On-Prem

Networks

Who is DDoSing you? Rivals, probably, or cheesed-off users

Plus: 'Largest-ever' duff traffic tsunami clocks in at 5.6 Tbps


In addition to Chinese spies invading organizations' networks and ransomware crews locking up sensitive files, botnets blasting distributed denial of service (DDoS) attacks can still cause a world of hurt — and website downtime — and it's quite likely your competitors are to blame.

Cloudflare, in its most recent quarterly DDoS trends report, claims to have blocked 21.3 million of these junk-traffic assaults in 2024, a 53 percent jump compared to the year before. It also says it thwarted the largest-ever DDoS attack, clocking in at 5.6 terabits per second, but more on that in a minute.

What's more interesting is who is launching these attacks.

Most of the CDN giant's customers who were DDoSed last year told Cloudflare they didn't know who attacked them. The ones that did know, however, claimed their competitors were the top culprits (40 percent) responsible.

After competitors, state-sponsored crews were reportedly behind 17 percent of attacks, with a similar percentage coming from "a disgruntled user or customer."

Finally: 14 percent claimed an extortionist was responsible for a DDoS incident, seven percent admitted it was self-inflicted, and two percent each blamed hacktivists and former employees.

But now, back to the largest-ever DDoS attack, according to Cloudflare.

Record makin' and record breakin'

This one, which happened close to Halloween, was a Mirai-variant botnet built from more than 13,000 IoT devices, the CDN titan claimed. It lasted only 80 seconds and spewed 5.6 terabits of junk traffic per second, according to Cloudflare.

The DNS provider said it thwarted the attack against an unnamed internet service provider in Eastern Asia on October 29. And despite the deluge of packets spamming the unnamed ISP, Cloudflare bragged the UDP-based DDoS assault didn't affect the customer at all. 

Stopping the traffic tsunami required zero human intervention (it was apparently detected and blocked autonomously) and didn't cause any performance degradation or affect any of the ISP's systems, we're told.

This broke the previous public record for largest-ever DDoS incident: A 3.8 Tbps attack, which Cloudflare also boasted about auto-detecting and mitigating.

It also reflects trends in DDoS attacks, which Cloudflare has been documenting quarterly since 2020, and the short version is: They are getting bigger and badder.

In 2024, Cloudflare blocked about 21.3 million DDoS attacks, a 53 percent jump compared to 2023, the biz reported in its most recent DDoS trends report.

In the fourth quarter alone, Cloudflare said it beat back 6.9 million of these, which translates to a 16 percent increase compared to Q3 of 2024 and an 83 percent year-over-year increase. Plus, more than 420 of these in Q4 were hyper-volumetric, meaning they exceeded 1 billion packets per second and 1 Tbps. In fact, the number of attacks that topped 1 Tbps increased 1,885 percent quarter-over-quarter, or so Cloudflare says.

Also with the Q4 attacks: 49 percent (3.4 million) were OSI layer 3 and 4 DDoS attacks, and 51 percent (3.5 million) were HTTP-level DDoS attacks. 

The majority of these HTTP attacks were launched by known botnets.

Ransom attacks surge

Another trend Cloudflare noted in its quarterly report: DDoS attacks are becoming shorter, meaning it's difficult — or impossible — for humans to manually respond to an alert, analyze the traffic, and block the network flood by hand.

This, of course, is rather self-serving as Cloudflare provides autonomous DDoS mitigation. But still, it's interesting to note that 72 percent of HTTP-based attacks end in under ten minutes. For the record: 22 percent last over an hour and 11 percent more than 24 hours. Again all according to Cloudflare.

Another interesting tidbit from the report: Cloudflare documented a spike in DDoS attacks in Q4 that required a ransom to end, with 12 percent of customers targeted by traffic-flooding attacks also reporting that these were accompanied by an extortion demand for a ransom payment.

This is a 78 percent spike compared to Q3, and a 25 percent increase year over year. ®

Send us news
7 Comments

Crimelords and spies for rogue states are working together, says Google

Only lawmakers can stop them. Plus: software needs to be more secure, but what's in it for us?

Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators

Crew helped lowlifes generate X-rated celeb deepfakes using Redmond's OpenAI-powered cloud – claim

Feds: Army soldier suspected of AT&T heist Googled ‘can hacking be treason,’ ‘defecting to Russia’

FYI: What NOT to search after committing a crime

With millions upon millions of victims, scale of unstoppable info-stealer malware laid bare

244M purloined passwords added to Have I Been Pwned thanks to govt tip-off

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Xi know what you did last summer: China was all up in Republicans' email, says book

Of course, Microsoft is in the mix, isn't it

China's Silver Fox spoofs medical imaging apps to hijack patients' computers

Sly like a PRC cyberattack

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

Southern Water takes the fifth over alleged $750K Black Basta ransom offer

Leaked chats and spilled secrets as AI helps decode circa 200K private talks

Thailand ready to welcome 7,000 trafficked scam call center victims back from Myanmar

It comes amid a major crackdown on the abusive industry that started during COVID

US minerals company says crooks broke into email and helped themselves to $500K

A painful loss for young company that's yet to generate revenue

Two arrested after pensioner scammed out of six-figure crypto nest egg

The latest in a long line of fraud stings worth billions each year