Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » Gcore Radar warns of new era of DDoS attacks
    Cyber Security

    Gcore Radar warns of new era of DDoS attacks

    techempireBy techempire3 Comments5 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportJanuary 23, 2024Hacker NewsInternet Security/Server Security

    DDoS attack

    Entering 2024, Gcore has released the latest Gcore Radar report, a biannual report in which the company releases internal analysis tracking DDoS attacks. Gcore’s extensive, globally distributed network of cleaning centers allows them to track attack trends at any time. Read on to learn about DDoS attack trends in Q3-Q4 2023 and what they mean for developing a strong protection strategy in 2024.

    Key findings from Gcore

    DDoS attack trends in the second half of 2023 reveal alarming developments in the scale and sophistication of cyber threats.

    Unprecedented attack power

    Peak DDoS (largest registered) attack volume has increased >100% annually over the past three years:

    • The peak capacity of DDoS attacks in 2021 is 300Gbps
    • In 2022, increase to 650 Gbps
    • Q1-Q2 2023 will increase to 800 Gbps again
    • Surge to 1600 Gbps (1.6 Tbps) in Q3-Q4 2023

    Notably, the jump to the second half of 2023 means the cybersecurity industry is measuring DDoS attacks in a new unit, the Terabit.

    The graph reflects the increase in maximum peak attack volumes from 2021 to 2023, at 300, 650 and 1600 Gbps respectively
    Maximum attack capability (Gbps) in 2021-2023

    This shows that the potential damage of DDoS attacks is significantly and continuously escalating, which is a trend of Gcore Expected to continue in 2024.

    attack duration

    Gcore’s attacks range in length from three minutes to nine hours, with an average of about one hour. Generally, short attacks are more difficult to detect because they cannot be subjected to proper traffic analysis due to data scarcity, and because they are more difficult to identify, they are also more difficult to mitigate. Longer attacks require more resources to combat and require robust mitigation responses; otherwise, there is a risk of the server being unavailable for an extended period of time.

    This chart shows the longest attacks (in bits and packets) seen by Gcore in the second half of 2023.
    Gcore’s longest recorded attack lasted nine hours

    Main attack types

    UDP floods continue to dominate, accounting for 62% of DDoS attacks. TCP floods and ICMP attacks also remain popular, accounting for 16% and 12% of the total, respectively.

    All other DDoS attack types, including SYN, SYN+ACK Flood, and RST Flood, combined accounted for only 10%. While some attackers may use these more sophisticated methods, most attackers still focus on delivering large numbers of packets to take down servers.

    DDoS attack type pie chart, of which UDP Flood accounts for 62%, TCP 16%, ICMP 12%, and other 10%
    Main attack types in the second half of 2023

    Changes in attack methods require multi-faceted defense strategies to defend against a range of DDoS technologies.

    Global attack source

    The global spread of attack sources demonstrates the borderless nature of cyber threats, allowing attackers to operate across national borders. Gcore discovered multiple attack sources in the second half of 2023, with the United States leading the way at 24%. Indonesia (17%), Netherlands (12%), Thailand (10%), Colombia (8%), Russia (8%), Ukraine (5%), Mexico (3%), Germany (2%) and Brazil ( 2%) ranks among the top ten, indicating that the world faces a wide range of threats.

    Main sources of attacks by country/region, with the United States ranking first at 24%
    Geographical attack source distribution

    The geographical distribution of DDoS attack sources provides important information for developing targeted defense strategies and developing international policies aimed at combating cybercrime. However, pinpointing the attacker’s location is challenging due to the use of techniques such as IP spoofing and the involvement of decentralized botnets. This makes it difficult to assess motivations and capabilities, which can vary from state-sponsored operations to individual hackers.

    Target industry

    The most attacked industries in the second half of 2023 highlight the impact of DDoS attacks on various industries:

    • The gaming industry remains the most affected industry, suffering 46% of attacks.
    • The financial sector, which includes banking and gambling services, ranks second with 22%.
    • Telecommunications (18%), infrastructure as a service (IaaS) providers (7%) and computer software companies (3%) have also become key targets.
    Pie chart of DDoS attack target industries from the third quarter to the fourth quarter of 2023, among which the gaming industry is the most severely affected, accounting for 46%.
    DDoS attacks on affected industries

    since Previous Gcore Radar reports, the attackers have not changed their focus: attackers are particularly interested in the gaming and financial sectors, possibly because of their economic benefits and user impact. This highlights the need for targeted cybersecurity strategies in the hardest-hit industries, such as countermeasures targeting specific gaming servers.

    analyze

    Data for the second half of 2023 highlights worrying trends in the DDoS attack landscape. The increase in attack capability to 1.6 Tbps is particularly alarming and signals a new level of threat that organizations must prepare for. In comparison, even a “humble” 300 Gbps attack can disable an unprotected server. Combined with the geographic distribution of attack sources, it is clear that the DDoS threat is a serious global problem that requires international cooperation and intelligence sharing to effectively mitigate potentially damaging attacks.

    The range of attack durations suggests attackers have become more strategic, tailoring their methods to specific targets and objectives:

    • In the field of gamingFor example, attacks that are relatively low in power and duration, but more frequent, can cause repeated damage to a specific server with the goal of disrupting the player experience and forcing them to switch to a competing server.
    • For the financial and telecommunications industries, Where the economic impact is more direct, attacks tend to be larger in number and vary widely in length.

    Ongoing attacks in the gaming, financial, telecommunications and IaaS industries reflect attackers’ strategic choices to select services where disruption would have a significant economic and operational impact.

    in conclusion

    Gcore Radar’s Q3-Q4 2023 report is a timely reminder of the changing nature of cyber threats. Organizations across sectors must invest in comprehensive and adaptable cybersecurity measures. Staying ahead of DDoS threats requires a keen understanding of cyber attackers’ ever-changing patterns and tactics.

    Gcore DDoS protection Has a record of repelling the most powerful and sustained attacks. Connect to Gcore DDoS Protection Protect your business from any impact of DDoS situations in 2024.

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.