The Nexusguard DDoS Statistical Report for 2023 reveals a shift in cyber threats, with politically motivated attacks driven by hacktivism, despite a decline in total attack count, while highlighting correlations between global events and the rise of DDoS incidents.
In the first half of 2022, the total attack count and average attack size increased by 75.60% and decreased by 55.97% respectively compared to the figures recorded in the second half of 2021.
2021 Q3 saw a notable trend in which attackers launched DDoS attacks at single targets within a CSP, attributing an attack size increase of 544% QoQ and 232% YoY.
The increase in online gaming attracted attention from attackers, resulting in nearly 77% of cyber attacks targeting online gaming and gambling industries in Q3 2020, according to the Nexusguard Q3 2020 Threat Report.
The increase in online gaming attracted attention from attackers, resulting in nearly 77% of cyber attacks targeting online gaming and gambling industries in Q3 2020, according to the Nexusguard Q3 2020 Threat Report.
Nexusguard research reveals 570% increase in Bit-and-Piece DDoS attacks. Traditional threshold-based attack detection is no longer reliable with new bit-and-piece changes.
DDoS Attacks Increase 542% Year-over-Year, according to Nexusguard’s Q1 2020 Threat Report. DDoS traffic capitalizes on work-from-home connectivity reliance to disrupt service provider targets.
Whether motivated by politics, profiteering, crime or other malicious purposes, attacks were frequent and impactful. With the COVID-19 pandemic elevating the importance of essential network services, the impact of DDoS attacks is bound to become only more severe.
DNSSEC remain the main driver of growth of DNS amplification attacks in the quarter, yet our analysts have detected a sharp and concerning rise in TCP SYN Flood attacks.
The DNS amplification types of DDoS attacks continued to be a favorite of DDoS-for-hire websites, soaring more than 40 times their volume compared to last quarter.
More than 90 percent of DDoS attacks rated smaller than one Gbps in size. “Bit-and-piece” attacks continued from last quarter into Q4, employed in many campaigns regardless of the vector utilized.
The quarterly report, which measures thousands of DDoS attacks around the world, showed Communications Service Providers (CSPs) were targeted by 65.5 percent of DDoS attacks in Q3, given their extensive networks enabling access to tenants’ assets.
In the quarter we saw an increase in both the average and maximum size of attacks over Q4 2017, and our insecure cyberworld became a target-rich battlefield: The 2018 FIFA World Cup came under attack, while cryptocurrency-related businesses continued to be targeted.
Two waves of amplification attacks have come to the forefront recently: The first wave consisted of DNSSEC Amplification attacks observed in our Q4 2017 Threat Report, while the second one appeared this quarter in the form of Memcached attacks.
The quarterly report, which measured thousands of attacks from around the world, attributes the skyrocketing attacks to servers enabled with Domain Name System Security Extensions (DNSSEC), a significant new risk if not properly configured.
In Q1 2016 new reflection services have been discovered, companies have increasingly become targets, and unexpectedly, the Number One target for DDoS attacks was DDoS researchers themselves
Gain insights into the multifaceted impact of DNS attacks on higher education institutions, covering financial implications, operational considerations, and proactive defense strategies.
Bitminter was among the first bitcoin mining pools to appear on the world stage. To maintain its position called for network stability and dependable uptime — and that’s exactly what Nexusguard delivered.