DDoS Attacks Increasing

13712665263?profile=RESIZE_400xIn a recent warning to global organizations, cybersecurity firm Netscout has unveiled its latest DDoS Threat Intelligence Report for the first half of 2025, highlighting an unrelenting barrage of Distributed Denial-of-Service (DDoS) attacks that are increasingly sophisticated, geopolitically motivated, and amplified by artificial intelligence.  Netscout's report, titled "Digital Aftershocks: Collateral Damage from DDoS Attacks," documents over 8 million attacks worldwide, with more than 3.2 million targeting the Europe, Middle East, and Africa (EMEA) region alone.[1]

These assaults, once mere disruptions, have evolved into precision tools capable of destabilizing critical infrastructure in key sectors such as communications, transportation, energy, and defense.  Netscout's analysis, drawn from monitoring tens of thousands of daily attacks across its ATLAS sensor network, reveals a "perfect storm" of threats. Hacktivist groups, nation-state actors, and opportunistic cybercriminals are leveraging AI integration, persistent campaigns, and DDoS-for-hire services to orchestrate strikes that challenge traditional defenses.  "AI-enhanced automation, multi-vector attacks, and carpet-bombing techniques challenge traditional defenses," the report states, emphasizing how botnets compromising tens of thousands of IoT devices, servers, and routers deliver sustained disruptions.

Key findings highlight the massive scale of the threat. NetScout observed more than 50 attacks exceeding one terabit per second (Tbps), including a record-breaking 3.12 Tbps assault in the Netherlands and a 1.5 gigapacket per second (Gpps) attack in the United States.   Attack volumes remain large, with global peak traffic surpassing 800 Tbps in the period to June 2025.

Botnet-driven attacks have grown in sophistication, averaging 880 incidents daily in March 2025 and peaking at 1,600, with durations averaging 18 minutes.  These attacks exploit known vulnerabilities in web servers, routers, and IoT devices, creating distributed networks that relentlessly pummel targets.

Geopolitical tensions have intensified DDoS activity, transforming it into a potent tool of influence.  The India-Pakistan conflict in May 2025 saw hacktivists target the Indian government and financial sectors, while the Iran-Israel escalation in June 2025 triggered over 15,000 attacks on Iran and 279 on Israel.  Events like the World Economic Forum saw a doubling of normal attack rates, with more than 1,400 incidents recorded. Such spikes demonstrate how adversaries time assaults for maximum chaos, often aligning with major political flashpoints.

Prominent among threat actors is the pro-Russian hacktivist group NoName057(16), which claimed over 475 attacks in March 2025 337% more than its nearest rival, focusing on government websites in Spain, Taiwan, and Ukraine.  Despite a recent takedown disrupting its botnet operations, experts warn of a potential resurgence.

Newcomers like DieNet and Keymous+ are rapidly emerging, utilizing DDoS-as-a-Service platforms to launch campaigns.  DieNet, introduced in March 2025, orchestrated over 60 attacks targeting US transit systems, Iraqi government sites, and infrastructure in Israel, Sweden, and Egypt. Keymous+ executed 73 assaults across 28 industries in 23 countries, democratizing advanced attacks for novice actors.

AI's role in escalating threats cannot be overstated.  Adversaries are utilizing large language models (LLMs) such as WormGPT and FraudGPT to automate reconnaissance, generate scripts, and devise evasion strategies.  This integration allows real-time adaptation to defenses, scaling attacks while lowering the barrier to entry.  "The integration of AI assistants and the use of large language models (LLMs), such as WormGPT and FraudGPT, escalates that concern," said Richard Hummel, Director of Threat Intelligence at NetscoutT.  "As hacktivist groups leverage more automation, shared infrastructure, and evolving tactics, organizations must recognize that traditional defenses are no longer sufficient," he added.

The report emphasizes collateral damage, where attacks ripple through service provider networks, affecting unintended victims.  Critical sectors face up to 1 Gbps and 330 kpps attacks on average, straining backbone infrastructure.  Netscout, protecting two-thirds of the routed IPv4 space, urges intelligence-driven defenses. "Organizations need intelligence-driven, proven DDoS defenses that can deal with the sophisticated attacks we see today," Hummel stressed.

This surge in DDoS activity signals a new era of cyber warfare, where AI and geopolitics converge to create unprecedented risks.  As threat actors innovate faster than defenses adapt, the report calls for adaptive, visibility-based strategies to mitigate these digital aftershocks.  With emerging groups and persistent campaigns, the DDoS landscape demands urgent evolution in cybersecurity postures worldwide.

 

This article is shared with permission at no charge for educational and informational purposes only.

Red Sky Alliance is a Cyber Threat Analysis and Intelligence Service organization.  We provide indicators of compromise information via a notification service (RedXray) or an analysis service (CTAC).  For questions, comments, or assistance, please contact the office directly at 1-844-492-7225 or feedback@redskyalliance.com    

Weekly Cyber Intelligence Briefings:
REDSHORTS - Weekly Cyber Intelligence Briefings
https://register.gotowebinar.com/register/5207428251321676122

 

[1] https://www.cybersecurityintelligence.com/blog/ddos-attacks-surging-in-2025-8677.html

E-mail me when people leave their comments –

You need to be a member of Red Sky Alliance to add comments!