Attack Round-ups

Next
Previous

2025
DDoS Trends Report

Predictions Based on MazeBolt Research into DDoS Attacks

DOWNLOAD THE PDF

Executive Summary

Why does the risk of Distributed Denial-of-Service (DDoS) attacks continue to rise?

 

DDoS attacks surged almost a third (30%) in the first half of 2024 compared to the same period in the previous year. Moreover, DDoS attacks on critical infrastructure increased by 55% in the last four years.

 

Hacktivist groups motivated by political and ideological agendas are driving the current growth in DDoS attacks. Moreover, today’s DDoS attacks may utilize advanced botnets to implement sophisticated attack methods that ensure that they are harder to detect and neutralize.

 

As the DDoS risk increases, awareness of why DDoS attacks persist is a key challenge. Security leaders need to promote an understanding that the main reason DDoS attacks still succeed is due to the existence of unidentified DDoS vulnerabilities. Therefore, the only way to mitigate the risk of attack is through a process of continuous testing, vulnerability identification, timely remediation, and validation.

 

continuous ddos vulnerability testing is the only way to properly prevent ddos attacks.

 

This type of ongoing, proactive approach is crucial to maintaining DDoS resilience and supporting the business continuity of online services.

 

This report provides insight into MazeBolt’s DDoS predictions for 2025, based on our own research and reports in the media during 2024.

DDoS Attack Trends for 2025

Based on MazeBolt’s internal and market research, we can expect to see the following DDoS attack trends continuing throughout 2025:

Threat to Democratic Elections

Politically motivated hackers can be expected to continue targeting countries undergoing election cycles. The attacks are likely to be both in the months leading up to elections as well as after the polls have opened. These types of attacks may be successful in causing downtime of electoral websites and infrastructure, and they can undermine the public confidence in election results.

Greater Enforcement of Compliance Requirements

Companies will continue to invest in adapting their cybersecurity processes to meet the more stringent regulations that came into effect recently, avoid stiff fines.

In-Depth Reporting

Companies will need to provide in-depth, timely DDoS resilience and attack reports, to meet the regulations, and this will create a greater need for the ongoing visibility and 

Companies will need to provide in-depth, timely DDoS resilience and attack reports, to meet the regulations, and this will create a greater need for the ongoing visibility and attack prevention capabilities provided by continuous DDoS vulnerability testing.

attack prevention capabilities provided by continuous DDoS vulnerability testing.

Industries at Greater Risk

Companies in the industries of banking and financial services, insurance, healthcare, and transportation are expected to continue being targeted more than other industries throughout 2025.

DDoS-for-Hire Services

DDoS-for-Hire gives less technically proficient threat actors an easy way into the hacking industry, by making it easier to launch DDoS attacks. The increase in DDoS-for-Hire tools is particularly notable in Asia and is connected to the rising risk of DDoS attacks across multiple sectors. DDoS-for-Hire gives users the ability to carry out an unwarranted performance, on a network.


the cost of ddos attacks on businesses is so devastating that it's essential to have ongoing ddos testing and validation

2024 DDoS Attack Analysis

A closer look at recently reported DDoS attacks shows that new DDoS attack techniques and emerging vulnerabilities are creating significant challenges for organizations that are trying to protect their digital services. Here are the most significant attack trends that emerged based on the data from recent DDoS attacks.

The Threat to Democratic Elections

2024 was a landmark year in electoral politics, with 50 countries plus the European Union – representing a total of over 2 billion voters – holding elections. Politically motivated DDoS attacks took place in countries in the months leading up to elections as well as after the polls opened.

In some cases, the DDoS attacks were successful in disrupting critical election infrastructure, causing downtime, and undermining the confidence of the public in the reliability of election results. DDoS attacks peaked around critical dates, indicating a coordinated effort to disrupt electoral processes.

Funding for the work of the threat actors, including both criminal groups and hacktivists, allegedly was provided by nation-states.

Examples of DDoS attacks during election cycles include:

US

What is a DDoS Attack? Elon Musk Claims Cyberattack Delayed Trump Interview

France

First Round of French Election: Party Attacks and a Modest Traffic Dip

Venezuela

Venezuela’s Election as seen in Cyberspace


ddos attacks are still a big problem during election times. Constant ddos simulations testing and validation is necessary to be protected against these politically charged ddos attacks

More Stringent Compliance Regulations

With the DORA and NIS2 Directive regulations in the EU, and new SEC regulations in the US, 2024 has seen a significant shift in the stringency of DDoS testing. One of the key aspects of the regulations involves more in-depth, transparent, and timely reporting requirements – and continuous DDoS testing is essential to complying with these requirements.

Table of the different regulatory frameworks that will impact the need for more ddos testing and business continuity

Enterprises doing business in Europe and the US must enhance their cybersecurity processes to meet the new regulations and avoid hefty fines. The DORA regulations, for example, are based on the following five pillars:


the five pillars of dora regulation including resilience testing and third-party risk which encompass continuous ddos testing and validation

High-Profile Arrests of Perpetrators of DDoS Attacks

Law enforcement officials are also making the headlines – with a number of instnaces in which the authorities have taken steps to detain groups responsible for high-profile DDoS attacks. In some cases, the arrest led to a new rash of DDoS attacks in response. For example, after the arrest of Telegram’s CEO Pavel Durov, several hacking groups launched a #FreeDurov DDoS campaign against online services in France. Here are some of the stories covered in the media:

US

Two Sudanese Nationals Indicted for Alleged Role in Anonymous Sudan Cyberattacks on Hospitals, Government Facilities, andother Critical Infrastructure in Los Angeles and Around the world

France

Telegram’s CEO & Founder Durov Under Arrest: Cybercriminals React

DDoS attacks in the UK
UK

17-Year-Old Linked to Scattered Spider Cybercrime Syndicate Arrested in UK

ddos attacks in spain
Spain

Spanish Police Arrest Three Suspects Linked to Pro-Moscow NoName057(16) Hackers

ddos attacks in japan
Japan

International Investigation of DDoS Leads to Oita Man’s Arrest

ddos attacks in cambodia
Cambodia

Anti-government Hackers Arrested After Attacks on Cambodian Official Websites


different ddos attacks occurring around the world in 2024 despite having existing ddos protections since they don't do ongoing ddos testing

A Shift in DDoS Public Awareness?

DDoS attacks on big name brands such as Disney+ in France, KFC in Italy, and Starbucks in the US were discussed in online forums and on social media. While these attacks were not confirmed publicly as DDoS attacks, the headlines associating them with DDoS are indicative of an increase in public awareness of DDoS dangers.

There is a shift in ddos public awareness due to big brands being attacked.
Alleged DDoS Attacks on Disney+ in France, Kentucky Fried Chicken in Italy, and Starbuck in the US

Top DDoS Targets: Breakdown by Industry

The following industries were the worst hit by DDoS attacks:

how the finance sector gets hit by damaging ddos attacks

Finance

Disrupted online services and availability,
causing financial
and reputational damages

healthcare companies being targeted by ddos attacks

Healthcare

Targeted the patient management systems and telemedicine platforms used by healthcare providers

ddos attacks on government

Government

Often coincided with political events; aimed to erode public trust and disrupt administrative functions

ddos attacks on transportation systems like airlines or railway systems

Transportation

Disrupt airlines and railway booking systems; exposed or blocked access to sensitive data; and impacted supply chains

While many organizations try to hide cyber breaches, the information that did become public made it clear that the most frequently attacked organizations provide financial services.

These include banks, payment processors, and other financial organizations. After financial services, the industries most targeted include healthcare, government organizations, and transportation.

The Most Prevalent Types of DDoS Attacks

The impact of a DDoS attack depends on several factors, including the scale of an attack, the nature of the attack, and the ability of the target system to handle the attack. While the frequency of DDoS attacks continues to rise, the attacks are also evolving in complexity and scale. For example, sophisticated DDoS attack methods are being implemented by advanced botnets such as the botnet malware family Gorilla.

In recent months, a marked increase has been seen specifically in the following types of DDoS attacks:

types of ddos attacks that have increase over that last few months

A Growing Threat: DDoS-for-Hire Services

Typically, DDoS attacks were carried out by highly skilled hackers with access to large networks of compromised devices, often referred to as botnets. With the rise of the commercialization of cybercrime, a new and concerning trend has emerged: DDoS as a Service (DDoSaaS). This trend significantly lowers the barrier to entry for launching powerful DDoS attacks. It is a model that allows individuals with limited technical skills to utilize botnet infrastructure and launch attacks against targets of their choice.

Greater Accessibility

DDoSaaS platforms are available on the dark web – as well as through “legitimate” channels on the open internet, where they are marketed as “stress testing” services. (By masquerading as legitimate services, they can be sold on the open internet). “Legitimate” channels include Telegram Channels, DDoS-for-Hire Forums and API-based DDoS Platforms.

These services provide simple, web-based dashboards and interfaces, allowing users to easily configure and launch attacks without requiring in-depth technical knowledge.

Users can usually select from various DDoS attack types, including volumetric floods, protocol attacks, and application layer attacks.

Greater Affordability

Services are typically offered through tiered subscription plans, with prices ranging from as low as $10 (on sale!) to $500 per month. Pricing often depends on factors like attack duration, volume, frequency, and the number of concurrent targets.

Most platforms accept easy-to-use payment methods such as cryptocurrency payments – particularly Bitcoin, for anonymity. Some services even accept PayPal and other payment methods.


Example prices for DDoS Attacks. DDoS attacks are quite affordable and only continuous ddos testing can prevent these attacks causing damage
Example of Advertised Prices and Capacities of a DDoS-for-Hire Service

More Effective

DDoSaaS providers maintain networks of compromised devices (frequently called botnets) to carry out attacks. These botnets can sometimes generate very high traffic volumes.

Many of these services utilize reflection and amplification methods to increase attack power and effectiveness.

Most platforms offer features to hide users’ identities, like not tracking IP addresses and encouraging VPN/Tor network usage.

Providers Operate Like Legitimate Businesses

Many DDoSaaS providers offer customer support, tiered service packages, and performance guarantees. Some even offer Service Level Agreements (SLAs) and refunds if an attack doesn’t achieve the desired outcome.

Beyond DDoS, some platforms offer other malicious tools like IP trackers or credential stuffing services.

DDoSaaS is Contributing to a Notable Surge in DDoS Attacks

The proliferation of DDoSaaS has democratized cyberattacks, making them accessible to anyone with malicious intent and a modest budget. As a result, organizations must be more vigilant than ever, adopting proactive cybersecurity measures. Businesses can reduce the risk of downtime, protect their reputation, and ensure the continuity of their operations by:

  •  Understanding the mechanics of DDoSaaS  
  • Implementing robust defenses
  •  Continuously testing for DDoS vulnerabilities

DDoSaaS is not just a passing fad. It’s a growing business that has solidified its place in the cybercrime ecosystem. The best defense is to be proactive, continuously test for vulnerabilities, and adapt to the changing threat landscape.


state of ddos as a service means that continuous ddos testing is critical to maintaining business continuity

Drill-Down: Top Attacks

The tables below provide insight into DDoS attacks published in the media during the third quarter of 2024. See also MazeBolt’s attack reports for Q1 and Q2.

July

DDos attacks that happened in july 2024 and that could have been prevented with ddos testing

August

DDos attacks that happened in august 2024 and that could have been prevented with ddos testing

September

DDos attacks that happened in september 2024 and that could have been prevented with ddos testing

Key Takeaways

Even with the best DDoS protections in place, the MazeBolt research team has found out, on average, 37% of an organization’s DDoS attack surface still remains vulnerable to DDoS attacks. This is because, over time, changes in IT systems and online services lead to security policy drift that results in DDoS vulnerabilities and misconfigurations, which leave organizations unprotected.

Shifts in the DDoS attack landscape that were particularly noteworthy this year included:

  • The growing number of attacks disrupting elections
  • New and more stringent compliance regulations that went into effect (NIS2, DORA)
  • Greater public awareness of DDoS – in response to both the headlines around high-profile arrests of perpetrators of DDoS attacks, and several alleged DDoS attacks on big name brands
  • Increased adoption of the business model known as DDoS-for-Hire services

 Protecting organizations from damaging DDoS attacks – and thereby strengthening the business continuity of online services – requires: 

Continuous
DDoS Testing

Sharpening of Operational Resilience

Transparency
and Reporting

Regulatory
Compliance

About MazeBolt

MazeBolt RADAR™ is a patented DDoS Vulnerability Management solution. Using thousands of non-disruptive DDoS simulations and without affecting online services, it can identify and enable the remediation of vulnerabilities in deployed DDoS defenses. RADAR™ enables organizations and governments to maintain the uninterrupted business continuity of online services. Using RADAR’s patented vulnerability simulation technology, enterprises have unparalleled visibility into their DDoS protection solutions so they can be confident that damaging DDoS attacks can be prevented – before they happen.

Read more at: https://www.mazebolt.com

Download
Attack Round-ups, Reports

Report

Access Full Guide

Latest DDoS Attacks

Enterprises & government agencies continued to be targeted with DDoS attacks in Q1 2024. This report analyses & maps the most serious DDoS attacks reported in the media.

What you will learn

  • Explanation of the major incidents
  • Industries and companies effected
  • Links to learn more
Download
Attack Round-ups

Report

Access Full Guide

Latest DDoS Attacks

Enterprises & government agencies continued to be targeted with sophisticated DDoS attacks in the last months of 2023. Read our latest attack report.

This report analyses & maps the most serious DDoS attacks in Q4 2023 – organized by location, industry, estimated damage, and threat actor affiliation.

What you will learn

 

  • Explanation of the biggest incidents
  • Links to the major attacks
  • Estimated incident downtime and cost
Download
Attack Round-ups

Check out MazeBolt’s DDoS Attack Round-Up for December 2023.

Download
Attack Round-ups

Check out MazeBolt’s DDoS Attack Round-Up for November 2023.

Download
Attack Round-ups

Check out MazeBolt’s DDoS Attack Round-Up for October 2023.

Download
Attack Round-ups

Check out MazeBolt’s DDoS Attack Round-Up for September 2023.

Download
Attack Round-ups
Summer Of DDoS 2023
This report Uncovers the relentless DDoS attacks by state-sponsored Russian threat actors. Learn why financial institutions and government services are vulnerable.
Download
Attack Round-ups

Check out MazeBolt’s DDoS Attack Round-Up for August 2023.

Download
Attack Round-ups

Report: MazeBolt – DDoS Threats – Q3 2023

Prevent DDoS Damage and downtime! MazeBolt’s RADAR™ pioneers DDoS security. Identify & and remediate vulnerabilities for robust protection.
Download

Check out MazeBolt’s DDoS Attack Round-Up for July 2023.

Download
Attack Round-ups

Check out MazeBolt’s DDoS Attack Round-Up for June 2023.

Download
Attack Round-ups

Check out MazeBolt’s DDoS Attack Round-Up for May 2023.

Download
Attack Round-ups

Check out MazeBolt’s DDoS Attack Round-Up for April 2023.

Download
Attack Round-ups

Check out MazeBolt’s DDoS Attack Round-Up for March 2023.

Download
Attack Round-ups

Check out MazeBolt’s DDoS Attack Round-Up for February 2023.

Download
Attack Round-ups

Check out MazeBolt’s DDoS Attack Round-Up for January 2023.

Download
Attack Round-ups

Check out MazeBolt’s DDoS Attack Round-Up for December 2022.

Download
Attack Round-ups
November 2022: DDoS Attack Round Up
Attack duration on the rise? Of the twelve major reported attacks in November, 5 attacks lasted several hours, and in some cases, up to a week.
Download
Attack Round-ups
October 2022: DDoS Attack Round-Up
As experts reported more than 6 million DDoS attacks in H1 this year, the gaming and governments continue to be targeted, reaching as far as Britain and the United States.
Download
September 2022: DDoS Attack Round Up
As we finish Q3, politically motivated malicious threat actors continue to target governmental organizations. This monthly trend follows the significant increase in patriotic DDoS attacks related to the Russo-Ukrainian conflict in H1 and a general rise in DDoS attacks.
Download

Case Studies

Next
Previous

Case Study

Access Full Case Study

About the customer

A leading multi-channel bank focused on retail banking, insurance, and asset management activities. With nearly 45,000 employees globally in 1500 branches, a barrage of DDoS attacks was damaging business continuity and hurting customer experience.

What you will learn


  • Customer challenges

  • MazeBolt RADAR findings


  • Our solution

  • Customer outcomes
Download

Case Study

Access Full Case Study

About the customer

A leading multi-channel bank focused on retail banking, insurance, and asset management activities. With nearly 45,000 employees globally in 1500 branches, a barrage of DDoS attacks was damaging business continuity and hurting customer experience.

What you will learn

 

  • Customer challenges
  • MazeBolt RADAR findings
  • Our solution
  • Customer outcomes
Download

Case Study

Access Full Case Study

About the customer

For a leading North American insurance company catering to a customer base of over 4 million and boasting yearly revenues of over $12 billion – having 24/7 online availability is more than critical.

The organization’s security teams struggled to prevent damaging downtime due to ongoing DDoS attacks. That is when MazeBolt came in.

What you will learn

 

  • Customer challenges
  • MazeBolt RADAR findings
  • Our solution
  • Customer outcomes
Download

Case Study

Access Full Case Study

About the customer

Governmental institutions and the public are reliant on online services and must have continuous online business continuity. Disruptions to these online applications and services damage public confidence and could become an issue of national security. The governemt of Isreal turned to MazeBolt to ensure online services remained reliable during elections.

What you will learn

 

  • Customer challenges
  • MazeBolt RADAR findings
  • Our solution
  • Customer outcomes
Download

Case Study

Access Full Case Study

About the customer

A global fintech organization that is committed to providing reliable services and tools to its account holders. Setting up and using the company’s services is easy for customers, but behind the facade lies a complex, secure, and highly intelligent platform with intricate applications and networks working seamlessly. That is, until a single incident spiraled into a hazardous DDoS attack, resulting in legitimate customers being blocked from services.

What you will learn

 

  • Customer challenges
  • MazeBolt RADAR findings
  • Our solution
  • Customer outcomes
Download

Case Study

Access Full Case Study

About the customer

A leading financial service provider in North America offering a range of digital financial services to its customers, including investment, mortgage, and retirement planning.

Having suffered a barrage of attacks and major business disruptions, the client implemented the RADAR attack and vulnerability simulation solution. The insights enabled them to close critical vulnerability gaps and maximize their cyber resilience.

What you will learn

 

  • Customer challenges
  • MazeBolt RADAR findings
  • Our solution
  • Customer outcomes
Download

Case Study

Access Full Case Study

About the customer

With over 6,000 employees, hundreds of partners, and millions of gamers – this company is one of the leading publicly traded companies in the gaming industry.

Following several DDoS attacks and subsequent service disruptions and downtime, the company needed to understand its true DDoS exposure and risk. This is when MazeBolt came into the picture.

What you will learn

 

  • Customer challenges
  • MazeBolt RADAR findings
  • Our solution
  • Customer outcomes
Download

Data Sheets

Next
Previous

Data Sheet: Enhance Microsoft Azure DDoS Protection with MazeBolt RADAR

Data Sheet

Download

Data Sheet: MazeBolt RADAR™ vs. Traditional DDoS Testing

Data Sheet

Download

Data Sheet: Supporting DORA Readiness

Data Sheet

Download

Data Sheet: Preferred Remediation Technology Alliance

Data Sheet

Explore the power of the F5 and MazeBolt partnership in achieving zero-second automated SLAs for DDoS protection. Download the solution brief now
Download

Data Sheet: MazeBolt – RADAR for Partners

Data Sheet

Elevate Partnerships with MazeBolt: Embrace DDoS Security Together! Collaborate for growth – market, sell, and succeed with RADAR™
Download
Data Sheet: MazeBolt – RADAR™ Overview
Defend Against DDoS Attacks: Discover MazeBolt RADAR™. Proactively eliminate vulnerabilities for robust protection
Download

eBook

Next
Previous

eBook

Access Full Guide

Gartner® CTEM

Continuous Threat Exposure Management (CTEM) is one of this year’s top technology trends, according to Gartner, Inc., a leading research and advisory firm in the technology space dedicated to helping businesses around the globe make critical IT decisions. CTEM is an innovative, real-time framework designed to address the evolving landscape of cybersecurity threats. As organizations increasingly face ever-more-sophisticated attacks, including a fast-growing number of Distributed Denial-of-Service (DDoS) attacks, traditional vulnerability management techniques fall short.

In this eBook, we will explore CTEM’s 5 key steps and its iterative management cycle, compare DDoS Vulnerability Management with traditional DDoS testing, and learn about “best practices” for implementing CTEM within your organization.

What you will learn

 

  • The differences between CTEM and traditional approaches to cybersecurity resilience
  • Why DDoS continues to be a problem despite cybersecurity advancements
  • How to leverage CTEM for DDoS Vulnerability Management
  • The limitations of today’s DDoS mitigation technologies
  • Why continuous DDoS testing and simulation is so important

Access Full Guide

Download

eBook

Access Full Guide

Gartner® CTEM

Continuous Threat Exposure Management (CTEM) is one of this year’s top technology trends, according to Gartner, Inc., a leading research and advisory firm in the technology space dedicated to helping businesses around the globe make critical IT decisions. CTEM is an innovative, real-time framework designed to address the evolving landscape of cybersecurity threats. As organizations increasingly face ever-more-sophisticated attacks, including a fast-growing number of Distributed Denial-of-Service (DDoS) attacks, traditional vulnerability management techniques fall short.

In this eBook, we will explore CTEM’s 5 key steps and its iterative management cycle, compare DDoS Vulnerability Management with traditional DDoS testing, and learn about “best practices” for implementing CTEM within your organization.

What you will learn

 

  • The differences between CTEM and traditional approaches to cybersecurity resilience
  • Why DDoS continues to be a problem despite cybersecurity advancements
  • How to leverage CTEM for DDoS Vulnerability Management
  • The limitations of today’s DDoS mitigation technologies
  • Why continuous DDoS testing and simulation is so important

Access Full Guide

Download

eBook

eBook

In the connected realm of the digital world, Distributed Denial-of-Service (DDoS) attackers continually adapt and devise new strategies to disrupt their targets. This ongoing evolution of tactics and techniques means that periodic “red teaming” approaches to testing quickly become out of date, and do not provide full protection against all types of DDoS attack.

In this eBook, we will explore the latest DDoS tactics employed by threat actors, discuss the limitations posed by reactive approaches to DDoS protection, and introduce how MazeBolt’s approach facilitates full automated DDoS protection.

What you will learn

 

  • The kinds of DDoS attacks and tactics most prevalent today
  • Which levels of a website’s infrastructure are attacked
  • The limitations of today’s DDoS mitigation technologies
  • Why continuous DDoS testing and simulation is so important

Access Full Guide

Download

eBook

Access Full Guide

Research & Analysis

The SEC’s latest cybersecurity regulations highlight the need for rigorous cyber risk management with emphasis on achieving business continuity. This eBook provides a deep dive with practical steps to help reduce the risk of DDoS attack, boost security, and improve cyber resilience.

What you will learn

 

  • Understanding the SEC ruling
  • Where does DDoS vulnerability testing come in?
  • Providing business continuity with cyber resilience
  • The benefits of SEC compliance

Access Full Guide

Download

eBook

Access Full Guide

Research & Analysis

This focused eBook provides a deep dive into the specifics of Distributed Denial of Service (DDoS) testing within the framework of the EU’s Digital Operational Resilience Act (DORA). With financial services firms facing increasing cyber threats, DDoS preparedness is crucial for compliance and operational stability.

What you will learn

 

  • The Five Pillars of DORA
  • Integration of DDoS Testing with operational resilience
  • Managing DDoS Risks in compliance with DORA
  • Developing a comprehensive DDoS testing program
  • Regulatory aspects of DDoS readiness
  • Aligning DDoS readiness with business continuity
Download

eBook

Access Full Guide

Botnet Research

As DDoS attacks evolve and become more sophisticated, the number of attack vectors and vulnerabilities also increase. DDoS attacks are relatively easy to launch and have become the weapon of choice for threat actors across the globe, and one of their favorite tools for such disruptive attacks are botnets.

This eBook will look into the world of botnets and why they are still a major cause of risk for organizations that depend on business continuity and resilience for their online services.

What you will learn

 

  • What is a botnet
  • Why are botnets still prevalent
  • What can you do to defend against botnets
Download

eBook

Access Full Guide

DDoS Attack Research

In this eBook, we review the ten most common DDoS attack vectors that often go unnoticed by security teams. We provide our recommendations on how to uncover vulnerabilities in DDoS protection layers and invest the proper prioritized efforts in remediation.

Regardless of what DDoS protection services the organization employs, the security team must be confident they have complete visibility into their DDoS security posture.

What you will learn

 

  • Describe the ten most common causes of attacks
  • Why successful attacks are due to misconfigurations in existing DDoS protections
  • Examples and explanations
Download

eBook

Access Full Guide

DDoS Research

DDoS attacks are a type of cyber attack that is designed to overwhelm a targeted network with traffic, disrupting or shutting down service to legitimate traffic. DDoS attacks can be particularly damaging, as they affect not only the target organization but also its customers, partners, and other stakeholders.

This eBook takes a deep dive into the reasons why DDoS attacks are becoming more complex, hazardous, and more common.

What you will learn

 

  • What is vulnerable for each attack
  • Description of the top attack vectors
  • Direct and indirect targets
Download

eBook

Access Full Guide

DDoS Attack and Vulnerability Testing

Many organizations grapple with a lack of time and technical resources to ensure comprehensive DDoS security. The lack of updates and maintenance leads to serious misconfigurations leaving organizations vulnerable to damaging service downtime.

This eBook will address these issues and explain why a proactive approach is needed to DDoS security. We will explore common DDoS mitigation services, explain common misconfigurations, and propose a set of best practices to help significantly reduce the risk of damaging DDoS attacks.

What you will learn

 

  • IT architectures and mitigation types
  • DDoS mitigation devices and capabilities
  • Common DDoS protection vulnerabilities
  • Best practises for optimizing DDoS protections
Download

Infographics

Next
Previous
DDoS Vulnerability Management

Protecting Your Organization from DDoS Attacks

Download
DORA Enforcement Starts January 2025
MazeBolt helps you meet the Digital Operational Resilience Act (DORA) compliance requirements across all five regulation pillars.
Download

Infographic: DDoS Testing Vs. DDoS RADAR™ Testing

DDoS testing is critical in order to uncover vulnerabilities that enable successful DDoS attacks. But is traditional DDoS testing really effective? Or, is RADAR the only way to uncover DDoS vulnerabilities and prevent damaging DDoS attacks?

Get the infographic to discover the pros and cons of DDoS testing.

Get the full infographic here.

Infographic: DDoS Testing Vs. DDoS RADAR™ Testing

Download
DDoS Attack on Gaming Companies
Discover the critical information about the DDoS threat in the gaming industry with this insightful infographic
Download
DDoS Attack on Governments 2021
This infographic highlights details of DDoS attacks targeted towards various governments across the world in 2021.
Download

Reports

Next
Previous

2025
DDoS Trends Report

Predictions Based on MazeBolt Research into DDoS Attacks

DOWNLOAD THE PDF

Executive Summary

Why does the risk of Distributed Denial-of-Service (DDoS) attacks continue to rise?

 

DDoS attacks surged almost a third (30%) in the first half of 2024 compared to the same period in the previous year. Moreover, DDoS attacks on critical infrastructure increased by 55% in the last four years.

 

Hacktivist groups motivated by political and ideological agendas are driving the current growth in DDoS attacks. Moreover, today’s DDoS attacks may utilize advanced botnets to implement sophisticated attack methods that ensure that they are harder to detect and neutralize.

 

As the DDoS risk increases, awareness of why DDoS attacks persist is a key challenge. Security leaders need to promote an understanding that the main reason DDoS attacks still succeed is due to the existence of unidentified DDoS vulnerabilities. Therefore, the only way to mitigate the risk of attack is through a process of continuous testing, vulnerability identification, timely remediation, and validation.

 

continuous ddos vulnerability testing is the only way to properly prevent ddos attacks.

 

This type of ongoing, proactive approach is crucial to maintaining DDoS resilience and supporting the business continuity of online services.

 

This report provides insight into MazeBolt’s DDoS predictions for 2025, based on our own research and reports in the media during 2024.

DDoS Attack Trends for 2025

Based on MazeBolt’s internal and market research, we can expect to see the following DDoS attack trends continuing throughout 2025:

Threat to Democratic Elections

Politically motivated hackers can be expected to continue targeting countries undergoing election cycles. The attacks are likely to be both in the months leading up to elections as well as after the polls have opened. These types of attacks may be successful in causing downtime of electoral websites and infrastructure, and they can undermine the public confidence in election results.

Greater Enforcement of Compliance Requirements

Companies will continue to invest in adapting their cybersecurity processes to meet the more stringent regulations that came into effect recently, avoid stiff fines.

In-Depth Reporting

Companies will need to provide in-depth, timely DDoS resilience and attack reports, to meet the regulations, and this will create a greater need for the ongoing visibility and 

Companies will need to provide in-depth, timely DDoS resilience and attack reports, to meet the regulations, and this will create a greater need for the ongoing visibility and attack prevention capabilities provided by continuous DDoS vulnerability testing.

attack prevention capabilities provided by continuous DDoS vulnerability testing.

Industries at Greater Risk

Companies in the industries of banking and financial services, insurance, healthcare, and transportation are expected to continue being targeted more than other industries throughout 2025.

DDoS-for-Hire Services

DDoS-for-Hire gives less technically proficient threat actors an easy way into the hacking industry, by making it easier to launch DDoS attacks. The increase in DDoS-for-Hire tools is particularly notable in Asia and is connected to the rising risk of DDoS attacks across multiple sectors. DDoS-for-Hire gives users the ability to carry out an unwarranted performance, on a network.


the cost of ddos attacks on businesses is so devastating that it's essential to have ongoing ddos testing and validation

2024 DDoS Attack Analysis

A closer look at recently reported DDoS attacks shows that new DDoS attack techniques and emerging vulnerabilities are creating significant challenges for organizations that are trying to protect their digital services. Here are the most significant attack trends that emerged based on the data from recent DDoS attacks.

The Threat to Democratic Elections

2024 was a landmark year in electoral politics, with 50 countries plus the European Union – representing a total of over 2 billion voters – holding elections. Politically motivated DDoS attacks took place in countries in the months leading up to elections as well as after the polls opened.

In some cases, the DDoS attacks were successful in disrupting critical election infrastructure, causing downtime, and undermining the confidence of the public in the reliability of election results. DDoS attacks peaked around critical dates, indicating a coordinated effort to disrupt electoral processes.

Funding for the work of the threat actors, including both criminal groups and hacktivists, allegedly was provided by nation-states.

Examples of DDoS attacks during election cycles include:

US

What is a DDoS Attack? Elon Musk Claims Cyberattack Delayed Trump Interview

France

First Round of French Election: Party Attacks and a Modest Traffic Dip

Venezuela

Venezuela’s Election as seen in Cyberspace


ddos attacks are still a big problem during election times. Constant ddos simulations testing and validation is necessary to be protected against these politically charged ddos attacks

More Stringent Compliance Regulations

With the DORA and NIS2 Directive regulations in the EU, and new SEC regulations in the US, 2024 has seen a significant shift in the stringency of DDoS testing. One of the key aspects of the regulations involves more in-depth, transparent, and timely reporting requirements – and continuous DDoS testing is essential to complying with these requirements.

Table of the different regulatory frameworks that will impact the need for more ddos testing and business continuity

Enterprises doing business in Europe and the US must enhance their cybersecurity processes to meet the new regulations and avoid hefty fines. The DORA regulations, for example, are based on the following five pillars:


the five pillars of dora regulation including resilience testing and third-party risk which encompass continuous ddos testing and validation

High-Profile Arrests of Perpetrators of DDoS Attacks

Law enforcement officials are also making the headlines – with a number of instnaces in which the authorities have taken steps to detain groups responsible for high-profile DDoS attacks. In some cases, the arrest led to a new rash of DDoS attacks in response. For example, after the arrest of Telegram’s CEO Pavel Durov, several hacking groups launched a #FreeDurov DDoS campaign against online services in France. Here are some of the stories covered in the media:

US

Two Sudanese Nationals Indicted for Alleged Role in Anonymous Sudan Cyberattacks on Hospitals, Government Facilities, andother Critical Infrastructure in Los Angeles and Around the world

France

Telegram’s CEO & Founder Durov Under Arrest: Cybercriminals React

DDoS attacks in the UK
UK

17-Year-Old Linked to Scattered Spider Cybercrime Syndicate Arrested in UK

ddos attacks in spain
Spain

Spanish Police Arrest Three Suspects Linked to Pro-Moscow NoName057(16) Hackers

ddos attacks in japan
Japan

International Investigation of DDoS Leads to Oita Man’s Arrest

ddos attacks in cambodia
Cambodia

Anti-government Hackers Arrested After Attacks on Cambodian Official Websites


different ddos attacks occurring around the world in 2024 despite having existing ddos protections since they don't do ongoing ddos testing

A Shift in DDoS Public Awareness?

DDoS attacks on big name brands such as Disney+ in France, KFC in Italy, and Starbucks in the US were discussed in online forums and on social media. While these attacks were not confirmed publicly as DDoS attacks, the headlines associating them with DDoS are indicative of an increase in public awareness of DDoS dangers.

There is a shift in ddos public awareness due to big brands being attacked.
Alleged DDoS Attacks on Disney+ in France, Kentucky Fried Chicken in Italy, and Starbuck in the US

Top DDoS Targets: Breakdown by Industry

The following industries were the worst hit by DDoS attacks:

how the finance sector gets hit by damaging ddos attacks

Finance

Disrupted online services and availability,
causing financial
and reputational damages

healthcare companies being targeted by ddos attacks

Healthcare

Targeted the patient management systems and telemedicine platforms used by healthcare providers

ddos attacks on government

Government

Often coincided with political events; aimed to erode public trust and disrupt administrative functions

ddos attacks on transportation systems like airlines or railway systems

Transportation

Disrupt airlines and railway booking systems; exposed or blocked access to sensitive data; and impacted supply chains

While many organizations try to hide cyber breaches, the information that did become public made it clear that the most frequently attacked organizations provide financial services.

These include banks, payment processors, and other financial organizations. After financial services, the industries most targeted include healthcare, government organizations, and transportation.

The Most Prevalent Types of DDoS Attacks

The impact of a DDoS attack depends on several factors, including the scale of an attack, the nature of the attack, and the ability of the target system to handle the attack. While the frequency of DDoS attacks continues to rise, the attacks are also evolving in complexity and scale. For example, sophisticated DDoS attack methods are being implemented by advanced botnets such as the botnet malware family Gorilla.

In recent months, a marked increase has been seen specifically in the following types of DDoS attacks:

types of ddos attacks that have increase over that last few months

A Growing Threat: DDoS-for-Hire Services

Typically, DDoS attacks were carried out by highly skilled hackers with access to large networks of compromised devices, often referred to as botnets. With the rise of the commercialization of cybercrime, a new and concerning trend has emerged: DDoS as a Service (DDoSaaS). This trend significantly lowers the barrier to entry for launching powerful DDoS attacks. It is a model that allows individuals with limited technical skills to utilize botnet infrastructure and launch attacks against targets of their choice.

Greater Accessibility

DDoSaaS platforms are available on the dark web – as well as through “legitimate” channels on the open internet, where they are marketed as “stress testing” services. (By masquerading as legitimate services, they can be sold on the open internet). “Legitimate” channels include Telegram Channels, DDoS-for-Hire Forums and API-based DDoS Platforms.

These services provide simple, web-based dashboards and interfaces, allowing users to easily configure and launch attacks without requiring in-depth technical knowledge.

Users can usually select from various DDoS attack types, including volumetric floods, protocol attacks, and application layer attacks.

Greater Affordability

Services are typically offered through tiered subscription plans, with prices ranging from as low as $10 (on sale!) to $500 per month. Pricing often depends on factors like attack duration, volume, frequency, and the number of concurrent targets.

Most platforms accept easy-to-use payment methods such as cryptocurrency payments – particularly Bitcoin, for anonymity. Some services even accept PayPal and other payment methods.


Example prices for DDoS Attacks. DDoS attacks are quite affordable and only continuous ddos testing can prevent these attacks causing damage
Example of Advertised Prices and Capacities of a DDoS-for-Hire Service

More Effective

DDoSaaS providers maintain networks of compromised devices (frequently called botnets) to carry out attacks. These botnets can sometimes generate very high traffic volumes.

Many of these services utilize reflection and amplification methods to increase attack power and effectiveness.

Most platforms offer features to hide users’ identities, like not tracking IP addresses and encouraging VPN/Tor network usage.

Providers Operate Like Legitimate Businesses

Many DDoSaaS providers offer customer support, tiered service packages, and performance guarantees. Some even offer Service Level Agreements (SLAs) and refunds if an attack doesn’t achieve the desired outcome.

Beyond DDoS, some platforms offer other malicious tools like IP trackers or credential stuffing services.

DDoSaaS is Contributing to a Notable Surge in DDoS Attacks

The proliferation of DDoSaaS has democratized cyberattacks, making them accessible to anyone with malicious intent and a modest budget. As a result, organizations must be more vigilant than ever, adopting proactive cybersecurity measures. Businesses can reduce the risk of downtime, protect their reputation, and ensure the continuity of their operations by:

  •  Understanding the mechanics of DDoSaaS  
  • Implementing robust defenses
  •  Continuously testing for DDoS vulnerabilities

DDoSaaS is not just a passing fad. It’s a growing business that has solidified its place in the cybercrime ecosystem. The best defense is to be proactive, continuously test for vulnerabilities, and adapt to the changing threat landscape.


state of ddos as a service means that continuous ddos testing is critical to maintaining business continuity

Drill-Down: Top Attacks

The tables below provide insight into DDoS attacks published in the media during the third quarter of 2024. See also MazeBolt’s attack reports for Q1 and Q2.

July

DDos attacks that happened in july 2024 and that could have been prevented with ddos testing

August

DDos attacks that happened in august 2024 and that could have been prevented with ddos testing

September

DDos attacks that happened in september 2024 and that could have been prevented with ddos testing

Key Takeaways

Even with the best DDoS protections in place, the MazeBolt research team has found out, on average, 37% of an organization’s DDoS attack surface still remains vulnerable to DDoS attacks. This is because, over time, changes in IT systems and online services lead to security policy drift that results in DDoS vulnerabilities and misconfigurations, which leave organizations unprotected.

Shifts in the DDoS attack landscape that were particularly noteworthy this year included:

  • The growing number of attacks disrupting elections
  • New and more stringent compliance regulations that went into effect (NIS2, DORA)
  • Greater public awareness of DDoS – in response to both the headlines around high-profile arrests of perpetrators of DDoS attacks, and several alleged DDoS attacks on big name brands
  • Increased adoption of the business model known as DDoS-for-Hire services

 Protecting organizations from damaging DDoS attacks – and thereby strengthening the business continuity of online services – requires: 

Continuous
DDoS Testing

Sharpening of Operational Resilience

Transparency
and Reporting

Regulatory
Compliance

About MazeBolt

MazeBolt RADAR™ is a patented DDoS Vulnerability Management solution. Using thousands of non-disruptive DDoS simulations and without affecting online services, it can identify and enable the remediation of vulnerabilities in deployed DDoS defenses. RADAR™ enables organizations and governments to maintain the uninterrupted business continuity of online services. Using RADAR’s patented vulnerability simulation technology, enterprises have unparalleled visibility into their DDoS protection solutions so they can be confident that damaging DDoS attacks can be prevented – before they happen.

Read more at: https://www.mazebolt.com

Download
Attack Round-ups, Reports

Research and Analysis

Access Full Guide

Frost & Sullivan Report

Organizations in many industries are reporting a 300% increase in damaging DDoS attacks this year. As the risk of DDoS attacks continues to surge, organizations are realizing the need to incorporate DDoS Vulnerability Management capabilities to supplement their current DDoS solutions. In parallel, industry compliance requirements create an urgent need for in-depth DDoS vulnerability testing and reporting.

Frost & Sullivan’s report, “Ongoing Vulnerability Testing for DDoS Protection,” explores the main reasons organizations are vulnerable to damaging DDoS attacks and how you can mitigate the risk through continuous, automated DDoS testing and vulnerability identification.

In this report, you will learn:

 

  • Why DDoS attacks are increasing
  • The business impact of DDoS attacks
  • Why current DDoS mitigation approaches are unreliable
  • The importance of ongoing maintenance of security policies
  • How proactive, continuous DDoS testing mitigates the risk

Access Full Report

Download

CIOReview

Access Full Guide

Maintaining Business Continuity

Business continuity represents one of the highest organizational priorities in the digital economy. When online services are driving the business around the clock, companies must ensure their architectures are resilient against attacks, including distributed denial of service (DDoS) attacks, which represent the most significant cyber threat to business continuity.

This interview with Matthew Andriani looks at how the industry needs to make a shift in DDoS protection deployments by moving away from a ‘deploy and trust’ approach to a proactive vulnerability identification and remediation philosophy.

What you will learn

 

  • How to augment your existing DDoS defense solutions
  • How MazeBolt is taking a different approach from traditional manual DDoS testing solutions
  • Strengthening the walls of Cybersecurity and protecting business reputation
  • How to ensure that all vulnerabilities are identified and eliminated before an attack
Download
The State of DDoS Protection
This report presents the effectiveness of DDoS mitigation. The data summarized provides insight into how well DDoS mitigation actually works and what can be done to better protect your organization from DDoS threats.
Download

Whitepapers

No items found

Videos

Next
Previous
Videos
The DDoS Threat to Democratic Elections
Videos
Introducing DDoS Vulnerability Management for Azure DDoS Protection with MazeBolt
Videos
The Problem of DDoS Attacks and the Vulnerabilities That Won’t Go Away
Videos
Comprehensive Guide to Achieving DORA Compliance
Videos
Non-Disruptive, Full-Coverage DDoS Testing with Zero Downtime
Videos
AI-Powered DDoS Vulnerability Detection and Mitigation
Videos
MazeBolt DTR | AI-based DDoS threat rating platform
Videos
Building Resilience in the DDoS War – Live Presentation
Videos
MazeBolt & F5: Preferred Remediation Alliance
Videos
DDoS Security FAQ’s – MazeBolt Webinar | Part 2
Videos
DDoS Security FAQ’s – MazeBolt Webinar | Part 1
Videos
MazeBolt RADAR™ Video
Videos
You Don’t Want the DDoS Emergency Response team
Videos
How to Close Your DDoS Vulnerability Gap?
Videos
CNS Outsourcing | Top 3 Advantages of MazeBolt
Videos
TeckSquare | DDoS as an opportunity
Videos
Greece as an Example: DDoS Attacks Can Cost Lives
Videos
Webinar: Zero Trust & DDoS | New Policies, Best Practices & How To Implement Them
Videos
Evolution of DDoS Attacks
Videos
RADAR™ Distributed Denial of Service Protection
Videos
How to Stop All DDoS Attacks