from Pro@programming.dev to cybersecurity@sh.itjust.works on 01 Sep 16:43
https://programming.dev/post/36701577
cross-posted from: programming.dev/post/36689630
Key Findings
1. Geopolitical Events Trigger Unprecedented DDoS Campaigns Expand: Major political events drove increased DDoS activity, evidenced by attack count spikes that coincide with these occurrences. These events saw hacktivist groups launching up to double the normal number of attacks in short timeframes. 2. Botnet-Driven Attacks Dominate with Increased Sophistication Expand: Botnet-driven attacks are getting longer, more frequent, and are employing multiple attack vectors to avoid mitigation. They are targeting known vulnerabilities in IoT devices, servers, routers, and more. 3. NoName057(16) Maintains Dominance Among Familiar Threat Actors: Well-known hacktivist and attack groups, such as NoName057(16), are launching more attacks across the globe while leveraging several attack vectors. 4. New Threat Actors Emerge with DDoS-as-a-Service Capabilities: Emerging attack groups like DieNet and Keymous+ are leveraging DDoS-for-hire infrastructure to launch DDoS-as-a-service campaigns, lowering the barrier to entry and expanding the threat landscape. 5. Global DDOS Attack Volume High with Regional Variations: With more than 8 million recorded attacks globally in the first half of 2025, DDoS attack volume remains massive. The attacks also show sustained intensity, reaching speeds of 3.12 Tbps and 1.5 Gpps.
DDoS attacks are no longer just a nuisance, they’re a weapon of geopolitical influence. In the first half of 2025 alone, more than 8 million attacks were recorded globally, with threat actors leveraging AI, botnets, and DDoS-for-hire services to launch increasingly sophisticated and sustained campaigns.
Report Highlights
- DDoS-Capable Botnets; - Country Analysis; - DDoS Attack Vectors; - Global Highlights; - Industry Analysis.
threaded - newest