NETSCOUT Identified Nearly 7.9 Million DDoS Attacks in 1H2023 According to Its Latest DDoS Threat Intelligence Report
- DDoS attacks increased by 31% YoY, reaching 7.9 million in 1H2023. DDoS attacks against wireless telecom providers increased by 79% in 2H2022 and 294% in APAC in 1H2023. HTTP/S application layer attacks grew by nearly 500% since 2019. Carpet-bombing attacks rose by 55% to over 724 daily. DNS water-torture attacks increased by 353%. A small number of nodes were responsible for a significant number of attacks.
- None.
Attacks Grew
Global events like the
During 2H2022, NETSCOUT documented a trend in DDoS attacks against wireless telecommunications providers that incurred a
NETSCOUT’s insights into the threat landscape come from its ATLAS sensor network built over decades of working with hundreds of Internet Service Providers globally, gleaning trends from an average of 424 Tbps of internet peering traffic, an increase of
“While world events and 5G network expansion have driven an increase in DDoS attacks, adversaries continue to evolve their approach to be more dynamic by taking advantage of bespoke infrastructure such as bulletproof hosts or proxy networks to launch attacks,” stated Richard Hummel, senior threat intelligence lead, NETSCOUT. “The lifecycle of DDoS attack vectors reveals the persistence of adversaries to find and weaponize new methods of attack, while DNS water torture and carpet-bombing attacks have become more prevalent.”
Other key findings from the NETSCOUT 1H2023 DDoS Threat Intelligence Report include:
-
Carpet-Bombing Attacks Rise. A resurgence in carpet-bombing attacks occurred since the beginning of the year, with a
55% increase to more than 724 daily, which NETSCOUT believes is a conservative estimate. These attacks cause significant harm across the global internet, spreading to hundreds and even thousands of hosts simultaneously. This tactic often avoids triggering high bandwidth threshold alerts to begin timely DDoS attack mitigation. -
DNS Water-Torture Attacks Become Commonplace. DNS water-torture attacks rose nearly
353% in daily attacks since the beginning of the year. The top five industries targeted include wired telecom, wireless telecom, data processing hosting, electronic shopping and mail-order companies, and insurance agencies and brokerages. - Higher Education and Governments Disproportionately Attacked. Adversaries create their own or use different types of abusable infrastructure as platforms to launch attacks. For example, open proxies were consistently leveraged in HTTP/S application-layer DDoS attacks against targets in the higher education and national government sectors. Meanwhile, DDoS botnets featured frequently in attacks against state and local governments.
-
DDoS Sources Are Persistent. A relatively small number of nodes are involved in a disproportionate number of DDoS attacks, with an average IP address churn rate of only
10% , as attackers tend to re-use abusable infrastructures. While these nodes are persistent, the impact fluctuates as adversaries rotate through different lists of abusable infrastructure every few days.
Visit our interactive website for more information on NETSCOUT's semi-annual DDoS Threat Intelligence Report. For real-time DDoS attack stats, map, and insights, visit NETSCOUT Cyber Threat Horizon. You can also find us on Facebook, LinkedIn, and Twitter.
About NETSCOUT
NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT) protects the connected world from cyberattacks and performance and availability disruptions through the company’s unique visibility platform and solutions powered by its pioneering deep packet inspection at scale technology. NETSCOUT serves the world’s largest enterprises, service providers, and public sector organizations. Learn more at www.netscout.com or follow @NETSCOUT on LinkedIn, Twitter, or Facebook.
©2023 NETSCOUT SYSTEMS, INC. All rights reserved. NETSCOUT, the NETSCOUT logo, Guardians of the Connected World, Visibility Without Borders, Adaptive Service Intelligence, Arbor, ATLAS, Cyber Threat Horizon, InfiniStream, nGenius, nGeniusONE, Omnis, and TrueCall are registered trademarks or trademarks of NETSCOUT SYSTEMS, INC., and/or its subsidiaries and/or affiliates in the
View source version on businesswire.com: https://www.businesswire.com/news/home/20230926255759/en/
Editorial Contacts:
Maribel Lopez
Manager, Marketing & Corporate Communications
+1 781 362 4330
maribel.lopez@netscout.com
Chris Shattuck
Finn Partners for NETSCOUT
+1 404 502 6755
NETSCOUT-US@FinnPartners.com
Source: NETSCOUT SYSTEMS, INC