI0hCsXZZ4TVkyNNod2/c1d84b0c119f51d9adb18a96b4795b1e/image8-1.png" />
            
            </figure>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application-layer attacks target the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service that end users are trying to access (HTTP/S in our case), <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer attacks</a> aim to overwhelm network infrastructure (such as in-line routers and servers) and the Internet link itself.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/G9kSKRT459XrlobrASHLn/8f20afceb5d535d67c712185ea20948e/image23-1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by month</h3>
      <a href="#network-layer-ddos-attacks-by-month">
        
      </a>
    </div>
    <p><b>In Q2, network-layer DDoS attacks increased by 109% YoY, and volumetric attacks of 100 Gbps and larger increased by 8% QoQ.</b></p><p>In Q2, the total amount of network-layer DDoS attacks increased by 109% YoY and 15% QoQ. June was the busiest month of the quarter with almost 36% of the attacks occurring in June.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/63wvQwZOAcqCfuGWLIC4d7/7667284bf69186e8be1da375083ceceb/image12.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by industry</h3>
      <a href="#network-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p><b>In Q2, attacks on Telecommunication companies grew by 66% QoQ.</b></p><p>For the second consecutive quarter, the Telecommunications industry was the most targeted by network-layer DDoS attacks. Even more so, attacks on Telecommunication companies grew by 66% QoQ. The Gaming industry came in second place, followed by Information Technology and Services companies.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1AqUyyBbet85BZ804EmvXa/7afedf5fa21fe7782a7445e04f877fca/image2-2.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by target country</h3>
      <a href="#network-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p><b>Attacks on US networks grew by 95% QoQ.</b></p><p>In Q2, the US remains the most attacked country. After the US came China, Singapore and Germany.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/48CEVlhmbUEAVjFtztOrAa/bca783442c0a7570ed38ae94a19c2101/image17-1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by ingress country</h3>
      <a href="#network-layer-ddos-attacks-by-ingress-country">
        
      </a>
    </div>
    <p><b>In Q2, almost a third of the traffic Cloudflare observed in Palestine and a fourth in Azerbaijan was part of a network-layer DDoS attack.</b></p><p>When trying to understand where network-layer DDoS attacks originate, we cannot use the same method as we use for the application-layer attack analysis. To launch an application-layer DDoS attack, <a href="https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/">successful handshakes</a> must occur between the client and the server in order to establish an HTTP/S connection. For a successful handshake to occur, the attacks cannot spoof their source IP address. While the attacker may use botnets, proxies, and other methods to obfuscate their identity, the attacking client's source IP location does sufficiently represent the attack source of application-layer DDoS attacks.</p><p>On the other hand, to launch network-layer DDoS attacks, in most cases, no handshake is needed. Attackers can spoof the source IP address in order to obfuscate the attack source and introduce randomness into the attack properties, which can make it harder for simple DDoS protection systems to block the attack. So if we were to derive the source country based on a spoofed source IP, we would get a ‘spoofed country’.</p><p>For this reason, when analyzing network-layer DDoS attack sources, we bucket the traffic by the Cloudflare data center locations where the traffic was ingested, and not by the (potentially) spoofed source IP to get an understanding of where the attacks originate from. We are able to achieve geographical accuracy in our report because we have data centers in <a href="http://www.cloudflare.com/network">over 270 cities</a> around the world. However, even this method is not 100% accurate, as traffic may be back hauled and routed via various Internet Service Providers and countries for reasons that vary from cost reduction to congestion and failure management.</p><p>Palestine jumps from the second to the first place as the Cloudflare location with the highest percentage of network-layer DDoS attacks. Following Palestine is Azerbaijan, South Korea, and Angola.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7eLWg6GnqkwtT8se0EXZU2/c980e216deae547593d69bf478feb855/image21-1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/g7HPkqNU8zeuSzWnBmZdH/7d7efc3c21c4360765249627ab06cd52/image7-1.png" />
            
            </figure><p>To view all regions and countries, check out the <a href="https://radar.cloudflare.com/notebooks/ddos-2022-q2#network-layer-ddos-attacks-by-ingress-country">interactive map</a>.</p>
    <div>
      <h3>Attack vectors</h3>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p><b>In Q2, DNS attacks increased making it the second most frequent attack vector.</b></p><p>An attack vector is a term used to describe the method that the attacker uses to launch their DDoS attack, i.e., the IP protocol, packet attributes such as TCP flags, flooding method, and other criteria.</p><p>In Q2, 53% of all network-layer attacks were <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a>. SYN floods remain the most popular attack vector. They abuse the initial connection request of the stateful <a href="https://www.cloudflare.com/learning/ddos/glossary/tcp-ip/">TCP</a> handshake. During this initial connection request, servers don’t have any context about the TCP connection as it is new and without the proper protection may find it hard to mitigate a flood of initial connection requests. This makes it easier for the attacker to consume an unprotected server’s resources.</p><p>After the SYN floods are attacks targeting DNS infrastructure, RST floods again abusing TCP connection flow, and generic attacks over UDP.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3AKhwoAGSHqlrQLHjecZAZ/fb6f4f110b1f2da4a62f3354ed396aa0/image13-1.png" />
            
            </figure>
    <div>
      <h3>Emerging threats</h3>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p><b>In Q2, the top emerging threats included attacks over CHARGEN, Ubiquiti and Memcached.</b></p><p>Identifying the top attack vectors helps organizations understand the threat landscape. In turn, this may help them improve their security posture to protect against those threats. Similarly, learning about new emerging threats that may not yet account for a significant portion of attacks, can help mitigate them before they become a significant force.</p><p>In Q2, the top emerging threats were amplification attacks abusing the Character Generator Protocol (CHARGEN), amplification attacks reflecting traffic off of exposed Ubiquiti devices, and the notorious Memcached attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/60X75WXzKulAjLCdpDS55b/5cc5c20179acc847f8f96e991e032264/image5-2.png" />
            
            </figure>
    <div>
      <h3>Abusing the CHARGEN protocol to launch amplification attacks</h3>
      <a href="#abusing-the-chargen-protocol-to-launch-amplification-attacks">
        
      </a>
    </div>
    <p><b>In Q2, attacks abusing the CHARGEN protocol increased by 378% QoQ.</b></p><p>Initially defined in <a href="https://datatracker.ietf.org/doc/html/rfc864">RFC 864</a> (1983), the Character Generator (CHARGEN) protocol is a service of the <a href="https://en.wikipedia.org/wiki/Internet_protocol_suite">Internet Protocol Suite</a> that does exactly what it says it does - it generates characters arbitrarily, and it doesn’t stop sending them to the client until the client closes the connection. Its original intent was for testing and debugging. However, it’s rarely used because it can so easily be abused to generate amplification/reflection attacks.</p><p>An attacker can spoof the source IP of their victim and fool supporting servers around the world to direct a stream of arbitrary characters “back” to the victim’s servers. This type of attack is amplification/reflection. Given enough simultaneous CHARGEN streams, the victim’s servers, if unprotected, would be flooded and unable to cope with legitimate traffic — resulting in a denial of service event.</p>
    <div>
      <h3>Amplification attacks exploiting the Ubiquiti Discovery Protocol</h3>
      <a href="#amplification-attacks-exploiting-the-ubiquiti-discovery-protocol">
        
      </a>
    </div>
    <p><b>In Q2, attacks over Ubiquity increased by 327% QoQ.</b></p><p><a href="https://www.ui.com/">Ubiquiti</a> is a US-based company that provides networking and Internet of Things (IoT) devices for consumers and businesses. Ubiquiti devices can be discovered on a network using the <a href="https://help.ui.com/hc/en-us/articles/204976244-EdgeRouter-Ubiquiti-Device-Discovery">Ubiquiti Discovery protocol</a> over UDP/TCP port 10001.</p><p>Similarly to the CHARGEN attack vector, here too, attackers can spoof the source IP to be the victim’s IP address and spray IP addresses that have port 10001 open. Those would then respond to the victim and essentially flood it if the volume is sufficient.</p>
    <div>
      <h3>Memcached DDoS attacks</h3>
      <a href="#memcached-ddos-attacks">
        
      </a>
    </div>
    <p><b>In Q2, Memcached DDoS attacks increased by 287% QoQ.</b></p><p><a href="https://www.cloudflare.com/learning/ddos/memcached-ddos-attack/">Memcached</a> is a database caching system for speeding up websites and networks. Similarly to CHARGEN and Ubiquiti, Memcached servers that support UDP can be abused to launch amplification/reflection DDoS attacks. In this case, the attacker would request content from the caching system and spoof the victim's IP address as the source IP in the UDP packets. The victim will be flooded with the Memcache responses which can be amplified by a factor of up to 51,200x.</p>
    <div>
      <h2>Network-layer DDoS attacks by attack rate</h2>
      <a href="#network-layer-ddos-attacks-by-attack-rate">
        
      </a>
    </div>
    <p><b>Volumetric attacks of over 100 Gbps increase by 8% QoQ.</b></p><p>There are different ways of measuring the size of an L3/4 DDoS attack. One is the volume of traffic it delivers, measured as the bit rate (specifically, terabits per second or gigabits per second). Another is the number of packets it delivers, measured as the packet rate (specifically, millions of packets per second).</p><p>Attacks with high bit rates attempt to cause a denial-of-service event by clogging the Internet link, while attacks with high packet rates attempt to overwhelm the servers, routers, or other in-line hardware appliances. These devices dedicate a certain amount of memory and computation power to process each packet. Therefore, by bombarding it with many packets, the appliance can be left with no further processing resources. In such a case, packets are “dropped,” i.e., the appliance is unable to process them. For users, this results in service disruptions and denial of service.</p>
    <div>
      <h3>Distribution by packet rate</h3>
      <a href="#distribution-by-packet-rate">
        
      </a>
    </div>
    <p>The majority of network-layer DDoS attacks remain below 50,000 packets per second. While 50 kpps is on the lower side of the spectrum at Cloudflare scale, it can still easily take down unprotected Internet properties and congest even a standard Gigabit Ethernet connection.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5edVFCX1vigbfc2CfCDz6g/a2284f3bcb556fbae9d9ff3cdecdd265/image4-1.png" />
            
            </figure><p>When we look at the changes in the attack sizes, we can see that packet-intensive attacks above 50 kpps decreased in Q2, resulting in an increase of 4% in small attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/152vteTszixrwCKNzrszuw/b7a271ee46ad011fa917c228781086b1/image11-1.png" />
            
            </figure>
    <div>
      <h3>Distribution by bitrate</h3>
      <a href="#distribution-by-bitrate">
        
      </a>
    </div>
    <p>In Q2, most of the network-layer DDoS attacks remain below 500 Mbps. This too is a tiny drop in the water at <a href="https://www.cloudflare.com/network/">Cloudflare scale</a>, but can very quickly shut down unprotected Internet properties with less capacity or at the very least cause congestion for even a standard Gigabit Ethernet connection.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1lUj3pmi7Ch0uSG5ZCuURH/a83742d4796e39b27d1f9e8b84efba97/image18-1.png" />
            
            </figure><p>Interestingly enough, large attacks between 500 Mbps and 100 Gbps decreased by 20-40% QoQ, but volumetric attacks above 100 Gbps increased by 8%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2aCjsSBcyiqdAXY6ZDamo9/e50f145f845f57b7b72657bd4a010fa1/image24-1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by duration</h3>
      <a href="#network-layer-ddos-attacks-by-duration">
        
      </a>
    </div>
    <p><b>In Q2, attacks lasting over three hours increased by 9%.</b></p><p>We measure the duration of an attack by recording the difference between when it is first detected by our systems as an attack and the last packet we see with that attack signature towards that specific target.</p><p>In Q2, 52% of network-layer DDoS attacks lasted less than 10 minutes. Another 40% lasted 10-20 minutes. The remaining 8% include attacks ranging from 20 minutes to over three hours.</p><p>One important thing to keep in mind is that even if an attack lasts only a few minutes, if it is successful, the repercussions could last well beyond the initial attack duration. IT personnel responding to a successful attack may spend hours and even days restoring their services.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3emu9oLw9gcXbz5AZWAZtM/1014ae5d075f95cd7871755745a8d11c/image19-2.png" />
            
            </figure><p>While most of the attacks are indeed short, we can see an increase of over 15% in attacks ranging between 20-60 minutes, and a 12% increase of attacks lasting more than three hours.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4hSf9t1KjaWIMXy4roHCla/060fbfb13ec4ca106e7b0eb302d9b2bc/image14-1.png" />
            
            </figure><p>Short attacks can easily go undetected, especially burst attacks that, within seconds, bombard a target with a significant number of packets, bytes, or requests. In this case, DDoS protection services that rely on manual mitigation by security analysis have no chance in mitigating the attack in time. They can only learn from it in their post-attack analysis, then deploy a new rule that filters the attack fingerprint and hope to catch it next time. Similarly, using an “on-demand” service, where the security team will redirect traffic to a DDoS provider during the attack, is also inefficient because the attack will already be over before the traffic routes to the on-demand DDoS provider.</p><p>It’s recommended that companies use <a href="https://www.cloudflare.com/ddos/">automated, always-on DDoS protection services</a> that analyze traffic and apply real-time fingerprinting fast enough to block short-lived attacks.</p>
    <div>
      <h2>Summary</h2>
      <a href="#summary">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet. A better Internet is one that is more secure, faster, and reliable for everyone — even in the face of DDoS attacks. As part of our mission, since 2017, we’ve been providing <a href="/unmetered-mitigation/">unmetered and unlimited DDoS protection</a> for free to all of our customers. Over the years, it has become increasingly easier for attackers to launch DDoS attacks. But as easy as it has become, we want to make sure that it is even easier — and free — for organizations of all sizes to protect themselves against DDoS attacks of all types.</p><p>Not using Cloudflare yet? <a href="https://dash.cloudflare.com/sign-up">Start now</a> with our Free and <a href="https://www.cloudflare.com/plans/pro/">Pro plans</a> to protect your websites, or <a href="https://www.cloudflare.com/magic-transit/">contact us</a> for comprehensive DDoS protection for your entire network using Magic Transit.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <category><![CDATA[Ukraine]]></category>
            <category><![CDATA[Russia]]></category>
            <guid isPermaLink="false">i4xr8wP9XJwugHF1dG7F8</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS Attack Trends for 2022 Q1]]></title>
            <link>https://blog.cloudflare.com/ddos-attack-trends-for-2022-q1/</link>
            <pubDate>Tue, 12 Apr 2022 13:12:59 GMT</pubDate>
            <description><![CDATA[ Welcome to our first DDoS report of 2022, and the ninth in total so far. This report includes new data points and insights both in the application-layer and network-layer sections — as observed across the global Cloudflare network between January and March 2022 ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Welcome to our first DDoS report of 2022, and the ninth in <a href="/tag/ddos-reports/">total</a> so far. This report includes new data points and insights both in the application-layer and network-layer sections — as observed across the global Cloudflare network between January and March 2022.</p><p>The first quarter of 2022 saw a massive spike in application-layer DDoS attacks, but a decrease in the total number of network-layer DDoS attacks. Despite the decrease, we’ve seen volumetric DDoS attacks surge by up to 645% QoQ, and we mitigated a new zero-day reflection attack with an amplification factor of 220 billion percent.</p><p>In the Russian and Ukrainian cyberspace, the most targeted industries were Online Media and Broadcast Media. In our Azerbaijan and Palestinian Cloudflare data centers, we’ve seen enormous spikes in DDoS activity — indicating the presence of botnets operating from within.</p>
    <div>
      <h2>The Highlights</h2>
      <a href="#the-highlights">
        
      </a>
    </div>
    
    <div>
      <h3>The Russian and Ukrainian cyberspace</h3>
      <a href="#the-russian-and-ukrainian-cyberspace">
        
      </a>
    </div>
    <ul><li><p>Russian Online Media companies were the most targeted industries within Russia in Q1. The next most targeted was the Internet industry, then Cryptocurrency, and then Retail. While many attacks that targeted Russian Cryptocurrency companies originated in Ukraine or the US, another major source of attacks was from within Russia itself.</p></li><li><p>The majority of HTTP DDoS attacks that targeted Russian companies originated from Germany, the US, Singapore, Finland, India, the Netherlands, and Ukraine. It’s important to note that being able to identify where cyber attack traffic originates is not the same as being able to attribute where the attacker is located.</p></li><li><p>Attacks on Ukraine targeted Broadcast Media and Publishing websites and seem to have been more distributed, originating from more countries — which may indicate the use of global botnets. Still, most of the attack traffic originated from the US, Russia, Germany, China, the UK, and Thailand.</p></li></ul><p>Read more about <a href="/what-cloudflare-is-doing-to-keep-the-open-internet-flowing-into-russia-and-keep-attacks-from-getting-out/">what Cloudflare is doing to keep the Open Internet flowing into Russia and keep attacks from getting out</a>.</p>
    <div>
      <h3>Ransom DDoS attacks</h3>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>In January 2022, over 17% of under-attack respondents reported being targeted by ransom DDoS attacks or receiving a threat in advance.</p></li><li><p>That figure drastically dropped to 6% in February, and then to 3% in March.</p></li><li><p>When compared to previous quarters, we can see that in total, in Q1, only 10% of respondents reported a ransom DDoS attack; a 28% decrease YoY and 52% decrease QoQ.</p></li></ul>
    <div>
      <h3>Application-layer DDoS attacks</h3>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>2022 Q1 was the busiest quarter in the past 12 months for application-layer attacks. HTTP-layer DDoS attacks increased by 164% YoY and 135% QoQ.</p></li><li><p>Diving deeper into the quarter, in March 2022 there were more HTTP DDoS attacks than in all of Q4 combined (and Q3, and Q1).</p></li><li><p>After four consecutive quarters in a row with China as the top source of HTTP DDoS attacks, the US stepped into the lead this quarter. HTTP DDoS attacks originating from the US increased by a staggering 6,777% QoQ and 2,225% YoY.</p></li></ul>
    <div>
      <h3>Network-layer DDoS attacks</h3>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>Network-layer attacks in Q1 increased by 71% YoY but decreased 58% QoQ.</p></li><li><p>The Telecommunications industry was the most targeted by network-layer DDoS attacks, followed by Gaming and Gambling companies, and the Information Technology and Services industry.</p></li><li><p>Volumetric attacks increased in Q1. Attacks above 10 Mpps (million packets per second) grew by over 300% QoQ, and attacks over 100 Gbps grew by 645% QoQ.</p></li></ul><p>This report is based on DDoS attacks that were automatically detected and mitigated by <a href="https://www.cloudflare.com/ddos/">Cloudflare’s DDoS Protection systems</a>. To learn more about how it works, check out <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">this deep-dive blog post</a>.</p><p><b>A note on how we measure DDoS attacks observed over our network</b>To analyze attack trends, we calculate the “DDoS activity” rate, which is either the percentage of attack traffic out of the total traffic (attack + clean) observed over our global network, or in a specific location, or in a specific category (e.g., industry or billing country). Measuring the percentages allows us to normalize data points and avoid biases reflected in absolute numbers towards, for example, a Cloudflare data center that receives more total traffic and likely, also more attacks.</p><p>To view an interactive version of this report view it on <a href="https://radar.cloudflare.com/notebooks/ddos-2022-q1/">Cloudflare Radar</a>.</p>
    <div>
      <h2>Ransom Attacks</h2>
      <a href="#ransom-attacks">
        
      </a>
    </div>
    <p>Our systems constantly analyze traffic and automatically apply mitigation when DDoS attacks are detected. Each DDoS’d customer is prompted with an automated survey to help us better understand the nature of the attack and the success of the mitigation.</p><p>For over two years now, Cloudflare has been surveying attacked customers — one question on the survey being if they received a threat or a ransom note demanding payment in exchange to stop the DDoS attack. In the last quarter, 2021 Q4, we observed a record-breaking level of reported ransom DDoS attacks (one out of every five customers). This quarter, we’ve witnessed a drop in ransom DDoS attacks with only one out of 10 respondents reporting a ransom DDoS attack; a 28% decrease YoY and 52% decrease QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5UeSXC4RnHStQU21LcdFyu/dffdcd7b7d167b4da2d40034b48d6886/unnamed.png" />
            
            </figure><p>When we break it down by month, we can see that January 2022 saw the largest number of respondents reporting receiving a ransom letter in Q1. Almost one out of every five customers (17%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1VoQDMsbVqmsgWOVsZsVEd/879958b830e5e8047874591105f73603/unnamed--1-.png" />
            
            </figure>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, specifically HTTP DDoS attacks, are attacks that usually aim to disrupt a web server by making it unable to process legitimate user requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests and — in some cases — crash, resulting in degraded performance or an outage for legitimate users.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Nk5a1cd1TpBCMSBUshW5p/14f88e849feca723c3d59e4932f779db/unnamed1.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by month</h3>
      <a href="#application-layer-ddos-attacks-by-month">
        
      </a>
    </div>
    <p><b>In Q1, application-layer DDoS attacks soared by 164% YoY and 135% QoQ - the busiest quarter within the past year.</b></p><p>Application-layer DDoS attacks increased to new heights in the first quarter of 2022. In March alone, there were more HTTP DDoS attacks than in all of 2021 Q4 combined (and Q3, and Q1).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4pgSaMnY4YtuqRpgnED5aW/f7052e3619d760fcfcc913fc1f212143/image22-1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5WcHhOZ9taZfDfnBYhJie9/366c28db62edaec91a3375be935ac7d0/image23-1.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by industry</h3>
      <a href="#application-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p><b>Consumer Electronics was the most targeted industry in Q1.</b></p><p>Globally, the Consumer Electronics industry was the most attacked with an increase of 5,086% QoQ. Second was the Online Media industry with a 2,131% increase in attacks QoQ. Third were Computer Software companies, with an increase of 76% QoQ and 1,472 YoY.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Io8GidjMPtjAwO3IoJ5QM/4637de38a6b7e782eccd5a9ad89f7b46/image9-5.png" />
            
            </figure><p>However, if we focus only on Ukraine and Russia, we can see that Broadcast Media, Online Media companies, and Internet companies were the most targeted. Read more about <a href="/what-cloudflare-is-doing-to-keep-the-open-internet-flowing-into-russia-and-keep-attacks-from-getting-out/">what Cloudflare is doing to keep the Open Internet flowing into Russia and keep attacks from getting out</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3KxUaIFTe76sBVFWOr4gXg/37664c82befd30709059d7eba9d7b181/image14-1.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3OdQpFtzCfTo3kWylObvpC/e35a3cfa51e3518057011624993cb29d/image3-6.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by source country</h3>
      <a href="#application-layer-ddos-attacks-by-source-country">
        
      </a>
    </div>
    <p>To understand the origin of the HTTP attacks, we look at the geolocation of the source IP address belonging to the client that generated the attack HTTP requests. Unlike network-layer attacks, source IP addresses cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> in HTTP attacks. A high percentage of DDoS activity in a given country usually indicates the presence of botnets operating from within the country's borders.</p><p>After four consecutive quarters in a row with China as the top source of HTTP DDoS attacks, the US stepped into the lead this quarter. HTTP DDoS attacks originating from the US increased by a staggering 6,777% QoQ and 2,225% YoY. Following China in second place are India, Germany, Brazil, and Ukraine.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3s0SD9E8DoiJriR6chDTIt/0067c86db96706cfd906029d839e034c/unnamed--2-.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by target country</h3>
      <a href="#application-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>In order to identify which countries are targeted by the most HTTP DDoS attacks, we bucket the DDoS attacks by our customers' billing countries and represent it as a percentage out of all DDoS attacks.</p><p>The US drops to second place, after being first for three consecutive quarters. Organizations in China were targeted the most by HTTP DDoS attacks, followed by the US, Russia, and Cyprus.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4CunftrRkj2XkF5Osf3aKS/762f851d62e01c8ec00c9e76e2229f97/image7-4.png" />
            
            </figure>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application-layer attacks target the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service that end users are trying to access (HTTP/S in our case), <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer attacks</a> aim to overwhelm network infrastructure (such as in-line routers and servers) and the Internet link itself.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/30aPmdSMAbPwwyujWllA2X/351c3c9b05c09616ecdb47dd556c3f1f/unnamed--1--1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by month</h3>
      <a href="#network-layer-ddos-attacks-by-month">
        
      </a>
    </div>
    <p><b>While HTTP DDoS attacks soared in Q1, network-layer DDoS attacks actually decreased by 58% QoQ, but still increased by 71% YoY.</b></p><p>Diving deeper into Q1, we can see that the amount of network-layer DDoS attacks remained mostly consistent throughout the quarter with about a third of attacks occurring every month.</p><p>![Graph of the yearly distribution of network-layer DDoS attacks by month in the past 12 months]](<a href="/content/images/2022/04/image28.png_WIDE">http://staging.blog.mrk.cfdata.org/content/images/2022/04/image28.png_WIDE</a>)</p><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7aI8iiTHyjVCpvTv5UjDtU/9bc5f0cd32fe0d25333cf6d1355c64b2/image23-3.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7GyfQMcPOegM2kbtwRR794/1f38b461cce0f9583ac89a0471041da3/unnamed--3-.png" />
            
            </figure>
    <div>
      <h2>Cloudflare mitigates zero-day amplification DDoS attack</h2>
      <a href="#cloudflare-mitigates-zero-day-amplification-ddos-attack">
        
      </a>
    </div>
    <p>Amongst these network-layer DDoS attacks are also zero-day DDoS attacks that Cloudflare automatically detected and mitigated.</p><p>In the beginning of March, Cloudflare researchers helped investigate and expose a zero-day vulnerability in Mitel business phone systems that amongst other possible exploitations, also enables attackers to launch an amplification DDoS attack. This type of attack reflects traffic off vulnerable Mitel servers to victims, amplifying the amount of traffic sent in the process by <b>an amplification factor of 220 billion percent</b> in this specific case. You can read more about it in our recent <a href="/cve-2022-26143-amplification-attack/">blog post</a>.</p><p>We observed several of these attacks across our network. One of them targeted a North American cloud provider using the Cloudflare Magic Transit service. The attack originated from 100 source IPs mainly from the US, UK, Canada, Netherlands, Australia, and approximately 20 other countries. It peaked above 50 Mpps (~22 Gbps) and was automatically detected and mitigated by Cloudflare systems.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7LxY8T04AQZBMT0LGM6lzT/7c8b9be1a413998572d9400717f56cc4/image1-9.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by industry</h3>
      <a href="#network-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p>Many network-layer DDoS attacks target Cloudflare’s IP ranges directly. These IP ranges serve our <a href="https://www.cloudflare.com/cdn/">WAF/CDN customers</a>, <a href="https://www.cloudflare.com/dns/">Cloudflare authoritative DNS</a>, <a href="https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/">Cloudflare public DNS resolver 1.1.1.1</a>,  <a href="https://www.cloudflare.com/products/zero-trust/zero-trust-network-access/">Cloudflare Zero Trust</a> products, and our corporate offices, to name a few. Additionally, we also allocate dedicated IP addresses to customers via our <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Spectrum</a> product and advertise the IP prefixes of other companies via our <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a>, <a href="https://www.cloudflare.com/magic-wan/">Magic WAN</a>, and <a href="https://www.cloudflare.com/magic-firewall/">Magic Firewall</a> Products for L3/4 DDoS protection.</p><p>In this report, for the first time, we've begun classifying network-layer DDoS attacks according to the industries of our customers using the Spectrum and Magic products. This classification allows us to understand which industries are targeted the most by network-layer DDoS attacks.</p><p>When we look at Q1 statistics, we can see that in terms of attack packets and attack bytes launched towards Cloudflare customers, the Telecommunications industry was targeted the most.  More than 8% of all attack bytes and 10% of all attack packets that Cloudflare mitigated targeted Telecommunications companies.</p><p>Following not too far behind, in second and third place were the Gaming / Gambling and Information Technology and Services industries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2bxF8tqebY5nrdxlmuAsZl/3da1fe00d18114b891aacb91e3969d0d/image20-1.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/aznwW5V47dkzudjNlMvGy/7c30c79064d92257b489de4283eb6e5d/image5-7.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by target country</h3>
      <a href="#network-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>Similarly to the classification by our customers’ industry, we can also bucket attacks by our customers’ billing country as we do for application-layer DDoS attacks, to identify the top attacked countries.</p><p>Looking at Q1 numbers, we can see that the US was targeted by the highest percentage of DDoS attacks traffic — over 10% of all attack packets and almost 8% of all attack bytes. Following the US is China, Canada, and Singapore.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Gcrg06kwyMWELD73zMmWt/efc1553da6d4b8c237f5b9365eb8317d/image19-1.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4eqgGdsJNhmcn09tW5ZMOi/5f13ebd0ce40dd826b649a4fd4e363c6/image15-2.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by ingress country</h3>
      <a href="#network-layer-ddos-attacks-by-ingress-country">
        
      </a>
    </div>
    <p>When trying to understand where network-layer DDoS attacks originate, we cannot use the same method as we use for the application-layer attack analysis. To launch an application-layer DDoS attack, <a href="https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/">successful handshakes</a> must occur between the client and the server in order to establish an HTTP/S connection. For a successful handshake to occur, the attacker cannot <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoof</a> their source IP address. While the attacker may use botnets, proxies, and other methods to obfuscate their identity, the attacking client's source IP location does sufficiently represent the attack source of application-layer DDoS attacks.</p><p>On the other hand, to launch network-layer DDoS attacks, in most cases, no handshake is needed. Attackers can <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoof</a> the source IP address in order to obfuscate the attack source and introduce randomness into the attack properties, which can make it harder for simple DDoS protection systems to block the attack. So if we were to derive the source country based on a spoofed source IP, we would get a ‘spoofed country’.</p><p>For this reason, when analyzing network-layer DDoS attack sources, we bucket the traffic by the Cloudflare edge data center locations where the traffic was ingested, and not by the (potentially) spoofed source IP to get an understanding of where the attacks originate from. We are able to achieve geographical accuracy in our report because we have data centers in <a href="/mid-2022-new-cities/">over 270 cities</a> around the world. However, even this method is not 100% accurate, as traffic may be back hauled and routed via various Internet Service Providers and countries for reasons that vary from cost reduction to congestion and failure management.</p><p>In Q1, the percentage of attacks detected in Cloudflare’s data centers in Azerbaijan increased by 16,624% QoQ and 96,900% YoY, making it the country with the highest percentage of network-layer DDoS activity (48.5%).</p><p>Following our Azerbaijanian data center is our Palestinian data center where a staggering 41.9% of all traffic was DDoS traffic. This represents a 10,120% increase QoQ and 46,456% YoY.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4DnN5j4chxISRXppNIV6a1/f0c98f9454ee54b19e686410209ae9ad/image2-8.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/h4otwpiEvjRN9OFzyHgqp/2f0c9cf45c20a3d1a7aad667433675f1/image12-1.png" />
            
            </figure><p>To view all regions and countries, check out the <a href="https://radar.cloudflare.com/notebooks/ddos-2022-q1/">interactive map</a>.</p>
    <div>
      <h3>Attack vectors</h3>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p><b>SYN Floods remain the most popular DDoS attack vector, while use of generic UDP floods drops significantly in Q1.</b></p><p>An attack vector is a term used to describe the method that the attacker uses to launch their DDoS attack, i.e., the IP protocol, packet attributes such as TCP flags, flooding method, and other criteria.</p><p>In Q1, SYN floods accounted for 57% of all network-layer DDoS attacks, representing a 69% increase QoQ and a 13% increase YoY. In second place, attacks over SSDP surged by over 1,100% QoQ. Following were RST floods and attacks over UDP. Last quarter, generic UDP floods took the second place, but this time, generic UDP DDoS attacks plummeted by 87% QoQ from 32% to a mere 3.9%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3nIMdTOj9gYnulv2zn4qBf/265dc7b5b1f3d819ec027564d499630e/image11-1.png" />
            
            </figure>
    <div>
      <h2>Emerging threats</h2>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>Identifying the top attack vectors helps organizations understand the threat landscape. In turn, this may help them improve their security posture to protect against those threats. Similarly, learning about new emerging threats that may not yet account for a significant portion of attacks, can help mitigate them before they become a significant force.</p><p>When we look at new emerging attack vectors in Q1, we can see increases in DDoS attacks reflecting off of Lantronix services (+971% QoQ) and SSDP reflection attacks (+724% QoQ). Additionally, SYN-ACK attacks increased by 437% and attacks by Mirai botnets by 321% QoQ.</p>
    <div>
      <h3>Attacker reflecting traffic off of Lantronix Discovery Service</h3>
      <a href="#attacker-reflecting-traffic-off-of-lantronix-discovery-service">
        
      </a>
    </div>
    <p>Lantronix is a US-based software and hardware company that provides solutions for Internet of Things (IoT) management amongst their vast offering. One of the tools that they provide to manage their IoT components is the Lantronix Discovery Protocol. It is a command-line tool that helps to search and find Lantronix devices. The discovery tool is UDP-based, meaning that no handshake is required. The source IP can be spoofed. So an attacker can use the tool to search for publicly exposed Lantronix devices using a 4 byte request, which will then in turn respond with a 30 byte response from port 30718. By spoofing the source IP of the victim, all Lantronix devices will target their responses to the victim — resulting in a reflection/amplification attack.</p>
    <div>
      <h3>Simple Service Discovery Protocol used for reflection DDoS attacks</h3>
      <a href="#simple-service-discovery-protocol-used-for-reflection-ddos-attacks">
        
      </a>
    </div>
    <p>The Simple Service Discovery Protocol (SSDP) protocol works similarly to the Lantronix Discovery protocol, but for Universal Plug and Play (UPnP) devices such as network-connected printers. By abusing the SSDP protocol, attackers can generate a reflection-based DDoS attack overwhelming the target’s infrastructure and taking their Internet properties offline. Read more about <a href="https://www.cloudflare.com/learning/ddos/ssdp-ddos-attack/">SSDP-based DDoS attacks</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6vdleq21CxFyxVpMsuseIT/51eed46af450728ced3f01fe3b3da68a/image21.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by attack rate</h3>
      <a href="#network-layer-ddos-attacks-by-attack-rate">
        
      </a>
    </div>
    <p><b>In Q1, we observed a massive uptick in volumetric DDoS attacks — both from the packet rate and bitrate perspective. Attacks over 10 Mpps grew by over 300% QoQ, and attacks over 100 Gbps grew by 645% QoQ.</b></p><p>There are different ways of measuring the size of an L3/4 DDoS attack. One is the volume of traffic it delivers, measured as the bit rate (specifically, terabits per second or gigabits per second). Another is the number of packets it delivers, measured as the packet rate (specifically, millions of packets per second).</p><p>Attacks with high bit rates attempt to cause a denial-of-service event by clogging the Internet link, while attacks with high packet rates attempt to overwhelm the servers, routers, or other in-line hardware appliances. These devices dedicate a certain amount of memory and computation power to process each packet. Therefore, by bombarding it with many packets, the appliance can be left with no further processing resources. In such a case, packets are “dropped,” i.e., the appliance is unable to process them. For users, this results in service disruptions and denial of service.</p>
    <div>
      <h3>Distribution by packet rate</h3>
      <a href="#distribution-by-packet-rate">
        
      </a>
    </div>
    <p>The majority of network-layer DDoS attacks remain below 50,000 packets per second. While 50 kpps is on the lower side of the spectrum at Cloudflare scale, it can still easily take down unprotected Internet properties and congest even a standard Gigabit Ethernet connection.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/29AAghjmcak4dGQvIXvYh8/c6202035c934087213e7ac65d3aed349/image4-5.png" />
            
            </figure><p>When we look at the changes in the attack sizes, we can see that attacks of over 10 Mpps grew by over 300% QoQ. Similarly, attacks of 1-10 Mpps grew by almost 40% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6trkK6tXjwa2wmVpnnr9Ik/5e6aaa9ec3f1d678daddffd4ff3a57e0/image8-3.png" />
            
            </figure>
    <div>
      <h3>Distribution by bitrate</h3>
      <a href="#distribution-by-bitrate">
        
      </a>
    </div>
    <p>In Q1, most of the network-layer DDoS attacks remain below 500 Mbps. This too is a tiny drop in the water at <a href="https://www.cloudflare.com/network/">Cloudflare scale</a>, but can very quickly shut down unprotected Internet properties with less capacity or at the very least congest, even a standard Gigabit Ethernet connection.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5RNEoynAmbXZQU7VaZGFU7/58138c225812ae7dcc4a81c619f3985e/image6-4.png" />
            
            </figure><p><i>Graph of the distribution of network-layer DDoS attacks by bit rate in 2022 Q1</i></p><p>Similarly to the trends observed in the packet-per-second realm, here we can also see large increases. The amount of DDoS attacks that peaked over 100 Gbps increased by 645% QoQ; attacks peaking between 10 Gbps to 100 Gbps increased by 407%; attacks peaking between 1 Gbps to 10 Gbps increased by 88%; and even attacks peaking between 500 Mbps to 1 Gbps increased by almost 20% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2uUqHLuTg4lD8DbJmXXLFS/6dcad7d8c2769a8269de62751cd22488/image13-1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by duration</h3>
      <a href="#network-layer-ddos-attacks-by-duration">
        
      </a>
    </div>
    <p><b>Most attacks remain under one hour in duration, reiterating the need for automated always-on DDoS mitigation solutions.</b></p><p>We measure the duration of an attack by recording the difference between when it is first detected by our systems as an attack and the last packet we see with that attack signature towards that specific target.</p><p>In previous reports, we provided a breakdown of ‘attacks under an hour’, and larger time ranges. However, in most cases over 90 percent of attacks last less than an hour. So starting from this report, we broke down the short attacks and grouped them by shorter time ranges to provide better granularity.</p><p>One important thing to keep in mind is that even if an attack lasts only a few minutes, if it is successful, the repercussions could last well beyond the initial attack duration. IT personnel responding to a successful attack may spend hours and even days restoring their services.</p><p>In the first quarter of 2022, more than half of the attacks lasted 10-20 minutes, approximately 40% ended within 10 minutes, another ~5% lasted 20-40 minutes, and the remaining lasted longer than 40 minutes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4AAxMcs15Aguf4sdMfjYQ6/d5dcfa6bb8b62b7ab8eeaff3f8100de8/image27.png" />
            
            </figure><p>Short attacks can easily go undetected, especially burst attacks that, within seconds, bombard a target with a significant number of packets, bytes, or requests. In this case, DDoS protection services that rely on manual mitigation by security analysis have no chance in mitigating the attack in time. They can only learn from it in their post-attack analysis, then deploy a new rule that filters the attack fingerprint and hope to catch it next time. Similarly, using an “on-demand” service, where the security team will redirect traffic to a DDoS provider during the attack, is also inefficient because the attack will already be over before the traffic routes to the on-demand DDoS provider.</p><p>It’s recommended that companies use automated, always-on DDoS protection services that analyze traffic and apply real-time fingerprinting fast enough to block short-lived attacks.</p>
    <div>
      <h2>Summary</h2>
      <a href="#summary">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet. A better Internet is one that is more secure, faster, and reliable for everyone — even in the face of DDoS attacks. As part of our mission, since 2017, we’ve been providing <a href="/unmetered-mitigation/">unmetered and unlimited DDoS protection</a> for free to all of our customers. Over the years, it has become increasingly easier for attackers to launch DDoS attacks. But as easy as it has become, we want to make sure that it is even easier — and free — for organizations of all sizes to protect themselves against DDoS attacks of all types.</p><p>Not using Cloudflare yet? <a href="https://dash.cloudflare.com/sign-up">Start now</a> with our Free and <a href="https://www.cloudflare.com/plans/pro/">Pro plans</a> to protect your websites, or <a href="https://www.cloudflare.com/magic-transit/">contact us</a> for comprehensive DDoS protection for your entire network using Magic Transit.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Ukraine]]></category>
            <category><![CDATA[Russia]]></category>
            <category><![CDATA[Mitel]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">6u6Ais7xHBvpPuuxFf9yes</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS Attack Trends for Q4 2021]]></title>
            <link>https://blog.cloudflare.com/ddos-attack-trends-for-2021-q4/</link>
            <pubDate>Mon, 10 Jan 2022 13:58:20 GMT</pubDate>
            <description><![CDATA[ In Q4, we observed a 95% increase in L3/4 DDoS attacks and record-breaking levels of Ransom DDoS attacks. The Manufacturing industry was the most targeted alongside a 5,800% increase in SNMP-based DDoS attacks and massive campaigns against VoIP providers around the world ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1gkcJlZwljNNiInjszMhDS/3679e2af7a226546660265e0749f0ac2/image3-1.png" />
            
            </figure><p>The first half of 2021 witnessed massive ransomware and ransom DDoS attack campaigns that interrupted aspects of critical infrastructure around the world (including one of the largest petroleum pipeline system operators in the US) and a <a href="https://csirt.divd.nl/2021/07/03/Kaseya-Case-Update/">vulnerability in IT management software</a> that targeted schools, public sector, travel organizations, and credit unions, to name a few.</p><p>The second half of the year recorded a growing swarm of one of the most powerful botnets deployed (<a href="/meris-botnet/">Meris</a>) and <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">record-breaking HTTP DDoS attacks</a> and <a href="/cloudflare-blocks-an-almost-2-tbps-multi-vector-ddos-attack/">network-layer attacks</a> observed over the Cloudflare network. This besides the <a href="/inside-the-log4j2-vulnerability-cve-2021-44228/">Log4j2 vulnerability</a> (CVE-2021-44228) discovered in December that allows an attacker to execute code on a remote server — arguably one of the most severe vulnerabilities on the Internet since both <a href="/tag/heartbleed/">Heartbleed</a> and <a href="/inside-shellshock/">Shellshock</a>.</p><p>Prominent attacks such as the ones listed above are but a few examples that demonstrate a trend of intensifying cyber-insecurity that affected everyone, from tech firms and government organizations to wineries and meat processing plants.</p><p>Here are some <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attack</a> trends and highlights from 2021 and Q4 ‘21 specifically:</p>
    <div>
      <h3>Ransom DDoS attacks</h3>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>In Q4, <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">ransom DDoS attacks</a> increased by 29% YoY and 175% QoQ.</p></li><li><p>In December alone, one out of every three survey respondents reported being targeted by a ransom DDoS attack or threatened by the attacker.</p></li></ul>
    <div>
      <h3>Application-layer DDoS attacks</h3>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>The Manufacturing industry was the most attacked in Q4 ’21, recording a whopping 641% increase QoQ in the number of attacks. The Business Services and Gaming/Gambling industries were the second and third most targeted industries by application-layer DDoS attacks.</p></li><li><p>For the fourth time in a row this year, China topped the charts with the highest percentage of attack traffic originating from its networks.</p></li><li><p>A new botnet called the <a href="/meris-botnet/">Meris botnet</a> emerged in mid-2021 and continued to bombard organizations around the world, launching some of the largest HTTP attacks on record — including a <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">17.2M rps attack that Cloudflare automatically mitigated</a>.</p></li></ul>
    <div>
      <h3>Network-layer DDoS attacks</h3>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>Q4 ’21 was the busiest quarter for attackers in 2021. In December 2021 alone, there were more than all the attacks observed in Q1 and Q2 ’21 separately.</p></li><li><p>While the majority of attacks were small, terabit-strong attacks became the new norm in the second half of 2021. Cloudflare automatically mitigated dozens of attacks peaking over 1 Tbps, with the largest one peaking just under <a href="/cloudflare-blocks-an-almost-2-tbps-multi-vector-ddos-attack/">2 Tbps — the largest we’ve ever seen</a>.</p></li><li><p>Q4 ’21, and November specifically, recorded a persistent ransom <a href="/update-on-voip-attacks/">DDoS campaign against VoIP providers</a> around the world.</p></li><li><p>Attacks originating from Moldova quadrupled in Q4 ’21 QoQ, making it the country with the highest percentage of network-layer DDoS activity.</p></li><li><p><a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP floods</a> were the most frequent attack vectors while emerging threats such as SNMP attacks increased by nearly 5,800% QoQ.</p></li></ul><p>This report is based on DDoS attacks that were automatically detected and mitigated by Cloudflare’s DDoS Protection systems. To learn more about how it works, check out <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">this deep-dive blog post</a>.</p>
    <div>
      <h3>A note on how we measure DDoS attacks observed over our network</h3>
      <a href="#a-note-on-how-we-measure-ddos-attacks-observed-over-our-network">
        
      </a>
    </div>
    <p>To analyze attack trends, we calculate the “DDoS activity” rate, which is the percentage of attack traffic out of the total traffic (attack + clean) observed over our global network. Measuring attack numbers as a percentage of the total traffic observed allows us to normalize data points and avoid biases reflected in absolute numbers towards, for example, a Cloudflare data center that receives more total traffic and likely, also more attacks.</p><p>An interactive version of this report is available on <a href="https://radar.cloudflare.com/notebooks/ddos-2021-q4">Cloudflare Radar</a>.</p>
    <div>
      <h2>Ransom Attacks</h2>
      <a href="#ransom-attacks">
        
      </a>
    </div>
    <p>Our systems constantly analyze traffic and automatically apply mitigation when DDoS attacks are detected. Each DDoS’d customer is prompted with an automated survey to help us better understand the nature of the attack and the success of the mitigation.</p><p>For over two years now, Cloudflare has been surveying attacked customers — one question on the survey being if they received a ransom note demanding payment in exchange to stop the DDoS attack. Q4 ’21 recorded the highest survey responses ever that indicated ransom threats — ransom attacks increased by 29% YoY and 175% QoQ. More specifically, one out of every 4.5 respondents (22%) reported receiving a ransom letter demanding payment by the attacker.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6YXf8BjOc11hjAwLqsC3Ee/d9690fb0ee28b1c024b8bfceb425e82c/image9.png" />
            
            </figure><p>The percentage of respondents reported being targeted by a ransom DDoS attack or that have received threats in advance of the attack.</p><p>When we break it down by month, we can see that December 2021 topped the charts with 32% of respondents reporting receiving a ransom letter — that’s nearly one out of every three surveyed respondents.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2qNYRymdKC7OmMRlqYW6yP/95660390bf9c222518705aab2a871e8c/unnamed.png" />
            
            </figure>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, specifically HTTP DDoS attacks, are attacks that usually aim to disrupt a web server by making it unable to process legitimate user requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests and — in some cases — crash, resulting in degraded performance or an outage for legitimate users.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2rXJ2p6S40Qc709TT5Kabb/f4aa6e71713ec57142419a8acc59170e/image13.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by industry</h3>
      <a href="#application-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p><b>In Q4, DDoS attacks on Manufacturing companies increased by 641% QoQ, and DDoS attacks on the Business Services industry increased by 97%.</b></p><p>When we break down the application-layer attacks targeted by industry, the Manufacturing, Business Services, and Gaming/Gambling industries were the most targeted industries in Q4 ’21.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3VZPSeXuR577XbrkgkQKYW/c346c1c5a7a18f178ce4f388a4774919/image12.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by source country</h3>
      <a href="#application-layer-ddos-attacks-by-source-country">
        
      </a>
    </div>
    <p>To understand the origin of the HTTP attacks, we look at the geolocation of the source IP address belonging to the client that generated the attack HTTP requests. Unlike network-layer attacks, source IP addresses cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> in HTTP attacks. A high percentage of DDoS activity in a given country usually indicates the presence of botnets operating from within the country's borders.</p><p>For the fourth quarter in a row, China remains the country with the highest percentage of DDoS attacks originating from within its borders. More than three out of every thousand HTTP requests that originated from Chinese IP addresses were part of an HTTP DDoS attack. The US remained in second place, followed by Brazil and India.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4V0FXoJ0TWV5ZZfVsfJwvX/00483401590d51fde24ab76e1ce743bb/image18.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by target country</h3>
      <a href="#application-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>In order to identify which countries are targeted by the most HTTP DDoS attacks, we bucket the DDoS attacks by our customers' billing countries and represent it as a percentage out of all DDoS attacks.</p><p>For the third consecutive time this year, organizations in the United States were targeted by the most HTTP DDoS attacks, followed by Canada and Germany.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4f8B9aTjlObizqYK5FO0vA/20b782dba3e36f87f31a541664305f03/image8.png" />
            
            </figure>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application-layer attacks target the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service that end users are trying to access, <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer attacks</a> aim to overwhelm network infrastructure (such as in-line routers and servers) and the Internet link itself.</p>
    <div>
      <h3>Cloudflare thwarts an almost 2 Tbps attack</h3>
      <a href="#cloudflare-thwarts-an-almost-2-tbps-attack">
        
      </a>
    </div>
    <p>In November, our systems automatically detected and mitigated <a href="/cloudflare-blocks-an-almost-2-tbps-multi-vector-ddos-attack/">an almost 2 Tbps DDoS attack</a>. This was a multi-vector attack combining <a href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/">DNS amplification</a> attacks and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP floods</a>. The entire attack lasted just one minute. The attack was launched from approximately 15,000 bots running a variant of the original Mirai code on IoT devices and <a href="https://www.rapid7.com/blog/post/2021/11/01/gitlab-unauthenticated-remote-code-execution-cve-2021-22205-exploited-in-the-wild/">unpatched GitLab instances</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6CZbhxkxGHatqnmkf0rD8B/0c378dc0f652ffa379bef8c9e200edf7/image14.jpg" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by month</h3>
      <a href="#network-layer-ddos-attacks-by-month">
        
      </a>
    </div>
    <p><b>December was the busiest month for attackers in 2021.</b></p><p>Q4 ‘21 was the busiest quarter in 2021 for attackers. Over 43% of all network-layer DDoS attacks took place in the fourth quarter of 2021. While October was a relatively calmer month, in November, the month of the Chinese Singles' Day, the American Thanksgiving holiday, Black Friday, and Cyber Monday, the number of network-layer DDoS attacks nearly doubled. The number of observed attacks increased towards the final days of December ’21 as the world prepared to close out the year. In fact, the total number of attacks in December alone was higher than all the attacks in Q2 ’21 and almost equivalent to all attacks in Q1 ’21.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3M60fvAArNvQNb92QmXP59/273a191925bb3d77ae22c647edf8d973/image5.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by attack rate</h3>
      <a href="#network-layer-ddos-attacks-by-attack-rate">
        
      </a>
    </div>
    <p><b>While most attacks are still relatively ‘small’ in size, terabit-strong attacks are becoming the norm.</b></p><p>There are different ways of measuring the size of an L3/4 DDoS attack. One is the volume of traffic it delivers, measured as the bit rate (specifically, terabits per second or gigabits per second). Another is the number of packets it delivers, measured as the packet rate (specifically, millions of packets per second).</p><p>Attacks with high bit rates attempt to cause a denial-of-service event by clogging the Internet link, while attacks with high packet rates attempt to overwhelm the servers, routers, or other in-line hardware appliances. These devices dedicate a certain amount of memory and computation power to process each packet. Therefore, by bombarding it with many packets, the appliance can be left with no further processing resources. In such a case, packets are “dropped,” i.e., the appliance is unable to process them. For users, this results in service disruptions and denial of service.</p><p>The distribution of attacks by their size (in bit rate) and month is shown below. As seen in the graph above, the majority of attacks took place in December. However, the graph below illustrates that larger attacks, over 300 Gbps in size, took place in November. Most of the attacks between 5-20 Gbps took place in December.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3FDRn0pqTveatbegOoQqZR/88162e7e901ccd0fe1409258a62a58f6/image10.png" />
            
            </figure><p><b>Distribution by packet rate</b></p><p>An interesting correlation Cloudflare has observed is that when the number of attacks increases, their size and duration decrease. In the first two-thirds of 2021, the number of attacks was relatively small, and correspondingly, their rates increased, e.g., in Q3 ’21, attacks ranging from 1-10 million packets per second (mpps) increased by 196%. In Q4 ’21, the number of attacks increased and Cloudflare observed a decrease in the size of attacks. 91% of all attacks peaked below 50,000 packets per second (pps) — easily sufficient to take down unprotected Internet properties.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ckVnjxEu3spStObJuOkyb/d4f0fa003c675a1b224b79bbb59e1e87/image4.png" />
            
            </figure><p>Larger attacks of over 1 mpps decreased by 48% to 28% QoQ, while attacks peaking below 50K pps increased by 2.36% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Pq9PVHDkDpxA2Ao0lsk54/2b83c62b6881c5b9f65b7fcb28b50a4a/image19.png" />
            
            </figure>
    <div>
      <h3>Distribution by bit rate</h3>
      <a href="#distribution-by-bit-rate">
        
      </a>
    </div>
    <p>Similar to the trend observed in packet-intensive attacks, the amount of bit-intensive attacks shrunk as well. While attacks over 1 Tbps are becoming the norm, with the largest one we’ve ever seen peak just below 2 Tbps, the majority of attacks are still small and peaked below 500 Mbps (97.2%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16pVIsOgXI2wsHIRLv7naT/9a8c062f58e23a902eb79052e15a13f9/image17.png" />
            
            </figure><p>In Q4 ’21, larger attacks of all ranges above 500 Mbps saw massive decreases ranging from 35% to 57% for the larger 100+ Gbps attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3II1ZYySec9lPey8MzL4zu/c6faf71ae63de7801c7e90e7b21613d3/image1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by duration</h3>
      <a href="#network-layer-ddos-attacks-by-duration">
        
      </a>
    </div>
    <p><b>Most attacks remain under one hour in duration, reiterating the need for automated always-on DDoS mitigation solutions.</b></p><p>We measure the duration of an attack by recording the difference between when it is first detected by our systems as an attack and the last packet we see with that attack signature towards that specific target. In the last quarter of 2021, 98% of all network-layer attacks lasted less than one hour. This is very common as most of the attacks are short-lived. Even more so, a trend we’ve seen is that when the number of attacks increases, as in this quarter, their rate and duration decreases.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4rFMqwUHU7xE4JBesamLXP/2cc512dfab3837fa7e8b8431b4c4a529/image2.png" />
            
            </figure><p>Short attacks can easily go undetected, especially burst attacks that, within seconds, bombard a target with a significant number of packets, bytes, or requests. In this case, DDoS protection services that rely on manual mitigation by security analysis have no chance in mitigating the attack in time. They can only learn from it in their post-attack analysis, then deploy a new rule that filters the attack fingerprint and hope to catch it next time. Similarly, using an “on-demand” service, where the security team will redirect traffic to a DDoS provider during the attack, is also inefficient because the attack will already be over before the traffic routes to the on-demand DDoS provider.</p><p>It’s recommended that companies use <a href="https://www.cloudflare.com/ddos/">automated, always-on DDoS protection services</a> that analyze traffic and apply real-time fingerprinting fast enough to block short-lived attacks.</p>
    <div>
      <h2>Attack vectors</h2>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p><b>SYN floods remain attackers’ favorite method of attack, while attacks over SNMP saw a massive surge of almost 5,800% QoQ.</b></p><p>An attack vector is a term used to describe the method that the attacker uses to launch their DDoS attack, i.e., the IP protocol, packet attributes such as TCP flags, flooding method, and other criteria.</p><p>For the first time in 2021, the percentage of <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN flood</a> attacks significantly decreased. Throughout 2021, SYN floods accounted for 54% of all network-layer attacks on average. While still grabbing first place as the most frequent vector, its share dropped by 38% QoQ to 34%.</p><p>However, it was a close-run for SYN attacks and UDP attacks. A <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP flood</a> is a type of denial-of-service attack in which a large number of User Datagram Protocol (UDP) packets are sent to a targeted server with the aim of overwhelming that device’s ability to process and respond. Oftentimes, the firewall protecting the targeted server can also become exhausted as a result of UDP flooding, resulting in a denial-of-service to legitimate traffic. Attacks over UDP jumped from fourth place in Q3 ’21 to second place in Q4 ’21, with a share of 32% of all network-layer attacks — a 1,198% increase in QoQ.</p><p>In third place came the SNMP underdog that made a massive leap with its first time 2021 appearance in the top attack vectors.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/lwbO8w5qu71J2zvndCsd4/b4c6479eb8f44192577a91c52f21585b/image7.png" />
            
            </figure>
    <div>
      <h2>Emerging threats</h2>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>When we look at emerging attack vectors — which helps us understand what new vectors attackers are deploying to launch attacks — we observe a massive spike in SNMP, MSSQL, and generic UDP-based DDoS attacks.</p><p>Both SNMP and MSSQL attacks are used to reflect and amplify traffic on the target by spoofing the target’s IP address as the source IP in the packets used to trigger the attack.</p><p>Simple Network Management Protocol (SNMP) is a UDP-based protocol that is often used to discover and manage network devices such as printers, switches, routers, and firewalls of a home or enterprise network on UDP well-known port 161. In an SNMP reflection attack, the attacker sends out a large number of SNMP queries while spoofing the source IP address in the packet as the targets to devices on the network that, in turn, reply to that target’s address. Numerous responses from the devices on the network results in the target network being DDoSed.</p><p>Similar to the SNMP amplification attack, the Microsoft SQL (MSSQL) attack is based on a technique that abuses the Microsoft SQL Server Resolution Protocol for the purpose of launching a reflection-based DDoS attack. The attack occurs when a <a href="https://en.wikipedia.org/wiki/Microsoft_SQL_Server">Microsoft SQL Server</a> responds to a client query or request, attempting to exploit the Microsoft SQL Server Resolution Protocol (MC-SQLR), listening on UDP port 1434.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7AtQXbK2LQzuoc0iLCHJpH/ab0c1aa0dfe437e5c53dee05ce75e078/unnamed-6.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by country</h3>
      <a href="#network-layer-ddos-attacks-by-country">
        
      </a>
    </div>
    <p><b>Attacks originating from Moldova quadrupled, making it the country with the highest percentage of network-layer DDoS activity.</b></p><p>When analyzing network-layer DDoS attacks, we bucket the traffic by the Cloudflare edge data center locations where the traffic was ingested, and not by the source IP. The reason for this is that, when attackers launch network-layer attacks, they can <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoof</a> the source IP address in order to obfuscate the attack source and introduce randomness into the attack properties, which can make it harder for simple DDoS protection systems to block the attack. Hence, if we were to derive the source country based on a spoofed source IP, we would get a spoofed country.</p><p>Cloudflare is able to overcome the challenges of spoofed IPs by displaying the attack data by the location of the Cloudflare data center in which the attack was observed. We are able to achieve geographical accuracy in our report because we have data centers in <a href="http://www.cloudflare.com/network">over 250 cities</a> around the world.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6aiutq5ecZcGT7DPuz29l8/679c95d7ce53e0242e31ee626ca4257e/image6.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1RVVsL8bBzMatBSldHMToC/9f07fc34b2fe114c4c598c2568457554/image16.png" />
            
            </figure><p>To view all regions and countries, check out the <a href="https://radar.cloudflare.com/notebooks/ddos-2021-q4#network-layer-ddos-attacks-by-country">interactive map</a>.</p>
    <div>
      <h2>Summary</h2>
      <a href="#summary">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet. A better Internet is one that is more secure, faster, and reliable for everyone — even in the face of DDoS attacks. As part of our mission, since 2017, we’ve been providing <a href="/unmetered-mitigation/">unmetered and unlimited DDoS protection</a> for free to all of our customers. Over the years, it has become increasingly easier for attackers to launch DDoS attacks. To counter the attacker’s advantage, we want to make sure that it is also easy and free for organizations of all sizes to protect themselves against DDoS attacks of all types.</p><p>Not using Cloudflare yet? <a href="https://dash.cloudflare.com/sign-up">Start now</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[RDDoS]]></category>
            <category><![CDATA[REvil]]></category>
            <category><![CDATA[VoIP]]></category>
            <category><![CDATA[Meris]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">19x0qmzhoEG72zCUibJD8Y</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Vivek Ganti</dc:creator>
        </item>
        <item>
            <title><![CDATA[A Brief History of the Meris Botnet]]></title>
            <link>https://blog.cloudflare.com/meris-botnet/</link>
            <pubDate>Tue, 09 Nov 2021 12:59:29 GMT</pubDate>
            <description><![CDATA[ Over the past months, we’ve been tracking and analyzing the activity of the Meris botnet. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Meris first got our attention due to an exceptionally large <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">17.2 million requests per second (rps) DDoS attack</a> that it launched against one of our customers. This attack, along with subsequent attacks originated by the Meris botnet, was automatically detected and mitigated by our <a href="https://www.cloudflare.com/ddos/">DDoS protection systems</a>. Cloudflare customers, even ones on the <a href="https://www.cloudflare.com/plans/free/">free plan</a>, are protected against Meris attacks.</p><p>Over the past months, we’ve been tracking and analyzing the activity of the Meris botnet. Some main highlights include:</p><ul><li><p>Meris targets approximately 50 different websites every single day with a daily average of 104 unique DDoS attacks.</p></li><li><p>More than 33% of all Meris DDoS attack traffic targeted China-based websites.</p></li><li><p>More than 12% of all websites that were attacked by Meris are operated by US-based companies.</p></li></ul><p><i>View more Meris attack insights and trends in the interactive </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet"><i>Radar dashboard</i></a><i>.</i></p>
    <div>
      <h3>So what is Meris?</h3>
      <a href="#so-what-is-meris">
        
      </a>
    </div>
    <p>Meris (Latvian for plague) is the name of an active botnet behind a series of recent DDoS attacks that have targeted thousands of websites around the world. It was originally detected in late June 2021 by <a href="https://blog.qrator.net/en/meris-botnet-climbing-to-the-record_142/">QRator</a> in joint research they conducted with Yandex. Their initial research identified 30,000 to 56,000 bots, but they estimated that the numbers are actually much higher, in the ballpark of 250,000 bots.</p><p>The Meris botnet is formed of infected routers and networking hardware manufactured by the Latvian company MikroTik. <a href="https://blog.mikrotik.com/security/meris-botnet.html">According to MikroTik’s</a> blog, the attackers exploited a vulnerability in the router’s operating system (RouterOS) which enabled attackers to gain unauthenticated remote access to read and write arbitrary files (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14847">CVE-2018-14847</a>).</p><p><a href="https://wiki.mikrotik.com/wiki/Manual:RouterOS_FAQ#What_is_MikroTik_RouterOS.E2.84.A2.3F">RouterOS</a> is the router operating system that’s used by MikroTik’s routers and the RouterBOARD hardware product family, which can also be used to turn any PC into a router. Administration of RouterOS can be done either via direct <a href="https://www.cloudflare.com/learning/access-management/what-is-ssh/">SSH connection</a> or by using a configuration utility called <a href="https://wiki.mikrotik.com/wiki/Manual:Winbox#Summary">WinBox</a>. The vulnerability itself was possible due to a <a href="https://en.wikipedia.org/wiki/Directory_traversal_attack">directory traversal</a> vulnerability in the WinBox interface with RouterOS.</p><p>Directory traversal is a type of exploit that allows attackers to travel to the parent directories to gain access to the operating system’s <a href="https://en.wikipedia.org/wiki/File_system">file system</a>, a method and structure of how data is stored and retrieved in the operating system. Once they gain access to the file system, attackers can then read the existing files that administer the router and write files directly into the file system to administer the routers to their botnet needs.</p><p>While the vulnerability was patched after its detection back in 2018, it’s still being exploited in compromised devices that do not use the patched RouterOS versions, or that use the default usernames and passwords. MicroTik has advised its customers to upgrade their devices’ OS version, to only allow access to the devices via secure IPsec, and to inspect for any abnormalities such as unknown SOCKS proxy settings and scripts.</p><p>To launch volumetric attacks, the botnet uses HTTP pipelining which allows it to send multiple requests over a single connection, thus increasing its total attack throughput. Furthermore, in an attempt to obfuscate the attack source, the botnet uses open SOCKS proxies to proxy their attack traffic to the target.</p><p>Cloudflare’s DDoS protection systems automatically detect and mitigate Meris attacks. One of the mitigation actions that the system can choose to use is the ‘Connection Close’ action which eliminates the risk of HTTP pipelining and helps slow down attackers. Additionally, as part of Cloudflare’s threat intelligence suite, we provide a Managed IP List of Open SOCKS Proxies that customers can use as part of their firewall rules — to block, challenge or rate-limit traffic that arrives via SOCKS proxies.</p>
    <div>
      <h3>How does Meris compare to Mirai?</h3>
      <a href="#how-does-meris-compare-to-mirai">
        
      </a>
    </div>
    <p>About five years ago, <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai</a> (Japanese for future) — the infamous botnet that infected hundreds of thousands of IoT devices —  <a href="/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis/">launched record-breaking DDoS attacks</a> against websites.</p><p>There have been many variants of the Mirai botnet since its source code was leaked. One version of Mirai, called <a href="/moobot-vs-gatebot-cloudflare-automatically-blocks-botnet-ddos-attack-topping-at-654-gbps/">Moobot</a>, was detected last year when it attacked a Cloudflare customer with a 654 Gbps DDoS attack. Another variant <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/#:~:text=Two%20weeks%20before%2C%20a%20Mirai-variant%20botnet%20launched%20over%20a%20dozen%20UDP%20and%20TCP%20based%20DDoS%20attacks%20that%20peaked%20multiple%20times%20above%201%20Tbps%2C%20with%20a%20max%20peak%20of%20approximately%201.2%20Tbps.">recently made a resurgence</a> when it targeted Cloudflare customers with over a dozen UDP and TCP based DDoS attacks that peaked multiple times above 1 Tbps, with a max peak of approximately 1.2 Tbps.</p><p>While Mirai infected IoT devices with low computational power, Meris is a swarm of routers that have significantly higher processing power and data transfer capabilities than IoT devices, making them much more potent in causing harm at a larger scale to web properties that are not protected by sophisticated cloud-based DDoS mitigation.</p>
    <div>
      <h2>Tracking the Meris botnet attacks</h2>
      <a href="#tracking-the-meris-botnet-attacks">
        
      </a>
    </div>
    <p>Since the appearance of Meris, Cloudflare’s systems automatically detected and mitigated Meris attacks using the existing mitigation rules. During our analysis of the Meris botnet attacks, our security experts noticed the attack vectors adapt to try and bypass Cloudflare’s defenses. Needless to say, they were not successful. But we wanted to stay many steps ahead of attackers — and so our engineers deployed additional rules that mitigate Meris attacks even more comprehensively. A side effect of these mitigation rules is that it also provides us with more granular threat intelligence on the Meris attacks.</p><p>Since we deployed the new rules in early August, we’ve seen Meris launch an average of 104 DDoS attacks on Cloudflare customers every day. The highest figure we’ve seen was on September 6, when Meris was used to launch 261 unique attacks against Cloudflare customers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6TtZZ2lzrszMdx8N3fhjp4/6bdfaba64b916e35235136ac8be75fda/unnamed--8-.png" />
            
            </figure><p><i>View the interactive graph on</i> <a href="https://radar.cloudflare.com/notebooks/meris-botnet#meris_attacks_over_time"><i>Cloudflare Radar</i></a><i>.</i></p><p>During that same day, on September 6, attacks from Meris accounted for a record-breaking 17.5% of all L7 DDoS attacks that Cloudflare observed.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3OP78KrTmwCcDv1W1n6jPr/f1ea42eb24f867c74eff3289d16941de/unnamed--1--3.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#share_of_meris_attacks"><i>Cloudflare Radar</i></a><i>.</i></p><p>Overall, Meris targets about 50 different websites and applications every single day. Although the average attack peaked at 106K rps, the median attack size was actually smaller at 17.6K rps. The largest attack we’ve seen was 17.2M rps and that occurred in July. In the graph below, you can see the daily highest requests per second rate after we deployed the new rules. Since then, the largest attack we’ve seen was 16.7M rps, which took place on August 19.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6yGWKQcIfIFhUsuJShFunZ/8f01287788ec1337311772309fc64354/unnamed--9-.png" />
            
            </figure>
    <div>
      <h2>Meris used to target Banks, Financial Services, and Insurance companies</h2>
      <a href="#meris-used-to-target-banks-financial-services-and-insurance-companies">
        
      </a>
    </div>
    <p>Over the past few months, the industry that received the most attack traffic from the Meris botnet was the Banking, Financial Services, and Insurance (BFSI) industry</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3GdZyXvW0bu3BUGgoptusx/073d6227e2b14baa96cc57cc926ab63b/unnamed-6.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#top10_industries_by_total_requests"><i>Cloudflare Radar</i></a><i>.</i></p><p>Following the BFSI industry, the most attacked industries were the Publishing, Gaming/Gambling, and IT Services industries. And while BFSI was the number one most attacked industry when considering the Meris DDoS activity rate, it <i>only</i> came in fourth place when considering the percentage of targeted websites.</p><p>In terms of the percentage of targeted websites, the Computer Software industry came in first place. Almost 4% of all impacted websites were of Computer Software companies protected by Cloudflare, followed by Gaming/Gambling and IT Services with 3% and 2%, respectively.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/72tWyMdL7CFZWKLTUe4MSN/fa7c89b73a1d34866284c9249460cdcf/unnamed--2--3.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#top10_industries_by_internet_properties"><i>Cloudflare Radar</i></a><i>.</i></p>
    <div>
      <h3>Attacks on industries over time</h3>
      <a href="#attacks-on-industries-over-time">
        
      </a>
    </div>
    <p>Besides the total breakdowns shown above, we can also view the top industries the botnet attacked over time to understand the changing trends. These trends may be tied to political events, new video game releases, sporting events, or any other global or local public interest events.</p><p>Off the top, we can already see the two largest peaks on August 9 and August 29 — mainly on the Computer Software, Gaming/Gambling, and IT industries. Another interesting peak occurred on August 14 against Cryptocurrency providers.</p><p>In late August, the botnet was pointed against gambling and casino websites, generating attacks at rates of hundreds of thousands to millions of requests per second. A second significant wave against the same industry was launched in early September.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Ch2h4SDn7AL79q3sLbr7m/deb98d1529f528523b70bf6818d13bd4/unnamed--3--3.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#top10_industries_attacked_by_meris"><i>Cloudflare Radar</i></a><i>.</i></p>
    <div>
      <h2>Meris targets websites in China, Australia, and US</h2>
      <a href="#meris-targets-websites-in-china-australia-and-us">
        
      </a>
    </div>
    <p>Similarly to the analysis of the top industries, we can calculate the Meris DDoS activity rate per target country to identify which countries came under the most attacks. In total, China-based companies saw the largest amount of DDoS attacks. More than 33% of all requests generated by Meris were destined for China-based companies that are protected by Cloudflare. Australia came in second place, and the US in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2efvUpiNBPMcVRff9MswfD/1c4adfa719a2a27a711a7a699ad470f6/unnamed--4--3.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#top10_countries_by_total_requests"><i>Cloudflare Radar</i></a><i>.</i></p><p>On the other hand, when we look at the number of websites that were targeted by Meris, the US came in first place. More than 12% of all websites that were targeted by Meris are operated by US-based companies. China came in second place with 5.6% and Russia in third with 4.4%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ztEAlupBFh5IMb6sx2zzR/dfdfdb346b7d59a993bf32e8948246bc/unnamed--5--2.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#top10_countries_by_internet_properties"><i>Cloudflare Radar</i></a><i>.</i></p>
    <div>
      <h3>Attacks on countries over time</h3>
      <a href="#attacks-on-countries-over-time">
        
      </a>
    </div>
    <p>Over time, we can see how the attacks on the top countries change. Similarly to the per-industry breakdown, we can also see two large peaks. The first one occurred on the same spike as the per-industry breakdown on August 9. However, the second one here occurred on September 1.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4wpvipMV2Q30VIGdGaoV1o/72dc434553158e6a1b8e74f922183834/unnamed--10-.png" />
            
            </figure><p><i>View the interactive graph on </i><a href="https://radar.cloudflare.com/notebooks/meris-botnet#top10_countries_attacked_by_meris"><i>Cloudflare Radar</i></a><i>.</i></p>
    <div>
      <h2>Location of the Meris bots</h2>
      <a href="#location-of-the-meris-bots">
        
      </a>
    </div>
    <p>Although only tens of thousands of bots have been detected per attack, it is estimated that there are roughly 250,000 bots worldwide. As indicated above, the botnet is formed of MikroTik routers. Using the source IP address of the routers, we’re able to identify the origin country of the bots to paint a geographical representation of the bots' presence and growth over time.</p><p>The change in the location of the bots doesn’t necessarily indicate that the botnet is growing or shrinking. It could also be that different bot groups are activated from time to time to spread the load of the attacks while attempting not to get caught.</p><p>At the beginning of August, the majority of the bots were located in Brazil. But by the end of August, that number plummeted to a single digit percentage close to zero. Meanwhile, the number of infected devices grew in the United States. From the beginning of September, the number of bots was significantly higher in the US, Russia, India, Indonesia, and China.</p><div></div><p><i>View the interactive graph on </i><a href="http://radar.cloudflare.com/notebooks/meris-botnet#location-of-the-meris-bots"><i>Cloudflare Radar</i></a><i>.</i></p>
    <div>
      <h2>Cloudflare protects against Meris attacks</h2>
      <a href="#cloudflare-protects-against-meris-attacks">
        
      </a>
    </div>
    <p>Cloudflare operates autonomous DDoS protection systems that automatically detect and mitigate DDoS attacks of all types, including attacks launched by Meris and Mirai. These systems are also customizable, and Cloudflare customers can tweak and tune their DDoS protection settings as needed with the <a href="/http-ddos-managed-rules/">HTTP DDoS Managed Ruleset</a> and the <a href="https://developers.cloudflare.com/waf/ddos-l34-mitigation">L3/4 DDoS Managed Ruleset</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[RDDoS]]></category>
            <category><![CDATA[Meris]]></category>
            <category><![CDATA[VoIP]]></category>
            <category><![CDATA[Mirai]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">1XxFdHMIJKNoJcgPqqPKMp</guid>
            <dc:creator>Vivek Ganti</dc:creator>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS Attack Trends for Q3 2021]]></title>
            <link>https://blog.cloudflare.com/ddos-attack-trends-for-2021-q3/</link>
            <pubDate>Thu, 04 Nov 2021 12:58:40 GMT</pubDate>
            <description><![CDATA[ In Q3, 2021 we saw and mitigated record-setting HTTP DDoS attacks, terabit-strong network layer attacks, one of the largest botnets ever deployed (Meris), and more recently, ransom attacks on Voice-over-IP (VoIP) service providers. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>The third quarter of 2021 was a busy quarter for DDoS attackers. Cloudflare observed and mitigated <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">record-setting HTTP DDoS attacks</a>, <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/#:~:text=with%20a%20max%20peak%20of%20approximately%201.2%20Tbps">terabit-strong network-layer attacks</a>, one of the <a href="/meris-botnet/">largest botnets ever deployed (Meris)</a>, and more recently, <a href="/update-on-voip-attacks/">ransom DDoS attacks on voice over IP (VoIP) service providers</a> and their <a href="/attacks-on-voip-providers/">network infrastructure</a> around the world.</p><p>Here’s a summary of the trends observed in Q3 ‘21:</p>
    <div>
      <h4>Application-layer (L7) DDoS attack trends:</h4>
      <a href="#application-layer-l7-ddos-attack-trends">
        
      </a>
    </div>
    <ul><li><p>For the second consecutive quarter in 2021, US-based companies were the most targeted in the world.</p></li><li><p>For the first time in 2021, attacks on UK-based and Canada-based companies skyrocketed, making them the second and third most targeted countries, respectively.</p></li><li><p>Attacks on Computer Software, Gaming/ Gambling, IT, and Internet companies increased by an average of 573% compared to the previous quarter.</p></li><li><p>Meris, one of the most powerful botnets in history, aided in launching DDoS campaigns across various industries and countries.</p></li></ul>
    <div>
      <h4>Network-layer (L3/4) DDoS attack trends:</h4>
      <a href="#network-layer-l3-4-ddos-attack-trends">
        
      </a>
    </div>
    <ul><li><p>DDoS attacks increased by 44% worldwide compared to the previous quarter.</p></li><li><p>The Middle East and Africa recorded the largest average attack increase of approximately 80%.</p></li><li><p>Morocco recorded the highest DDoS activity in the third quarter globally — three out of every 100 packets were part of a DDoS attack.</p></li><li><p>While SYN and RST attacks remain the dominant attack method used by attackers, Cloudflare observed a surge in <a href="https://en.wikipedia.org/wiki/Datagram_Transport_Layer_Security">DTLS</a> amplification attacks — recording a 3,549% increase QoQ.</p></li><li><p>Attackers targeted (and continue to target going into the fourth quarter this year) VoIP service providers with massive DDoS attack campaigns in attempts to bring SIP infrastructure down.</p></li></ul><p><b>Note on avoiding data biases:</b> When we analyze attack trends, we calculate the “DDoS activity” rate, which is the percentage of attack traffic of the total traffic (attack + clean). When reporting application- and network-layer DDoS attack trends, we use this metric, which allows us to normalize the data points and avoid biases toward, for example, a larger Cloudflare data center that naturally handles more traffic and therefore also, possibly, more attacks compared to a smaller Cloudflare data center located elsewhere.</p>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, specifically HTTP DDoS attacks, are attacks that usually aim to disrupt a web server by making it unable to process legitimate user requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests and — in some cases — crash, resulting in degraded performance or an outage for legitimate users.</p>
    <div>
      <h4>Q3 ‘21 was the quarter of Meris — one of the most powerful botnets deployed to launch some of the largest HTTP DDoS attacks in history.</h4>
      <a href="#q3-21-was-the-quarter-of-meris-one-of-the-most-powerful-botnets-deployed-to-launch-some-of-the-largest-http-ddos-attacks-in-history">
        
      </a>
    </div>
    <p>This past quarter, we observed <a href="/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/">one of the largest recorded HTTP attacks</a> — 17.2M rps (requests per second) — targeting a customer in the financial services industry. One of the most powerful botnets ever observed, called Meris, is known to be deployed in launching these attacks.</p><p>Meris (Latvian for plague) is a botnet behind recent DDoS attacks that have targeted networks or organizations around the world. The Meris botnet infected routers and other networking equipment manufactured by the Latvian company MikroTik. According to MikroTik’s blog, a vulnerability in the MikroTik RouterOS (that was patched after its detection back in 2018) was exploited in still unpatched devices to build a botnet and launch coordinated DDoS attacks by bad actors.</p><p>Similar to the <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai botnet</a> of 2016, Meris is one of the most powerful botnets recorded. While Mirai infected IoT devices with low computational power such as smart cameras, Meris is a growing swarm of networking infrastructure (such as routers and switches) with significantly higher processing power and data transfer capabilities than IoT devices — making them much more potent in causing harm at a larger scale. Be that as it may, Meris is an example of how the attack volume doesn’t necessarily guarantee damage to the target. As far as we know, Meris, despite its strength, was not able to cause significant impact or Internet outages. On the other hand, by tactically <a href="https://en.wikipedia.org/wiki/DDoS_attack_on_Dyn">targeting the DYN DNS service in 2016</a>, Mirai succeeded in causing significant Internet disruptions.</p>
    <div>
      <h3>Application-layer DDoS attacks by industry</h3>
      <a href="#application-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p><b>The tech and gaming industries were the most targeted industries in Q3 ‘21.</b></p><p>When we break down the application-layer attacks targeted by industry, Computer Software companies topped the charts. The Gaming/Gambling industry, also known to be regular targets of online attacks, was a close second, followed by the Internet and IT industries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/JPadNrIHstG6fM3Oxg6A7/22252c708bd8797a7d4be42348929b7a/image6-5.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by source country</h3>
      <a href="#application-layer-ddos-attacks-by-source-country">
        
      </a>
    </div>
    <p>To understand the origin of the HTTP attacks, we look at the geolocation of the source IP address belonging to the client that generated the attack HTTP requests. Unlike network-layer attacks, source IPs cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> in HTTP attacks. A high DDoS activity rate in a given country usually indicates the presence of botnets operating from within.</p><p>In the third quarter of 2021, most attacks originated from devices/servers in China, the United States, and India. While China remains in first place, the number of attacks originating from Chinese IPs actually decreased by 30% compared to the previous quarter. Almost one out of every 200 HTTP requests that originated from China was part of an HTTP DDoS attack.</p><p>Additionally, attacks from Brazil and Germany shrank by 38% compared to the previous quarter. Attacks originating from the US and Malaysia reduced by 40% and 45%, respectively.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2ABqWAhmZCoG1eZ6RBNc9g/6a5bb8519048c6464df07a30876cdce7/image31.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by target country</h3>
      <a href="#application-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>In order to identify which countries are targeted the most by L7 attacks, we break down the DDoS activity by our customers’ billing countries.</p><p>For the second consecutive time this year, organizations in the United States were targeted the most by L7 DDoS attacks in the world, followed by those in the UK and Canada.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6T0eaxRVbixvISjvuFzNGG/79519d6af266fec7ee15e866df162c88/image10-7.png" />
            
            </figure>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application-layer attacks target the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service that end users are trying to access, <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer attacks</a> aim to overwhelm network infrastructure (such as in-line routers and servers) and the Internet link itself.</p>
    <div>
      <h4>Mirai-variant botnet strikes with a force of 1.2 Tbps.</h4>
      <a href="#mirai-variant-botnet-strikes-with-a-force-of-1-2-tbps">
        
      </a>
    </div>
    <p>Q3 ‘21 was also the quarter when the infamous Mirai made a resurgence. A Mirai-variant botnet launched over a dozen UDP- and TCP-based DDoS attacks that peaked multiple times above 1 Tbps, with a max peak of approximately 1.2 Tbps. These network-layer attacks targeted Cloudflare customers on the <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> and <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Spectrum</a> services. One of these targets was a major APAC-based Internet services, telecommunications, and hosting provider and the other was a gaming company. In all cases, the attacks were automatically detected and mitigated without human intervention.</p>
    <div>
      <h3>Network-layer DDoS attacks by month</h3>
      <a href="#network-layer-ddos-attacks-by-month">
        
      </a>
    </div>
    
    <div>
      <h4>September was, by far, the busiest month for attackers this year.</h4>
      <a href="#september-was-by-far-the-busiest-month-for-attackers-this-year">
        
      </a>
    </div>
    <p>Q3 ‘21 accounted for more than 38% of all attacks this year. September was the busiest month for attackers so far in 2021 — accounting for over 16% of all attacks this year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7rSRKsyrgPbljcg6EKZLAt/91e1b92d2ac5aa052a29936f7deca4e5/image20.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by attack rate</h3>
      <a href="#network-layer-ddos-attacks-by-attack-rate">
        
      </a>
    </div>
    <p><b>Most attacks are ‘small’ in size, but the number of larger attacks continues to rise.</b></p><p>There are different ways of measuring the size of a L3/4 DDoS attack. One is the volume of traffic it delivers, measured as the bit rate (specifically, terabits per second or gigabits per second). Another is the number of packets it delivers, measured as the packet rate (specifically, millions of packets per second).</p><p>Attacks with high bit rates attempt to cause a denial-of-service event by clogging the Internet link, while attacks with high packet rates attempt to overwhelm the servers, routers, or other in-line hardware appliances. Appliances dedicate a certain amount of memory and computation power to process each packet. Therefore, by bombarding it with many packets, the appliance can be left with no further processing resources. In such a case, packets are “dropped,” i.e., the appliance is unable to process them. For users, this results in service disruptions and denial of service.</p><p>The distribution of attacks by their size (in bit rate) and month is shown below. Interestingly enough, all attacks over 400 Gbps took place in August, including some of the largest attacks we have seen; multiple attacks peaked above 1 Tbps and reached as high as 1.2 Tbps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2gWdjNgw6dpUGm9dtwTl6m/7342a03af814d9530dfbb83a95c2fe58/image8-6.png" />
            
            </figure>
    <div>
      <h4>Packet rate</h4>
      <a href="#packet-rate">
        
      </a>
    </div>
    <p>As seen in previous quarters, the majority of attacks observed in Q3 ‘21 were relatively small in size — nearly 89% of all attacks peaked below 50K packets per second (pps). While a majority of attacks are smaller in size, we observed that the number of larger attacks is increasing QoQ — attacks that peaked above 10M pps increased by 142% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6l8ybFgUYfXl660WkGXssz/be1059d15032c3add6a75d125a1bb2cb/image16-1.png" />
            
            </figure><p>Attacks of packet rates ranging from 1-10 million packets per second increased by 196% compared to the previous quarter. This trend is similar to what we observed the last quarter as well, suggesting that larger attacks are increasing.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7dkSGlex98BjHJxLGMXc58/a91d6928dadb6f9e6aba034947d648b9/image22-1.png" />
            
            </figure>
    <div>
      <h4>Bit rate</h4>
      <a href="#bit-rate">
        
      </a>
    </div>
    <p>From the bit rate perspective, a similar trend was observed — a total of 95.4% of all attacks peaked below 500 Mbps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2O1tTLdcoHzRwGSSaj5Kl0/367783ca32926c29b7b9d619f219b403/image11-4.png" />
            
            </figure><p>QoQ data shows that the number of attacks of sizes ranging from 500 Mbps to 10 Gbps saw massive increases of 126% to 289% compared to the previous quarter. Attacks over 100 Gbps decreased by nearly 14%.</p><p>The number of larger bitrate attacks increased QoQ (with the one exception being attacks over 100 Gbps, which decreased by nearly 14% QoQ). In particular, attacks ranging from 500 Mbps to 1 Gbps saw a surge of 289% QoQ and those ranging from 1 Gbps to 100 Gbps surged by 126%.</p><p>This trend once again illustrates that, while (in general) a majority of the attacks are indeed smaller, the number of “larger” attacks is increasing. This suggests that more attackers are garnering more resources to launch larger attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ktaoC9RxCLuAKOxdrHZHx/ae793021eb74f2a9f10be3c14212926d/image2-3.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by duration</h3>
      <a href="#network-layer-ddos-attacks-by-duration">
        
      </a>
    </div>
    
    <div>
      <h4>Most attacks remain under one hour in duration, reiterating the need for automated always-on DDoS mitigation solutions.</h4>
      <a href="#most-attacks-remain-under-one-hour-in-duration-reiterating-the-need-for-automated-always-on-ddos-mitigation-solutions">
        
      </a>
    </div>
    <p>We measure the duration of an attack by recording the difference between when it is first detected by our systems as an attack and the last packet we see with that attack signature. As in previous quarters, most of the attacks are short-lived. To be specific, 94.4% of all DDoS attacks lasted less than an hour. On the other end of the axis, attacks over 6 hours accounted for less than 0.4% in Q3 ‘21, and we did see a QoQ increase of 165% in attacks ranging 1-2 hours. Be that as it may, a longer attack does not necessarily mean a more dangerous one.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4bpCM8AFhJhVr2SrzJLLY2/f46527826d0d7aa0b866ca343d641b96/image23-1.png" />
            
            </figure><p>Short attacks can easily go undetected, especially burst attacks that, within seconds, bombard a target with a significant number of packets, bytes, or requests. In this case, DDoS protection services that rely on manual mitigation by security analysis have no chance in mitigating the attack in time. They can only learn from it in their post-attack analysis, then deploy a new rule that filters the attack fingerprint and hope to catch it next time. Similarly, using an “on-demand” service, where the security team will redirect traffic to a DDoS provider during the attack, is also inefficient because the attack will already be over before the traffic routes to the on-demand DDoS provider.</p><p>Cloudflare recommends that companies use automated, always-on DDoS protection services that analyze traffic and apply real-time fingerprinting fast enough to block the short-lived attacks. Cloudflare analyzes traffic out-of-path, ensuring that DDoS mitigation does not add any latency to legitimate traffic, even in always-on deployments. Once an attack is identified, our autonomous edge DDoS protection system (<a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">dosd</a>) generates and applies a dynamically crafted rule with a real-time signature. Pre-configured firewall rules comprising allow/deny lists for known traffic patterns take effect immediately.</p>
    <div>
      <h3>Attack vectors</h3>
      <a href="#attack-vectors">
        
      </a>
    </div>
    
    <div>
      <h4>SYN floods remain attackers’ favorite method of attack, while attacks over DTLS saw a massive surge — 3,549% QoQ.</h4>
      <a href="#syn-floods-remain-attackers-favorite-method-of-attack-while-attacks-over-dtls-saw-a-massive-surge-3-549-qoq">
        
      </a>
    </div>
    <p>An attack vector is the term used to describe the method that the attacker utilizes in their attempt to cause a denial-of-service event.</p><p>As observed in previous quarters, attacks utilizing SYN floods remain the most popular method used by attackers.</p><p>A <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN flood</a> attack is a DDoS attack that works by exploiting the very foundation of the TCP protocol — the stateful TCP connection between a client and a server as a part of the 3-way TCP handshake. As a part of the TCP handshake, the client sends an initial connection request packet with a synchronize flag (SYN). The server responds with a packet that contains a synchronized acknowledgment flag (SYN-ACK). Finally, the client responds with an acknowledgment (ACK) packet. At this point, a connection is established and data can be exchanged until the connection is closed. This stateful process can be abused by attackers to cause denial-of-service events.</p><p>By repeatedly sending SYN packets, the attacker attempts to overwhelm a server or the router’s connection table that tracks the state of TCP connections. The server replies with a SYN-ACK packet, allocates a certain amount of memory for each given connection, and falsely waits for the client to respond with the final ACK. Given a sufficient number of connections occupying the server’s memory, the server is unable to allocate further memory for legitimate clients, causing the server to crash or preventing it from handling legitimate client connections, i.e., a denial-of-service event.</p><p>More than half of all attacks observed over our network were SYN floods. This was followed by RST, ACK, and UDP floods.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Vo4muJmB01yU0Qh88Ni35/1605e4b188335f8433a57368c39424f1/image4-3.png" />
            
            </figure>
    <div>
      <h3>Emerging threats</h3>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>While SYN and RST floods remain popular overall, when we look at emerging attack vectors — which helps us understand what new vectors attackers are deploying to launch attacks — we observed a massive spike in <a href="https://en.wikipedia.org/wiki/Datagram_Transport_Layer_Security">DTLS</a> amplification attacks. DTLS floods increased by 3,549% QoQ.</p><p>Datagram Transport Layer Security (DTLS) is a protocol similar to Transport Layer Security (<a href="https://www.cloudflare.com/learning/ssl/transport-layer-security-tls/">TLS</a>) designed to provide similar security guarantees to connectionless datagram-based applications to prevent message forgery, eavesdropping, or tampering. DTLS, being connectionless, is specifically useful for establishing VPN connections, without the <a href="https://openvpn.net/faq/what-is-tcp-meltdown/">TCP meltdown</a> problem. The application is responsible for reordering and other connection properties.</p><p>Just as with most UDP-based protocols, DTLS is spoofable and being used by attackers to generate reflection amplification attacks to overwhelm network gateways.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/73mUxKAOpch92qdR7CR6ZJ/530b32f08bbf9f4adae6f31e717f7197/image18-1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by country</h3>
      <a href="#network-layer-ddos-attacks-by-country">
        
      </a>
    </div>
    <p><b>While Morocco topped the charts in terms of the highest network attack rate observed, Asian countries closely followed.</b></p><p>When analyzing network-layer DDoS attacks, we bucket the traffic by the Cloudflare edge data center locations where the traffic was ingested, and not by the source IP. The reason for this is that, when attackers launch network-layer attacks, they can <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoof</a> the source IP address in order to obfuscate the attack source and introduce randomness into the attack properties, which may make it harder for simple DDoS protection systems to block the attack. Hence, if we were to derive the source country based on a spoofed source IP, we would get a spoofed country.</p><p>Cloudflare is able to overcome the challenges of spoofed IPs by displaying the attack data by the location of the Cloudflare data center in which the attack was observed. We are able to achieve geographical accuracy in our report because we have data centers in <a href="http://www.cloudflare.com/network">over 250 cities</a> around the world.</p>
    <div>
      <h4>Worldwide</h4>
      <a href="#worldwide">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2mpDYFQKy9GOIoJkGbnntr/d38114debdb65a05ef4e9b51e8570464/image12-7.png" />
            
            </figure><p>To view all regions and countries, check out the <a href="https://radar.cloudflare.com/notebooks/ddos-2021-q3#network-layer-ddos-attacks-by-country">Radar DDoS Report dashboard’s interactive map</a>.</p>
    <div>
      <h3>A note on recent attacks on voice over-IP service providers — and ransom DDoS attacks</h3>
      <a href="#a-note-on-recent-attacks-on-voice-over-ip-service-providers-and-ransom-ddos-attacks">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6EzEvtPaswPIEik7EsnQZq/327aba3e45924d43cf71dd629436bd88/image25-1.png" />
            
            </figure><p>We <a href="/attacks-on-voip-providers/">recently reported</a> and <a href="/update-on-voip-attacks/">provided an update</a> on the surge in DDoS attacks on VoIP service providers — some of who have also received ransom threats. As of early Q4 ‘21, this attack campaign is still ongoing and current. At Cloudflare, we continue to onboard VoIP service providers and shield their applications and networks against attacks.</p><p>HTTP attacks against <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api-gateway/">API gateways</a> and the corporate websites of the providers have been combined with network-layer and transport-layer attacks against VoIP infrastructures.</p><p>Examples include:</p><ol><li><p><b>TCP floods targeting stateful firewalls:</b> These are being used in “trial-and-error” type attacks. They are not very effective against telephony infrastructure specifically (because it is mostly UDP) but very effective at overwhelming stateful firewalls.</p></li><li><p><b>UDP floods targeting SIP infrastructure:</b> Floods of UDP traffic that have no well-known fingerprint, aimed at critical VoIP services. Generic floods like this may look like legitimate traffic to unsophisticated filtering systems.</p></li><li><p><b>UDP reflection targeting SIP infrastructure:</b> These methods, when targeted at SIP or RTP services, can easily overwhelm Session Border Controllers (SBCs) and other telephony infrastructure. The attacker seems to learn enough about the target’s infrastructure to target such services with high precision.</p></li><li><p><b>SIP protocol-specific attacks:</b> Attacks at the application layer are of particular concern because of the higher resource cost of generating application errors versus filtering on network devices.</p></li></ol><p>Organizations also continue to receive ransom notes that threaten attacks in exchange for bitcoin. <a href="https://www.cloudflare.com/learning/security/ransomware/what-is-ransomware/">Ransomware</a> and <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">ransom DDoS</a> attacks, for the fourth consecutive quarter, continue to be a germane threat to organizations all over the world.</p><p>Cloudflare products close off several threat vectors that can lead to a ransomware infection and ransom DDoS attacks:</p><ul><li><p>Cloudflare <a href="https://www.cloudflare.com/learning/access-management/what-is-dns-filtering/">DNS filtering</a> blocks unsafe websites.</p></li><li><p>Cloudflare <a href="https://www.cloudflare.com/teams/browser-isolation/">Browser Isolation</a> prevents drive-by downloads and other browser-based attacks.</p></li><li><p>A <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> architecture can help <a href="https://www.cloudflare.com/learning/security/ransomware/how-to-prevent-ransomware/">prevent ransomware from spreading</a> within a network.</p></li><li><p><a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> protects organizations’ networks against <a href="https://www.cloudflare.com/learning/ddos/how-to-prevent-ddos-attacks/">DDoS attacks</a> using BGP route redistribution — without impacting latency.</p></li></ul>
    <div>
      <h2>Helping build a better Internet</h2>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>Cloudflare was founded on the mission to help build a better Internet. And part of that mission is to build an Internet where the impact of DDoS attacks is a thing of the past. Over the last 10 years, we have been unwavering in our efforts to protect our customers’ Internet properties from DDoS attacks of any size or kind. In <a href="/unmetered-mitigation/">2017</a>, we announced <a href="https://www.cloudflare.com/ddos/">unmetered DDoS protection</a> for free — as part of every Cloudflare service and plan, including the Free plan — to make sure every organization can stay protected and available. Organizations big and small have joined Cloudflare over the past several years to ensure their websites, applications, and networks are secure from DDoS attacks, and remain fast and reliable.</p><p>But cyberattacks come in various forms, not just DDoS attacks. Malicious bots, ransomware attacks, email phishing, and VPN / remote access hacks are some many attacks that continue to plague organizations of all sizes globally. These attacks target websites, APIs, applications, and entire networks — which form the lifeblood of any online business. That is why the <a href="https://www.cloudflare.com/security/">Cloudflare security portfolio</a> accounts for everything and everyone connected to the Internet.</p><p>To learn more about <a href="http://www.cloudflare.com/ddos">Cloudflare DDoS</a> or our <a href="https://www.cloudflare.com/network-services/">network services</a>, <a href="http://dash.cloudflare.com">create an account</a> or <a href="http://www.cloudflare.com/enterprise">reach out to us</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[RDDoS]]></category>
            <category><![CDATA[REvil]]></category>
            <category><![CDATA[VoIP]]></category>
            <category><![CDATA[Meris]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">7kwFdWfVmfPJD0WyuH6Bqu</guid>
            <dc:creator>Vivek Ganti</dc:creator>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Update on recent VoIP attacks: What should I do if I’m attacked?]]></title>
            <link>https://blog.cloudflare.com/update-on-voip-attacks/</link>
            <pubDate>Thu, 07 Oct 2021 02:20:59 GMT</pubDate>
            <description><![CDATA[ Because of the sustained attacks we are observing, we are sharing details on recent attack patterns, what steps they should take before an attack, and what to do after an attack has taken place. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/34Ko9laUln2ejkX7zQx97s/a3d664659f98cf96aca8a6d7a9942606/image-2-1.png" />
            
            </figure><p>Attackers continue targeting VoIP infrastructure around the world. In our blog from last week, <a href="/attacks-on-voip-providers/">May I ask who’s calling, please? A recent rise in VoIP DDoS attacks</a>, we reviewed how the SIP protocol works, ways it can be abused, and how Cloudflare can help protect against attacks on VoIP infrastructure without impacting performance.</p><p>Cloudflare’s network stands in front of some of the largest, most performance-sensitive voice and video providers in the world, and is uniquely well suited to mitigating attacks on VoIP providers.</p><p>Because of the sustained attacks we are observing, we are sharing details on recent attack patterns, what steps they should take before an attack, and what to do after an attack has taken place.</p><p>Below are three of the most common questions we’ve received from companies concerned about attacks on their VoIP systems, and Cloudflare’s answers.</p>
    <div>
      <h3>Question #1: How is VoIP infrastructure being attacked?</h3>
      <a href="#question-1-how-is-voip-infrastructure-being-attacked">
        
      </a>
    </div>
    <p>The attackers primarily use off-the-shelf <a href="https://www.cloudflare.com/learning/ddos/ddos-attack-tools/ddos-booter-ip-stresser">booter</a> services to launch attacks against VoIP infrastructure. The attack methods being used are not novel, <b>but the persistence of the attacker and their attempts to understand the target’s infrastructure are.</b></p><p>Attackers have used various attack vectors to probe the existing defenses of targets and try to infiltrate any existing defenses to disrupt VoIP services offered by certain providers. In some cases, they have been successful. HTTP attacks against <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api-gateway/">API gateways</a> and the corporate websites of the providers have been combined with network-layer and transport-layer attack against VoIP infrastructures. Examples:</p><ol><li><p><b><b><b>TCP floods targeting stateful firewalls</b></b></b>These are being used in “trial-and-error” type attacks. They are not very effective against telephony infrastructure specifically (because it’s mostly UDP) but very effective at overwhelming stateful firewalls.</p></li><li><p><b><b><b>UDP floods targeting SIP infrastructure</b></b></b>Floods of UDP traffic that have no well-known fingerprint, aimed at critical VoIP services. Generic floods like this may look like legitimate traffic to unsophisticated filtering systems.</p></li><li><p><b><b><b>UDP reflection targeting SIP infrastructure</b></b></b>These methods, when targeted at SIP or RTP services, can easily overwhelm <a href="https://en.wikipedia.org/wiki/Session_border_controller">Session Border Controllers</a> (SBCs) and other telephony infrastructure. The attacker seems to learn enough about the target’s infrastructure to target such services with high precision.</p></li><li><p><b><b><b>SIP protocol-specific attacks</b></b></b>Attacks at the application layer are of particular concern because of the higher resource cost of generating application errors vs filtering on network devices.</p></li></ol>
    <div>
      <h3>Question #2: How should I prepare my organization in case our VoIP infrastructure is targeted?</h3>
      <a href="#question-2-how-should-i-prepare-my-organization-in-case-our-voip-infrastructure-is-targeted">
        
      </a>
    </div>
    <ol><li><p><b><b><b>Deploy an always-on DDoS mitigation service</b></b></b>Cloudflare recommends the deployment of always-on network level protection, like <a href="https://www.cloudflare.com/magic-transit/">Cloudflare Magic Transit</a>, prior to your organization being attacked.</p><p>Do not rely on reactive on-demand SOC-based DDoS Protection services that require humans to analyze attack traffic — they take too long to respond. Instead, onboard to a cloud service that has sufficient network capacity and automated DDoS mitigation systems.</p><p><b>Cloudflare has effective mitigations in place for the attacks seen against VoIP infrastructure</b>, including for <a href="/announcing-flowtrackd/">sophisticated TCP floods</a> and SIP specific attacks.</p></li><li><p><b><b><b>Enforce a positive security model</b></b></b>Block TCP on IP/port ranges that are not expected to receive TCP, instead of relying on on-premise firewalls that can be overwhelmed. Block network probing attempts (e.g. ICMP) and other packets that you don't normally expect to see.</p></li><li><p><b><b><b>Build custom mitigation strategies</b></b></b>Work together with your DDoS protection vendor to tailor mitigation strategies to your workload. Every network is different, and each poses unique challenges when integrating with DDoS mitigation systems.</p></li><li><p><b><b><b>Educate your employees</b></b></b>Train all of your employees to be on the lookout for ransom demands. Check email, support tickets, form submissions, and even server access logs. Ensure employees know to immediately report ransom demands to your Security Incident Response team.</p></li></ol>
    <div>
      <h3>Question #3: What should I do if I receive a ransom/threat?</h3>
      <a href="#question-3-what-should-i-do-if-i-receive-a-ransom-threat">
        
      </a>
    </div>
    <ol><li><p><b><b><b>Do not pay the ransom</b></b></b>Paying the ransom only encourages bad actors—and there’s no guarantee that they won’t attack your network now or later.</p></li><li><p><b><b><b>Notify Cloudflare</b></b></b>We can help ensure your website and network infrastructure are safeguarded against these attacks.</p></li><li><p><b><b><b>Notify local law enforcement</b></b></b>They will also likely request a copy of the ransom letter that you received.</p></li></ol>
    <div>
      <h3>Cloudflare is here to help</h3>
      <a href="#cloudflare-is-here-to-help">
        
      </a>
    </div>
    <p>With over 100 Tbps of network capacity, a network architecture that <a href="/magic-transit-network-functions/">efficiently filters traffic close to the source</a>, and a physical presence in over 250 cities, Cloudflare can help protect critical VoIP infrastructure without impacting latency, jitter, and call quality. Test results demonstrate a performance improvement of 36% on average across the globe for a real customer network using Cloudflare Magic Transit.</p><p>Some of the largest voice and video providers in the world rely on Cloudflare to protect their networks and ensure their services remain online and fast. We stand ready to help.</p><p>Talk to a Cloudflare specialist to <a href="https://www.cloudflare.com/lp/voip-ddos-protection/">learn more</a>.Under attack? Contact our <a href="https://www.cloudflare.com/under-attack-hotline/">hotline</a> to speak with someone immediately.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[VoIP]]></category>
            <category><![CDATA[UDP]]></category>
            <category><![CDATA[REvil]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">2KaaFctdoCtSayt95YpQ48</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Vivek Ganti</dc:creator>
            <dc:creator>Alex Forster</dc:creator>
        </item>
        <item>
            <title><![CDATA[May I ask who’s calling, please? A recent rise in VoIP DDoS attacks]]></title>
            <link>https://blog.cloudflare.com/attacks-on-voip-providers/</link>
            <pubDate>Fri, 01 Oct 2021 00:05:42 GMT</pubDate>
            <description><![CDATA[ Over the past month, multiple Voice over Internet Protocol (VoIP) providers have been targeted by Distributed Denial of Service (DDoS) attacks from entities claiming to be REvil.  ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5scnckYKmaLjLhcqAKlM2z/0cdff1ded9d8716758ebd4c5f000c624/image-2-1.png" />
            
            </figure><p>Over the past month, multiple Voice over Internet Protocol (VoIP) providers have been targeted by <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service</a> (DDoS) attacks from entities claiming to be <a href="https://en.wikipedia.org/wiki/REvil">REvil</a>. The multi-vector attacks combined both L7 attacks targeting critical HTTP websites and API endpoints, as well as L3/4 attacks targeting VoIP server infrastructure. In some cases, these attacks resulted in significant impact to the targets’ VoIP services and website/API availability.</p><p>Cloudflare’s network is able to effectively protect and accelerate voice and video infrastructure because of our global reach, sophisticated traffic filtering suite, and unique perspective on attack patterns and threat intelligence.</p><p>If you or your organization have been targeted by DDoS attacks, ransom attacks and/or extortion attempts, seek immediate help to protect your Internet properties. We recommend not paying the ransom, and to <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">report it to your local law enforcement agencies</a>.</p>
    <div>
      <h2>Voice (and video, emojis, conferences, cat memes and remote classrooms) over IP</h2>
      <a href="#voice-and-video-emojis-conferences-cat-memes-and-remote-classrooms-over-ip">
        
      </a>
    </div>
    <p>Voice over IP (VoIP) is a term that's used to describe a group of technologies that allow for communication of multimedia over the Internet. This technology enables your FaceTime call with your friends, your virtual classroom lessons over Zoom and even some “normal” <a href="https://en.wikipedia.org/wiki/Voice_over_LTE">calls you make from your cell phone</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/25Rq1Fpa8Yk3Nk6JjTMTzD/60e01d58150e99d9a48302efcb258181/fBF3R0cMoiiEcrbpmZOCBTNJj2hyTWnxNDcKQGJFragPFf1vf-9sIlPrYOYtHo4r3pJqTqCiVJCG6bSb0vQ4-EcsUJRpwd2tacBhHsHAXN5TMv8CUQKxeXibq4dB.png" />
            
            </figure><p>The principles behind VoIP are similar to traditional digital calls over circuit-switched networks. The main difference is that the encoded media, e.g., voice or video, is partitioned into small units of bits that are transferred over the Internet as the payloads of IP packets according to specially defined media protocols.</p><p>This “packet switching” of voice data, as compared to traditional “circuit switching”, results in much more efficient use of network resources. As a result, calling over VoIP can be much more cost-effective than calls made over the POTS (“plain old telephone service”). Switching to VoIP can <a href="https://telzio.com/blog/cost-benefits-switching-voip-service/#:~:text=Companies%20can%20reduce%20monthly%20telecom%20costs%20by%20over%2050%25%20by%20switching%20to%20VoIP.">cut down telecom costs</a> for businesses by more than 50%, so it's no surprise that one in every three businesses has already <a href="https://hostingtribunal.com/blog/voip-stats/#:~:text=61%25%20of%20businesses%20switch%20to%20a%20VoIP%20system">adopted VoIP technologies</a>. VoIP is flexible, scalable, and has been especially useful in bringing people together remotely during the pandemic.</p><p>A key protocol behind most VoIP calls is the heavily adopted <a href="https://en.wikipedia.org/wiki/Session_Initiation_Protocol">Session Initiation Protocol</a> (SIP). SIP was originally defined in <a href="https://datatracker.ietf.org/doc/html/rfc2543">RFC-2543</a> (1999) and designed to serve as a flexible and modular protocol for initiating calls (“sessions”), whether voice or video, or two-party or multiparty.</p>
    <div>
      <h2>Speed is key for VoIP</h2>
      <a href="#speed-is-key-for-voip">
        
      </a>
    </div>
    <p>Real-time communication between people needs to feel natural, immediate and responsive. Therefore, one of the most important features of a good VoIP service is speed. The user experiences this as natural sounding audio and high definition video, without lag or stutter. Users’ perceptions of call quality are typically closely measured and tracked using metrics like <a href="https://en.wikipedia.org/wiki/Perceptual_Evaluation_of_Speech_Quality">Perceptual Evaluation of Speech Quality</a> and <a href="https://en.wikipedia.org/wiki/Mean_opinion_score">Mean Opinion Scores</a>. While SIP and other VoIP protocols can be implemented using <a href="https://www.cloudflare.com/learning/ddos/glossary/tcp-ip/">TCP</a> or <a href="https://www.cloudflare.com/learning/ddos/glossary/user-datagram-protocol-udp/">UDP</a> as the underlying protocols, UDP is typically chosen because it’s faster for routers and servers to process them.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1AmGmFZIFpA4s42yh86k9z/47d171fcc57bc62e711e79efc423c979/pasted-image-0--1-.png" />
            
            </figure><p>UDP is a protocol that is unreliable, stateless and comes with no Quality of Service (QoS) guarantees. What this means is that the routers and servers typically use less memory and computational power to process UDP packets and therefore can process more packets per second. Processing packets faster results in quicker assembly of the packets’ payloads (the encoded media), and therefore a better call quality.</p><p>Under the guidelines of <i>faster is better</i>, VoIP servers will attempt to process the packets as fast as possible on a first-come-first-served basis. Because UDP is stateless, it doesn’t know which packets belong to existing calls and which attempt to initiate a new call. Those details are in the SIP headers in the form of requests and responses which are not processed until further up the network stack.</p><p>When the rate of packets per second increases beyond the router’s or server’s capacity, the <i>faster is better </i> guideline actually turns into a disadvantage. While a traditional circuit-switched system will refuse new connections when its capacity is reached and attempt to maintain the existing connections without impairment, a VoIP server, in its race to process as many packets as possible, will not be able to handle all packets or all calls when its capacity is exceeded. This results in latency and disruptions for ongoing calls, and failed attempts of making or receiving new calls.</p><p>Without proper protection in place, the race for a superb call experience comes at a security cost which attackers learned to take advantage of.</p>
    <div>
      <h2>DDoSing VoIP servers</h2>
      <a href="#ddosing-voip-servers">
        
      </a>
    </div>
    <p>Attackers can take advantage of UDP and the SIP protocol to overwhelm unprotected VoIP servers with floods of specially-crafted UDP packets. One way attackers overwhelm VoIP servers is by pretending to initiate calls. Each time a malicious call initiation request is sent to the victim, their server uses computational power and memory to authenticate the request. If the attacker can generate enough call initiations, they can overwhelm the victim’s server and prevent it from processing legitimate calls. This is a classic DDoS technique applied to SIP.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/44Gt0qiZEnPizgMU0Tm4qF/398c2973aae58df7060167d794bd296e/image-3-1.png" />
            
            </figure><p>A variation on this technique is a SIP reflection attack. As with the previous technique, malicious call initiation requests are used. However, in this variation, the attacker doesn’t send the malicious traffic to the victim directly. Instead, the attacker sends them to many thousands of random unwitting SIP servers all across the Internet, and they spoof the source of the malicious traffic to be the source of the intended victim. That causes thousands of SIP servers to start sending unsolicited replies to the victim, who must then use computational resources to discern whether they are legitimate. This too can starve the victim server of resources needed to process legitimate calls, resulting in a widespread denial of service event for users. Without the proper protection in place, VoIP services can be extremely susceptible to DDoS attacks.</p><p>The graph below shows a recent multi-vector UDP DDoS attack that targeted VoIP infrastructure protected by Cloudflare’s <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> service. The attack peaked just above 70 Gbps and 16M packets per second. While it's not the largest attack we’ve ever seen, attacks of this size can have large impact on unprotected infrastructure. This specific attack lasted a bit over 10 hours and was automatically detected and mitigated.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/783B5mU5tkeQh3WCy6sZZw/3646fc97616f8cdcb79a33a10383f77d/1.png" />
            
            </figure><p>Below are two additional graphs of similar attacks seen last week against SIP infrastructure. In the first chart we see multiple protocols being used to launch the attack, with the bulk of traffic coming from (spoofed) DNS reflection and other common amplification and reflection vectors. These attacks peaked at over 130 Gbps and 17.4M pps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Nkjw09j6s8NeJz2iUJ0F8/f53003ab380dbdf93e89ad659d87c865/2.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Lt858PFam9TDqQCXZa60A/afe2971a7febc08ae82eb3161e339290/3.png" />
            
            </figure>
    <div>
      <h3>Protecting VoIP services without sacrificing performance</h3>
      <a href="#protecting-voip-services-without-sacrificing-performance">
        
      </a>
    </div>
    <p>One of the most important factors for delivering a quality VoIP service is speed. The lower the latency, the better. Cloudflare’s <a href="https://www.cloudflare.com/de-de/magic-transit/">Magic Transit</a> service can help protect critical VoIP infrastructure without impacting latency and call quality.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3mZSrIvKNLTyiYElhv7Ydp/8b18d4e784c5ec1f3cf94ab14a3aebf8/4.png" />
            
            </figure><p>Cloudflare’s Anycast architecture, coupled with the size and scale of our network, minimizes and can even improve latency for traffic routed through Cloudflare versus the public Internet. Check out our <a href="/magic-makes-your-network-faster/">recent post</a> from Cloudflare’s Speed Week for more details on how this works, including test results demonstrating a performance improvement of 36% on average across the globe for a real customer network using Magic Transit.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/654f4KI1t80kWgpSp9CzAh/99c1d83370a21d9f1213df79163d7c81/5.png" />
            
            </figure><p>Furthermore, every packet that is ingested in a Cloudflare data center is analyzed for DDoS attacks using multiple layers of out-of-path detection to avoid latency. Once an attack is detected, the edge generates a real-time fingerprint that matches the characteristics of the attack packets. The fingerprint is then matched in the Linux kernel eXpress Data Path (XDP) to quickly drop attack packets at wirespeed without inflicting collateral damage on legitimate packets. We have also recently deployed additional specific mitigation rules to inspect UDP traffic to determine whether it is valid SIP traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5BOr4wRSTZL3RGXjSTooLk/947d19c3f66ff3a213fa139c21377460/6.png" />
            
            </figure><p>The detection and mitigation is done autonomously within every single Cloudflare edge server — there is no “scrubbing center” with limited capacity and limited deployment scope in the equation. Additionally, threat intelligence is automatically shared across our network in real-time to ‘teach’ other edge servers about the attack.</p><p>Edge detections are also completely configurable. Cloudflare <a href="https://www.cloudflare.com/de-de/magic-transit/">Magic Transit</a> customers can use the <a href="https://developers.cloudflare.com/waf/ddos-l34-mitigation">L3/4 DDoS Managed Ruleset</a> to tune and optimize their DDoS protection settings, and also craft custom packet-level (including deep packet inspection) firewall rules using the <a href="https://developers.cloudflare.com/magic-firewall/">Magic Firewall</a> to enforce a positive security model.</p>
    <div>
      <h2>Bringing people together, remotely</h2>
      <a href="#bringing-people-together-remotely">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet. A big part of that mission is making sure that people around the world can communicate with their friends, family and colleagues uninterrupted — especially during these times of COVID. Our network is uniquely positioned to help keep the world connected, whether that is by <a href="/announcing-our-real-time-communications-platform/">helping developers build real-time communications systems</a> or by keeping VoIP providers online.</p><p>Our network’s speed and our <a href="https://www.cloudflare.com/ddos/">always-on, autonomous DDoS protection technology</a> helps VoIP providers to continue serving their customers without sacrificing performance or having to give in to ransom DDoS extortionists.</p><p>Talk to a Cloudflare specialist to <a href="https://www.cloudflare.com/lp/voip-ddos-protection/">learn more</a>.</p><p><b>Under attack?</b> Contact our <a href="https://www.cloudflare.com/under-attack-hotline/">hotline</a> to speak with someone immediately.</p> ]]></content:encoded>
            <category><![CDATA[Device Security]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[VoIP]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">6Az8U8DqpTDtYPANCcSNRU</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Alex Forster</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Helps K-12s Go Back to School]]></title>
            <link>https://blog.cloudflare.com/cloudflare-helps-k12-go-back-to-school/</link>
            <pubDate>Thu, 05 Aug 2021 12:55:43 GMT</pubDate>
            <description><![CDATA[ Cloudflare is excited to announce our Back to School initiative that provides special K-12 Education pricing to help school districts stop  cyber attacks while improving web performance. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6XvfDiBOfadXfz5RjNglKj/7a6a258a2036fa6c0005cae95462578a/image1-7.png" />
            
            </figure><p>While Federal funding programs focus on providing connectivity to students and staff, security is often an afterthought and reallocating funds to protect the network can become a challenge. We are excited to announce our <b>Back to School</b> initiative to further support our mission to provide performance <i>and</i> security with no trade-offs.</p><p>From start to finish, education customers will work with our dedicated Public Sector team, well-versed in the specific technical environments and business needs for K-12 districts. Your IT team will have access to 24/7/365 technical support, emergency response and support during <a href="https://www.cloudflare.com/ddos/under-attack/">under attack</a> situations, and ongoing training to continuously help improve your security posture and business continuity plans.</p>
    <div>
      <h3>Attacks Against K-12 Schools On The Rise</h3>
      <a href="#attacks-against-k-12-schools-on-the-rise">
        
      </a>
    </div>
    <p>Public schools in the United States, especially K-12s, saw a record-breaking increase in cybersecurity attacks. The <a href="https://k12cybersecure.com/map/">K-12 Cyber Incident Map</a> cataloged 408 publicly-disclosed school incidents, including a wide range of cyber attacks; from data breaches to ransomware, phishing attacks, and denial-of-service attacks. This is an 18 percent increase over 2019 and continues the upward trend in attacks since the K-12 Cyber Incident Map started tracking incidents in 2016. To support our public education partners, Cloudflare has created a tailored onboarding experience to help education entities receive enterprise-level security services at an affordable price.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5YLS6Orm1F18UltcHROrbg/5fd1b8e00b5bea815f27e0e3169e6393/image2-5.png" />
            
            </figure><p><i>Source:</i> <a href="https://k12cybersecure.com/year-in-review/">https://k12cybersecure.com/year-in-review/</a>‌‌</p><p>The public school system serves over 50 million students and employs nearly 6.7 million people, making it the largest industry by employment in the United States. This government-funded, free education system creates a market size of nearly $806 billion. Schools partner with technology companies for student resources and overall operations, and use SaaS applications and cloud deployments to control costs. Investing in these products and services allowed schools to transition to remote learning during the pandemic and continue educating students.</p><p>Despite their reliance on connectivity and technology, school districts rarely invest enough in cybersecurity to combat the high risk of attacks. Cybercriminals see public schools as ‘soft targets’ as they hold a lot of valuable data.</p><p>Ransomware attacks make data vulnerable to exposure and block access to a school district’s network. Baltimore County, Maryland schools experienced an attack in November 2020 that shut down schools for two days for 111,000 students, and cost the school system over $8 million to recover.</p><p>In September 2020, Toledo Public Schools in Ohio experienced a data breach by the Maze ransomware cartel. Maze posted 9 GB of compressed data that included sensitive student and employee data from at least 2008 to 2017. Less than six months later, in February 2021, parents received identity theft and credit fraud notifications involving their children.</p><p>Phishing attacks also continue to be a headache for K-12 school districts. The median amount stolen in attacks are \$2 million and, in 2020, \$9.8 million was stolen from a single school district.</p><p>Between the high rate of cybersecurity attacks in 2020 and into the first half of 2021, things are not slowing down, and education entities will continue to be targeted, whether it be directly or indirectly.</p>
    <div>
      <h3>The Move to Modern</h3>
      <a href="#the-move-to-modern">
        
      </a>
    </div>
    <p>As it became a focus for K-12 Districts to modernize and move physical infrastructure into a more flexible, scalable solution, many school districts were looking for a way to offload <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a> onto a cloud-based offering. Leveraging Cloudflare’s global anycast network, we’re able to provide a single management console to handle application needs: Managed DNS with built-in DNSSEC, DDoS mitigation, and Web Application Firewall. You can learn more on how <a href="https://www.cloudflare.com/case-studies/mpisd/">Mount Pleasant School District in Texas consolidated their web assets</a> in our case study.</p>
    <div>
      <h3>Where The Need Has Shifted</h3>
      <a href="#where-the-need-has-shifted">
        
      </a>
    </div>
    <p>The pandemic has exposed network security gaps in education, leaving a few main areas open to vulnerability — namely open/exposed ports that allow malicious actors to stay under the radar and end-of-life software that no longer receives security updates or bug fixes.</p><p>As attackers become more sophisticated, it has become imperative that districts implement comprehensive network layer solutions to prevent outages, data breaches, and other cyber-related incidents. The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) released a <a href="https://us-cert.cisa.gov/sites/default/files/publications/AA20-345A_Joint_Cybersecurity_Advisory_Distance_Learning_S508C.pdf">Joint Cybersecurity Advisory</a> that provides recommendations for K-12 for stopping threats and attacks.</p>
    <div>
      <h3>How Cloudflare One Can Help</h3>
      <a href="#how-cloudflare-one-can-help">
        
      </a>
    </div>
    <p><a href="/introducing-cloudflare-one/">Cloudflare One</a> is a <a href="https://www.cloudflare.com/learning/network-layer/network-as-a-service-naas/">network-as-a-service solution</a> designed to replace a patchwork of appliances with a single network that provides cloud-based security, performance, and control through one user interface.</p><p>While districts may be receiving DDoS protection from their upstream ISP, there are a few common issues we see with this setup:</p><ul><li><p>ISPs typically use the same commodity devices that were being deployed up to 20 years ago in data centers.</p></li><li><p>The devices are typically set up in an “on demand” fashion so that if you begin to experience a DDoS attack they will need to first be notified before assisting. In many cases, if that appliance is overloaded or unable to withstand the size or complexity of an attack, healthy traffic may be dropped as well.</p></li><li><p>There is limited visibility into the source of the attack and a lack of control around putting security measures in place for future incidents.</p></li></ul><p>As compared to hardware boxes and on-premise appliances, Cloudflare’s service is “always on”. This means we’re agile and will proactively take action in the event of an attack, the time to mitigate is as small as possible, and you get the added benefit of other services being layered into the defense in depth strategy (DNS, CDN, WAF).</p><p>Within Cloudflare One, our Layer 3 DDos Mitigation solution called <a href="https://www.cloudflare.com/magic-transit">Magic Transit</a>, has helped districts like <a href="https://www.cloudflare.com/case-studies/godwin-heights-public-school-district/">Godwin Heights</a> stay online by blocking hundreds of large DDoS attacks (just within the first few weeks!). Using anycast and BGP to announce your IP space, Cloudflare absorbs traffic destined for your network and mitigates DDoS attacks closest to the source, before sending the filtered traffic back to your network over low latency paths for fast performance.</p><p>Another focus during the pandemic has been supporting remote students and staff. This continues to challenge IT security as we think about how to not only keep our networks up and running, but how to protect students and staff while on the network from phishing attacks, malware, and ransomware.</p><p><a href="/introducing-cloudflare-for-teams/">Cloudflare for Teams</a> is composed of Access and Gateway. Access pairs with <a href="https://www.cloudflare.com/learning/access-management/what-is-identity-and-access-management/">identity management systems</a> to <a href="https://www.cloudflare.com/application-services/solutions/">protect all internal applications</a>. Gateway is designed to secure access to the outbound Internet through DNS and <a href="https://www.cloudflare.com/learning/access-management/what-is-url-filtering/">URL filtering</a>, SSL inspection, and file upload/download policies, which ultimately protects users from malware, <a href="https://www.cloudflare.com/learning/email-security/how-to-prevent-phishing/">phishing</a>, and other <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">security threats</a>. This added layer of protection provides your users access to the applications they need without sacrificing security or performance.</p><p><b>Please inquire at</b> <a><b>publicsector@cloudflare.com</b></a> <b>for our special Education K-12 Pricing. We look forward to supporting you.</b></p> ]]></content:encoded>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">70slXMaeHViDrBuyYf88Cb</guid>
            <dc:creator>Nandini Jayarajan</dc:creator>
            <dc:creator>Kristina Williams</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS attack trends for 2021 Q2]]></title>
            <link>https://blog.cloudflare.com/ddos-attack-trends-for-2021-q2/</link>
            <pubDate>Tue, 20 Jul 2021 14:07:52 GMT</pubDate>
            <description><![CDATA[ The DDoS attack trends observed over Cloudflare’s network in 2021 Q2 paint a picture that reflects the overall global cyber threat landscape. Here are some highlights of DDoS attack trends observed in 2021 Q2.  ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/39mNnJiwZsNven8wj6LLMm/4e94ad8ffcaf3f8317b9e2763a110e96/image4-4.png" />
            
            </figure><p>Recent weeks have witnessed massive ransomware and ransom DDoS (Distributed Denial of Service) attack campaigns that interrupted aspects of critical infrastructure around the world, including one of the largest petroleum pipeline system operators, and one of the world’s biggest meat processing companies. Earlier this quarter, more than 200 organizations across Belgium, including the government and parliament websites and other services, were <a href="https://www.welivesecurity.com/2021/05/05/belgium-government-websites-offline-ddos-attack/">also DDoS’d</a>.</p><p>And when most of the United States were celebrating Independence Day on July 4, <a href="https://www.nytimes.com/2021/07/02/technology/cyberattack-businesses-ransom.html">hundreds of US companies</a> were hit by a ransomware attack demanding 70 million USD in Bitcoin. Attackers known to be affiliated with <a href="https://en.wikipedia.org/wiki/REvil">REvil</a>, a Russian ransomware group, exploited multiple previously unknown <a href="https://csirt.divd.nl/2021/07/03/Kaseya-Case-Update/">vulnerabilities in IT management software</a>. The targets included schools, small public-sector bodies, travel and leisure organizations, and credit unions, to name a few. While the threat of ransomware and ransom DDoS is not new (read our posts on <a href="/targeted-ransomware-attack/">ransomware</a> and <a href="/ransom-ddos-attacks-target-a-fortune-global-500-company/">ransom DDoS</a> from 2021 Q1), the latest attacks on Internet properties ranging from wineries, professional sports teams, ferry services and hospitals has brought them from just being background noise to front page headlines affecting our day-to-day lives. In fact, recent attacks have propelled ransomware and DDoS to the <a href="https://www.nytimes.com/2021/06/15/world/europe/biden-putin-cyberweapons.html">top of US President Biden’s national security agenda</a>.</p><p>The DDoS attack trends observed over Cloudflare’s network in 2021 Q2 paint a picture that reflects the overall global cyber threat landscape. Here are some highlights.</p><ul><li><p>Over 11% of our surveyed customers who were targeted by a DDoS attack reported receiving a threat or ransom letter threatening in advance, in the first six months of this year. Emergency onboarding of customers under an active DDoS attack increased by 41.8% in 2021 H1 compared to 2020 H2.</p></li><li><p>HTTP DDoS attacks targeting government administration/public sector websites increased by 491%, making it the second most targeted industry after Consumer Services whose DDoS activity increased by 684% QoQ.</p></li><li><p>China remains the country with the most DDoS activity originating from within their borders — 7 out of every 1,000 HTTP requests originating from China were part of an HTTP DDoS attack targeting websites, and more than 3 out of every 100 bytes that were ingested in our data centers in China were part of a network-layer DDoS attack.</p></li><li><p>Emerging threats included amplification DDoS attacks that abused the <a href="https://en.wikipedia.org/wiki/QOTD">Quote of the Day</a> (QOTD) protocol which increased by 123% QoQ. Additionally, as the adoption of QUIC protocol continues to increase, so do <a href="https://www.cloudflare.com/learning/ddos/what-is-a-quic-flood/">attacks over QUIC</a> — registering a whopping 109% QoQ surge in 2021 Q2.The number of network-layer DDoS attacks in the range of 10-100 Gbps increased by 21.4% QoQ. One customer that was attacked is <a href="https://hypixel.net/">Hypixel</a>, an American gaming company. Hypixel remained online with no downtime and no performance penalties to their gamer users, even when under an active DDoS attack campaign larger than 620 Gbps. Read their <a href="#Hypixel">story here</a>.</p></li></ul><p>To view all DDoS attack insights across all regions and industries worldwide, visit Cloudflare’s interactive <a href="https://radar.cloudflare.com/ddos-2021-q2">Radar DDoS dashboard</a>.</p>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, specifically HTTP DDoS attacks, are attacks that usually aim to disrupt an HTTP server by making it unable to process legitimate user requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests or even crash resulting in performance penalties or a denial of service event for legitimate users.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4wBrQ5nbm5Ftp4Jtp3FUmf/aa80f246fbda295e4c277287a84e2f20/image9-2.png" />
            
            </figure>
    <div>
      <h3>DDoS activity per market industry</h3>
      <a href="#ddos-activity-per-market-industry">
        
      </a>
    </div>
    <p>When we analyze attacks, we calculate the ‘DDoS activity’ rate, which is the percentage of attack traffic out of the total traffic (attack + clean). This allows us to normalize the data points and avoid biases towards, for example, a larger data center that naturally handles more traffic and therefore also more attacks.</p><p>In 2021 Q2, Consumer Services was the most targeted industry followed by Government Administration and Marketing &amp; Advertising.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/BNS2NS3CfkboBTbio9DNB/ec93a3a12f67b36282445109cb4884bd/image9-5.png" />
            
            </figure>
    <div>
      <h3>DDoS activity per source country</h3>
      <a href="#ddos-activity-per-source-country">
        
      </a>
    </div>
    <p>To understand the origin of the HTTP attacks we observed over Cloudflare’s network, we look at the source IP address of the client generating the attack HTTP requests. Unlike network-layer attacks, source IPs cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> in HTTP attacks. A high DDoS activity rate in a given country indicates large botnets operating from within.</p><p>China and the US remain in the first and second places, respectively, regarding the percentage of DDoS activity originating from within their territories. In China, more than 7 out of every 1,000 HTTP requests were part of an HTTP DDoS attack, while in the US almost 5 out of 1,000 HTTP requests were part of an attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Dofsks3JwUiz1DFtZMfiz/5e11649e0a5a8c4599d54a253968eaec/image15-1.png" />
            
            </figure>
    <div>
      <h3>DDoS activity per target country</h3>
      <a href="#ddos-activity-per-target-country">
        
      </a>
    </div>
    <p>In order to identify which countries the targets of the DDoS attacks resided in, we break down the DDoS activity by our customers’ billing countries. Note that Cloudflare does not charge for attack traffic and has pioneered providing <a href="/unmetered-mitigation/">unmetered and unlimited DDoS protection since 2017</a>. By cross-referencing the attack data with our customers’ billing country, we can identify which countries were attacked the most.</p><p>Data observed in 2021 Q2 suggest that organizations in the US and China were the most targeted by HTTP DDoS attacks. In fact, one out of every 200 HTTP requests destined to US-based organizations was part of a DDoS attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3IjvjwsPMjZklE4Ydp8rMV/995d9b12aeaf3ff03dbfe8fae8035ccd/image12-2.png" />
            
            </figure>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application-layer attacks strike the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service end users are trying to access, <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer attacks</a> target network infrastructure (such as in-line routers and other network servers) and the Internet link itself.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ZGk7zNsakyucjxh3dTfHT/73cf3e238051b8224084bb7948634205/image8-3.png" />
            
            </figure><p>The chart above shows the distribution of network-layer DDoS attacks in 2021 Q2.</p>
    <div>
      <h3>Distribution of attacks by size (packet rate and bit rate)</h3>
      <a href="#distribution-of-attacks-by-size-packet-rate-and-bit-rate">
        
      </a>
    </div>
    <p>There are different ways of measuring the size of a L3/4 DDoS attack. One is the volume of traffic it delivers, measured as the bit rate (specifically, gigabits-per-second). Another is the number of packets it delivers, measured as the packet rate (specifically, packets-per-second). Attacks with high bit rates attempt to saturate the Internet link, while attacks with high packet rates attempt to overwhelm the servers, routers or other in-line hardware appliances.</p><p>The distribution of attacks by their size (in bit rate) and month is shown below. As observed in the chart, all attacks over 300 Gbps were observed in the month of June.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4UfdUlKKsI8GOpFmwf03Rc/1452780737730707fdadbc662a8d26ae/image17-1.png" />
            
            </figure><p>In terms of bit rate, attacks under 500 Mbps constituted a majority of all DDoS attacks observed in 2021 Q2.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/bfz0GXloSJaPAHNhsfYso/3eed0e35c5d233976ffc93d75744302d/image1-11.png" />
            
            </figure><p>Similarly, looking from the lens of packet rate, nearly 94% of attacks were under 50K pps. Even though attacks from 1-10M pps constituted only 1% of all DDoS attacks observed, this number is 27.5% higher than that observed in the previous quarter, suggesting that larger attacks are not diminishing either -- but rather increasing.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4T311qgyhubyXagT3qusJH/79e0c1cabb0178149b20ce68cb9d540d/image16-1.png" />
            
            </figure><p>Note that while attacks under 500 Mbps and 50K pps might seem ‘small’ compared to other headline-making large attacks, they are often sufficient to create major disruptions for Internet properties that are not protected by an always-on, automated cloud-based DDoS protection service. Moreso, many organisations have uplinks provided by their service providers with a bandwidth capacity smaller than 1 Gbps. Assuming their public-facing network interface also serves legitimate traffic, DDoS attacks smaller than 500 Mbps are often capable of taking down exposed Internet properties.</p>
    <div>
      <h3>Distribution by attack duration</h3>
      <a href="#distribution-by-attack-duration">
        
      </a>
    </div>
    <p>Cloudflare continues to see a large percentage of DDoS attacks that last under an hour. In Q2, over 97% of all DDoS attacks lasted less than an hour.</p><p>Short burst attacks may attempt to cause damage without being detected by DDoS detection systems. DDoS services that rely on manual analysis and mitigation may prove to be useless against these types of attacks because they are over before the analyst even identifies the attack traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3jfGiII5EZLrv7MuMuYw9B/adadf963a342123c02a2c1d7ca5668ac/image7-2.png" />
            
            </figure><p>Alternatively, the use of short attacks may be used to probe the cyber defenses of the target. Load-testing tools and automated DDoS tools, that are widely available on the dark web, can generate short bursts of a SYN flood, for example, and then follow up with another short attack using a different attack vector. This allows attackers to understand the security posture of their targets before they decide to launch larger attacks at larger rates and longer durations — which come at a cost.</p><p>In other cases, attackers generate small DDoS attacks as proof and warning to the target organization of the attacker’s ability to cause real damage later on. It’s often followed by a ransom email to the target organization, demanding payment to avoid suffering an attack that could more thoroughly cripple network infrastructure.</p><p>This highlights the need for an always on, automated DDoS protection approach. DDoS protection services that rely on manual re-routing, analysis and mitigation may prove to be useless against these types of attacks because they are over before the analyst can even identify the attack traffic.</p>
    <div>
      <h3>Distribution of attacks by attack vectors</h3>
      <a href="#distribution-of-attacks-by-attack-vectors">
        
      </a>
    </div>
    <p>An attack vector is the term used to describe the method that the attacker utilizes in their attempt to cause a denial of service event.</p><p>As observed in previous quarters, attacks utilizing SYN floods and UDP-based protocols remain the most popular methods by attackers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6UzS0qrB22W6hhSdHJavER/c93432b06a08b1ea8769fe344c01c230/image13-2.png" />
            
            </figure><p>What is a <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN flood</a> attack? It’s a DDoS attack that exploits the very foundation of the TCP protocol. A stateful TCP connection between a client and a server begins with a 3-way <a href="https://www.cloudflare.com/learning/ddos/glossary/tcp-ip/">TCP handshake</a>. The client sends an initial connection request packet with a synchronize flag (SYN). The server responds with a packet that contains a synchronized acknowledgment flag (SYN-ACK). Finally, the client responds with an acknowledgment (ACK) packet. At this point, a connection is established and data can be exchanged until the connection is closed. This stateful process can be abused by attackers to cause denial of service events.</p><p>By repeatedly sending SYN packets, the attacker attempts to overwhelm a server or the router’s connection table that tracks the state of TCP connections. The router replies with a SYN-ACK packet, allocates a certain amount of memory for each given connection, and falsely waits for the client to respond with the final ACK. Given a sufficient number of connections occupying the router’s memory, the router is unable to allocate further memory for legitimate clients, causing the router to crash or preventing it from handling legitimate client connections, i.e., a denial of service event.</p>
    <div>
      <h3>Emerging threats</h3>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>Emerging threats included amplification DDoS attacks that abuse the <a href="https://en.wikipedia.org/wiki/QOTD">Quote of the Day</a> (QOTD) service which increased by 123% QoQ. QOTD was defined in <a href="https://datatracker.ietf.org/doc/html/rfc865">RFC-865</a> (1983) and can be sent over either the UDP or TCP protocols. It was originally designed for debugging and as a measurement tool, with no specific syntax for the quote. The RFC does however recommend the use of ASCII characters and to limit the length to 512 characters.</p><p>Furthermore, we’ve seen a 107% increase QoQ in UDP Portmap and Echo attacks -- all of which are really old attack vectors. This may indicate attackers digging up old methods and attack tools to try and overcome protection systems.</p><p>As we’ve seen in previous quarters, the adoption of the <a href="/quic-version-1-is-live-on-cloudflare/">QUIC protocol</a> continues to increase. Consequently, so do attacks over QUIC, or more specifically floods and amplification attacks of non-QUIC traffic in places where we’d expect to see QUIC traffic. In 2021 Q2, these types of attacks increased by 109% QoQ. This continued trend may indicate that attackers are attempting to abuse the QUIC-designated ports and gateways into organizations' networks -- searching for vulnerabilities and security holes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4oq2p0pv8pJ5L9PrZ48iAO/7ce4c68fa4a294937b83e4614d5b544d/image14-1.png" />
            
            </figure>
    <div>
      <h3>DDoS activity by Cloudflare data center country</h3>
      <a href="#ddos-activity-by-cloudflare-data-center-country">
        
      </a>
    </div>
    <p>In 2021 Q2, our data center in Haiti observed the largest percentage of network-layer DDoS attack traffic, followed by Brunei (almost 3 out of every 100 packets were part of an attack) and China.</p><p>Note that when analyzing network-layer DDoS attacks, we bucket the traffic by the Cloudflare edge data center locations where the traffic was ingested, and not by the source IP. The reason for this is that, when attackers launch network-layer attacks, they can <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoof</a> the source IP address in order to obfuscate the attack source and introduce randomness into the attack properties, which may make it harder for simple DDoS protection systems to block the attack. Hence, if we were to derive the source country based on a spoofed source IP, we would get a spoofed country. Cloudflare is able to overcome the challenges of spoofed IPs by displaying the attack data by the location of Cloudflare’s data center in which the attack was observed. We’re able to achieve geographical accuracy in our report because we have data centers in <a href="http://www.cloudflare.com/network">over 200 cities</a> around the world.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5c6ZKm5g6OF4A6tUh9eOra/bb9d6d9c2c8096484264b4b3b5c2be07/image6-5.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/78BgjOWRRSWxuQlWkM0EXJ/47bfe5fb782651d81e9ae01bc48651dc/image11-3.png" />
            
            </figure><p>To view all regions and countries, check out the <a href="https://radar.cloudflare.com/ddos-2021-q2#ddos-activity-by-cloudflare-data-center-country">Radar DDoS Report dashboard’s interactive map</a>.</p>
    <div>
      <h2>A note on ransomware and ransom DDoS — a growing global threat</h2>
      <a href="#a-note-on-ransomware-and-ransom-ddos-a-growing-global-threat">
        
      </a>
    </div>
    <p>The last few weeks have seen a resurgence of ransom-driven cyber threats: <a href="/targeted-ransomware-attack/">ransomware</a> and <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">ransom DDoS</a> (RDDoS).</p>
    <div>
      <h3>So what is ransomware and ransom DDoS, and how are they different?</h3>
      <a href="#so-what-is-ransomware-and-ransom-ddos-and-how-are-they-different">
        
      </a>
    </div>
    <p>Ransomware is malicious software that encrypts an organization's systems and databases, rendering them inaccessible and unusable. Malware is usually introduced into an organization's systems via <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">phishing emails</a> -- tricking employees to click on a link or download a file. Once the malware is installed on the employee’s device, it encrypts the device and can propagate to the entire network of the organization’s servers and employee devices. The attacker will demand money, usually in the form of Bitcoin, in exchange for decrypting the organization's systems and granting them access back to their systems.</p><p>Unlike a ransomware attack, a ransom DDoS attack does not encrypt a company's systems; it aims to knock them offline if the ransom is not paid. What makes ransom DDoS attacks even more dangerous is that they do not require the attacker to gain access to a business's internal systems to execute the attack. However, with a strong DDoS protection strategy in place, a ransom DDoS attack has little to no effect on businesses.</p><p>Ransomware and ransom DDoS threats are impacting most industries across the globe — the financial industry, transportation, oil and gas, consumer goods, and even education and healthcare.</p><p>Entities claiming to be ‘Fancy Lazarus’, ‘Fancy Bear’, ‘Lazarus Group’, and ‘REvil’ are once again launching ransomware and ransom-DDoS attacks against organizations’ websites and network infrastructure unless a ransom is paid before a given deadline. In the case of DDoS threats, prior to the ransom note, a small DDoS attack is usually launched as a form of demonstration. The demonstration attack is typically over UDP, lasting roughly 30-120 minutes.</p><p>The ransom note is typically sent to the common group email aliases of the company that are publicly available online such as noc@, support@, help@, legal@, abuse@, etc. In several cases, it has ended up in spam. In other cases, we’ve seen employees disregard the ransom note as spam, increasing the organization’s response time which resulted in further damage to their online properties.</p><p>Cloudflare’s recommendation for organizations that receive a threat or ransom note:</p><ol><li><p><b>Do not panic, and we recommend you do not pay the ransom</b>: Paying ransom only encourages and funds bad actors. There’s also no guarantee that you won’t be attacked again anyway.</p></li><li><p><b>Contact local law enforcement</b>: Be ready to provide a copy of the ransom letter you received and any other logs or packet captures.</p></li><li><p><b>Activate an effective DDoS protection strategy</b>: Cloud-based DDoS protection can be quickly onboarded in the event of an active threat, and with a team of security experts on your side, risks can be mitigated quickly and effectively.</p></li></ol><p><a href="http://www.cloudflare.com/ransom-ddos">Here’s a short video</a> by Cloudflare CTO, John Graham-Cumming addressing the threat of ransom DDoS attacks.</p><a><h2>Cloudflare protects Hypixel against a massive DDoS attack campaign</h2></a><p>At Cloudflare, our teams have been exceptionally busy this past quarter rapidly onboarding (onto our <a href="https://www.cloudflare.com/magic-transit/">Magic Transit service</a>) a multitude of new and existing customers that have either received a ransom letter or were under an active DDoS attack.</p><p>One such customer is <a href="https://hypixel.net/">Hypixel Inc</a>, the development studio behind the world's largest Minecraft minigame server. With over 24M total unique logins to date and a world record 216,000+ concurrent players on PC, the Hypixel team works hard to add value to the experience of millions of players across the globe.</p><p>The gaming industry is often subject to some of the largest volumetric DDoS attacks — and as a marquee brand, Hypixel attracts more than its fair share. Uptime and high performance are fundamental to the functioning of Hypixel’s servers. Any perceived downtime or noticeable lag could result in an exodus of gamers.</p><p>When Hypixel was under a massive DDoS attack campaign, they turned to Cloudflare to extend their services with Cloudflare to include Magic Transit, Cloudflare’s BGP-based DDoS protection service for network infrastructure. After rapidly onboarding them overnight, Cloudflare was automatically able to detect and mitigate DDoS attacks targeting their network — several of which were well over 620 Gbps. The DDoS attack comprised mostly TCP floods and UDP amplification attacks. In the graph, the various colors represent the multiple Cloudflare systems that contribute to detecting and mitigating the multi-vector attack — emphasising the value of our multi-layered DDoS approach.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3OOyezktZS10mCS4iK4YH2/e6b0cac93a92b09e7b2e1737aedc833d/image10-5.png" />
            
            </figure><p>Even as attack patterns changed in real-time, Magic Transit shielded Hypixel’s network. In fact, because all their clean traffic routed over Cloudflare’s high performing low-latency network, Hypixel’s users noticed no change in gamer experience — even during an active volumetric DDoS attack.</p><p>During the attack campaign, Cloudflare automatically detected and mitigated over 5,000 DDoS attacks: 53% were ACK floods, 39% were UDP-based attacks and 8% SYN floods.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7KjFtFo9jD57noYEmgeOGA/06f02cd677a11129603870fe28a0c85d/image4-6.png" />
            
            </figure><blockquote><p>“<i>We had several attacks of well over 620 Gbps with no impact at all on our players. Their gaming experience remained uninterrupted and fast, thanks to Cloudflare Magic Transit</i>.”- <b>Simon Collins-Laflamme, CEO, Hypixel Inc.</b></p></blockquote><p>Hypixel’s journey with Cloudflare began with them employing <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Cloudflare Spectrum</a> to help protect their gaming infrastructure against DDoS attacks. As their user base grew, they adopted additional Cloudflare products to bolster the robustness and resilience of all of their critical infrastructure. Today, they use multiple Cloudflare products including <a href="http://www.cloudflare.com/cdn">CDN</a>, <a href="https://www.cloudflare.com/rate-limiting/">Rate Limiting</a>, <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Spectrum</a>, <a href="https://www.cloudflare.com/products/argo-smart-routing/">Argo Smart Routing</a>, and <a href="https://www.cloudflare.com/load-balancing/">Load Balancing</a> to build and secure infrastructure that provides gamers around the world the real-time gaming experiences they need.</p>
    <div>
      <h2>Get holistic protection against cyber attacks of any kind</h2>
      <a href="#get-holistic-protection-against-cyber-attacks-of-any-kind">
        
      </a>
    </div>
    <p>DDoS attacks constitute just one facet of the many cyber threats organizations are facing today. As businesses shift to a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> approach, network and security buyers will face larger threats related to network access, and a continued surge in the frequency and sophistication of bot-related and ransomware attacks.</p><p>A key design tenet while building products at Cloudflare is integration. <a href="/introducing-cloudflare-one/">Cloudflare One</a> is a solution that uses a Zero Trust security model to provide companies a better way to protect devices, data, and applications — and is deeply integrated with our existing platform of security and DDoS solutions.</p><p>In fact, Cloudflare offers an integrated solution that comprises an all-star cast featuring the following to name a few:</p><ul><li><p><b>DDoS</b>: LEADER in Forrester Wave™ for DDoS Mitigation Solutions, Q1 2021<sup>1</sup></p></li><li><p><b>WAF</b>: Cloudflare is a CHALLENGER in the 2020 Gartner Magic Quadrant for Web Application Firewall (receiving the highest placement in the ‘Ability to Execute’)<sup>2</sup></p></li><li><p><b>Zero Trust</b>: Cloudflare is a LEADER in the Omdia Market Radar: Zero-Trust Access Report, 2020<sup>3</sup></p></li><li><p><b>Web protection</b>: Innovation leader in the Global Holistic Web Protection Market for 2020 by Frost &amp; Sullivan<sup>4</sup></p></li></ul><p>Cloudflare’s global (<a href="/ten-new-cities-four-new-countries/">and growing</a>) network is uniquely positioned to deliver DDoS protection and other security, performance, and reliability services with unparalleled scale, speed, and smarts.</p><p>To learn more about Cloudflare’s DDoS solution <a href="https://www.cloudflare.com/plans/enterprise/">contact us</a> or <a href="http://dash.cloudflare.com">get started</a>.</p><p>____</p><p><sup>1</sup>Forrester Wave™: DDoS Mitigation Solutions, Q1 2021, Forrester Research, Inc., March 3, 2021. Access the report at <a href="https://www.cloudflare.com/forrester-wave-ddos-mitigation-2021/">https://www.cloudflare.com/forrester-wave-ddos-mitigation-2021/</a></p><p><sup>2</sup>Gartner, “Magic Quadrant for Web Application Firewalls”, Analyst(s): Jeremy D'Hoinne, Adam Hils, John Watts, Rajpreet Kaur, October 19, 2020. <a href="https://www.cloudflare.com/gartner-mq-waf-2020/">https://www.cloudflare.com/gartner-mq-waf-2020/</a></p><p><sup>3</sup> <a href="https://www.cloudflare.com/lp/omdia-zero-trust">https://www.cloudflare.com/lp/omdia-zero-trust</a></p><p><sup>4</sup><a href="https://www.cloudflare.com/lp/frost-radar-holistic-web/">https://www.cloudflare.com/lp/frost-radar-holistic-web/</a></p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Fancy Bear]]></category>
            <category><![CDATA[Lazarus group]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">6p5SAqIZUvGBphfunpzQWJ</guid>
            <dc:creator>Vivek Ganti</dc:creator>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Anatomy of a Targeted Ransomware Attack]]></title>
            <link>https://blog.cloudflare.com/targeted-ransomware-attack/</link>
            <pubDate>Tue, 23 Mar 2021 13:00:00 GMT</pubDate>
            <description><![CDATA[ Imagine your most critical systems suddenly stop operating. And then someone demands a ransom to get your systems working again. Or someone launches a DDoS against you and demands a ransom to make it stop.  That’s the world of ransomware and ransom DDoS. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Imagine your most critical systems suddenly stop operating, bringing your entire business to a screeching halt. And then someone demands a ransom to get your systems working again. Or someone launches a DDoS against you and demands ransom to make it stop.  That’s the world of ransomware and ransom DDoS.</p><p>So what exactly is ransomware? It is malicious software that encrypts files on computers making them useless until they are decrypted. In some cases, ransomware could even corrupt and destroy data. A ransom note is then placed on compromised systems with instructions to pay a ransom in exchange for a decryption utility that can be used to restore encrypted files. Payment is often in the form of <a href="https://en.wikipedia.org/wiki/Bitcoin">Bitcoin</a> or other <a href="https://en.wikipedia.org/wiki/Cryptocurrency">cryptocurrency</a>.</p><p>Recently, Cloudflare onboarded and <a href="/ransom-ddos-attacks-target-a-fortune-global-500-company/">protected</a> a Fortune 500 customer from a targeted <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS (RDDoS)</a> attack -- a different type of extortion attack.</p><p>Prior to joining Cloudflare, I responded to and investigated a large number of data breaches and ransomware attacks for clients across various industries, including healthcare, financial, and education, to name a few. I’ve been in the trenches analyzing these types of attacks and working closely with clients to help them recover from the aftermath.</p><p>In this blog post, I want to share what I learned from those network intrusions and how Cloudflare can help prevent a similar attack in your environment.</p>
    <div>
      <h3>Attack Evolution</h3>
      <a href="#attack-evolution">
        
      </a>
    </div>
    <p>Before peeling back the layers of targeted ransomware attacks, I want to briefly describe the differences between opportunistic vs. targeted types of attacks.</p><p>An opportunistic attack is one where a crime group casts a wide net with the end goal of infecting whoever and whatever they can. This is often accomplished by mass distribution of spam email that contains <a href="https://www.cloudflare.com/learning/email-security/what-is-email-fraud/">malicious URLs</a> or file attachments that execute <a href="https://www.cloudflare.com/learning/security/glossary/malicious-payload/">malicious code</a> on user endpoints, ultimately infecting them with ransomware.</p><p>Other methods of distribution include <a href="https://en.wikipedia.org/wiki/Drive-by_download">drive-by downloads</a> and <a href="https://en.wikipedia.org/wiki/Malvertising">malvertising</a> campaigns where unsuspected users visit compromised websites that lead to a series of redirection chains that ultimately serve the user with malicious content. This is where Cloudflare’s <a href="https://www.cloudflare.com/teams/browser-isolation/">Remote Browser Isolation</a> (RBI) solution really shines!</p><p>Over the past few years, threat actors have shifted to much more targeted attacks that net higher Bitcoin payment returns for their efforts. These attacks generally focus on compromising critical systems, <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">exfiltrating data</a>, and installing <a href="https://en.wikipedia.org/wiki/Backdoor_(computing)">backdoors</a> in target environments. Now let’s walk through what I’ve seen from the trenches.</p>
    <div>
      <h3>Initial Compromise</h3>
      <a href="#initial-compromise">
        
      </a>
    </div>
    <p>From my experience, the majority of the targeted investigations I conducted all started from one of three common initial attack vectors:</p><ul><li><p>An attacker compromised <a href="https://www.cloudflare.com/learning/access-management/what-is-the-remote-desktop-protocol/">Remote Desktop Protocol (RDP)</a> or <a href="https://www.cloudflare.com/learning/access-management/what-is-a-vpn/">Virtual Private Network (VPN)</a> servers</p></li><li><p>An attacker exploited an unpatched vulnerability in a web application or server</p></li><li><p>An attacker <a href="https://www.cloudflare.com/learning/access-management/phishing-attack/">spear-phished</a> key individuals to gain a foothold in the target environment</p></li></ul><p>Not surprisingly, the most common method I came across were attacks against RDP and VPN servers. Most of which were accessed from traditional <a href="https://www.cloudflare.com/learning/bots/brute-force-attack/">brute force</a> login attempts where <a href="https://www.cloudflare.com/learning/access-management/what-is-two-factor-authentication/">two-factor authentication</a> was not enabled. In other cases, attackers leveraged compromised credentials to access the environment over VPN.</p><p>In reality, the initial compromise stage was not very complex at all. In most cases, attackers simply scanned the Internet for low hanging fruit and looked for any exposed RDP servers that listened on the standard 3389 RDP port. Thankfully, <a href="/cloudflare-access-now-supports-rdp/">Cloudflare Access</a> makes it very easy to protect your RDP servers from these types of attacks. Last year, with the pandemic shifting the majority of the workforce to a remote-first environment, Cloudflare announced the ability to <a href="/protecting-remote-desktops-at-scale-with-cloudflare-access/">protect your RDP</a> servers at scale. Taking security a step further, Cloudflare announced <a href="/magic-wan-firewall/">Magic WAN &amp; Firewall</a> to allow users to have further control over other internal resources by segmenting what they can interact with and from where.</p><p>In cases where direct exploitation of unpatched vulnerabilities was used as the attack vector to spread ransomware and a patch is not immediately available, using a <a href="https://www.cloudflare.com/learning/security/what-is-a-firewall/">web application firewall</a> such as <a href="https://www.cloudflare.com/waf/">Cloudflare’s WAF</a>, is a great way to apply short-term mitigation strategies to block exploitation attempts until a patch becomes available.</p>
    <div>
      <h3>Lateral Movement, Data Exfiltration, and Extortion</h3>
      <a href="#lateral-movement-data-exfiltration-and-extortion">
        
      </a>
    </div>
    <p>One particular compromise was particularly scary. After the attacker gained access to the client’s environment by compromising an RDP server, they began to perform internal reconnaissance to identify critical systems in their environment.</p><p>After the attacker mapped out the network, they leveraged compromised credentials to remotely install <a href="https://en.wikipedia.org/wiki/Backdoor_(computing)">backdoors</a> on two critical systems in order to maintain persistence. This was one of the first times I saw an attacker do this in a ransomware compromise, but it speaks to the level of effort threat actors are willing to go. Unfortunately, this wasn’t all they did.</p><p>After installing the backdoors, the threat actor then moved laterally to the company’s internal backup servers to permanently delete all data backups to prevent the client from restoring from them. Unfortunately, they did not maintain offsite copies of this data. And  the threat actor also exfiltrated sensitive customer data from the environment before deploying the ransomware.</p><p>The final blow was when the threat actor deployed ransomware across the environment, crippling their entire operations and literally bringing everything to a halt. Following the ransomware deployment, the threat actor emailed key decision makers of the organization, including the board, and demanded a very high sum of Bitcoin in exchange for the keys to decrypt their systems. They also threatened to release customer data if they did not pay the amount and provided proof as evidence.</p><p>I remember this investigation vividly because it was quite devastating for the founder. This attack literally took everything he had built away over the span of a day or two.</p>
    <div>
      <h3>Using Cloudflare</h3>
      <a href="#using-cloudflare">
        
      </a>
    </div>
    <p>While threat actors may only need one way to get in, defenders have more than one opportunity to detect them. <a href="/announcing-antivirus-in-cloudflare-gateway/">One exciting announcement this week that helps with just that is Gateway with AV</a>! By adding malware scanning to Gateway, defenders can now detect malicious files that unsuspecting users download or a threat actor places. Oftentimes, these are early signs of compromise that should be investigated.</p><p>From a response and investigation standpoint, Gateway can be used to block malicious domains to prevent other users from reaching them. As a bonus, Gateway logs are especially useful for scoping other potentially compromised devices that also communicate with malicious domains. In fact, the Security team at Cloudflare uses Gateway to keep our own users secure and to help us conduct investigations.</p><p>Combined with Gateway, Cloudflare Access and WAF can be used to add an extra layer of security and visibility into your users and applications, both of which also provide valuable insight to security teams. Threat actors look for different ways to compromise your environment at the user, application, and network level. With Access, you can protect and control what users have access to, monitor authentication activity, and revoke access easily if a compromise is suspected. Critical web applications, especially those that are Internet-facing, should be protected by a <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> to block malicious attacks from legitimate web traffic. All it takes is one vulnerability to be exploited for an attacker to potentially gain access to your data, or worse, embed malicious content that can be used to infect users that visit your web application.</p><p>Lastly, while I only focused on ransomware on the endpoint, I should point out that threat actors can also leverage <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">botnets</a> to conduct attacks over the network. Imagine being surrounded by a small army of bulldozers threatening to destroy your home unless you pay them a large sum of money. That’s as Ransom DDoS and it’s why <a href="https://www.cloudflare.com/ddos/">DDoS mitigation</a> is so important.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Ransomware attacks continue <a href="https://www.kroll.com/en/insights/publications/cyber/ransomware-attack-trends-2020">to be on the rise</a> and there’s no sign of them slowing down in the near future. With ransomware as a service (<a href="https://www.crowdstrike.com/cybersecurity-101/ransomware/ransomware-as-a-service-raas/">RaaS</a>) models, it’s even easier for inexperienced threat actors to get their hands on them today. RaaS is essentially a franchise that allows criminals to rent ransomware from malware authors. It takes away the need to build their own and creates a win-win opportunity for both parties.</p><p>Here are some general recommendations to help you and your organization stay secure:</p><ul><li><p>Use 2FA everywhere, especially on your <a href="https://www.cloudflare.com/learning/access-management/what-is-remote-access-security/">remote access entry points</a>. This is where Cloudflare Access really helps.</p></li><li><p>Maintain multiple redundant backups of critical systems and data, both onsite and offsite</p></li><li><p>Monitor and block malicious domains using Cloudflare Gateway + AV</p></li><li><p>Sandbox web browsing activity using Cloudflare RBI to isolate threats at the browser</p></li></ul><p></p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <category><![CDATA[Attacks]]></category>
            <guid isPermaLink="false">35AEsTbZ4S2cbK8OR7BGxx</guid>
            <dc:creator>James Espinosa</dc:creator>
        </item>
        <item>
            <title><![CDATA[Network-layer DDoS attack trends for Q4 2020]]></title>
            <link>https://blog.cloudflare.com/network-layer-ddos-attack-trends-for-q4-2020/</link>
            <pubDate>Fri, 22 Jan 2021 12:00:00 GMT</pubDate>
            <description><![CDATA[ DDoS attack trends in the final quarter of 2020 defied norms in many ways. For the first time in 2020, Cloudflare observed an increase in the number of large DDoS attacks. Specifically, the number of attacks over 500Mbps and 50K pps saw a massive uptick.  ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7s9ko2O5p5cLQZgufvnI5S/b74e1b67409f06450d3c29c62cba4018/image21-1.png" />
            
            </figure><p>DDoS attack trends in the final quarter of 2020 defied norms in many ways. For the first time in 2020, Cloudflare observed an increase in the number of large DDoS attacks. Specifically, the number of attacks over 500Mbps and 50K pps saw a massive uptick.</p><p>In addition, attack vectors continued to evolve, with protocol-based attacks seeing a 3-10x increase compared to the prior quarter. Attackers were also more persistent than ever — nearly 9% of all attacks observed between October and December lasted more than 24 hours.</p><p>Below are additional noteworthy observations from the fourth quarter of 2020, which the rest of this blog explores in greater detail.</p><ul><li><p><b>Number of attacks:</b> For the first time in 2020, the total number of attacks observed in Q4 decreased compared to the prior quarter.</p></li><li><p><b>Attack duration:</b> 73% of all attacks observed lasted under an hour, a decrease from 88% in Q3.</p></li><li><p><b>Attack vectors:</b> While SYN, ACK, and RST floods continued to be the dominant attack vectors deployed, attacks over NetBIOS saw a whopping 5400% increase, followed by those over ISAKMP and SPSS.</p></li><li><p><b>Global DDoS activity:</b> Our data centers in Mauritius, Romania, and Brunei recorded the highest percentages of DDoS activity relative to non-attack traffic.</p></li><li><p><b>Additional attack tactics:</b> <a href="/ransom-ddos-attacks-target-a-fortune-global-500-company/">Ransom DDoS (RDDoS)</a> attacks continue to target organizations around the world as criminal groups attempt to extort a ransom in the form of Bitcoin under a threat of a DDoS attack.</p></li></ul>
    <div>
      <h2>Number of attacks</h2>
      <a href="#number-of-attacks">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3HM7RUrs09sv3IbtaQvXGv/7dbb30b2db348e3bf883cddf52d078a8/image13.png" />
            
            </figure><p>For the first time in 2020, the total number of network layer DDoS attacks we observed decreased compared to the previous quarter. Q4 constituted 15% of all attacks observed in 2020, compared to Q3’s 48%. In fact, the total number of attacks in Q4 was less than that seen in the month of September alone by a whopping 60%. On a monthly basis, December was Q4’s busiest month for attackers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Ip14T10pJRkDIw9fvTfQ0/09e7c30e8b4e043c3d005ad71162d91d/image15.png" />
            
            </figure>
    <div>
      <h2>Attack rates</h2>
      <a href="#attack-rates">
        
      </a>
    </div>
    <p>There are different ways of measuring an L3/4 DDoS attack’s size. One is the volume of traffic it delivers, or its ‘bit rate’ (measured in gigabits-per-second). Another is the number of packets it delivers, or its ‘packet rate’ (measured in packets-per-second). Attacks with high bit rates attempt to saturate last-mile network links of the target, and attacks with high packet rates attempt to overwhelm routers or other in-line hardware <a href="/network-layer-ddos-attack-trends-for-q3-2020/#blog-1-ddos">devices</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2RcquZz3afZORkFCgX36I9/a88c1203f6ef1febdbd32b813c174b82/image8-4.png" />
            
            </figure><p>In Q4, as in previous quarters, the majority of attacks were quite small —  under 1 Gbps and 1M pps, specifically. This trend is not surprising, since most attacks are launched by amateur attackers using tools that are easy to use and cost a few dollars at most. Small attacks may also serve as a smokescreen to distract security teams from other kinds of cyberattacks, or to test a network’s existing defense mechanisms.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1E4MxtMUrD6jJyaE3fRs4r/292e5113b67c5aa523853af314307cc3/image16.png" />
            
            </figure><p>However, the overall popularity of small attacks didn’t tell the whole story in Q4. Attacks over 500Mbps and 50K pps constituted a larger percentage of total attacks than they did in previous quarters. In fact, the number of attacks over 100 Gbps increased by 10x from Q3, and those over 10M pps increased by 3.6x.</p><p>One unique large attack Cloudflare observed was an ACK flood DoS attack that was automatically detected and mitigated by Cloudflare’s systems. What was unique about this attack was not the max packet rate, but the attack method that appears to have been borrowed from the world of acoustics.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/35buUEe8hOv4zBOQOA9iP8/5707197c5eeb59b31485f69baf0d0f2a/image18.png" />
            
            </figure><p>As can be seen in the graph above, the attack’s packet rate followed a wave-shaped pattern for over 19 hours. It seems as though the attacker was inspired by an acoustics concept called <a href="https://en.wikipedia.org/wiki/Beat_%28acoustics%29">beat</a>. For this reason, we codenamed this attack “Beat”. In acoustics, a beat is a term that is used to describe an interference of two different wave frequencies. You can read more about the Beat attack in our blog post: <a href="/beat-an-acoustics-inspired-ddos-attack/">Beat - An Acoustics Inspired DDoS Attack</a></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4PEt7dDxV5LREn7Q6iIdth/eae37ba35274b2a5f7cac79c2a6dc9d3/image14.png" />
            
            </figure><p>Whether packet intensive or bit intensive, the increase in large DDoS attacks is a disturbing trend. It indicates that attackers are getting more brazen, and are using tools that allow them to launch larger attacks. What’s worse, often larger attacks have implications to not just target the network, but also intermediary service providers that serve the target network downstream.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5wdXb2mmtdoiXsN7xcyPDM/b71256231eac1a31492c7dc0e009ad74/image10.png" />
            
            </figure>
    <div>
      <h2>Attack Duration</h2>
      <a href="#attack-duration">
        
      </a>
    </div>
    <p>73% of attacks in Q4 ‘20 lasted for under an hour. On the other end of the spectrum, nearly 9% of attacks lasted over 24 hrs (compared to a mere 1.5% in Q3 '20). This increase reinforces the need for a real-time, always-on defense system to protect against attacks of every size and duration.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/17UQiWvWFYIaUiolqdKt5Q/6fb13aac9a437538dbd08bb88e002220/image2-6.png" />
            
            </figure>
    <div>
      <h2>Attack vectors</h2>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p>An ‘attack vector’ is a term used to describe the attack method. The most popular method, SYN floods, constituted nearly 42% of all attacks observed in Q3, followed by ACK, RST, and UDP-based DDoS attacks. This is relatively consistent with observations from previous quarters. However, ACK attacks jumped from ninth place in Q3 to second place — a 13x increase quarter-over-quarter— dethroning RST attacks from second place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5zC3yC4BbV7Lj4xWjHJSvB/7e7da50386d5112e32675c0125610d44/image3-9.png" />
            
            </figure>
    <div>
      <h2>Top emerging threats</h2>
      <a href="#top-emerging-threats">
        
      </a>
    </div>
    <p>While TCP based attacks like SYN and RST floods remain popular, UDP-protocol specific attacks such as NetBIOS and ISAKMP-based DDoS attacks are seeing an explosion compared to the prior quarter.</p><p>NetBIOS is a protocol that allows applications on separate machines to communicate and access shared resources over a local area network, and ISAKMP is a protocol used to establish Security Associations (SAs) and cryptographic keys when setting up an <a href="https://www.cloudflare.com/learning/network-layer/what-is-ipsec/">IPsec</a> VPN connection (IPsec uses the Internet Key Exchange (IKE) protocol to ensure secure connections and will authenticate and encrypt packets of data sent over an Internet Protocol (IP) network.)</p><p>Cloudflare continues to see protocol based attacks — and indeed, multi-vector attacks — deployed to attempt to bring networks down. As the complexity of attacks elevates, adequate <a href="https://www.cloudflare.com/ddos/">DDoS protection</a> needs to be put in place to keep organizations secure and online at all times.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1alYse6gRa3CRb7XWg6X1E/1c0ef1468c1daa632afa9df7da740ad3/image20.png" />
            
            </figure>
    <div>
      <h2>Global DDoS activity</h2>
      <a href="#global-ddos-activity">
        
      </a>
    </div>
    <p>To understand where these attacks come from, we look at the Cloudflare edge network data centers where the traffic was ingested, rather than the location of the source IP. The reason? When attackers launch L3/4 attacks, they can spoof the source IP address in order to obfuscate their attack’s source.</p><p>In this report, we also measure the attack traffic observed at a Cloudflare data center relative to the non-attack traffic observed at the same data center for geo-based distribution. This gives us more accuracy in our endeavor to pinpoint geographic locations that are observing more threats than others. We’re able to achieve geographical accuracy in our report because we have data centers in over 200 cities, in more than 100 countries around the world.</p><p>Looking at Q4 metrics, we observed interesting insights — our data centers in Mauritius, Romania, and Brunei recorded the highest percentages of attack traffic relative to non-attack traffic. Specifically, between 4.4% and 4.9% of all traffic in those countries came from DDoS attacks. Another way of saying this is that almost 5 out of every 100 bytes was part of attack traffic. These observations indicate increased botnet activities in those countries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6vEdVCnJ29d4xYl4OO4ewm/23ad8afedefe5599f5ee21f8b15782b3/image17.png" />
            
            </figure><p>What might explain the comparatively high incidence of DDoS attacks in these countries? While it’s impossible to say for sure, here are some possibilities for the top two countries on the list:</p><p><a href="https://en.wikipedia.org/wiki/Mauritius"><b>Mauritius</b></a> - In August 2020, a state of environmental emergency was declared in Mauritius after a <a href="https://news.sky.com/story/mauritius-declares-environmental-emergency-after-mass-oil-spill-from-grounded-tanker-12044845">ship carrying nearly 4,000 tons of fuel cracked its hull</a>. The oil spill ignited <a href="https://en.wikipedia.org/wiki/MV_Wakashio_oil_spill#Anti-government_protests">anti-government protests</a> calling for the resignation of the prime minister. Since then, the government has suspended the parliament twice, and has also been accused of suppressing local media and independent reporting covering the incident. Even five months after, following a series of human-rights scandals, the <a href="https://www.forbes.com/sites/nishandegnarain/2021/12/30/protests-continue-in-mauritius-five-months-after-oil-spill/">protests continue</a>. The events in Mauritius may be linked to the increased DDoS activity.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1XhinXF9uOitM4v87nMXAU/19f3794f239cb09dfec881486b387eed/image19.png" />
            
            </figure><p>Source: wikipedia</p><p><a href="https://en.wikipedia.org/wiki/Romania"><b>Romania</b></a> - Two events may be behind the increased DDoS activity in Romania. Romania recently held parliamentary elections which ended on December 6, 2020. In addition, the EU announced on December 9th that <a href="https://www.zdnet.com/article/romania-to-host-the-eus-new-cybersecurity-research-hub/">Romania will host their new cyber security research hub</a>, the European Cybersecurity Industrial, Technology and Research Competence Centre (ECCC). Another possible explanation is that Romania is the country <a href="https://www.romania-insider.com/romania-cheapest-fast-internet-december-2019#:~:text=The%20price%20of%20super%2Dfast,and%20discounts%20platform%20Picodi.com.">with the cheapest super-fast broadband Internet in the world</a> — making it easier for anyone to launch volumetric attacks from within Romania.</p><blockquote><p>?<a href="https://twitter.com/hashtag/Bucharest?src=hash&amp;ref_src=twsrc%5Etfw">#Bucharest</a> to be the host of the future EU <a href="https://twitter.com/hashtag/Cyber?src=hash&amp;ref_src=twsrc%5Etfw">#Cyber</a> Centre?Hub for high tech and innovation, featuring a thriving digital ecosystem, dynamic and young, Romania’s capital will take this task in a responsible and dedicated manner, to the benefit of the entire European Union???</p>— Romania in the EU ?? (@romaniaineu) <a href="https://twitter.com/romaniaineu/status/1336801063865880577?ref_src=twsrc%5Etfw">December 9, 2020</a></blockquote> 
    <div>
      <h2>DDoS activity by region</h2>
      <a href="#ddos-activity-by-region">
        
      </a>
    </div>
    
    <div>
      <h3>Africa</h3>
      <a href="#africa">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4aSVgyvlzwLkSjZgJ822q6/06214280151ad46a664f65fe9671f05f/image1-8.png" />
            
            </figure>
    <div>
      <h3>Asia Pacific and Oceania</h3>
      <a href="#asia-pacific-and-oceania">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3rY41nNbrh7XbMHwYvnuod/c64daed84c64daee7dd1e7ec09e8012e/image7-2.png" />
            
            </figure>
    <div>
      <h3>Europe</h3>
      <a href="#europe">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1biS8O0qMJlUx6w8UHlBk8/3f03e086baf3601a1908f2f0da747e62/image5-4.png" />
            
            </figure>
    <div>
      <h3>Middle East</h3>
      <a href="#middle-east">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2EWOB1PIiaEJlm9ckwiZfB/cf6815df60afae615fe1c38b3b1aeafe/image12.png" />
            
            </figure>
    <div>
      <h3>North America</h3>
      <a href="#north-america">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/SzOJ762wAnsnEVcd1EFMi/9de62ea7f35e75a434cba2b910155c4e/image6-2.png" />
            
            </figure>
    <div>
      <h3>South America</h3>
      <a href="#south-america">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/42E9QJzkD2jBaAyC5lWQym/7ca786d49fcb7a49d7a7d4e2de9bf955/image11.png" />
            
            </figure>
    <div>
      <h3>United States</h3>
      <a href="#united-states">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/sg1e4R6PEPFjK6Yul5t7N/8a896086e83ec12b910a250ba30df568/image9-1.png" />
            
            </figure>
    <div>
      <h2>Ransom-based attacks continue to plague organizations</h2>
      <a href="#ransom-based-attacks-continue-to-plague-organizations">
        
      </a>
    </div>
    <p>In <a href="/network-layer-ddos-attack-trends-for-q3-2020/">our previous quarterly DDoS report</a>, we noted a rise in extortion and ransom-based DDoS (RDDoS) attacks around the world. In a RDDoS attack, a malicious party threatens a person or organization with a cyberattack that could knock their networks, websites, or applications offline for a period of time, unless the person or organization pays a ransom. You can read more about RDDoS attacks <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">here</a>.</p><p>In Q4 ‘20, this disturbing trend continued. Organizations large and small came to Cloudflare asking for help in keeping their network infrastructure online while they figured out how to respond to ransom notes. <a href="/ransom-ddos-attacks-target-a-fortune-global-500-company/">Read this story</a> of what a Fortune Global 500 company did when they received a ransom note, and about their recommendations for organizations.</p><p>Cloudflare continues to closely monitor this trend. If you receive a threat:</p><ol><li><p><b>Do not panic — we recommend you to not pay the ransom</b>: Paying the ransom only encourages bad actors and finances illegal activities — and there’s no guarantee attackers won’t attack your network anyway.</p></li><li><p><b>Notify local law enforcement</b>: They will also likely request a copy of the ransom letter that you received.</p></li><li><p><b>Contact Cloudflare</b>: We can help ensure your website and network infrastructure are safeguarded from these ransom attacks.</p></li></ol>
    <div>
      <h2>Cloudflare DDoS Protection</h2>
      <a href="#cloudflare-ddos-protection">
        
      </a>
    </div>
    <p>Cloudflare provides comprehensive L3-L7 DDoS protection. In 2017, we pioneered the elimination of the industry standard surge pricing for DDoS attacks, providing customers with unmetered and unlimited DDoS protection. Since then, we’ve onboarded thousands of customers of all sizes — including <a href="https://www.cloudflare.com/case-studies/wikimedia-foundation">Wikimedia</a>, <a href="https://www.cloudflare.com/case-studies/panasonic">Panasonic</a>, and <a href="https://www.cloudflare.com/case-studies/discord">Discord</a> — that use Cloudflare to  protect and accelerate their Internet properties. Why do they choose Cloudflare? Three main reasons:</p><p><b>1. No scrubs</b>Cloudflare doesn't operate scrubbing centers as we believe that <a href="/no-scrubs-architecture-unmetered-mitigation/">the scrubbing center model is a flawed approach to DDoS protection</a>. Scrubbing centers cause delays and cost too much to build and run. What’s more, DDoS attacks are asymmetric — attackers have more available bandwidth than a single scrubbing center will ever be able to handle.</p><p>Cloudflare’s network is architected so that every machine in every data center performs DDoS mitigation. Doing this at the edge is the only way to mitigate at scale without impacting performance. Our Anycast-based architecture makes our capacity equivalent to our DDoS scrubbing capacity, the largest in the market at 51 Tbps. This means Cloudflare detects and mitigates DDoS attacks close to the source of attack. Better yet, Cloudflare’s global threat intelligence acts like an immune system for the Internet — employing our <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning models</a> to learn from and mitigate attacks against any customer to protect them all.</p><p><b>2. It’s about time</b>Most organizations are in some stage of their journey from on-prem to the cloud. The threat landscape, functional requirements, and scale of business applications are evolving faster than ever before, and the volume and sophistication of network attacks are already straining the defensive capabilities of even the most advanced enterprises. One concern many enterprises have when adopting the cloud is added latency for applications. Most cloud-based DDoS protection services rely on specialized data centers aka “scrubbing centers'' for DDoS mitigation. Backhauling traffic to those data centers can add significant latency depending on its location relative to the destination server.</p><p>This problem compounds when an organization uses different providers for different networking functions. When traffic must hop from provider to provider, latency can be measured in hundreds of milliseconds.</p><p>Cloudflare’s <a href="http://www.cloudflare.com/network">distributed geographical presence</a> ensures that attacks are globally detected and mitigated in under 3 seconds on average — making it one of the fastest in the industry.</p><p><b>3. It’s not just about DDoS</b>DDoS attacks constitute just one facet of the many cyber threats organizations are facing today. As businesses shift to a <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> approach, network and security buyers will face larger threats related to network access, and a continued surge in the frequency and sophistication of bot-related attacks.</p><p>A key design tenet while building products at Cloudflare is integration. <a href="/introducing-cloudflare-one/">Cloudflare One</a> is a solution that uses a Zero Trust security model to provide companies a better way to protect devices, data, and applications — and is deeply integrated with our existing platform of security and DDoS solutions.</p><p>To learn more about Cloudflare’s DDoS solution <a href="https://www.cloudflare.com/plans/enterprise/">contact us</a> or <a href="https://dash.cloudflare.com/">get started</a> today by signing up on our dashboard.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <category><![CDATA[RDDoS]]></category>
            <category><![CDATA[Fancy Bear]]></category>
            <category><![CDATA[Lazarus group]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <guid isPermaLink="false">3VunyYvpqhFGSKSBurDLOq</guid>
            <dc:creator>Vivek Ganti</dc:creator>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Ransom DDoS attacks target a Fortune Global 500 company]]></title>
            <link>https://blog.cloudflare.com/ransom-ddos-attacks-target-a-fortune-global-500-company/</link>
            <pubDate>Thu, 07 Jan 2021 16:19:24 GMT</pubDate>
            <description><![CDATA[ In late 2020, a major Fortune Global 500 company was targeted by a Ransom DDoS (RDDoS) attack by a group claiming to be the Lazarus Group. Cloudflare quickly onboarded them to the Magic Transit service and protected them against the lingering threat.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>In late 2020, a major <a href="https://en.wikipedia.org/wiki/Fortune_Global_500">Fortune Global 500</a> company was targeted by a <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS (RDDoS) attack</a> by a group claiming to be the <a href="https://en.wikipedia.org/wiki/Lazarus_Group">Lazarus Group</a>. Cloudflare quickly onboarded them to the <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a> service and protected them against the lingering threat. This extortion attempt was part of wider ransom campaigns that have been unfolding throughout the year, targeting thousands of organizations around the world. Extortionists are threatening organizations with crippling <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">DDoS attacks</a> if they do not pay a ransom.</p><p>Throughout 2020, Cloudflare onboarded and protected many organizations with Magic Transit, Cloudflare’s <a href="https://www.cloudflare.com/ddos/">DDoS protection service</a> for critical network infrastructure, the <a href="https://www.cloudflare.com/waf/">WAF</a> service for HTTP applications, and the <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Spectrum</a> service for TCP/UDP based applications -- ensuring their business’s availability and continuity.</p>
    <div>
      <h2>Unwinding the attack timeline</h2>
      <a href="#unwinding-the-attack-timeline">
        
      </a>
    </div>
    <p>I spoke with Daniel (a pseudonym) and his team, who work at the Incident Response and Forensics team at the aforementioned company. I wanted to learn about their experience, and share it with our readers so they could learn how to better prepare for such an event. The company has requested to stay anonymous and so some details have been omitted to ensure that. In this blog post, I will refer to them as X.</p><p>Initially, the attacker sent ransom emails to a handful of X’s publicly listed email aliases such as press@, shareholder@, and hostmaster@. We’ve heard from other customers that in some cases, non-technical employees received the email and ignored it as being spam which delayed the incident response team’s time to react by hours. However, luckily for X, a network engineer that was on the email list of the hostmaster@ alias saw it and immediately forwarded it to Daniel’s incident response team.</p><p>In the ransom email, the attackers demanded 20 bitcoin and gave them a week to pay up, or else a second larger attack would strike, and the ransom would increase to 30 bitcoin. Daniel says that they had a contingency plan ready for this situation and that they did not intend to pay. Paying the ransom funds illegitimate activities, motivates the attackers, and does not guarantee that they won’t attack anyway.</p><blockquote><p>...Please perform a google search of “Lazarus Group” to have a look at some of our previous work. Also, perform a search for “NZX” or “New Zealand Stock Exchange” in the news. You don’t want to be like them, do you?...</p><p>The current fee is 20 Bitcoin (BTC). It’s a small price to pay for what will happen if your whole network goes down. Is it worth it? You decide!...</p><p>If you decide not to pay, we will start the attack on the indicated date and uphold it until you do. We will completely destroy your reputation and make sure your services will remain offline until you pay...</p></blockquote><p><i>--An excerpt of the ransom note</i></p>
    <div>
      <h2>The contingency plan</h2>
      <a href="#the-contingency-plan">
        
      </a>
    </div>
    <p>Upon receiving the email from the network engineer, Daniel called him and they started combing through the network data -- they noticed a significant increase in traffic towards one of their global data centers. This attacker was not playing around, firing gigabits per second towards a single server. The attack, despite just being a proof of intention, saturated the Internet uplink to that specific data center, causing a denial of service event and generating a series of failure events.</p><p>This first “teaser” attack came on a work day, towards the end of business hours as people were already wrapping up their day. At the time, X was not protected by Cloudflare and relied on an on-demand DDoS protection service. Daniel activated the contingency plan which relied on the on-demand scrubbing center service.</p><p>Daniel contacted their DDoS protection service. It took them over 30 minutes to activate the service and redirect X’s traffic to the scrubbing center. Activating the on-demand service caused networking failures and resulted in multiple incidents for X on various services -- even ones that were not under attack. Daniel says hindsight is 2020 and he realized that an always-on service would have been much more effective than on-demand, reactionary control that takes time to implement, after the impact is felt. The networking failures amplified the one-hour attack resulting in incidents lasting much longer than expected.</p>
    <div>
      <h2>Onboarding to Cloudflare</h2>
      <a href="#onboarding-to-cloudflare">
        
      </a>
    </div>
    <p>Following the initial attack, Daniel’s team reached out to Cloudflare and wanted to onboard to our automated always-on DDoS protection service, Magic Transit. The goal was to onboard to it before the second attack would strike. Cloudflare explained the pre-onboarding steps, provided details on the process, and helped onboard X’s network in a process Daniel defined as “quite painless and very professional. The speed and responsiveness were impressive. One of the key differentiation is the attack and traffic analytics that we see that our incumbent provider couldn’t provide us. We’re seeing attacks we never knew about being mitigated automatically.”</p><p>The attackers promised a second, huge attack which never happened. Perhaps it was just an empty threat, or it could be that the attackers detected that X is protected by Cloudflare which deterred them and they, therefore, decided to move on to their next target?</p>
    <div>
      <h2>Recommendations for organizations</h2>
      <a href="#recommendations-for-organizations">
        
      </a>
    </div>
    <p>I asked Daniel if he has any recommendations for businesses so they can learn from his experience and be better prepared, should they be targeted by ransom attacks:</p><p><b>1. Utilize an automated always-on DDoS protection service</b></p><p>Do not rely on reactive on-demand SOC-based DDoS Protection services that require humans to analyze attack traffic. It just takes too long. Don’t be tempted to use an on-demand service: “you get all of the pain and none of the benefits”. Instead, onboard to a cloud service that has sufficient network capacity and automated DDoS mitigation systems.</p><p><b>2. Work with your vendor to build and understand your threat model</b></p><p>Work together with your DDoS protection vendor to tailor mitigation strategies to your workload. Every network is different, and each poses unique challenges when integrating with DDoS mitigation systems.</p><p><b>3. Create a contingency plan and educate your employees</b></p><p>Be prepared. Have plans ready and train your teams on them. Educate all of your employees, even the non-techies, on what to do if they receive a ransom email. They should report it immediately to your Security Incident Response team.</p><p><i>Cloudflare customers need not worry as they are protected. Enterprise customers can reach out to their account team if they are being extorted in order to review and optimize their security posture if needed. Customers on all other plans can reach out to our support teams and learn more about how to</i> <a href="https://support.cloudflare.com/hc/en-us/articles/200170196-Responding-to-DDoS-attacks#h_6v9PrAUcuaN7j47oyeOPgw"><i>optimize your Cloudflare security configuration</i></a><i>.</i></p><p><i>Not a Cloudflare customer yet?</i> <a href="https://www.cloudflare.com/plans/enterprise/contact/"><i>Speak to an expert</i></a> or <a href="https://dash.cloudflare.com/sign-up">sign up</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <category><![CDATA[Fancy Bear]]></category>
            <category><![CDATA[Magic Transit]]></category>
            <category><![CDATA[Lazarus group]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <guid isPermaLink="false">4U9KoEuJmbxQsU7l0FPuII</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Network-layer DDoS attack trends for Q3 2020]]></title>
            <link>https://blog.cloudflare.com/network-layer-ddos-attack-trends-for-q3-2020/</link>
            <pubDate>Wed, 18 Nov 2020 12:00:00 GMT</pubDate>
            <description><![CDATA[ In Q3 ‘20, Cloudflare observed a surge in DDoS attacks, with double the number of DDoS attacks and more attack vectors deployed than ever — with a notable surge in protocol-specific DDoS attacks such as mDNS, Memcached, and Jenkins amplification floods. ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1jF83Q9sYOyLDQ8T7y5CXX/45f7608acb2ef5cd2dc30d4e650b782b/image6-4.png" />
            
            </figure><p><b>DDoS attacks are surging</b> — both in frequency and sophistication. After doubling from Q1 to Q2, the total number of network layer attacks observed in Q3 doubled again — resulting in a 4x increase in number compared to the pre-COVID levels in the first quarter. Cloudflare also observed more attack vectors deployed than ever — in fact, while SYN, RST, and UDP floods continue to dominate the landscape, we saw an explosion in protocol specific attacks such as mDNS, Memcached, and Jenkins DoS attacks.</p><p>Here are other key network layer DDoS trends we observed in Q3:</p><ul><li><p>Majority of the attacks are under 500 Mbps and 1 Mpps — both still suffice to cause service disruptions</p></li><li><p>We continue to see a majority of attacks be under 1 hr in duration</p></li><li><p>Ransom-driven DDoS attacks (RDDoS) are on the rise as groups claiming to be Fancy Bear, Cozy Bear and the Lazarus Group extort organizations around the world. As of this writing, the ransom campaign is still ongoing. See a special note on this below.</p></li></ul>
    <div>
      <h3>Number of attacks</h3>
      <a href="#number-of-attacks">
        
      </a>
    </div>
    <p>The total number of L3/4 DDoS attacks we observe on our network continues to increase substantially, as indicated in the graph below. All in all, Q3 saw over 56% of all attacks this year — double that of Q2, and four times that of Q1. In addition, the number of attacks per month increased throughout the quarter.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/eIvD1EPThyRCdvoFBL8XX/8501596dd9c41688c0eb29e8af3d5703/image12-1.png" />
            
            </figure><p>While September witnessed the largest number of attacks overall, August saw the most large attacks (over 500Mbps). Ninety-one percent of large attacks in Q3 took place in that month—while monthly distribution of other attack sizes was far more even.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2IrTs1dyFpufH2GrOLC3Pa/8b27913d3fb0609774f5b65fbcac7af0/image9-1.png" />
            
            </figure><p>While the total number of attacks between 200-300 Gbps decreased in September, we saw more global attacks on our network in Q3. This suggests the increase in the use of distributed botnets to launch attacks. In fact, in early July, Cloudflare witnessed <a href="/moobot-vs-gatebot-cloudflare-automatically-blocks-botnet-ddos-attack-topping-at-654-gbps/">one of the largest-ever attacks on our network</a> — generated by Moobot, a <a href="/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis/">Mirai</a>-based botnet. The attack peaked at 654 Gbps and originated from 18,705 unique IP addresses, each believed to be a Moobot-infected IoT device. The attack campaign lasted nearly 10 days, but the customer was protected by Cloudflare, so they observed no downtime or service degradation.</p><h2>Attack size (bit rate and packet rate)</h2><p>There are different ways of measuring a L3/4 DDoS attack’s size. One is the volume of traffic it delivers, measured as the bit rate (specifically, Gigabits-per-second). Another is the number of packets it delivers, measured as the packet rate (specifically, packets-per-second). Attacks with high bit rates attempt to saturate the Internet link, and attacks with high packet rates attempt to overwhelm the routers or other in-line hardware devices.</p><p>In Q3, most of the attacks we observed were smaller in size. In fact, over 87% of all attacks were under 1 Gbps. This represents a significant increase from Q2, when roughly 52% of attacks were that small.  Note that, even ‘small’ attacks of under 500 Mbps are many times sufficient to create major disruptions for Internet properties that are not protected by a Cloud based DDoS protection service. Many organizations have uplinks provided by their ISPs that are far less than 1 Gbps. Assuming their public facing network interface also serves legitimate traffic, you can see how even these ‘small’ DDoS attacks can easily take down Internet properties.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/67jEBElzS4SdgzUg2qWb6y/0b29ee030f2126e6cfe779a17a03692b/image10-2.png" />
            
            </figure><p>This trend holds true for attack packet rates. In Q3, 47% of attacks were under 50k pps — compared to just 19% in Q2.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6jDfpcPzz6D2Ga9pudsPdJ/42d892f6d8e234dedcdd62fbb2c5db19/image8-1.png" />
            
            </figure><p>Smaller attacks can indicate that amateur attackers may be behind the attacks — using tools easily available to generate attacks on exposed IPs/ networks. Alternatively, small attacks may serve as a smokescreen to distract security teams from other kinds of cyberattacks that might be taking place simultaneously.</p>
    <div>
      <h3>Attack duration</h3>
      <a href="#attack-duration">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2EGtlfRfpul4ouwzzixxB5/c64951bcd1c43c05fa9d9f0ef85341cf/image5-3.png" />
            
            </figure><p>In terms of length, very short attacks were the most common attack type observed in Q3, accounting for nearly 88% of all attacks. This observation is in line with our prior reports — in general, Layer 3/4 DDoS attacks are getting shorter in duration.</p><p>Short burst attacks may attempt to cause damage without being detected by DDoS detection systems. DDoS services that rely on manual analysis and mitigation may prove to be useless against these types of attacks because they are over before the analyst even identifies the attack traffic.</p><p>Alternatively, the use of short attacks may be used to probe the cyber defenses of the target. Load-testing tools and automated DDoS tools, that are widely available on the dark web, can generate short bursts of, say, a SYN flood, and then following up with another short attack using an alternate attack vector. This allows attackers to understand the security posture of their targets before they decide to potentially launch larger attacks at larger rates and longer durations - which come at a cost.</p><p>In other cases, attackers generate small DDoS attacks as proof and warning to the target organization of the attacker’s ability to cause real damage later on. It’s often followed by a ransom note to the target organization, demanding payment so as to avoid suffering an attack that could more thoroughly cripple network infrastructure.</p><p>Whatever their motivation, DDoS attacks of any size or duration are not going away anytime soon. Even short DDoS attacks cause harm, and having an automated real-time defense mechanism in place is critical for any online business.</p>
    <div>
      <h3>Attack vectors</h3>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> constituted nearly 65% of all attacks observed in Q3, followed by RST floods and UDP floods in second and third places. This is relatively consistent with observations from previous quarters, highlighting the DDoS attack vector of choice by attackers.</p><p>While TCP based attacks like SYN and RST floods continue to be popular, UDP-protocol specific attacks such as mDNS, Memcached, and Jenkins are seeing an explosion compared to the prior quarter.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3aC5Dl4SPW5m6IWzVdlJpJ/f092be311fee7c0b28116c0d394f66dc/image-5.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1IzY6gk4kSWcqvKrcBtLmo/3fd3997ccfebab2ff263ca50ecd0cf1f/image13-1.png" />
            
            </figure><p>Multicast DNS (mDNS) is a UDP-based protocol that is used in local networks for service/device discovery. Vulnerable mDNS servers respond to unicast queries originating outside of the local network, which are ‘spoofed’ (altered) with the victim's source address. This results in amplification attacks. In Q3, we noticed an explosion of mDNS attacks — specifically, we saw a 2,680% increase compared to the previous quarter.</p><p>This was followed by <a href="https://www.cloudflare.com/learning/ddos/memcached-ddos-attack">Memcached</a> and Jenkins attacks. Memcached is a Key Value database. Requests can be made over the UDP protocol with a spoofed source address of the target. The size of the Value stored in the requested Key will affect the amplification factor, resulting in a DDoS amplification attack. Similarly, Jenkins, NTP, Ubiquity and the other UDP based protocols have seen a dramatic increase over the quarter due to its UDP stateless nature. A vulnerability in the older version (<a href="https://nvd.nist.gov/vuln/detail/CVE-2020-2100">Jenkins 2.218</a> and earlier) aided the launch of DDoS attacks. This vulnerability was fixed in Jenkins 2.219 by disabling UDP multicast/ broadcast messages by default. However there are still many vulnerable and exposed devices that run UDP based services which are being harnessed to generate volumetric amplification attacks.</p>
    <div>
      <h3>Attack by country</h3>
      <a href="#attack-by-country">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7G3o9akXvt2LTGVWEijSqr/3b1c55ce7380c55fa6f8bcc94d000112/image2-9.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1N6lAC9tcUt07R9tJlv1Tv/c0757a5918fff27c58c302e2e7bde238/image4-8.png" />
            
            </figure><p>Looking at country-based distribution, the United States observed the most number of L3/4 DDoS attacks, followed by Germany and Australia. Note that when analyzing L3/4 DDoS attacks, we bucket the traffic by the Cloudflare edge data center locations where the traffic was ingested, and not by the location of the source IP. The reason is when attackers launch L3/4 attacks they can spoof the source IP address in order to obfuscate the attack source. If we were to derive the country based on a spoofed source IP, we would get a spoofed country. Cloudflare is able to overcome the challenges of spoofed IPs by displaying the attack data by the location of Cloudflare’s data center in which the attack was observed. We’re able to achieve geographical accuracy in our report because we have data centers in over 200 cities around the world.</p>
    <div>
      <h3>Africa</h3>
      <a href="#africa">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7wsuVQRHIvB0rqToNcP9Tl/3ac6afddef1846c058e4eb0acade724e/BDES-1247_DDoS_Trends_Report_Q32020-10.png" />
            
            </figure>
    <div>
      <h3>Asia Pacific &amp; Oceania</h3>
      <a href="#asia-pacific-oceania">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ACJVFEAu49FbAEq1QNt6v/3f6cb0da18ffd22aab96ff943ce90260/BDES-1247_DDoS_Trends_Report_Q32020-11.png" />
            
            </figure>
    <div>
      <h3>Europe</h3>
      <a href="#europe">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ITS2QtgD0BCbrSl2td6LE/c6c17ac71c7e35a5aabd6e9d660d6c5b/BDES-1247_DDoS_Trends_Report_Q32020-12.png" />
            
            </figure>
    <div>
      <h3>Middle East</h3>
      <a href="#middle-east">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/21t1TvjNu1RBkTF4u3pIxI/b33ed46dced8d1c16c15deaab52f1ab2/Middle-East_3x.png" />
            
            </figure>
    <div>
      <h3>North America</h3>
      <a href="#north-america">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3V3ZzVYkNANX8iwKAmVSbK/6e3165239cfee9689f8819706296d8f5/North-America_3x.png" />
            
            </figure>
    <div>
      <h3>South America</h3>
      <a href="#south-america">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5BOr2iIu2AbVgqIsyLRKTB/1fa12fe524225792e8b41c78751cf33b/BDES-1247_DDoS_Trends_Report_Q32020-15.png" />
            
            </figure>
    <div>
      <h3>United States</h3>
      <a href="#united-states">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/66zKSWET6zVODRjcb2seiU/13785a8bec7c281b45b31ae895a94e2c/BDES-1247_DDoS_Trends_Report_Q32020-16.png" />
            
            </figure>
    <div>
      <h3>A note on recent ransom-driven DDoS attacks</h3>
      <a href="#a-note-on-recent-ransom-driven-ddos-attacks">
        
      </a>
    </div>
    <p>Over the past months, Cloudflare has observed another disturbing trend — a rise in extortion and ransom-based DDoS (RDDoS) attacks targeting organizations around the world. While RDDoS threats do not always result in an actual attack, the cases seen in recent months show that attacker groups are willing to carry out the threat, launching large scale DDoS attacks that can overwhelm organizations that lack adequate protection. In some cases, the initial teaser attack may be sufficient to cause impact if not protected by a Cloud based DDoS protection service.</p><p>In a RDDoS attack, a malicious party threatens a person or organization with a cyberattack that could knock their networks, websites, or applications offline for a period of time, unless the person or organization pays a ransom. You can read more about RDDoS attacks <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">here</a>.</p><p>Entities claiming to be Fancy Bear, Cozy Bear, and Lazarus have been threatening to launch DDoS attacks against organizations’ websites and network infrastructure unless a ransom is paid before a given deadline. Additionally, an initial ‘teaser’ DDoS attack is usually launched as a form of demonstration before parallel to the ransom email. The demonstration attack is typically a UDP reflection attack using a variety of protocols, lasting roughly 30 minutes in duration (or less).</p><p>What to do if you receive a threat:</p><ol><li><p><b>Do not panic and we recommend you to not pay the ransom</b>: Paying the ransom only encourages bad actors, finances illegal activities —and there’s no guarantee that they won’t attack your network now or later.</p></li><li><p><b>Notify local law enforcement</b>: They will also likely request a copy of the ransom letter that you received.</p></li><li><p><b>Contact Cloudflare</b>: We can help ensure your website and network infrastructure are safeguarded from these ransom attacks.</p></li></ol>
    <div>
      <h3>Cloudflare DDoS protection is different</h3>
      <a href="#cloudflare-ddos-protection-is-different">
        
      </a>
    </div>
    <p>On-prem hardware/cloud-scrubbing centers can't address the challenges of modern volumetric DDoS attacks. Appliances are easily overwhelmed by large DDoS attacks, Internet links quickly saturate, and rerouting traffic to cloud scrubbing centers introduces unacceptable latency penalties. Our <a href="https://www.cloudflare.com/ddos/">cloud-native, always-on, automated DDoS protection</a> approach solves problems that traditional cloud signaling approaches were originally created to address.</p><p>Cloudflare’s mission is to help build a better Internet, which grounds our DDoS approach and is why in 2017, we pioneered <a href="/unmetered-mitigation/">unmetered DDoS mitigation</a> for all of our customers on all plans including the <a href="https://www.cloudflare.com/plans/free/">free plan</a>. We are able to provide this level of protection because every server on our network can <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">detect &amp; block threats</a>, enabling us to absorb attacks of any size/kind, with no latency impact. This architecture gives us unparalleled advantages compared to any other vendor.</p><ul><li><p><b>51 Tbps of DDoS mitigation capacity and under 3 sec TTM</b>: Every data center in Cloudflare’s network detects and mitigates DDoS attacks. Once an attack is identified, the Cloudflare’s local data center mitigation system (dosd) generates and applies a dynamically crafted rule with a real-time signature — and mitigates attacks in under 3 seconds globally on average. This 3-second Time To Mitigate (TTM) is one of the fastest in the industry. Firewall rules and “proactive”/static configurations take effect immediately.</p></li><li><p><b>Fast performance included</b>:  Cloudflare is architected so that customers do not incur a latency penalty as a result of attacks. We deliver DDoS protection from every Cloudflare data center (instead of legacy scrubbing centers or on-premise hardware boxes) which allows us to mitigate attacks closest to the source. Cloudflare analyzes traffic out-of-path ensuring that our DDoS mitigation solution doesn’t add any latency to legitimate traffic. The rule is applied at the most optimal place in the Linux stack for a cost efficient mitigation, ensuring no performance penalty.</p></li><li><p><b>Global Threat Intelligence</b>: Like an immune system, our network learns from/mitigates attacks against any customer to protect them all. With threat intelligence (TI), it automatically blocks attacks and is employed in customer facing features (Bot Fight mode, Firewall Rules &amp; Security Level). Users create custom rules to mitigate attacks based on traffic attribute filters, threat &amp; bot scores generated using ML models (protecting against bots/botnets/DDoS).</p></li></ul><p>To learn more about Cloudflare’s DDoS solution <a href="https://www.cloudflare.com/plans/enterprise/">contact us</a> or <a href="https://dash.cloudflare.com/">get started</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[RDDoS]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <category><![CDATA[Fancy Bear]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <guid isPermaLink="false">2wAF9ScxGpcNPZViO9aZhy</guid>
            <dc:creator>Vivek Ganti</dc:creator>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
    </channel>
</rss>