Tuesday, March 17, 2026
HomeCyber SecurityDDoS Assaults Surge 46% in First Half of 2024, Gcore Report Reveals

DDoS Assaults Surge 46% in First Half of 2024, Gcore Report Reveals


DDoS Assaults Surge 46% in First Half of 2024, Gcore Report Reveals

Monitoring evolving DDoS traits is important for anticipating threats and adapting defensive methods. The complete Gcore Radar Report for the primary half of 2024 supplies detailed insights into DDoS assault knowledge, showcasing adjustments in assault patterns and the broader panorama of cyber threats. Right here, we share a collection of findings from the total report.

Key Takeaways

The variety of DDoS assaults in H1 2024 has elevated by 46% in comparison with the identical interval final yr, reaching 445K in Q2 2024. In comparison with knowledge for the earlier six months (Q3–4 2023), it elevated by 34%.

Peak assault energy elevated barely: Probably the most highly effective assault in H1 2024 reached 1.7 Tbps. By comparability, in 2023, it was 1.6 Tbps. Though there has solely been a rise of 0.1 Tbps in a yr, this nonetheless signifies a achieve in energy that poses a major hazard.

To place this into perspective, a terabit per second (Tbps) represents a large quantity of information flooding a community, equal to over 212,000 high-definition video streams being transmitted concurrently. Contemplating that even a 300 Gbps assault could make an unprotected server unavailable and trigger it to lose popularity, loyalty, and clients, any improve throughout the Tbps capability is critical.

Most-Attacked Industries

The gaming and playing trade stays essentially the most affected, accounting for 49% of the full assaults. This sector is especially susceptible resulting from its aggressive nature and the excessive monetary stakes concerned in on-line gaming.

The expertise trade skilled a major uptick in assaults, doubling to fifteen% of complete incidents. Expertise suppliers host important companies together with servers, storage, and networking assets, making disruptions notably impactful throughout quite a few different industries. Monetary companies, telecom, and e-commerce comply with, with 12%, 10%, and seven% of the assaults, respectively.

Community vs. Utility Layer Assaults

Community-layer assaults (L3–4) have predominantly impacted the gaming, expertise, and telecom industries because of the crucial nature of their real-time knowledge companies. Utility-layer assaults (L7) have considerably affected sectors similar to monetary companies, e-commerce, and media, disrupting transaction processing and content material supply.

Within the community layer, the gaming and playing sectors face the brunt resulting from their real-time interplay necessities and excessive consumer engagement, which make them prime targets. For expertise suppliers, the broad impression of assaults can disrupt a number of consumer companies concurrently, inflicting in depth operational interruptions. Telecom firms, which underpin the connectivity and communication framework, can expertise widespread service disruptions throughout assaults, affecting numerous customers and companies.

Utility layer (L7) assaults are a selected danger for the monetary sector because of the extreme repercussions related to downtime and regulatory penalties. E-commerce and the media and leisure sectors, which rely closely on steady buyer engagement and seamless content material supply respectively, face vital challenges in sustaining service stability throughout such assaults.

Assault Origins and Varieties

Figuring out the origins of application-layer assaults entails tracing IP addresses to particular international locations, offering actionable intelligence for defensive methods. In distinction, network-layer assaults typically contain IP spoofing, complicating origin monitoring. Frequent assault strategies embody UDP floods for network-layer assaults and HTTP floods for application-layer assaults, focusing on vulnerabilities in communication protocols.

Assault Length

Most DDoS assaults are transient, sometimes lasting beneath 10 minutes, however their frequency and depth may cause substantial operational disruptions. Nevertheless, the longest assault in H1 2024 lasted 16 hours, highlighting the necessity for strong and responsive mitigation methods.

Customized Assaults

Attackers are more and more personalizing their strategies, focusing on particular industries. This development in direction of extra subtle assaults requires superior, tailor-made defensive measures and underscores the significance of worldwide cooperation in cyber protection. Customized assaults within the gaming trade typically purpose to degrade particular servers, compelling customers to modify to rivals, whereas in monetary companies, the aim is usually to trigger most disruption for rapid monetary achieve via ransomware.

The variability within the length of assaults signifies that the perpetrators are adopting extra subtle techniques, customizing their strategies to align with the vulnerabilities and priorities of their targets. Within the gaming trade, as an illustration, assaults are usually short-lived and fewer highly effective however happen with better frequency. This tactic goals to repeatedly disturb a selected server, thereby degrading the gaming expertise in hopes of compelling gamers emigrate to rival servers. In distinction, for the monetary companies and telecommunications sectors—the place service disruptions have extremely excessive stakes and income repercussions are extra rapid—assaults are usually extra intense in quantity and range considerably in size.

Conclusion

The difficulty of DDoS assaults persists as a crucial worldwide concern, calling for world collaboration and the change of intelligence to behave swiftly and reduce the impression of those sorts of assaults.

The evolving nature of DDoS assaults, with growing complexity and precision, necessitates a vigilant and proactive defensive posture. With 145+ Tbps of community capability, protection throughout six continents, and a worldwide community always studying from its thousands and thousands of web properties, Gcore DDoS Safety supplies complete safeguards, making certain enterprise continuity and strong safety throughout numerous industries susceptible to those cyber threats.

Get the total Gcore Radar report for much more insights.

Discovered this text attention-grabbing? This text is a contributed piece from one in every of our valued companions. Observe us on Twitter and LinkedIn to learn extra unique content material we publish.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments