<img alt="" src="https://secure.leadforensics.com/89462.png" style="display:none;">

DDoS Threat Report 2019 Q4

An unprecedented concentration of DDoS attacks on US networks was observed, with more than 1,000 victims identified in various states. Whether motivated by politics, profiteering, crime or other malicious purposes, attacks were frequent and impactful. What’s more, with the COVID-19 pandemic elevating the importance of essential network services such as banking, online shopping, and virtual meetings, the impact of DDoS attacks is bound to become only more severe.

  • DNS Amplification was the most common type of attack throughout 2019. In Q4 alone, DNS was the most frequently exploited vector, with amplification attacks soaring nearly 3,000% YOY.
  • ASN-level networks in the US, UK, and China were hit the hardest, with the US being hit by more than 42M attacks. Reflection attacks that exploit open DNS resolvers were the most frequent, while stealthy “Bit-and-Piece” attacks remained a threat and continued to cause outages.
  •  A growing pool of insecure IoT devices suggests that IoT botnets will continue to thrive. At the same time, protecting public and open recursive DNS resolvers from abuses that amplify attack traffic is becoming an impossible mission, while easy access to DDoS-for-hire services allows relative novices to launch massive attacks very cost effectively.

You may be interested in

DDoS Threat Report 2020 Q3

The increase in online gaming attracted attention from attackers, resulting in nearly 77% of cyber attacks targeting online gaming and gambling industries in Q3 2020. More than a third of these entertainment attacks focused on online gaming targets. Nexusguard anal...

DDoS Threat Report 2020 Q2

A shift in attack tactics by perpetrators in Q2 2020, saw a 570% increase in bit-and-piece attacks compared to the same period last year. Attackers adopted a more elaborate practise of bit-and-piece attacks to launch various amplification and UDP-based attacks to f...

DDoS Threat Report 2020 Q1

In the first quarter of the year, DDoS attacks rose more than 278% compared to Q1 2019 and more than 542% compared to the last quarter. While working from home has become the new norm due to COVID-19 pandemic restrictions, heavy use and reliance of online services ...

DDoS Threat Report 2019 Q3

DNSSEC (Domain Name System Security Extensions) remain the main driver of growth of DNS amplification attacks in the quarter, yet our analysts have detected a sharp and concerning rise in TCP SYN Flood attacks. TCP SYN Flood is not a new method, but findings indicate that techniques have grown in...