<img alt="" src="https://secure.leadforensics.com/89462.png" style="display:none;">

DDoS Threat Report 2016 Q4

Emerging vulnerabilities are constantly being uncovered in both IoT devices already deployed and new ones coming to market, thus surely presaging a growing number of future botnet infections. Blended attacks consisting of DDoS and hacking activities were predominantly aimed at financial and government sectors.

  • 200+ Gbps-sized attacks became commonplace late in Q4.
  • The number of attacks in December increased by 152+%, while attacks in November climbed more than 50% over October.
  • In the financial sector, WAF alerts surged 2.86X from November to December.
  • 17,872,563 DNS attacks leveraging cpsc.gov has been recorded.
  • Mirai started the outbreak of IoT botnets; 426,770 IoT bots were observed since botnet monitoring commenced in October.
2016_Q4

 

 

A large spike in a network layer attack hit in late November. The massive attack of nearly 200Gbps was observed between 19:54h 16 November and 00:55h 17 November in 2016, before descending to an average level of 20Gbps.

You may be interested in

DDoS Threat Report 2020 Q2

A shift in attack tactics by perpetrators in Q2 2020, saw a 570% increase in bit-and-piece attacks compared to the same period last year. Attackers adopted a more elaborate practise of bit-and-piece attacks to launch various amplification and UDP-based attacks to f...

DDoS Threat Report 2020 Q1

In the first quarter of the year, DDoS attacks rose more than 278% compared to Q1 2019 and more than 542% compared to the last quarter. While working from home has become the new norm due to COVID-19 pandemic restrictions, heavy use and reliance of online services ...

DDoS Threat Report 2019 Q4

An unprecedented concentration of DDoS attacks on US networks was observed, with more than 1,000 victims identified in various states. Whether motivated by politics, profiteering, crime or other malicious purposes, attacks were frequent and impactful. What’s more, ...

DDoS Threat Report 2019 Q3

DNSSEC (Domain Name System Security Extensions) remain the main driver of growth of DNS amplification attacks in the quarter, yet our analysts have detected a sharp and concerning rise in TCP SYN Flood attacks. TCP SYN Flood is not a new method, but findings indicate that techniques have grown in...

DDoS Threat Report 2019 Q2

DNS amplification attacks swelled in Q2 2019, with the amplified attacks spiking more than 1,000% compared with Q2 2018. Nexusguard researchers attributed Domain Name System Security Extensions (DNSSEC) with fueling the new wave of DNS amplification attacks, which accounted for more than 65% of t...