Threat IntelHIGH

DDoS Attacks - 150% Surge Reported in 2025 Trends

CSCyber Security News
DDoS attacksGcorebotnetnetwork-layer attacksapplication-layer attacks
🎯

Basically, DDoS attacks are overwhelming online services, and they increased by 150% last year.

Quick Summary

DDoS attacks have surged by 150% in 2025, with technology and finance sectors most affected. This rise highlights the urgent need for businesses to enhance their defenses against such threats.

What Happened

In a recent report by Gcore, a significant surge in DDoS attacks has been revealed, with a staggering 150% increase year-on-year. The total number of attacks skyrocketed from 512,000 in Q4 2024 to 1.3 million in Q4 2025. This alarming trend indicates that DDoS activity is not just rising; it is accelerating and diversifying. The report highlights that the total attack volume reached a record 12 terabits per second (Tbps), showcasing a sixfold increase in attack capabilities.

The landscape of DDoS threats is evolving. Attackers are now leveraging automated tools and sophisticated techniques to execute their campaigns. This change means that businesses must adapt quickly to protect themselves from these increasingly frequent and complex threats.

Who's Being Targeted

The report identifies key sectors that are being disproportionately affected by these attacks. The technology sector is the most targeted, accounting for 34% of all attacks, followed closely by financial services (20%) and gaming (19%). These sectors are prime targets due to their reliance on service availability, where disruptions can lead to immediate operational and financial impacts.

Geographically, the Americas dominate the source of attacks, with Mexico and Brazil together contributing 55% of the observed DDoS activity. This concentration of attack sources underscores the need for businesses to implement defenses that can mitigate threats as close to their origin as possible.

Tactics & Techniques

The report reveals a shift in the tactics employed by attackers. Network-layer attacks now make up 82% of all incidents, reflecting a 20% increase from previous reports. These types of attacks are favored because they are cheaper and easier to execute, making them attractive for those looking to cause disruption.

Interestingly, while network-layer DDoS attacks are becoming shorter in duration—75% last less than one minute—application-layer attacks are evolving. A significant 64% of these attacks now exceed 10 minutes, indicating a shift towards more sustained efforts to disrupt services. This evolution reflects a broader trend where attackers are increasingly using automation to conduct large-scale campaigns with specific business impacts in mind.

Defensive Measures

Given the rapid escalation of DDoS attacks, businesses must take proactive measures to safeguard their operations. Gcore emphasizes the importance of adopting integrated security solutions that can detect intent, analyze behavior, and respond across multiple attack surfaces.

To effectively combat these threats, organizations should consider the following actions:

  • Invest in DDoS protection services that can absorb and mitigate large-scale attacks.
  • Enhance monitoring capabilities to quickly identify and respond to unusual traffic patterns.
  • Educate staff about the risks of DDoS attacks and the importance of cybersecurity hygiene.

As the threat landscape evolves, understanding these dynamics and preparing accordingly has never been more critical. Businesses that previously felt insulated from such threats must now recognize their vulnerability and take action to protect their digital assets.

🔒 Pro insight: The surge in DDoS attacks signals a shift towards more automated and sophisticated attack strategies, necessitating immediate enhancements in defensive measures.

Original article from

Cyber Security News · Cybernewswire

Read Full Article

Related Pings

HIGHThreat Intel

Threat Intel - Russian Broker Sentenced for Ransomware Role

Aleksei Volkov, a Russian hacker, has been sentenced to prison for selling access to corporate networks. His actions enabled ransomware attacks costing millions. This case highlights the need for stronger cybersecurity measures.

The Register Security·
HIGHThreat Intel

Threat Intel - Why Your Monitoring Program Is Failing

Flawed threat monitoring systems allow attackers to remain undetected for weeks. This oversight increases risks and costs for organizations. Rethink your monitoring strategies now!

Cyber Security News·
HIGHThreat Intel

Threat Intel - Russian Initial Access Broker Sentenced

Aleksei Volkov, a Russian hacker, has been sentenced to 81 months in prison for his role in ransomware attacks. His actions caused over $9 million in losses to victims. This case highlights the ongoing threat posed by initial access brokers in the cybercrime landscape.

Infosecurity Magazine·
HIGHThreat Intel

Handala Group - Iranian Hack-and- Leak Operations Exposed

The FBI has uncovered the Handala group, an Iranian hacking collective targeting dissidents since 2023. Their sophisticated malware poses serious risks to individuals and organizations. Stay informed and take protective measures against these threats.

Infosecurity Magazine·
HIGHThreat Intel

Threat Intel - Stryker Identifies Malicious File in Attack

Stryker has identified a malicious file linked to an Iran-backed cyberattack. The FBI warns of similar malware used by Iranian hackers. This incident highlights ongoing cyber threats from state-sponsored actors.

SecurityWeek·
HIGHThreat Intel

Threat Intel - New Data Leak Site ALP-001 Emerges

A new dark web site called ALP-001 has emerged, linked to an active Initial Access Broker. This site indicates a dangerous shift towards data extortion in cybercrime. Organizations should be vigilant and enhance their security measures to mitigate risks.

Cyber Security News·