In This Article:
DDoS attacks are precision-guided digital weapons as DDoS-for-hire services, AI and powerful botnets drive onslaught of attacks
WESTFORD, Mass., April 02, 2025--(BUSINESS WIRE)--NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT) today released its 2H2024 DDoS Threat Intelligence Report, revealing how Distributed Denial of Service (DDoS) attacks have become a dominant means of waging cyberwarfare linked to sociopolitical events such as elections, civil protests, and policy disputes. The findings show how attackers exploit moments of national vulnerability to amplify chaos and erode trust in institutions, as they target the critical infrastructure of governments, commercial entities and service providers.
Throughout the year, DDoS attacks were intricately tied to social/political events, including Israel experiencing a 2,844% surge tied to hostage rescues and political conflicts, Georgia enduring a 1,489% increase during the lead-up to the passage of the "Russia Bill," Mexico having a 218% increase during national elections, and the United Kingdom experiencing a 152% increase on the day the Labour Party resumed session in Parliament.
"DDoS has emerged as the go-to tool for cyberwarfare," stated Richard Hummel, director, threat intelligence, NETSCOUT. "NoName057(16) continues to be the leading actor for politically motivated DDoS campaigns targeting governments, infrastructure, and organizations. In 2024, they repeatedly targeted government services in the United Kingdom, Belgium, and Spain."
AI and Automation Drive Scale and Impact
DDoS-for-hire services have become more powerful using AI for CAPTCHA bypassing, with about nine in ten platforms now offering this capability. Additionally, many employ automation to enable dynamic, multi-target campaigns and offer infrastructure exploitation techniques such as carpet bombing, geo-spoofing, and IPv6 to expand attack surfaces. Even the most novice operators can launch significant DDoS attack campaigns causing substantial harm.
Botnets Playing a Bigger Role
Enterprise servers and routers have been exploited to intensify attacks and make remediation more challenging. Overall botnet populations declined by 5% but demonstrated strong resiliency despite concerted takedown efforts. Law enforcement takedown efforts, like Operation PowerOFF, continue to target DDoS-for-hire services but only momentarily disrupt attack platforms as new platforms take their place. The long-term impact is uncertain as attackers adapt and reconstitute their networks, with no significant decline in global attack volume.