Luxembourg, Aug. 14, 2024 – Gcore, a global edge AI, cloud, network, and security solutions provider, released the results of its Q1-Q2 2024 Gcore Radar report, focusing on DDoS attack trends. The report highlighted a significant 46% increase in the number of DDoS attacks compared to the same period in 2023, with peak attack power now measured in terabits per second, a substantial rise from the gigabits per second levels seen a year ago. This shift towards terabits per second was noted in the second half of the previous year.
The key highlights from the Q1-Q2 2024 report include the total number of attacks during this period, amounting to 830,000, representing a 46% increase from the previous year. Additionally, peak attack power rose from 1.6 Tbps to 1.7 Tbps, indicating a concerning trend in the potency of these attacks. UDP floods made up a majority of the DDoS attacks at 61%, followed by TCP floods at 18% and SYN floods at 11%. The most targeted business sectors were gaming (49%), technology (15%), financial services (12%), and telecommunications (10%). Interestingly, e-commerce (7%) and media and entertainment (5%) industries saw an increase in attacks, moving out of the ‘Other’ category.
Gcore’s Head of Security, Andrey Slastenov, expressed concern over the slight increase in attack power, emphasizing the potential impact even a small hike in potency can have on organizations. He stressed the importance of understanding why industries are being targeted and the need for robust protection measures to mitigate these threats effectively.
The technology sector emerged as one of the most attacked industries in the report, with a significant rise in the number of attacks, doubling to 15% from the previous period. Attackers are increasingly targeting businesses hosting critical infrastructure, disrupting services and operations. As per the report, gaming remained the most attacked industry, followed by technology and telecommunications.
In terms of attack origins, the US led in network-layer attacks, followed by Germany, Netherlands, and Singapore. The application-layer attacks showed similar origins as well. UDP floods were the predominant attack vector, constituting 61% of DDoS attacks, with TCP and SYN floods following at 18% and 11%, respectively. HTTP flood remained the most popular attack method at the L7 layer.
The report also highlighted the short yet potent nature of DDoS attacks, with the majority lasting under ten minutes but still causing significant disruptions. With attacks becoming more sophisticated, organizations need to prioritize DDoS detection, mitigation, and protection to prevent downtime and revenue loss.
Gcore Radar serves as a valuable resource for understanding the evolving threat landscape and equips businesses and individuals with insights to stay informed about cybersecurity developments. To access the full report, visit http://gcore.com/library/wp-security-gcore-radar-q1-2-2024.
Gcore is a leading global provider of edge AI, cloud, network, and security solutions, operating from Luxembourg with a strong presence worldwide. With a robust network infrastructure and a focus on performance and reliability, Gcore caters to global leaders across various industries. Learn more about Gcore at gcore.com.

