Get the latest DDoS attack trends including origins, tactics, types, targets and hot-topic issues
Learn about the origins, tactics, types, and targets of cyber- attacks and emerging threats and trends from post-attack analysis and intelligence by cybersecurity and DDoS mitigation experts. Each issue includes quarter-over-quarter and year-over-year trends, plus a spotlight on an actual attack and a case study on a hot-topic issue.
Thriving criminal industry taps into Internet devices, spreads easy-to-use tools
Four-fold increase in DDoS attack size and volume
Spotlight: 321 Gbps DDoS attack
Case study: DDoS botnets built from devices other than PCs and servers
Emerging threat: Phishing attacks target third-party content providers
Malicious actors switch tactics to build, deploy and conceal powerful botnets
Attack activity remains elevated
Spotlight: A powerful botnet –powered DNS attack
Case study: Botnet construction based on web vulnerabilities
Malicious actors choose reflection, not infection for record-setting DDoS attacks
Number of DDoS attacks, peak bandwidth soar
Spotlight: Record-setting DDoS attack
Case study: WordPress DDoS pingback application reflection attack
Mobile applications being used for DDoS attacks
Ease of use, widespread availability fuel growing threat
Spotlight: Multi-vector DDoS campaign
Case study: The Asian DDoS threat
DDoS perpetrators changed tactics to amplify attack sizes and hide identities
Can now use smaller botnets to launch high-bandwidth attacks
Attack spotlight: Multi-layer, multi-vector attack
Case study: DrDoS reflection services within the underground marketplace
Significant increases in average DDoS attack bandwidth and packet-per-second rates
Average packet-per-second and attack bandwidth rates rise 1,655 percent and 925 percent respectively.
Case study: DrDoS (reflection) attack campaign
Giant attacks overwhelming appliances, ISPs, carriers, content delivery networks
Average attack bandwidth totaled 48.25 Gbps in Q1 2013, a 718 percent increase over last quarter, with an average packet-per-second rate of 32.4 Mpps.
Case study: Multi-vector attack campaigns
e-Commerce and SaaS businesses hit with 50+ Gbps DDoS attacks
Increased scale and diversity of DDoS attacks and the enduring nature of botnets.
Case study: Evolution of itsoknoproblembro
Intense 20 Gbps DDoS attacks become the new norm
Seven DDoS attacks were mitigated with an average bitrate in excess of 20 Gbps, and the United States joined China as the most prolific sources of DDoS denial of service attacks.
Case Study: itsoknoproblembro web-based DDoS suite
Perpetrators attempt to maximize botnet longevity
Shorter but higher volume DDoS attacks hit businesses of all types as hackers try to maximize botnet longevity and revenue while minimizing the risk of discovery.
Attack Spotlight: Dirt Jumper DDoS toolkit.
Financial services firms get hammered
A significant increase in attack traffic was directed at financial services firms.
Attacks become more concentrated and damaging
A dramatic rise in packet-per-second volume and significant attack activity against e-Commerce businesses
DDoS attackers change strategies
Attackers start to target the DDoS mitigation infrastructure directly, specifically routers.
Akamai® is the leading provider of cloud services for helping enterprises provide secure, high-performing user experiences on any device, anywhere. At the core of the Company's solutions is the Akamai Intelligent Platform providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai helps enterprises around the world optimize the web experience with SaaS cloud computing solutions including web application acceleration, mobile and web performance optimization, web media delivery and content delivery network (CDN) services, Akamai's cloud security solutions protect online assets against threats such as SQL Injection and DDoS attacks for maximum information security. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud.