zeroBS continuously collects informations and status reports on the subject of infrastructure and application security vs DDoS-Threats. In this article we provide an condensed overview of trends and developments.
additionally we track DDoS-ThreatLevels in different flavors:
2023
Summary
- hacktivsm continues and grows, with groups and targets are found worldwide
- a strong shift towards layer-7/stack/protocol-attacks are seen across many vendors, while the numbers of volumetric attacks decrease
- browserbots are very common among booterservices and botnet-to-rent
- sophistication continues to advance amongst threat-actors, whilst they develop TTPS to evade mititgation-systems
- the more professional actors also targeting APIs
- the trend towards serverbased-botnets, as seen since 2021, continues, with the strongest attacks attributed to them
- IoT-botnets raise in size globally from total of 200.000 to 1.000.000 infected devices
- simple UDP reflection/amplification is declining, complex and multivector - attacks are taking the lead
- botnet-providers find telegram as a good sales-channel
- trend of attackers harnessing larger botnets
References, Reports and selected Readings
- Qrator Q2 2023 DDoS attacks statistics and overview https://blog.qrator.net/en/q2-2023-ddos-attacks-statistics-and-overview_177/
- Imperva DDoS Landscape report 2023 https://www.imperva.com/resources/reports/the-imperva-global-ddos-threat-landscape-report-2023.pdf
- Cloudflare DDoS threat report for 2023 Q1 https://blog.cloudflare.com/ddos-threat-report-2023-q1/
- Cloudflare DDoS threat report for 2023 Q2 https://blog.cloudflare.com/ddos-threat-report-2023-q2/
- F5 2023 DDoS Attack Trends https://www.f5.com/labs/articles/threat-intelligence/2023-ddos-attack-trends
- Netscout Threat Report 2023 https://www.netscout.com/threatreport/wp-content/uploads/2023/04/Threat-Report-2H2022.pdf
- Cloudflare DDoS-Radar: Analytics and insights https://radar.cloudflare.com/security-and-attacks?dateRange=28d
- Booter-Service development and Capabilities https://blog.kybervandals.com/booter-service-development-and-capabilities/
- Hacktivism Unveiled, April 2023 Insights Into the Footprints of Hacktivists https://www.radware.com/security/threat-advisories-and-attack-reports/hacktivism-unveiled-april-2023/
- Nokia ThreatIntel-Report on DDoS and Botnets: https://pf.content.nokia.com/t00902-trust-threat-intelligence-report/report-nokia-threat-intelligence-report-202
- Interview with Anonymous Sudan https://intelcocktail.com/anonymous-sudan-interview/
- How the FBI goes after DDoS cyberattackers https://techcrunch.com/2023/08/12/fbi-ddos-for-hire-cyberattackers/
physical DDOS // Cheap Radio Hack Disrupted Poland's Railway System
- https://twitter.com/lukOlejnik/status/1695439622426202443
- https://www.wired.com/story/poland-train-radio-stop-attack/
Avg Botnet-Size
- IoT: up to 5.000 (Nokia)
- Server: 1000 - 5000 (Nokia)
- Max: 135.000 (Qrator)
TA DDoS
- NoName057 | analysis
- XAKNet (HackNet)
- Cyber Army of Russia
- Deadnet
- KillNet / UserSec
- Anonymous Sudan | interview
2022
due to the mass of events and new actors, we stopped recording the known attacks
Summary
-
general trend: frequency goes down, quality goes up
-
OSINT is the big newcomer in 2022, giving attackers the ability to find and attack weak spots in targets networks/application (hello kitty KillNet/Noname et al
-
once-sophisticated Attacks hit the Mainstream (TCP-DirectPath, Carpetbombing, DNS-DDoS): Neustar & Netscout are seeing CarpetBombing arriving in the mainstream, where in Q3/Q4 50% of attacks against networks are leveraging CarpetBombing-Attacks (Neustar, Netscout)
-
Server-based Botnets are back again and have a stable 5-10k - size
-
TCP DirectPath has been seen as a dominant and most successful attackvector in more-than-average-attacks
-
DDoS - Threat actors custom-tailor each attack ("surgical methods", Lumen) to bypass multiple layers of DDoS mitigation and protection, both cloud-based and on premises.
-
HitAnd Run-Attacks (Short-term, Testing defense only)
-
DDoS as third ransom-vector by Ransomware-Gangs
-
strong hacktivism-activities due to geopolitical events (Ukraine-War, Iran uprising etc) fuel the DDoS-Threat-Landscape
References & Reports
- Cloudflare DDoS attack trends for 2022 Q4
- Cloudflare DDoS attack trends for 2022 Q3
- Cloudflare Radar DDoS attack trends for 2022 Q2
- Cloudflare Radar DDoS attack trends for 2022 Q1
- NETSCOUT THREAT INTELLIGENCE REPORT
- Akamai: Cyberterrorists Target Record Number of Victims with DDoS Attacks in Q2
- Lumen Quarterly DDoS Report Q2 2022
- Cloudflare blocks 15M rps HTTPS DDoS attack
- Akamai: The Relentless Evolution of DDoS Attacks
- How Google Cloud blocked largest Layer 7 DDoS attack yet, 46 million rps | Google Cloud Blog
TA DDoS
- NoName057
- XAKNet (HackNet)
- Cyber Army of Russia
- Deadnet
- KillNet
2021
TL;DR: attackers get more advanced, but experienced protectors know how to cope with the attacks
- a more detailed timeline of current events are tracked in our DDoS-Incidents Logbook 2021
- a german version as PDF-Download is available as well (TLP:GREEN)
current Trends and what we expect in the near future:
The DDoS-Threat-Situation has not really improved in recent years, and DDoS-based extortion still seems lucrative enough. Furthermore, we see a Renaissance of DDoS-Attacks in 2021 for many actors, either extortion, hacktivism or your average "sportsman".
since 2020, a DDoS ransomware gang with changing names has been very active (tracked by us here ), attacking unprotected companies with highly targeted attacks. Trademark of this gang:
- customized and targeted attacks after reconnaissance with high penetrating power.
- APT-mocking with constantly new names (Fancy Bear, Armada Collective, Lazarus Group, or REvil lately)
- attacks on multiple targets of one industry (so far: banks, travel, ISP, telcos, VOIP providers, gaming industry, email providers)
- global scale attacks
- DDoS campaigns in 2021 have become more targeted, multi-vector and persistent (Neustar, Netscout)
- Ransom DDoS (RDDoS) campaigns got a substantial boost (ENISA, Cloudflare, Netscout)
- cybercrime-as-a-service (aka: Booter/Stresser-services) works as an amplifier of web-based and volumetric DDoS attacks
technical trends
- TCP-based attack vectors are coming into focus due to
new researchpapers (link to paper directly ), which suggest a huge potential in TCP volumetric attacks - TCP-Amplification and Reflection will become a major threat in the coming years, especially with amplification-rates > 1000. we expect advanced adversaries using this vector more and more successfully, and already have seen well done TCP-attacks
- DDoS is moving towards mobile networks and IoT (ENISA), supporting localised DDoS where an attacker interferes with the connectivity of a specific area threating services like onlinebanking and any service with a large customerbase using mobile devices/connection
- Recon, target-analysis and mitigation-monitoring is quite common with Ransom DDoS and advanced attackers (multiple sources and DFIR)
- Botnet-Size of 50.000 Bots and more is the new norm for IoT-Botnets
- 1TB/s volumetric attacks defines the new upper level and has been seen by many providers (Netscout, Cloudlfare, Google, Neustar)
- streetprices for DDoS-Attacks kept stable in the last 2 years
- DTLS and GRE are emerging vectors
- 60% of all DDoS-Attacks are application-based and non-volumetric
Reports and Analysis
disclaimer: we refer to reports and analysis with benefit for technical personel/blueteams
- The current ENISA-REPORT covers DDoS in detail in section 8. THREATS AGAINST AVAILABILITY AND INTEGRITY. Organizations in Europe should be aware that "... the threat potential of DDoS attacks is higher than its current impact in the EU ...", which may well lead to an increase in attacks in the EU area.
- NETSCOUTs 2021 Threat Intelligence Report provides a very detailed development, analysis and overview of the DDoS threat situation in 2021, compared to previous years. One of the keyfindings (besides whatr has been covered above): TB-attacks starts to become "the norm"
- Cloudflares report on a 17.2Mio RPS DDoS attack offers an interesting insight into a large Mirai-Botnet.
- DDoS Attack Trends for Q3 2021 by Cloudflare gives an excellent overview about the global activities and trends.
- Google: Exponential growth in DDoS attack volumes from 2020 ist a very interesting read about large-scale DDoS-Attacks, trends and attacker-capabilities
2018
Intro
zeroBS sammelt die wichtigsten Informationen und Status-Reports (Akamai, Neustar, Verisign, Qihoo 360) zum Thema Infrastruktursicherheit / Lage auf dem DDoS-Sektor, und gibt in diesem Artikel eine Übersicht über die wichtigsten Aussagen, Trends und Inhalte.
https://ddosmon.net/insight/
https://blogs.akamai.com/2018/06/summer-soti---ddos-by-the-numbers.html
https://securityledger.com/2018/06/akamai-report-finds-ddos-attacks-more-sophisticated-adaptive/
https://www.corero.com/blog/890-the-current-state-of-ddos-attacks-are-they-getting-smarter.html
https://www.verisign.com/en_GB/security-services/ddos-protection/ddos-report/index.xhtml
https://www.security.neustar/blog/Neustar-DDoS-and-Cyber-Security-Report-Wins-InfoSec-Award-for-Research-Report
visibility / tools
https://blog.radware.com/security/2016/03/how-to-prepare-for-a-ddos-attack/
Member discussion: