HomeCII/OTGcore Radar Report Reveals 46% Spike in Number of DDoS Attacks in...

Gcore Radar Report Reveals 46% Spike in Number of DDoS Attacks in First Half of 2024

Published on

spot_img

Luxembourg, Aug. 14, 2024 – Gcore, a global edge AI, cloud, network, and security solutions provider, released the results of its Q1-Q2 2024 Gcore Radar report, focusing on DDoS attack trends. The report highlighted a significant 46% increase in the number of DDoS attacks compared to the same period in 2023, with peak attack power now measured in terabits per second, a substantial rise from the gigabits per second levels seen a year ago. This shift towards terabits per second was noted in the second half of the previous year.

The key highlights from the Q1-Q2 2024 report include the total number of attacks during this period, amounting to 830,000, representing a 46% increase from the previous year. Additionally, peak attack power rose from 1.6 Tbps to 1.7 Tbps, indicating a concerning trend in the potency of these attacks. UDP floods made up a majority of the DDoS attacks at 61%, followed by TCP floods at 18% and SYN floods at 11%. The most targeted business sectors were gaming (49%), technology (15%), financial services (12%), and telecommunications (10%). Interestingly, e-commerce (7%) and media and entertainment (5%) industries saw an increase in attacks, moving out of the ‘Other’ category.

Gcore’s Head of Security, Andrey Slastenov, expressed concern over the slight increase in attack power, emphasizing the potential impact even a small hike in potency can have on organizations. He stressed the importance of understanding why industries are being targeted and the need for robust protection measures to mitigate these threats effectively.

The technology sector emerged as one of the most attacked industries in the report, with a significant rise in the number of attacks, doubling to 15% from the previous period. Attackers are increasingly targeting businesses hosting critical infrastructure, disrupting services and operations. As per the report, gaming remained the most attacked industry, followed by technology and telecommunications.

In terms of attack origins, the US led in network-layer attacks, followed by Germany, Netherlands, and Singapore. The application-layer attacks showed similar origins as well. UDP floods were the predominant attack vector, constituting 61% of DDoS attacks, with TCP and SYN floods following at 18% and 11%, respectively. HTTP flood remained the most popular attack method at the L7 layer.

The report also highlighted the short yet potent nature of DDoS attacks, with the majority lasting under ten minutes but still causing significant disruptions. With attacks becoming more sophisticated, organizations need to prioritize DDoS detection, mitigation, and protection to prevent downtime and revenue loss.

Gcore Radar serves as a valuable resource for understanding the evolving threat landscape and equips businesses and individuals with insights to stay informed about cybersecurity developments. To access the full report, visit http://gcore.com/library/wp-security-gcore-radar-q1-2-2024.

Gcore is a leading global provider of edge AI, cloud, network, and security solutions, operating from Luxembourg with a strong presence worldwide. With a robust network infrastructure and a focus on performance and reliability, Gcore caters to global leaders across various industries. Learn more about Gcore at gcore.com.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...