Key Findings:
- Application-Layer DNS DDoS Attacks: These attacks quadrupled compared to the first half of 2023. Malicious DNS queries surged by 76% compared to all of 2023, with the finance sector being the most targeted.
- Regional Impact: EMEA bore the brunt, facing over 90% of global web DDoS attacks, while North America saw 66% of web application and API attacks.
- Industry Targeting: Financial institutions were hit hardest, with 44% of network-layer DDoS attacks directed at them. The sector also experienced a record-breaking six-day web DDoS attack campaign, enduring multiple waves totaling 100 hours of attack time.
- Hacktivist Activity: Pro-Russian hacktivist groups intensified their operations, particularly against Ukraine, where the average number of attacks doubled compared to 2023. Notably, NoName057(16) claimed 1,902 attacks, making it the most active threat actor.
- Network-layer DDoS Attacks: The average volume blocked per organisation grew exponentially, particularly in the APAC region (302%) and EMEA (293%).
The Road Ahead: According to Radware director of threat intelligence Pascal Geenens, the remainder of 2024 could witness further increases in attack volumes, particularly with the growing use of AI by threat actors. Key upcoming events, including the U.S. elections and concerns over the global economy, are expected to fuel even more cyber disruptions.
About Radware
Radware is a global leader in application security and delivery solutions for multi-cloud environments. Their AI-driven solutions provide precise, hands-free protection against sophisticated cyber threats, including DDoS attacks, API abuse, and bad bots. With a focus on evolving cybersecurity challenges, Radware helps enterprises and carriers protect their operations and brands while minimising costs.
|
For more details, Radware’s complete H1 2024 Global Threat Analysis Report is available for download.