May 9, 2024 at 04:29PM
New data from Nexusguard’s DDoS Statistical Trends Report 2024 shows a shift in DDoS tactics with increased attacks on computers and servers, shorter but more powerful attacks, and increased targeting of Windows OS devices. Additionally, politically charged motives are driving attacks on vital services. HTTPS Flood and DNS Amplification attacks are gaining prominence, highlighting vulnerabilities in global internet infrastructure.
Summary of meeting notes:
– DDoS Statistical Trends Report 2024 by Nexusguard reveals a shift in DDoS tactics, with computers and servers becoming the primary target of attacks, making up 92% of DDoS attempts.
– Attacks are becoming shorter, less frequent, but more powerful. The overall frequency of attacks dropped by 55%, but the size of attacks grew by 233% in 2023.
– Attacks lasting 90 minutes increased by 22%, now making up 81% of all DDoS attacks.
– Politically charged hacktivism is increasingly motivating DDoS attacks, making vital services in areas like the public sector, government, and finance more vulnerable.
– Application attacks have shifted towards Windows OS devices, comprising 87% of all DDoS targets in 2023.
– NTP Amplification Attacks remain the most prominent attack vector, with HTTPS Flood and DNS Amplification rapidly gaining on NTP Amplification.
– Application attacks and volumetric attacks showed shifts in 2023, with application attacks rising 79% YoY and volumetric attacks declining 30%.
– Single-vector attacks dominate 93% of DDoS attacks, highlighting bad actors’ preference for simpler techniques.
For more information, refer to the full report on www.nexusguard.com.