Cyber Security

The protection of internet-connected systems, including hardware, software and data, from cyberattacks

DDoS attacks skyrocket as hacktivist activity surges, threatening critical global infrastructure

NETSCOUT SYSTEMS, INC. today released findings from its 1H2024 DDoS Threat Intelligence Report, citing a dramatic 43 percent increase in the number of application-layer attacks and a 30 percent increase in volumetric attacks, especially in Europe and the Middle East. Attack duration varied with 70 percent lasting less than 15 minutes.

The escalation of attacks involves a range of threat actors, including hacktivists, targeting critical infrastructure in the banking and financial services, government and utilities sectors. These attacks pose significant threats by disrupting vital civilian services in countries that oppose hacktivists’ ideologies. Key industries, already facing frequent and intense multi-vector attacks, experienced a 55 percent increase over the past four years.

“Hacktivist activities continue to plague global organisations with more sophisticated and coordinated DDoS attacks against multiple targets simultaneously,” stated Richard Hummel, director, threat intelligence, NETSCOUT. “As adversaries use more resilient, take-down-resistant networks, detection and mitigation are more challenging. This report gives network operations teams insights to fine-tune their strategies to stay ahead of these evolving threats.”

 

Attack sophistication strains networks worldwide

DDoS attacks continue to evolve, using innovative technologies and approaches to disrupt networks. During the 1H2024, NETSCOUT observed several significant trends, including:

  • NoName057(16), a pro-Russia hacktivist group, increased its focus on application-layer attacks, particularly HTTP/S GET and POST floods, leading to a 43 percent rise compared to 1H2023
  • Bot-infected devices increased by 50 percent with the emergence of the Zergeca botnet – and the continued evolution of the DDoSia botnet used by NoName057(16) – which uses advanced technologies like DNS over HTTPS (DoH) for command-and-control (C2)
  • Distributed botnet C2 infrastructure leveraging bots as control nodes enabling more decentralised and resilient DDoS attack coordination

These attacks have triggered widespread disruptions, affecting industries on a global scale. Service slowdowns or outages can cripple revenue streams, delay critical operations, hinder productivity and significantly elevate organisational risks.

 

Attackers targeting new networks

NETSCOUT also found that the emergence of new networks and autonomous system numbers (ASNs) play a pivotal role in increased DDoS activity. Over 75 percent of newly established networks are involved with DDoS activities, both as targets or abused participants in furthering attacks on others, within the first 42 days of coming online, as adversaries launch attacks using resilient nuisance networks and bulletproof hosting providers. Organisations need to plan for DDoS protection when splitting off a portion of a network to a new ASN rather than assume automatic protections from upstream service providers.

NETSCOUT’s global internet visibility is backed by decades of experience working with the world’s largest service providers and enterprises. It collects, analyses, prioritises and disseminates data on DDoS attacks from 216 countries and territories, 470 vertical industries and over 14,000 ASNs. Powered by its ATLAS platform, the company gains insights from more than 500 terabits per second (Tbps) of internet peering network traffic.

Visit our interactive website (https://www.netscout.com/threatreport) for more information on NETSCOUT’s DDoS Threat Intelligence Report. For real-time DDoS attack stats, map and insights, visit NETSCOUT Cyber Threat Horizon: https://horizon.netscout.com/.