www.helpnetsecurity.com Open in urlscan Pro
54.203.13.2  Public Scan

URL: https://www.helpnetsecurity.com/2023/07/21/ddos-attacks-h1-2023/
Submission: On July 21 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

POST

<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
  <div class="mc4wp-form-fields">
    <div class="hns-newsletter">
      <div class="hns-newsletter__top">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__title">
              <i>
                        <svg class="hic">
                            <use xlink:href="#hic-plus"></use>
                        </svg>
                    </i>
              <span>Cybersecurity news</span>
            </div>
          </div>
        </div>
      </div>
      <div class="hns-newsletter__bottom">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__body">
              <div class="row">
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
                    <label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
                  </div>
                </div>
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
                    <label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
                  </div>
                </div>
              </div>
            </div>
            <div class="form-check form-control-lg mb-3">
              <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
              <label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
            </div>
            <div class="input-group mb-3">
              <input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
              <button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
            </div>
            <div class="form-check">
              <input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
              <label class="form-check-label" for="mcs4">
                <span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms &amp; conditions</a>
                </span>
              </label>
            </div>
          </div>
        </div>
      </div>
    </div>
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1689948808"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
  <div class="mc4wp-response"></div>
</form>

Text Content

searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle
upmagazine plus
 * News
 * Features
 * Expert analysis
 * Videos
 * Reviews
 * Events
 * Whitepapers
 * Industry news
 * Product showcase
 * Newsletters

 * 
 * 
 * 


Help Net Security
July 21, 2023
Share


ATTACKERS INTENSIFY DDOS ATTACKS WITH NEW TACTICS



As we entered 2023, the cybersecurity landscape witnessed an increase in
sophisticated, high-volume attacks, according to Gcore.



The maximum attack power rose from 600 to 800 Gbps. UDP flood attacks were most
common and amounted to 52% of total attacks, while SYN flood accounted for 24%.
In third place was TCP flood.

The most-attacked business sectors are gaming, telecom, and financial. The
longest attack duration in Q2/Q3 was seven days, 16 hours, and 22 minutes. Most
attacks lasted less than four hours.


THE INCREASE IN THE DDOS ATTACK VOLUME IN THE H1 OF 2023

There has been a significant increase in the power and volume of DDoS attacks
over the last two years:

 * In 2021, the capacity of DDoS attacks was up to 300 Gbps.
 * In 2022, the attack capacity was about 650 Gbps.
 * In the H1 of 2023, we see a capacity of about 800 Gbps.

The alarming 50–100% annual increase in DDoS attack volume highlights the
growing sophistication of cyber attackers and their utilization of increasingly
powerful tools.

This means that businesses need to invest in DDoS mitigation strategies and
solutions to protect their networks, systems, and customer data. Failure to
address these evolving threats can result in costly disruptions, reputational
damage, loss of customer trust, and security breaches.


ATTACKERS ARE EMPLOYING ADAPTIVE STRATEGIES

According to Gcore’s statistics, in the H1 of 2023:

 * UDP flood became more popular among attackers and is the most common method.
 * SYN flood is in second place.
 * In third place is TCP flood.
 * All other techniques combined accounted for just 5% of attack types.

According to Andrey Slastenov, Head of Security Department at Gcore: “There has
been an increase in the frequency of complex, multi-vector attacks. Attackers
are now employing adaptive strategies, such as combining high-volume UDP attacks
with a massive number of TCP packets, and shifting from targeting the
application layer with a large amount of traffic to using a high volume of small
packets. These changes in tactics indicate a deliberate effort to intensify the
DDoS assault by overwhelming the network infrastructure and potentially
bypassing mitigation measures. The ultimate goal is to maximize the impact of
the attack and disrupt services.”

DDoS attacks across different business sectors have revealed specific trends and
impacts. According to Gcore’s report, gaming, telecom, and financial industries
were the most attacked sectors in the H1 of 2023.




More about
 * attacks
 * cybercrime
 * cybersecurity
 * DDoS
 * Gcore
 * report

Share this

FEATURED NEWS

 * North Korean hackers targeted tech companies through JumpCloud and GitHub
 * Citrix ADC zero-day exploitatation: CISA releases details about attack on CI
   organization (CVE-2023-3519)
 * How healthcare organizations should measure their device security success

Free entry-level cybersecurity training and certification exam


SPONSORED


3 WAYS WE’VE MADE THE CIS CONTROLS MORE AUTOMATION-FRIENDLY


THE BEST DEFENSE AGAINST CYBER THREATS FOR LEAN SECURITY TEAMS


SECURITY IN THE CLOUD WITH MORE AUTOMATION




DON'T MISS


NORTH KOREAN HACKERS TARGETED TECH COMPANIES THROUGH JUMPCLOUD AND GITHUB


CITRIX ADC ZERO-DAY EXPLOITATATION: CISA RELEASES DETAILS ABOUT ATTACK ON CI
ORGANIZATION (CVE-2023-3519)


HOW HEALTHCARE ORGANIZATIONS SHOULD MEASURE THEIR DEVICE SECURITY SUCCESS


CISOS ARE MAKING CYBERSECURITY A BUSINESS PROBLEM


MICROSOFT EXCHANGE SERVERS COMPROMISED BY TURLA APT




Cybersecurity news
Daily Newsletter
Weekly Newsletter
(IN)SECURE - monthly newsletter with top articles
Subscribe
I have read and agree to the terms & conditions
Leave this field empty if you're human:

© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us
×