
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Mon, 13 Apr 2026 18:03:37 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Safe in the sandbox: security hardening for Cloudflare Workers]]></title>
            <link>https://blog.cloudflare.com/safe-in-the-sandbox-security-hardening-for-cloudflare-workers/</link>
            <pubDate>Thu, 25 Sep 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ We are further hardening Cloudflare Workers with the latest software and hardware features. We use defense-in-depth, including V8 sandboxes and the CPU's memory protection keys to keep your data safe. ]]></description>
            <content:encoded><![CDATA[ <p>As a <a href="https://www.cloudflare.com/learning/serverless/what-is-serverless/"><u>serverless</u></a> cloud provider, we run your code on our globally distributed infrastructure. Being able to run customer code on our network means that anyone can take advantage of our global presence and low latency. Workers isn’t just efficient though, we also make it simple for our users. In short: <a href="https://workers.cloudflare.com/"><u>You write code. We handle the rest</u></a>.</p><p>Part of 'handling the rest' is making Workers as secure as possible. We have previously written about our <a href="https://blog.cloudflare.com/mitigating-spectre-and-other-security-threats-the-cloudflare-workers-security-model/"><u>security architecture</u></a>. Making Workers secure is an interesting problem because the whole point of Workers is that we are running third party code on our hardware. This is one of the hardest security problems there is: any attacker has the full power available of a programming language running on the victim's system when they are crafting their attacks.</p><p>This is why we are constantly updating and improving the Workers Runtime to take advantage of the latest improvements in both hardware and software. This post shares some of the latest work we have been doing to keep Workers secure.</p><p>Some background first: <a href="https://www.cloudflare.com/developer-platform/products/workers/"><u>Workers</u></a> is built around the <a href="https://v8.dev/"><u>V8</u></a> JavaScript runtime, originally developed for Chromium-based browsers like Chrome. This gives us a head start, because V8 was forged in an adversarial environment, where it has always been under intense attack and <a href="https://github.blog/security/vulnerability-research/getting-rce-in-chrome-with-incorrect-side-effect-in-the-jit-compiler/"><u>scrutiny</u></a>. Like Workers, Chromium is built to run adversarial code safely. That's why V8 is constantly being tested against the best fuzzers and sanitizers, and over the years, it has been hardened with new technologies like <a href="https://v8.dev/blog/oilpan-library"><u>Oilpan/cppgc</u></a> and improved static analysis.</p><p>We use V8 in a slightly different way, though, so we will be describing in this post how we have been making some changes to V8 to improve security in our use case.</p>
    <div>
      <h2>Hardware-assisted security improvements from Memory Protection Keys</h2>
      <a href="#hardware-assisted-security-improvements-from-memory-protection-keys">
        
      </a>
    </div>
    <p>Modern CPUs from Intel, AMD, and ARM have support for <a href="https://man7.org/linux/man-pages/man7/pkeys.7.html"><u>memory protection keys</u></a>, sometimes called <i>PKU</i>, Protection Keys for Userspace. This is a great security feature which increases the power of virtual memory and memory protection.</p><p>Traditionally, the memory protection features of the CPU in your PC or phone were mainly used to protect the kernel and to protect different processes from each other. Within each process, all threads had access to the same memory. Memory protection keys allow us to prevent specific threads from accessing memory regions they shouldn't have access to.</p><p>V8 already <a href="https://issues.chromium.org/issues/41480375"><u>uses memory protection keys</u></a> for the <a href="https://en.wikipedia.org/wiki/Just-in-time_compilation"><u>JIT compilers</u></a>. The JIT compilers for a language like JavaScript generate optimized, specialized versions of your code as it runs. Typically, the compiler is running on its own thread, and needs to be able to write data to the code area in order to install its optimized code. However, the compiler thread doesn't need to be able to run this code. The regular execution thread, on the other hand, needs to be able to run, but not modify, the optimized code. Memory protection keys offer a way to give each thread the permissions it needs, but <a href="https://en.wikipedia.org/wiki/W%5EX"><u>no more</u></a>. And the V8 team in the Chromium project certainly aren't standing still. They describe some of their future plans for memory protection keys <a href="https://docs.google.com/document/d/1l3urJdk1M3JCLpT9HDvFQKOxuKxwINcXoYoFuKkfKcc/edit?tab=t.0#heading=h.gpz70vgxo7uc"><u>here</u></a>.</p><p>In Workers, we have some different requirements than Chromium. <a href="https://developers.cloudflare.com/workers/reference/security-model/"><u>The security architecture for Workers</u></a> uses V8 isolates to separate different scripts that are running on our servers. (In addition, we have <a href="https://blog.cloudflare.com/spectre-research-with-tu-graz/"><u>extra mitigations</u></a> to harden the system against <a href="https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)"><u>Spectre</u></a> attacks). If V8 is working as intended, this should be enough, but we believe in <i>defense in depth</i>: multiple, overlapping layers of security controls.</p><p>That's why we have deployed internal modifications to V8 to use memory protection keys to isolate the isolates from each other. There are up to 15 different keys available on a modern x64 CPU and a few are used for other purposes in V8, so we have about 12 to work with. We give each isolate a random key which is used to protect its V8 <i>heap data</i>, the memory area containing the JavaScript objects a script creates as it runs. This means security bugs that might previously have allowed an attacker to read data from a different isolate would now hit a hardware trap in 92% of cases. (Assuming 12 keys, 92% is about 11/12.)</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4cHaaZrAhQf759og04S63G/59ff1974dc878ec8ad7d40f1f079be37/image9.png" />
          </figure><p>The illustration shows an attacker attempting to read from a different isolate. Most of the time this is detected by the mismatched memory protection key, which kills their script and notifies us, so we can investigate and remediate. The red arrow represents the case where the attacker got lucky by hitting an isolate with the same memory protection key, represented by the isolates having the same colors.</p><p>However, we can further improve on a 92% protection rate. In the last part of this blog post we'll explain how we can lift that to 100% for a particular common scenario. But first, let's look at a software hardening feature in V8 that we are taking advantage of.</p>
    <div>
      <h2>The V8 sandbox, a software-based security boundary</h2>
      <a href="#the-v8-sandbox-a-software-based-security-boundary">
        
      </a>
    </div>
    <p>Over the past few years, V8 has been gaining another defense in depth feature: the V8 sandbox. (Not to be confused with the <a href="https://blog.cloudflare.com/sandboxing-in-linux-with-zero-lines-of-code/"><u>layer 2 sandbox</u></a> which Workers have been using since the beginning.) The V8 sandbox has been a multi-year project that has been gaining <a href="https://v8.dev/blog/sandbox"><u>maturity</u></a> for a while. The sandbox project stems from the observation that many V8 security vulnerabilities start by corrupting objects in the V8 heap memory. Attackers then leverage this corruption to reach other parts of the process, giving them the opportunity to escalate and gain more access to the victim's browser, or even the entire system.</p><p>V8's sandbox project is an ambitious software security mitigation that aims to thwart that escalation: to make it impossible for the attacker to progress from a corruption on the V8 heap to a compromise of the rest of the process. This means, among other things, removing all pointers from the heap. But first, let's explain in as simple terms as possible, what a memory corruption attack is.</p>
    <div>
      <h3>Memory corruption attacks</h3>
      <a href="#memory-corruption-attacks">
        
      </a>
    </div>
    <p>A memory corruption attack tricks a program into misusing its own memory. Computer memory is just a store of integers, where each integer is stored in a location. The locations each have an <i>address</i>, which is also just a number. Programs interpret the data in these locations in different ways, such as text, pixels, or <i>pointers</i>. Pointers are addresses that identify a different memory location, so they act as a sort of arrow that points to some other piece of data.</p><p>Here's a concrete example, which uses a buffer overflow. This is a form of attack that was historically common and relatively simple to understand: Imagine a program has a small buffer (like a 16-character text field) followed immediately by an 8-byte pointer to some ordinary data. An attacker might send the program a 24-character string, causing a "buffer overflow." Because of a vulnerability in the program, the first 16 characters fill the intended buffer, but the remaining 8 characters spill over and overwrite the adjacent pointer.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5VlcKOYtfRHwWZVDb6GOPm/517ae1987c89273e1f33eb6ca11d752d/image5.png" />
          </figure><p><sup><i>See below for how such an attack would now be thwarted.</i></sup></p><p>Now the pointer has been redirected to point at sensitive data of the attacker's choosing, rather than the normal data it was originally meant to access. When the program tries to use what it believes is its normal pointer, it's actually accessing sensitive data chosen by the attacker.</p><p>This type of attack works in steps: first create a small confusion (like the buffer overflow), then use that confusion to create bigger problems, eventually gaining access to data or capabilities the attacker shouldn't have.  The attacker can eventually use the misdirection to either steal information or plant malicious data that the program will treat as legitimate.</p><p>This was a somewhat abstract description of memory corruption attacks using a buffer overflow, one of the simpler techniques. For some much more detailed and recent examples, see <a href="https://googleprojectzero.blogspot.com/2015/06/what-is-good-memory-corruption.html"><u>this description from Google</u></a>, or this <a href="https://medium.com/@INTfinitySG/miscellaneous-series-2-a-script-kiddie-diary-in-v8-exploit-research-part-1-5b0bab211f5a"><u>breakdown of a V8 vulnerability</u></a>.</p>
    <div>
      <h3>Compressed pointers in V8</h3>
      <a href="#compressed-pointers-in-v8">
        
      </a>
    </div>
    <p>Many attacks are based on corrupting pointers, so ideally we would remove all pointers from the memory of the program.  Since an object-oriented language's heap is absolutely full of pointers, that would seem, on its face, to be a hopeless task, but it is enabled by an earlier development. Starting in 2020, V8 has offered the option of saving memory by using <a href="https://v8.dev/blog/pointer-compression"><u>compressed pointers</u></a>. This means that, on a 64-bit system, the heap uses only 32 bit offsets, relative to a base address. This limits the total heap to maximally 4 GiB, a limitation that is acceptable for a browser, and also fine for individual scripts running in a V8 isolate on Cloudflare Workers.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/sO5ByQzR62UcxZiaxwcaq/2f2f0c04af57bb492e9ecaa321935112/image1.png" />
          </figure><p><sup><i>An artificial object with various fields, showing how the layout differs in a compressed vs. an uncompressed heap. The boxes are 64 bits wide.</i></sup></p><p>If the whole of the heap is in a single 4 GiB area then the first 32 bits of all pointers will be the same, and we don't need to store them in every pointer field in every object. In the diagram we can see that the object pointers all start with 0x12345678, which is therefore redundant and doesn't need to be stored. This means that object pointer fields and integer fields can be reduced from 64 to 32 bits.</p><p>We still need 64 bit fields for some fields like double precision floats and for the sandbox offsets of buffers, which are typically used by the script for input and output data. See below for details.</p><p>Integers in an uncompressed heap are stored in the high 32 bits of a 64 bit field. In the compressed heap, the top 31 bits of a 32 bit field are used. In both cases the lowest bit is set to 0 to indicate integers (as opposed to pointers or offsets).</p><p>Conceptually, we have two methods for compressing and decompressing, using a base address that is divisible by 4 GiB:</p>
            <pre><code>// Decompress a 32 bit offset to a 64 bit pointer by adding a base address.
void* Decompress(uint32_t offset) { return base + offset; }
// Compress a 64 bit pointer to a 32 bit offset by discarding the high bits.
uint32_t Compress(void* pointer) { return (intptr_t)pointer &amp; 0xffffffff; }</code></pre>
            <p>This pointer compression feature, originally primarily designed to save memory, can be used as the basis of a sandbox.</p>
    <div>
      <h3>From compressed pointers to the sandbox</h3>
      <a href="#from-compressed-pointers-to-the-sandbox">
        
      </a>
    </div>
    <p>The biggest 32-bit unsigned integer is about 4 billion, so the <code>Decompress()</code> function cannot generate any pointer that is outside the range [base, base + 4 GiB]. You could say the pointers are trapped in this area, so it is sometimes called the <i>pointer cage</i>. V8 can reserve 4 GiB of virtual address space for the pointer cage so that only V8 objects appear in this range. By eliminating <i>all</i> pointers from this range, and following some other strict rules, V8 can contain any memory corruption by an attacker to this cage. Even if an attacker corrupts a 32 bit offset within the cage, it is still only a 32 bit offset and can only be used to create new pointers that are still trapped within the pointer cage.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3r5H81eDvHgaPIBFw5gG6B/65ffa220f9141a81af893183a09321ac/image7.png" />
          </figure><p><sup><i>The buffer overflow attack from earlier no longer works because only the attacker's own data is available in the pointer cage.</i></sup></p><p>To construct the sandbox, we take the 4 GiB pointer cage and add another 4 GiB for buffers and other data structures to make the 8 GiB sandbox. This is why the buffer offsets above are 33 bits, so they can reach buffers in the second half of the sandbox (40 bits in Chromium with larger sandboxes). V8 stores these buffer offsets in the high 33 bits and shifts down by 31 bits before use, in case an attacker corrupted the low bits.</p><p>Cloudflare Workers have made use of compressed pointers in V8 for a while, but for us to get the full power of the sandbox we had to make some changes. Until recently, all isolates in a process had to be one single sandbox if you were using the sandboxed configuration of V8. This would have limited the total size of all V8 heaps to be less than 4 GiB, far too little for our architecture, which relies on serving 1000s of scripts at once.</p><p>That's why we commissioned <a href="https://www.igalia.com/"><u>Igalia</u></a> to add<a href="https://dbezhetskov.dev/multi-sandboxes/"><u> isolate groups</u></a> to V8. Each isolate group has its own sandbox and can have 1 or more isolates within it. Building on this change we have been able to start using the sandbox, eliminating a whole class of potential security issues in one stroke. Although we can place multiple isolates in the same sandbox, we are currently only putting a single isolate in each sandbox.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3jwaGI8xIAC6755vw2BWfE/d8b0cd5b36dbe8b5e628c62ef7f3d474/image2.png" />
          </figure><p><sup><i>The layout of the sandbox. In the sandbox there can be more than one isolate, but all their heap pages must be in the pointer cage: the first 4 GiB of the sandbox. Instead of pointers between the objects, we use 32 bit offsets. The offsets for the buffers are 33 bits, so they can reach the whole sandbox, but not outside it.</i></sup></p>
    <div>
      <h2>Virtual memory isn't infinite, there's a lot going on in a Linux process</h2>
      <a href="#virtual-memory-isnt-infinite-theres-a-lot-going-on-in-a-linux-process">
        
      </a>
    </div>
    <p>At this point, we were not quite done, though. Each sandbox reserves 8 GiB of space in the virtual memory map of the process, and it must be 4 GiB aligned <a href="https://v8.dev/blog/pointer-compression"><u>for efficiency</u></a>. It uses much less physical memory, but the sandbox mechanism requires this much virtual space for its security properties. This presents us with a problem, since a Linux process 'only' has 128 TiB of virtual address space in a 4-level page table (another 128 TiB are reserved for the kernel, not available to user space).</p><p>At Cloudflare, we want to run Workers as efficiently as possible to keep costs and prices down, and to offer a generous free tier. That means that on each machine we have so many isolates running (one per sandbox) that it becomes hard to place them all in a 128 TiB space.</p><p>Knowing this, we have to place the sandboxes carefully in memory. Unfortunately, the Linux syscall, <a href="https://man7.org/linux/man-pages/man2/mmap.2.html"><u>mmap</u></a>, does not allow us to specify the alignment of an allocation unless you can guess a free location to request. To get an 8 GiB area that is 4 GiB aligned, we have to ask for 12 GiB, then find the aligned 8 GiB area that must exist within that, and return the unused (hatched) edges to the OS:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Dqey3y5ZsPugD3pyRpQUY/cdadceeb96dbb01a2062dc98c7c554bc/image6.png" />
          </figure><p>If we allow the Linux kernel to place sandboxes randomly, we end up with a layout like this with gaps. Especially after running for a while, there can be both 8 GiB and 4 GiB gaps between sandboxes:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6oaIPZnjaJrLYoFK6v03oI/6c53895f1151d70f71511d8cdfa35f00/image3.png" />
          </figure><p>Sadly, because of our 12 GiB alignment trick, we can't even make use of the 8 GiB gaps. If we ask the OS for 12 GiB, it will never give us a gap like the 8 GiB gap between the green and blue sandboxes above. In addition, there are a host of other things going on in the virtual address space of a Linux process: the malloc implementation may want to grab pages at particular addresses, the executable and libraries are mapped at a random location by ASLR, and V8 has allocations outside the sandbox.</p><p>The latest generation of x64 CPUs supports a much bigger address space, which solves both problems, and Linux kernels are able to make use of the extra bits with <a href="https://en.wikipedia.org/wiki/Intel_5-level_paging"><u>five level page tables</u></a>. A process has to <a href="https://lwn.net/Articles/717293/"><u>opt into this</u></a>, which is done by a single mmap call suggesting an address outside the 47 bit area. The reason this needs an opt-in is that some programs can't cope with such high addresses. Curiously, V8 is one of them.</p><p>This isn't hard to fix in V8, but not all of our fleet has been upgraded yet to have the necessary hardware. So for now, we need a solution that works with the existing hardware. We have modified V8 to be able to grab huge memory areas and then use <a href="https://man7.org/linux/man-pages/man2/mprotect.2.html"><u>mprotect syscalls</u></a> to create tightly packed 8 GiB spaces for sandboxes, bypassing the inflexible mmap API.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7kPgAWxoR7nDsZHUOBsNMp/15e7b2a1aac827acfce8b0d614e44cde/image8.png" />
          </figure>
    <div>
      <h2>Putting it all together</h2>
      <a href="#putting-it-all-together">
        
      </a>
    </div>
    <p>Taking control of the sandbox placement like this actually gives us a security benefit, but first we need to describe a particular threat model.</p><p>We assume for the purposes of this threat model that an attacker has an arbitrary way to corrupt data within the sandbox. This is historically the first step in many V8 exploits. So much so that there is a <a href="https://bughunters.google.com/about/rules/chrome-friends/5745167867576320/chrome-vulnerability-reward-program-rules#v8-sandbox-bypass-rewards"><u>special tier</u></a> in Google's V8 bug bounty program where you may <i>assume</i> you have this ability to corrupt memory, and they will pay out if you can leverage that to a more serious exploit.</p><p>However, we assume that the attacker does not have the ability to execute arbitrary machine code. If they did, they could <a href="https://www.usenix.org/system/files/sec20fall_connor_prepub.pdf"><u>disable memory protection keys</u></a>. Having access to the in-sandbox memory only gives the attacker access to their own data. So the attacker must attempt to escalate, by corrupting data inside the sandbox to access data outside the sandbox.</p><p>You will recall that the compressed, sandboxed V8 heap only contains 32 bit offsets. Therefore, no corruption there can reach outside the pointer cage. But there are also arrays in the sandbox — vectors of data with a given size that can be accessed with an index. In our threat model, the attacker can modify the sizes recorded for those arrays and the indexes used to access elements in the arrays. That means an attacker could potentially turn an array in the sandbox into a tool for accessing memory incorrectly. For this reason, the V8 sandbox normally has <i>guard regions</i> around it: These are 32 GiB virtual address ranges that have no virtual-to-physical address mappings. This helps guard against the worst case scenario: Indexing an array where the elements are 8 bytes in size (e.g. an array of double precision floats) using a maximal 32 bit index. Such an access could reach a distance of up to 32 GiB outside the sandbox: 8 times the maximal 32 bit index of four billion.</p><p>We want such accesses to trigger an alarm, rather than letting an attacker access nearby memory.  This happens automatically with guard regions, but we don't have space for conventional 32 GiB guard regions around every sandbox.</p><p>Instead of using conventional guard regions, we can make use of memory protection keys. By carefully controlling which isolate group uses which key, we can ensure that no sandbox within 32 GiB has the same protection key. Essentially, the sandboxes are acting as each other's guard regions, protected by memory protection keys. Now we only need a wasted 32 GiB guard region at the start and end of the huge packed sandbox areas.
</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/53MPs8P84ayqEiTXh7gV5O/88104f74f1d51dbdda8d987e1c7df3aa/image10.png" />
          </figure><p>With the new sandbox layout, we use strictly rotating memory protection keys. Because we are not using randomly chosen memory protection keys, for this threat model the 92% problem described above disappears. Any in-sandbox security issue is unable to reach a sandbox with the same memory protection key. In the diagram, we show that there is no memory within 32 GiB of a given sandbox that has the same memory protection key. Any attempt to access memory within 32 GiB of a sandbox will trigger an alarm, just like it would with unmapped guard regions.</p>
    <div>
      <h2>The future</h2>
      <a href="#the-future">
        
      </a>
    </div>
    <p>In a way, this whole blog post is about things our customers <i>don't</i> need to do. They don't need to upgrade their server software to get the latest patches, we do that for them. They don't need to worry whether they are using the most secure or efficient configuration. So there's no call to action here, except perhaps to sleep easy.</p><p>However, if you find work like this interesting, and especially if you have experience with the implementation of V8 or similar language runtimes, then you should consider coming to work for us. <a href="https://job-boards.greenhouse.io/cloudflare/jobs/6718312?gh_jid=6718312"><u>We are recruiting both in the US and in Europe</u></a>. It's a great place to work, and Cloudflare is going from strength to strength.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Engineering]]></category>
            <category><![CDATA[Linux]]></category>
            <category><![CDATA[Malicious JavaScript]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <guid isPermaLink="false">7bZyPF4nBnr5gisZW2crax</guid>
            <dc:creator>Erik Corry</dc:creator>
            <dc:creator>Ketan Gupta</dc:creator>
        </item>
        <item>
            <title><![CDATA[MadeYouReset: An HTTP/2 vulnerability thwarted by Rapid Reset mitigations]]></title>
            <link>https://blog.cloudflare.com/madeyoureset-an-http-2-vulnerability-thwarted-by-rapid-reset-mitigations/</link>
            <pubDate>Thu, 14 Aug 2025 22:03:00 GMT</pubDate>
            <description><![CDATA[ A new HTTP/2 denial-of-service (DoS) vulnerability called MadeYouReset was recently disclosed by security researchers. Cloudflare HTTP DDoS mitigation, already protects from MadeYouReset. ]]></description>
            <content:encoded><![CDATA[ <p><i><sub>(Correction on August 19, 2025: This post was updated to correct and clarify details about the vulnerability and the HTTP/2 protocol.)</sub></i></p><p>On August 13, security researchers at Tel Aviv University disclosed a new HTTP/2 denial-of-service (DoS) vulnerability that they are calling MadeYouReset (<a href="https://www.kb.cert.org/vuls/id/767506"><u>CVE-2025-8671</u></a>). This vulnerability exists in a limited number of unpatched HTTP/2 server implementations that do not accurately track use of server-sent stream resets, which can lead to resource consumption. <b>If you’re using Cloudflare for HTTP DDoS mitigation, you’re already protected from MadeYouReset</b>.</p><p>Cloudflare was informed of this vulnerability in May through a coordinated disclosure process, and we were able to confirm that our systems were not susceptible. We foresaw this sort of attack while mitigating the "<a href="https://blog.cloudflare.com/on-the-recent-http-2-dos-attacks/"><u>Netflix vulnerabilities</u></a>" in 2019, and added even stronger defenses in response to <a href="https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/"><u>Rapid Reset</u></a> (<a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487"><u>CVE-2023-44487</u></a>) in 2023. MadeYouReset and Rapid Reset are two conceptually similar attacks that exploit a fundamental feature within <a href="https://datatracker.ietf.org/doc/html/rfc9113#RST_STREAM"><u>the HTTP/2 specification</u></a> (RFC 9113): stream resets. In the HTTP/2 protocol, a client initiates a bidirectional stream that carries an HTTP request/response exchange, represented as frames sent between the client and server. Typically, HEADERS and DATA frames are used for a complete exchange.  Endpoints can use the RST_STREAM frame to prematurely terminate a stream, essentially cancelling operations and signalling that it won’t process any more request or response data. Furthermore, HTTP/2 requires that RST_STREAM is sent when there are protocol errors related to the stream. For example, <a href="http://datatracker.ietf.org/doc/html/rfc9113#section-6.1-10"><u>section 6.1 of RFC 9113</u></a> requires that when a DATA frame is received under the wrong circumstances, "...<i>the recipient MUST respond with a stream error (</i><a href="https://datatracker.ietf.org/doc/html/rfc9113#section-5.4.2"><i><u>Section 5.4.2</u></i></a><i>) of type STREAM_CLOSED</i>". </p><p>The vulnerability exploited by both MadeYouReset and Rapid Reset lies in the potential for malicious actors to abuse this stream reset mechanism. By repeatedly causing stream resets, attackers can overwhelm a server's resources. While the server is attempting to process and respond to a multitude of requests, the rapid succession of resets forces it to expend computational effort on starting and then immediately discarding these operations. This can lead to resource exhaustion and impact the availability of the targeted server for legitimate users; <a href="https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/#impact-on-customers"><u>as described previously</u></a>, the main difference between the two attacks is that Rapid Reset exploits client-sent resets, while MadeYouReset exploits server-sent resets. It works by using a client to persuade a server into resetting streams via intentionally sending frames that trigger protocol violations, which in turn trigger stream errors.</p><p>RFC 9113 details a number of <a href="https://datatracker.ietf.org/doc/html/rfc9113#section-10.5"><u>denial-of-service considerations</u></a>. Fundamentally, the protocol provides many features with legitimate uses that can be exploited by attackers with nefarious intent. Implementations are advised to harden themselves: "An endpoint that doesn't monitor use of these features exposes itself to a risk of denial of service. Implementations SHOULD track the use of these features and set limits on their use."</p><p>Fortunately, the MadeYouReset vulnerability only impacts a relatively small number of HTTP/2 implementations. In most major HTTP/2 implementations already in widespread use today, the proactive measures taken to implement RFC 9113 guidance and counter Rapid Reset in 2023 have also provided substantial protection against MadeYouReset, limiting its potential impact and preventing a similarly disruptive event.</p><blockquote><p><b>A note about Cloudflare’s Pingora and its users:
</b>Our <a href="https://blog.cloudflare.com/pingora-open-source/"><u>open-sourced Pingora framework</u></a> uses the popular Rust-language h2 library for its HTTP/2 support. Versions of h2 prior to 0.4.11 were <a href="https://seanmonstar.com/blog/hyper-http2-didnt-madeyoureset/"><u>potentially susceptible to MadeYouReset</u></a>. Users of Pingora can patch their applications by updating their h2 crate version using the cargo update command. Pingora does not itself terminate inbound HTTP connections to Cloudflare’s network, meaning this vulnerability could not be exploited against Cloudflare’s infrastructure.</p></blockquote><p>We would like to credit researchers <a href="https://galbarnahum.com/posts/made-you-reset-intro"><u>Gal Bar Nahum</u></a>, Anat Bremler-Barr, and Yaniv Harel of Tel Aviv University for discovering this vulnerability and thank them for their leadership in the coordinated disclosure process. Cloudflare always encourages security researchers to submit vulnerabilities like this to our <a href="https://hackerone.com/cloudflare?type=team"><u>HackerOne Bug Bounty program</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[DDoS]]></category>
            <guid isPermaLink="false">707qJXBfSyXWBe0ziAnp8G</guid>
            <dc:creator>Alex Forster</dc:creator>
            <dc:creator>Noah Maxwell Kennedy</dc:creator>
            <dc:creator>Lucas Pardue</dc:creator>
            <dc:creator>Evan Rittenhouse</dc:creator>
        </item>
        <item>
            <title><![CDATA[Targeted by 20.5 million DDoS attacks, up 358% year-over-year: Cloudflare’s 2025 Q1 DDoS Threat Report]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2025-q1/</link>
            <pubDate>Sun, 27 Apr 2025 23:00:00 GMT</pubDate>
            <description><![CDATA[ DDoS attacks are surging. In 2025 Q1, Cloudflare blocked +20M attacks (a 358% YoY spike) along with 5.6 Tbps and 4.8 Bpps record-breaking attacks. ]]></description>
            <content:encoded><![CDATA[ <p>Welcome to the 21st edition of the Cloudflare DDoS Threat Report. Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of <a href="https://www.cloudflare.com/learning/ddos/glossary/denial-of-service/"><u>Distributed Denial of Service (DDoS) attacks</u></a> based on data from the <a href="https://www.cloudflare.com/network/"><u>Cloudflare network</u></a>. In this edition, we focus on the first quarter of 2025. To view previous reports, visit <a href="http://www.ddosreport.com"><u>www.ddosreport.com</u></a>.</p><p>While this report primarily focuses on 2025 Q1, it also includes late-breaking data from a <a href="#hyper-volumetric-ddos-attacks">hyper-volumetric DDoS campaign observed in April 2025</a>, featuring some of the largest attacks ever publicly disclosed. In a historic surge of activity, we blocked the most intense packet rate attack on record, peaking at 4.8 billion packets per second (Bpps), 52% higher than the previous benchmark, and separately defended against a massive 6.5 terabits-per-second (Tbps) flood, matching the highest bandwidth attacks ever reported.</p>
    <div>
      <h2>Key DDoS insights</h2>
      <a href="#key-ddos-insights">
        
      </a>
    </div>
    <ul><li><p>In the first quarter of 2025, Cloudflare blocked 20.5 million DDoS attacks. That represents a 358% year-over-year (YoY) increase and a 198% quarter-over-quarter (QoQ) increase. </p></li><li><p>Around one third of those, 6.6 million, targeted the Cloudflare network infrastructure directly, as part of an 18-day multi-vector attack campaign.</p></li><li><p>Furthermore, in the first quarter of 2025, Cloudflare blocked approximately 700 hyper-volumetric DDoS attacks that exceeded 1 Tbps or 1 Bpps — an average of around 8 attacks per day.</p></li></ul><p>All the attacks were blocked by our <a href="https://www.cloudflare.com/ddos/"><u>autonomous defenses</u></a>.</p><p><i>To learn more about DDoS attacks and other types of cyber threats, refer to our </i><a href="https://www.cloudflare.com/learning/"><i><u>Learning Center</u></i></a><i>. Visit </i><a href="https://radar.cloudflare.com/reports?q=DDoS"><i><u>Cloudflare Radar</u></i></a><i> to view this report in its interactive version where you can drill down further. There's a </i><a href="https://developers.cloudflare.com/radar/"><i><u>free API</u></i></a><i> for those interested in investigating Internet trends. You can also learn more about the </i><a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/"><i><u>methodologies</u></i></a><i> used in preparing these reports.</i></p>
    <div>
      <h2>DDoS attacks in numbers</h2>
      <a href="#ddos-attacks-in-numbers">
        
      </a>
    </div>
    <p>In the first quarter of 2025, we blocked 20.5 million DDoS attacks. For comparison, during the calendar year 2024, we blocked 21.3 million DDoS attacks. In just this past quarter, we blocked 96% of what we blocked in 2024.</p><p>The most significant increase was in network-layer DDoS attacks. In 2025 Q1, we blocked 16.8M network-layer DDoS attacks. That’s a 397% QoQ increase and a 509% YoY increase. HTTP DDoS attacks also increased — a 7% QoQ increase and a 118% YoY increase.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4sBpHyhcmYaGxx6bYjGhIR/c257628e5f3c3f854f734c371192de00/image2.png" />
          </figure><p>We count DDoS attacks based on unique real-time fingerprints generated by our systems. In some instances, a single attack or campaign may generate multiple fingerprints, particularly when different mitigation strategies are applied. While this can occasionally lead to higher counts, the metric offers a strong overall indicator of attack activity during a given period.</p>
    <div>
      <h3>Attacks target the Cloudflare network and Internet infrastructure</h3>
      <a href="#attacks-target-the-cloudflare-network-and-internet-infrastructure">
        
      </a>
    </div>
    <p>Of the 20.5 million DDoS attacks blocked in Q1, 16.8 million were network-layer DDoS attacks, and of those, 6.6M targeted Cloudflare’s network infrastructure directly. Another 6.9 million targeted hosting providers and service providers protected by Cloudflare.</p><p>These attacks were part of an 18-day multi-vector DDoS campaign comprising <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/"><u>SYN flood attacks</u></a>, <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/"><u>Mirai-generated DDoS attacks</u></a>, and <a href="https://www.cloudflare.com/learning/ddos/ssdp-ddos-attack/"><u>SSDP amplification attacks</u></a> to name a few. These attacks, as with all of the 20.5 million, were autonomously detected and blocked by our DDoS defenses.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3vyRgcrWUTgw9aClvNaLE9/7afb403ff99c4565c3874fe252372961/image5.png" />
          </figure><p>In the graph below, daily aggregates of attacks against Cloudflare are represented by the blue line, and the other colors represent the various hosting providers and Internet service providers using Cloudflare’s <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Magic Transit</u></a> service that were attacked simultaneously.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3sh8O0seqxOmmQxYY0xO7F/c8563ea41e431b037a7312b60ed36fdc/image1.png" />
          </figure>
    <div>
      <h3>Hyper-volumetric DDoS attacks</h3>
      <a href="#hyper-volumetric-ddos-attacks">
        
      </a>
    </div>
    <p>Hyper-volumetric DDoS attacks are attacks that exceed 1-2 Tbps or 1 Bpps. In 2025 Q1, we blocked over 700 of these attacks. Approximately 4 out of every 100,000 network-layer DDoS attacks were hyper-volumetric. Hyper-volumetric DDoS attacks tend to take place over <a href="https://www.cloudflare.com/learning/ddos/glossary/user-datagram-protocol-udp/"><u>UDP</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4GtQgxuXLcOgXRabQadxb1/00dc9fbf694fd2ec5ada0ca222dc9a2f/image10.png" />
          </figure>
    <div>
      <h3>Hyper-volumetric attacks continue spill into Q2</h3>
      <a href="#hyper-volumetric-attacks-continue-spill-into-q2">
        
      </a>
    </div>
    <p>While this report primarily focuses on 2025 Q1, we believe it is important to also highlight the significant hyper-volumetric record-breaking DDoS attacks that continued into Q2. As such, we have included initial insights from that campaign.</p><p>In the second half of April 2025, Cloudflare’s systems automatically detected and blocked dozens of hyper-volumetric DDoS attacks as part of an intense campaign. The largest attacks peaked at 4.8 Bpps and 6.5 Tbps, with these massive surges typically lasting between 35 and 45 seconds. At 6.5 Tbps, this attack matches the <a href="https://www.wired.com/story/eleven11bot-botnet-record-size-ddos-attacks/"><u>largest publicly disclosed DDoS attack</u></a> to date. The 4.8 Bpps attack is the largest ever to be disclosed from the packet intensity perspective, approximately 52% larger than the previous 3.15 Bpps record.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1F1R0SBYghSqSPjiNYYK6W/c60c183589e9d554b9fb32e9553737a6/image17.png" />
          </figure><p>The attacks originated from 147 countries and targeted multiple IP addresses and ports of a hosting provider that is protected by Cloudflare <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Magic Transit</u></a>. All the attacks were successfully blocked by Cloudflare’s network.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5oqr2yW1zOQYx3tTUbUt93/b283fda3d65be0e9e37d2e786ff13f8a/image6.png" />
          </figure>
    <div>
      <h2>Threat actors</h2>
      <a href="#threat-actors">
        
      </a>
    </div>
    <p>When surveying Cloudflare customers that were targeted by DDoS attacks, the majority said they didn’t know who attacked them. The ones that did know reported their competitors as the number one threat actor behind the attacks (39%), which is similar to last quarter. This is quite common in the gaming and gambling industry.</p><p>Another 17% reported that a state-level or state-sponsored threat actor was behind the attack, and a similar percentage reported that a disgruntled user or customer was behind the attack. </p><p>Another 11% reported that they mistakenly inflicted the DDoS attack on themselves (self-DDoS) and a similar percentage said an extortionist was behind the attacks. 6% reported that the attacks were launched by disgruntled or former employees.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5M5hxvgMluwmP7m0SLaxMz/8ef0cb0d5788e036f7b476010fab9139/image9.png" />
          </figure>
    <div>
      <h2>Anatomy of a DDoS attack</h2>
      <a href="#anatomy-of-a-ddos-attack">
        
      </a>
    </div>
    <p>On the network-layer, <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/"><u>SYN flood</u></a> remains the most common Layer 3/4 DDoS attack vector, followed by <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/"><u>DNS flood</u></a> attacks. <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/"><u>Mirai</u></a>-launched DDoS attacks take the third place, replacing <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/"><u>UDP flood</u></a> attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2vo7n97mpZ9F3ms2evLTfr/cd41b34aac742ce542ceface04edfb47/image11.png" />
          </figure><p>In the HTTP realm, over 60% of the attacks were identified and blocked as known botnets, 21% were attacks with suspicious HTTP attributes, another 10% were launched by botnets impersonating browsers, and the remaining 8% were generic floods, attacks of unusual request patterns, and cache busting attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2X6OoIc5DeB9uBA43gmNAZ/bc438e6aa93820b68cde82b483e84c27/image12.png" />
          </figure>
    <div>
      <h3>Emerging threats</h3>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>In 2025 Q1, we saw a 3,488% QoQ increase in CLDAP reflection/amplification attacks. <a href="https://datatracker.ietf.org/doc/html/rfc1798"><u>CLDAP (Connectionless Lightweight Directory Access Protocol)</u></a> is a variant of <a href="https://datatracker.ietf.org/doc/html/rfc4511"><u>LDAP (Lightweight Directory Access Protocol)</u></a>, used for querying and modifying directory services running over IP networks. CLDAP is connectionless, using UDP instead of TCP, making it faster but less reliable. Because it uses UDP, there’s no handshake requirement, which allows attackers to spoof the source IP address, thus allowing attackers to exploit it as a reflection vector. In these attacks, small queries are sent with a spoofed source IP address (the victim's IP), causing servers to send large responses to the victim, overwhelming it. Mitigation involves filtering and monitoring unusual CLDAP traffic.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1TnoEpazSZJfAwYAkXIlTi/84c59434f17502d11eeea290e27ba4f4/image4.png" />
          </figure><p>We also saw a 2,301% QoQ increase in ESP reflection/amplification attacks. The ESP (Encapsulating Security Payload) protocol is part of <a href="https://www.cloudflare.com/learning/network-layer/what-is-ipsec/"><u>IPsec</u></a> and provides confidentiality, authentication, and integrity to network communications. However, it can be abused in DDoS attacks if malicious actors exploit misconfigured or vulnerable systems to reflect or amplify traffic towards a target, leading to service disruption. Like with other protocols, securing and properly configuring the systems using ESP is crucial to block the risks of DDoS attacks.</p>
    <div>
      <h2>Attack size &amp; duration</h2>
      <a href="#attack-size-duration">
        
      </a>
    </div>
    <p>Despite the increase in hyper-volumetric attacks, most DDoS attacks are small. In 2025 Q1, 99% of Layer 3/4 DDoS attacks were under 1 Gbps and 1 Mpps. Similarly, 94% of HTTP DDoS attacks were 1 million requests per second (rps). However, ‘small’ is a relative term and most Internet properties wouldn’t be able to withstand even those small attacks. They can easily saturate unprotected Internet links and crash unprotected servers.</p><p>Furthermore, most attacks are very short-lived. 89% of Layer 3/4 DDoS attacks and 75% of HTTP DDoS attacks end within 10 minutes. Even the largest, record-breaking, hyper-volumetric DDoS attacks can be very short, such as the 35-second attack seen in the examples above. 35 seconds, or even 10 minutes, is not a sufficient time for manual mitigation or activating an on-demand solution: by the time a security analyst receives the alert, and analyzes the attack, it’s already over. And while the attacks may be very short, the trickle effect of attack leads to network and applications failures that can take days to recover from — all whilst services are down or degraded. The current threat landscape leaves no time for human intervention. Detection and mitigation should be always-on, in-line and automated — with sufficient capacity and global coverage to handle the attack traffic along with legitimate peak time traffic.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Qb588RBcnkgWlTyqpP1gF/9b582d0a766be5e200b4a608a5fc2ee0/image7.png" />
          </figure><p>On the other hand, hyper-volumetric HTTP DDoS attacks that exceed 1 Mrps doubled their share. In 2025 Q1, 6 out of every 100 HTTP DDoS attacks exceeded 1 Mrps. On the network-layer, 1 out of every 100,000 attacks exceeded 1 Tbps or 1 Bpps.</p>
    <div>
      <h3>Attack example</h3>
      <a href="#attack-example">
        
      </a>
    </div>
    <p>One example of such an attack targeted a <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Cloudflare Magic Transit</u></a> customer. The customer itself is a US-based hosting provider that offers web servers, <a href="https://www.cloudflare.com/learning/video/what-is-voip/"><u>Voice over IP (VoIP)</u></a> servers, and game servers amongst its solutions. This specific attack targeted port 27015. This port is most commonly associated with multiplayer gaming servers, especially Valve's Source engine games, such as Counter-Strike: Global Offensive (CS:GO), Team Fortress 2, Garry's Mod, Left 4 Dead, and Half-Life 2: Deathmatch.</p><p>It's used for the game server connection, letting clients connect to the server to play online. In many cases, this port is open for both UDP and TCP, depending on the game and what kind of communication it's doing. This customer was targeted with multiple hyper-volumetric attacks that were autonomously blocked by Cloudflare.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YQNMOEL84t0oPfNpYiSnF/ee44629d6a191c23eddc1bb36a66b879/image8.png" />
          </figure>
    <div>
      <h2>Top attacked locations</h2>
      <a href="#top-attacked-locations">
        
      </a>
    </div>
    <p>The first quarter of 2025 saw a significant shift in the top 10 <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-country"><u>most attacked locations</u></a> globally. Germany made a notable jump, climbing four spots — making it the most attacked country. In second place, Turkey also experienced a surge of 11 spots. In third, China, on the other hand, slipped two spots compared to the previous quarter, while Hong Kong remained unchanged. India rose four spots, and Brazil stayed the same. Taiwan dropped four positions. The Philippines experienced the largest decline, falling 6 spots. South Korea and Indonesia, however, both jumped up by two spots each.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1EZzoKCRJBdxvb4loWUImY/eb7ae5cf9c66b4fc551a8d60cf22b03b/image15.png" />
          </figure>
    <div>
      <h2>Top attacked industries</h2>
      <a href="#top-attacked-industries">
        
      </a>
    </div>
    <p>The top 10 <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-industry"><u>most attacked industries</u></a> in 2025 Q1 saw some notable changes. The Gambling &amp; Casinos industry jumped up four spots as the most attacked industry, while the Telecommunications, Service Providers and Carriers industry slid down one spot. The Information Technology &amp; Services and Internet industries both saw minor fluctuations, moving up one and down two spots, respectively. The Gaming and <a href="https://www.cloudflare.com/banking-and-financial-services/">Banking &amp; Financial Services industries</a> both saw a one-spot increase, while the Cyber Security industry made a massive leap of 37 spots compared to the previous quarter. Retail saw a slight decline of one spot, while the Manufacturing, Machinery, Technology &amp; Engineering industry surged 28 spots. The Airlines, Aviation &amp; Aerospace industry had the biggest jump of all, moving up 40 spots making it the tenth most attacked industry.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1G4wkWm6UVSR5sgPY3NjP6/fe1311ec9e7b8a2485fea2014346d65b/image16.png" />
          </figure>
    <div>
      <h2>Top attack sources</h2>
      <a href="#top-attack-sources">
        
      </a>
    </div>
    <p>The ranking of the top 10 <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#source-country"><u>largest sources of DDoS attacks</u></a> in 2025 Q1 also shifted notably. Hong Kong soared to the number one position, climbing three spots from the previous quarter. Indonesia edged down to second place, while Argentina rose two spots to third. Singapore slipped two spots to fourth, and Ukraine dropped one to fifth. Brazil made a striking leap, climbing seven places to land in sixth place, closely followed by Thailand, which also rose seven spots to seventh. Germany also increased, moving up two positions to eighth. Vietnam made the most dramatic climb, jumping 15 spots to claim ninth place, while Bulgaria rounded out the list, dipping two spots to tenth.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7tPgUpT7o7ifuMAu2aODrq/b19b39fc919f95b569a187f1ddf66ec0/image3.png" />
          </figure>
    <div>
      <h3>Top source ASNs</h3>
      <a href="#top-source-asns">
        
      </a>
    </div>
    <p>An <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>ASN (Autonomous System Number)</u></a> is a unique identifier assigned to a network or group of IP networks that operate under a single routing policy on the Internet. It’s used to exchange routing information between systems using protocols like <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/"><u>BGP (Border Gateway Protocol)</u></a>.</p><p>When looking at where the DDoS attacks originate from, specifically HTTP DDoS attacks, there are a few autonomous systems that stand out. In 2025 Q1, the German-based <a href="https://radar.cloudflare.com/as24940"><u>Hetzner (AS24940)</u></a> retained its position as the largest source of HTTP DDoS attacks. It was followed by the French-based <a href="https://radar.cloudflare.com/as16276"><u>OVH (AS16276)</u></a> in second, the US-based <a href="https://radar.cloudflare.com/as14061"><u>DigitalOcean (AS14061)</u></a> in third, and another German-based provider, <a href="https://radar.cloudflare.com/as51167"><u>Contabo (AS51167)</u></a>, in fourth. </p><p>Other major sources included the China-based <a href="https://radar.cloudflare.com/as4134"><u>ChinaNet Backbone (AS4134)</u></a> and <a href="https://radar.cloudflare.com/as132203"><u>Tencent (AS132203)</u></a>, the Austrian-based <a href="https://radar.cloudflare.com/as200373"><u>Drei (AS200373)</u></a>, and three US-based providers to wrap up the top 10 — <a href="https://radar.cloudflare.com/as8075"><u>Microsoft (AS8075)</u></a>, <a href="https://radar.cloudflare.com/as31898"><u>Oracle (AS31898)</u></a>, and <a href="https://radar.cloudflare.com/as396982"><u>Google Cloud Platform (AS396982)</u></a>. Most of the networks in this ranking are well-known cloud computing or hosting providers, highlighting how cloud infrastructure is frequently leveraged — either intentionally or through exploitation — for launching DDoS attacks.</p><p>To help hosting providers, cloud computing providers and any Internet service providers identify and take down the abusive accounts that launch these attacks, we leverage Cloudflare’s unique vantage point to provide a <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/"><u>free DDoS Botnet Threat Feed for Service Providers</u></a>. Over 600 organizations worldwide have already signed up for this feed. It gives service providers a list of offending IP addresses from within their ASN that we see launching HTTP DDoS attacks. It’s completely free and all it takes is opening a free Cloudflare account, authenticating the ASN via <a href="https://docs.peeringdb.com/howto/authenticate/"><u>PeeringDB</u></a>, and then <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/#get-full-report"><u>fetching the threat intelligence via API</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4AX4nalnfQuGKu7rea9HLM/7b2c0f6919aab8627ddcf0fff2a2449a/image13.png" />
          </figure>
    <div>
      <h2>Helping build a better Internet</h2>
      <a href="#helping-build-a-better-internet">
        
      </a>
    </div>
    <p>At Cloudflare, our mission is to help build a better Internet. A key part of that commitment is offering free protection against DDoS attacks, as well as supporting the broader Internet community by providing free tools to help other networks detect and dismantle botnets operating within their infrastructure.</p><p>As the threat landscape continues to evolve, we see that many organizations still adopt DDoS protection only after experiencing an attack or rely on outdated, on-demand solutions. In contrast, our data shows that those with proactive security strategies are far more resilient. That’s why we focus on automation and a comprehensive, always-on, in-line security approach to stay ahead of both existing and emerging threats.</p><p>Backed by our global network with 348 Tbps of capacity spanning 335 cities, we remain dedicated to delivering unmetered, unlimited DDoS protection, regardless of the size, duration, or frequency of attacks.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Mirai]]></category>
            <guid isPermaLink="false">4xYQnrTgTa1v8bY1lRyu4G</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare thwarts over 47 million cyberthreats against Jewish and Holocaust educational websites]]></title>
            <link>https://blog.cloudflare.com/cloudflare-thwarts-over-47-million-cyberthreats-against-jewish-and-holocaust/</link>
            <pubDate>Mon, 27 Jan 2025 22:07:41 GMT</pubDate>
            <description><![CDATA[ January 27 marks the International Holocaust Remembrance Day — a solemn occasion to honor the memory of the six million Jews who perished in the Holocaust, along with countless others who fell victim ]]></description>
            <content:encoded><![CDATA[ <p></p><p>January 27 marks the <a href="https://en.wikipedia.org/wiki/International_Holocaust_Remembrance_Day"><u>International Holocaust Remembrance Day</u></a> — a solemn occasion to honor the memory of the six million Jews who perished in the Holocaust, along with countless others who fell victim to the Nazi regime's campaign of hatred and intolerance. This tragic chapter in human history serves as a stark reminder of the catastrophic consequences of prejudice and extremism. </p><p>The United Nations General Assembly designated January 27 — the anniversary of the liberation of <a href="https://en.wikipedia.org/wiki/Auschwitz_concentration_camp"><u>Auschwitz-Birkenau</u></a> —  as International Holocaust Remembrance Day. This year, we commemorate the 80th anniversary of the liberation of this infamous extermination camp.</p><p>As the world reflects on this dark period, a troubling resurgence of antisemitism underscores the importance of vigilance. This growing hatred has spilled into the digital realm, with cyberattacks increasingly targeting Jewish and Holocaust remembrance and educational websites — spaces dedicated to preserving historical truth and fostering awareness.</p><p>For this reason, here at Cloudflare, we began to publish annual reports covering cyberattacks that target these organizations. These cyberattacks include <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/"><u>DDoS attacks</u></a> as well as <a href="https://www.cloudflare.com/learning/bots/what-is-a-bot/"><u>bot</u></a> and <a href="https://www.cloudflare.com/en-gb/learning/security/what-is-web-application-security/"><u>application attacks</u></a>. The insights and trends are based on websites protected by Cloudflare. This is our fourth report, and you can view our previous Holocaust Remembrance Day blogs <a href="https://blog.cloudflare.com/tag/holocaust/"><u>here</u></a>.</p>
    <div>
      <h2>Project Galileo</h2>
      <a href="#project-galileo">
        
      </a>
    </div>
    <p>At Cloudflare, we are proud to support these vital organizations through <a href="https://www.cloudflare.com/en-gb/galileo/"><u>Project Galileo</u></a>, an initiative providing free security protections to vulnerable groups worldwide. If you or your organization could benefit from this program, consider applying today to help protect these essential platforms and the invaluable work they do.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3tyusSSEjith2HMfONmpfZ/d7a47e9faa2b0003ae4e3c2ab1c01722/BLOG-2659_2.png" />
          </figure><p><sup><i>Project Galileo overview. Source: </i></sup><a href="https://cf-assets.www.cloudflare.com/slt3lc6tev37/7bEraZE4BmpaCFfYYHxbaU/20dda9014ac14793e61daaff0783eee5/2024_Cloudflare_Impact_Report.pdf"><sup><i><u>Cloudflare 2024 Impact Report</u></i></sup></a><sup><i></i></sup></p><p>One of the organizations that we protect through Project Galileo is <a href="https://muzeon.ro/en/"><u>Muzeon</u></a>, a museum dedicated to preserving Jewish history in Cluj-Napoca, Romania. Muzeon faced significant cyberattacks that impacted their website’s performance and hindered operations before using Cloudflare.</p><p>As part of Project Galileo, Muzeon implemented Cloudflare's <a href="https://www.cloudflare.com/en-gb/ddos/"><u>DDoS mitigation</u></a>, <a href="https://www.cloudflare.com/en-gb/application-services/products/waf/"><u>Web Application Firewall (WAF)</u></a>, <a href="https://www.cloudflare.com/application-services/products/dns/"><u>Managed DNS</u></a>, and other services. These measures drastically reduced the attacks and allowed Muzeon to focus on its important mission of storytelling and preserving cultural heritage. </p><p>Cloudflare’s solutions not only protected their digital infrastructure but also freed up time for Muzeon to expand its interactive exhibits, ensuring they could continue sharing their essential work globally. You can read more about this case study <a href="https://www.cloudflare.com/en-gb/case-studies/muzeon/"><u>here</u></a>. </p>
    <div>
      <h2>Significant rise in antisemitism around the world</h2>
      <a href="#significant-rise-in-antisemitism-around-the-world">
        
      </a>
    </div>
    <p>Following the October 7, 2023, <a href="https://en.wikipedia.org/wiki/October_7_Hamas-led_attack_on_Israel"><u>Hamas-led attack</u></a> on Israel, there has been a <a href="https://en.wikipedia.org/wiki/Antisemitism_during_the_Israel%E2%80%93Hamas_war"><u>surge in global antisemitic incidents</u></a>. In the <a href="https://www.adl.org/resources/press-release/over-10000-antisemitic-incidents-recorded-us-oct-7-2023-according-adl"><u>U.S. alone</u></a> there have been more than 10,000 antisemitic incidents from October 7, 2023 to September 24, 2024, representing an over 200-percent increase compared to the incidents reported during the same period a year before. As we’ve seen, the digital world is often a mirror to the real world. As a result, it is not surprising that websites dedicated to sharing information about the Holocaust, as well as Jewish memorial and education platforms, are now increasingly being targeted online. </p>
    <div>
      <h2>Cyberattacks against Jewish and Holocaust educational websites </h2>
      <a href="#cyberattacks-against-jewish-and-holocaust-educational-websites">
        
      </a>
    </div>
    <p>For the years 2020, 2021, and 2022, the number of cyberthreats targeting Holocaust and Jewish educational and memorial websites protected by Cloudflare was, on average, 736,339 malicious HTTP requests annually.</p><p>After the October 7 Hamas-led attack, cyberattacks skyrocketed. In 2023, the amount of blocked HTTP requests surged by 872% to 35.7 million compared to 2022. Most of these cyberattacks occurred after October 7, 2023. </p><p>In 2024, the number of blocked HTTP requests exceeded 47 million — representing a 30% increase compared to 2023. Over 3 out of every 100 HTTP requests towards Holocaust and Jewish memorial and education websites protected by Cloudflare were malicious and blocked. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6p2NxGtyK3jDccp2G0MMvF/c7777304675f36f8cbe301f92a6dc5ec/BLOG-2659_3.png" />
          </figure><p><sup><i>Cyber threats against Holocaust and Jewish memorial and educational websites by year</i></sup></p>
    <div>
      <h3>Cyberattacks by quarter</h3>
      <a href="#cyberattacks-by-quarter">
        
      </a>
    </div>
    <p>In the fourth quarter of 2023, the volume of malicious requests exceeded 27 million. Throughout the first three quarters of 2024, we saw a gradual decrease in the quantity of malicious requests. But in the fourth quarter of 2024, cyberattacks spiked by 33%, to 36 million requests, following the one-year anniversary of the October 7 assault.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1YFVY3jTbMYsgbenBdor1P/6634fdf6edce5a5f3d44f34fdf017b3d/BLOG-2659_4.png" />
          </figure><p><sup><i>Cyber threats against Holocaust and Jewish memorial and educational websites by quarter</i></sup></p>
    <div>
      <h3>Cyberattacks by month</h3>
      <a href="#cyberattacks-by-month">
        
      </a>
    </div>
    <p>Breaking down the quarters into months, we can see an initial peak in October 2023 after the October 7 Hamas-led attack. The volume of cyberattacks remained elevated during November and December 2023.</p><p>Afterward, as we entered 2024, the quantity and percentage of cyberattacks against these websites significantly decreased. In November, over a third (34%) of all requests towards these websites were blocked, with over 36 million requests blocked that month alone.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5JGzGCm49GBBZMYfriSTpl/1f47b7b90bb5607461216fd2788c2f34/BLOG-2659_5.png" />
          </figure><p><sup><i>Cyber threats against Holocaust and Jewish memorial and educational websites by month</i></sup></p>
    <div>
      <h2>Helping build a safer Internet and a better world</h2>
      <a href="#helping-build-a-safer-internet-and-a-better-world">
        
      </a>
    </div>
    <p>On the International Holocaust Remembrance Day, we reflect on the importance of standing against both antisemitism and cyber threats — issues that have escalated since the October 7, 2023, Hamas-led attack. </p><p>At Cloudflare, we are unwavering in our commitment to create a safer, more inclusive Internet. The rise in antisemitism has made it even more critical to protect educational websites and communities from harmful cyber attacks. We invite everyone to join us in this fight. Even with our <a href="https://www.cloudflare.com/en-gb/plans/"><u>free plan</u></a>, we offer strong security and performance, ensuring that vital resources and websites remain safe and accessible. By working together, we can protect the lessons of history and foster a more secure digital world for all.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Network Services]]></category>
            <category><![CDATA[Judeoflare]]></category>
            <category><![CDATA[Holocaust]]></category>
            <guid isPermaLink="false">4tycw0mGr6bpp3AbV17wEK</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2024-q4/</link>
            <pubDate>Tue, 21 Jan 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[ 2024 ended with a bang. Cloudflare mitigated another record-breaking DDoS attack peaking at 5.6 Tbps. ]]></description>
            <content:encoded><![CDATA[ <p>Welcome to the 20th edition of the Cloudflare DDoS Threat Report, marking five years since our first report in 2020.</p><p>Published quarterly, this report offers a comprehensive analysis of the evolving threat landscape of <a href="https://www.cloudflare.com/en-gb/learning/ddos/glossary/denial-of-service/"><u>Distributed Denial of Service (DDoS) attacks</u></a> based on data from the <a href="https://www.cloudflare.com/network/"><u>Cloudflare network</u></a>. In this edition, we focus on the fourth quarter of 2024 and look back at the year as a whole.</p>
    <div>
      <h2>Cloudflare’s unique vantage point</h2>
      <a href="#cloudflares-unique-vantage-point">
        
      </a>
    </div>
    <p>When we published our <a href="https://blog.cloudflare.com/network-layer-ddos-attack-trends-for-q1-2020/"><u>first report</u></a>, Cloudflare’s global network capacity was 35 Terabits per second (Tbps). Since then, our network’s capacity has grown by 817% to 321 Tbps. We also significantly expanded our global presence by 65% from 200 cities in the beginning of 2020 to 330 cities by the end of 2024.</p><p>Using this massive network, we now serve and protect nearly <a href="https://w3techs.com/technologies/overview/proxy"><u>20% of all websites</u></a> and close to 18,000 unique Cloudflare customer <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-subnet/"><u>IP networks</u></a>. This extensive infrastructure and customer base uniquely positions us to provide key insights and trends that benefit the wider Internet community.</p>
    <div>
      <h2>Key DDoS insights</h2>
      <a href="#key-ddos-insights">
        
      </a>
    </div>
    <ul><li><p>In 2024, Cloudflare’s autonomous DDoS defense systems blocked around 21.3 million DDoS attacks, representing a 53% increase compared to 2023. On average, in 2024, Cloudflare blocked 4,870 DDoS attacks every hour.</p></li><li><p>In the fourth quarter, over 420 of those attacks were hyper-volumetric, exceeding rates of 1 billion packets per second (pps) and 1 Tbps. Moreover, the amount of attacks exceeding 1 Tbps grew by a staggering 1,885% quarter-over-quarter.</p></li><li><p>During the week of Halloween 2024, Cloudflare’s DDoS defense systems successfully and autonomously detected and blocked a 5.6 Terabit per second (Tbps) DDoS attack — the largest attack ever reported.</p></li></ul><p><i>To learn more about DDoS attacks and other types of cyber threats, visit our </i><a href="https://www.cloudflare.com/learning/"><i><u>Learning Center</u></i></a><i>, access </i><a href="https://blog.cloudflare.com/tag/ddos-reports"><i><u>previous DDoS threat reports</u></i></a><i> on the Cloudflare blog, or visit our interactive hub, </i><a href="https://radar.cloudflare.com/reports?q=DDoS"><i><u>Cloudflare Radar</u></i></a><i>. There's also a </i><a href="https://developers.cloudflare.com/radar/"><i><u>free API</u></i></a><i> for those interested in investigating these and other Internet trends. You can also learn more about the </i><a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/"><i><u>methodologies</u></i></a><i> used in preparing these reports.</i></p>
    <div>
      <h2>Anatomy of a DDoS attack</h2>
      <a href="#anatomy-of-a-ddos-attack">
        
      </a>
    </div>
    <p>In 2024 Q4 alone, Cloudflare mitigated 6.9 million DDoS attacks. This represents a 16% increase quarter-over-quarter (QoQ) and 83% year-over-year (YoY).</p><p>Of the 2024 Q4 DDoS attacks, 49% (3.4 million) were <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/"><u>Layer 3</u></a>/<a href="https://www.cloudflare.com/learning/network-layer/what-is-the-network-layer/"><u>Layer 4</u></a> DDoS attacks and 51% (3.5 million) were HTTP DDoS attacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/33qc2yEBIE4Tmq6ke3dOIY/398216db2fb03e6093f55dac35394568/image13.png" />
          </figure><p><sup><i>Distribution of 6.9 million DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>HTTP DDoS attacks</h2>
      <a href="#http-ddos-attacks">
        
      </a>
    </div>
    <p>The majority of the HTTP DDoS attacks (73%) were launched by known <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">botnets</a>. Rapid detection and blocking of these attacks were made possible as a result of operating a massive network and seeing many types of attacks and botnets. In turn, this allows our security engineers and researchers to craft heuristics to increase mitigation efficacy against these attacks.</p><p>An additional 11% were HTTP DDoS attacks that were caught pretending to be a legitimate browser. Another 10% were attacks which contained suspicious or unusual HTTP attributes. The remaining 8% “Other” were generic <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/"><u>HTTP floods</u></a>, volumetric cache busting attacks, and volumetric attacks targeting login endpoints.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/27nsCB9HReu48XtiJKufwg/cb8814d1cc390e4cd1ffea9316fd589e/image19.png" />
          </figure><p><sup><i>Top HTTP DDoS attack vectors: 2024 Q4</i></sup></p><p>These <a href="https://www.cloudflare.com/learning/security/glossary/attack-vector/">attack vectors</a>, or attack groups, are not necessarily exclusive. For example, known botnets also impersonate browsers and have suspicious HTTP attributes, but this breakdown is our attempt to categorize the HTTP DDoS attacks in a meaningful way.</p>
    <div>
      <h3>Top user agents</h3>
      <a href="#top-user-agents">
        
      </a>
    </div>
    <p>As of this report’s publication, the current stable version of Chrome for Windows, Mac, iOS, and Android is 132, according to Google’s <a href="https://chromereleases.googleblog.com/"><u>release notes</u></a>. However, it seems that threat actors are still behind, as thirteen of the top user agents that appeared most frequently in DDoS attacks were Chrome versions ranging from 118 to 129.</p><p>The HITV_ST_PLATFORM user agent had the highest share of DDoS requests out of total requests (99.9%), making it the user agent that’s used almost exclusively in DDoS attacks. In other words, if you see traffic coming from the HITV_ST_PLATFORM user agent, there is a 0.1% chance that it is legitimate traffic.</p><p>Threat actors often avoid using uncommon user agents, favoring more common ones like Chrome to blend in with regular traffic. The presence of the HITV_ST_PLATFORM user agent, which is associated with smart TVs and set-top boxes, suggests that the devices involved in certain cyberattacks are compromised smart TVs or set-top boxes. This observation highlights the importance of securing all Internet-connected devices, including smart TVs and set-top boxes, to prevent them from being exploited in cyberattacks.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5uUCjjPdGu63u7OmgRE6Yw/4b15c1e88cfe86ae0bc5824346908b24/image18.png" />
          </figure><p><sup><i>Top user agents abused in DDoS attacks: 2024 Q4</i></sup></p><p>The user agent <a href="https://github.com/benoitc/hackney"><u>hackney</u></a> came in second place, with 93% of requests containing this user agent being part of a DDoS attack. If you encounter traffic coming from the hackney user agent, there is a 7% chance that it is legitimate traffic. Hackney is an HTTP client library for Erlang, used for making HTTP requests and is popular in Erlang/Elixir ecosystems.</p><p>Additional user agents that were used in DDoS attacks are <a href="https://www.utorrent.com/"><u>uTorrent</u></a>, which is associated with a popular BitTorrent client for downloading files. <a href="https://pkg.go.dev/net/http"><u>Go-http-client</u></a> and <a href="https://github.com/valyala/fasthttp"><u>fasthttp</u></a> were also commonly used in DDoS attacks. The former is the default HTTP client in Go’s standard library and the latter is a high-performance alternative. fasthttp is used to build fast web applications, but is often exploited for DDoS attacks and <a href="https://www.cloudflare.com/learning/ai/how-to-prevent-web-scraping/">web scraping</a> too.</p>
    <div>
      <h2>HTTP attributes commonly used in DDoS attacks</h2>
      <a href="#http-attributes-commonly-used-in-ddos-attacks">
        
      </a>
    </div>
    
    <div>
      <h3>HTTP methods</h3>
      <a href="#http-methods">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/"><u>HTTP methods</u></a> (also called HTTP verbs) define the action to be performed on a resource on a server. They are part of the HTTP protocol and allow communication between clients (such as browsers) and servers.</p><p>The GET method is most commonly used. Almost 70% of legitimate HTTP requests made use of the GET method. In second place is the POST method with a share of 27%.</p><p>With DDoS attacks, we see a different picture. Almost 14% of HTTP requests using the HEAD method were part of a DDoS attack, despite it hardly being present in legitimate HTTP requests (0.75% of all requests). The DELETE method came in second place, with around 7% of its usage being for DDoS purposes.</p><p>The disproportion between methods commonly seen in DDoS attacks versus their presence in legitimate traffic definitely stands out. Security administrators can use this information to optimize their security posture based on these headers.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1fD5aUHaIkRMUNPZJI0LKW/d5856e7ce13cb7d1e28727401b885b1a/image10.png" />
          </figure><p><sup><i>Distribution of HTTP methods in DDoS attacks and legitimate traffic: 2024 Q4</i></sup></p>
    <div>
      <h3>HTTP paths</h3>
      <a href="#http-paths">
        
      </a>
    </div>
    <p>An HTTP path describes a specific server resource. Along with the HTTP method, the server will perform the action on the resource.</p><p>For example, GET <a href="https://developers.cloudflare.com/ddos-protection/"><u>https://developers.cloudflare.com/ddos-protection/</u></a> will instruct the server to retrieve the content for the resource /ddos-protection/.</p><p>DDoS attacks often target the root of the website (“/”), but in other cases, they can target specific paths. In 2024 Q4, 98% of HTTP requests towards the /wp-admin/ path were part of DDoS attacks. The /wp-admin/ path is the default <a href="https://wordpress.com/support/dashboard/"><u>administrator dashboard for WordPress websites</u></a>.</p><p>Obviously, many paths are unique to the specific website, but in the graph below, we’ve provided the top <i>generic</i> paths that were attacked the most. Security administrators can use this data to strengthen their protection on these endpoints, as applicable. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/I9SweJVs4sLYjgHy469NN/b7d0e76648b0ec26af32143a45dc1dd6/image21.png" />
          </figure><p> <sup><i>Top HTTP paths targeted by HTTP DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>HTTP vs. HTTPS</h2>
      <a href="#http-vs-https">
        
      </a>
    </div>
    <p>In Q4, almost 94% of legitimate traffic was <a href="https://www.cloudflare.com/en-gb/learning/ssl/what-is-https/"><u>HTTPS</u></a>. Only 6% was plaintext HTTP (not encrypted). Looking at DDoS attack traffic, around 92% of HTTP DDoS attack requests were over HTTPS and almost 8% were over plaintext HTTP.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1grfbkXvzjh8nXJYtrhiJP/8ff46ac59d296fcad89475f2bc242184/unnamed__2_.png" />
          </figure><p><sup><i>HTTP vs. HTTPS in legitimate traffic and DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>Layer 3/Layer 4 DDoS attacks</h2>
      <a href="#layer-3-layer-4-ddos-attacks">
        
      </a>
    </div>
    <p>The top three most common Layer 3/Layer 4 (network layer) attack vectors were <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/"><u>SYN flood</u></a> (38%), <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/"><u>DNS flood attacks</u></a> (16%), and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/"><u>UDP floods</u></a> (14%).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1hXTXtKe2kVD9fjw26aIN8/7bbd5ef01b04a3bba28232cdcf876c3a/image1.png" />
          </figure><p><sup><i>Top L3/4 DDoS attack vectors: 2024 Q4</i></sup></p><p>An additional common attack vector, or rather, botnet type, is <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/"><u>Mirai</u></a>. Mirai attacks accounted for 6% of all network layer DDoS attacks — a 131% increase QoQ. In 2024 Q4, a Mirai-variant botnet was responsible for the largest DDoS attack on record, but we’ll discuss that further in the <a href="#the-largest-ddos-attack-on-record"><u>next section</u></a>.</p>
    <div>
      <h2>Emerging attack vectors</h2>
      <a href="#emerging-attack-vectors">
        
      </a>
    </div>
    <p>Before moving on to the next section, it’s worthwhile to discuss the growth in additional attack vectors that were observed this quarter. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Hz074MxtzzdG4uvCM8P93/af6c86b023160f66acf0fe209386acf7/image8.png" />
          </figure><p><sup><i>Top emerging threats: 2024 Q4</i></sup></p><p><sup><i></i></sup><a href="https://www.cloudflare.com/learning/ddos/memcached-ddos-attack/"><u>Memcached DDoS attacks</u></a> saw the largest growth, with a 314% QoQ increase. <a href="https://memcached.org/"><u>Memcached</u></a> is a database caching system for speeding up websites and networks. Memcached servers that support <a href="https://www.cloudflare.com/learning/ddos/glossary/user-datagram-protocol-udp/">UDP</a> can be abused to launch amplification or reflection DDoS attacks. In this case, the attacker would request content from the caching system and spoof the victim's IP address as the source IP in the UDP packets. The victim will be flooded with the Memcache responses, which can be up to 51,200x larger than the initial request.</p><p>BitTorrent DDoS attacks also surged this quarter by 304%. The <a href="https://en.wikipedia.org/wiki/BitTorrent"><u>BitTorrent protocol</u></a> is a communication protocol used for peer-to-peer file sharing. To help the BitTorrent clients find and download the files efficiently, BitTorrent clients may utilize <a href="https://en.wikipedia.org/wiki/BitTorrent_tracker"><u>BitTorrent Trackers</u></a> or <a href="https://en.wikipedia.org/wiki/Distributed_hash_table"><u>Distributed Hash Tables (DHT)</u></a> to identify the peers that are <a href="https://en.wikipedia.org/wiki/Glossary_of_BitTorrent_terms#Seed_/_seeding"><u>seeding</u></a> the desired file. This concept can be abused to launch DDoS attacks. A malicious actor can <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/"><u>spoof</u></a> the victim’s IP address as a seeder IP address within Trackers and DHT systems. Then clients would request the files from those IP addresses. Given a sufficient number of clients requesting the file, it can flood the victim with more traffic than it can handle.</p>
    <div>
      <h2>The largest DDoS attack on record</h2>
      <a href="#the-largest-ddos-attack-on-record">
        
      </a>
    </div>
    <p>On October 29, a 5.6 Tbps <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/"><u>UDP DDoS attack</u></a> launched by a Mirai-variant botnet targeted a Cloudflare <a href="https://www.cloudflare.com/network-services/products/magic-transit/"><u>Magic Transit</u></a> customer, an Internet service provider (ISP) from Eastern Asia. The attack lasted only 80 seconds and originated from over 13,000 <a href="https://www.cloudflare.com/learning/ddos/glossary/internet-of-things-iot/"><u>IoT</u></a> devices. Detection and mitigation were fully autonomous by Cloudflare’s distributed defense systems. It required no human intervention, didn’t trigger any alerts, and didn’t cause any performance degradation. The systems worked as intended.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/kx3Uj4y4G4KZ6yNritxg4/d47e8f1b51a630bce28e8b036a4e7b64/image16.png" />
          </figure><p><sup><i>Cloudflare’s autonomous DDoS defenses mitigate a 5.6 Tbps Mirai DDoS attack without human intervention</i></sup></p><p>While the total number of unique source IP addresses was around 13,000, the average unique source IP addresses per second was 5,500. We also saw a similar number of unique source ports per second. In the graph below, each line represents one of the 13,000 different source IP addresses, and as portrayed, each contributed less than 8 Gbps per second. The average contribution of each IP address per second was around 1 Gbps (~0.012% of 5.6 Tbps).</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2biclYyny81QnJxQpP3PcF/8e1ec9c4b227043b1bd05914c1f543b1/image14.png" />
          </figure><p><sup><i>The 13,000 source IP addresses that launched the 5.6 Tbps DDoS attack</i></sup></p>
    <div>
      <h2>Hyper-volumetric DDoS attacks</h2>
      <a href="#hyper-volumetric-ddos-attacks">
        
      </a>
    </div>
    <p>In 2024 Q3, we started seeing a rise in hyper-volumetric network layer DDoS attacks. In 2024 Q4, the amount of attacks exceeding 1 Tbps increased by 1,885% QoQ and attacks exceeding 100 Million pps (packets per second) increased by 175% QoQ. 16% of the attacks that exceeded 100 Million pps also exceeded 1 Billion pps.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3L3X48ztfIeGRVe3Su009z/b6798328b8926b33ea78b0617ee3aad5/image6.png" />
          </figure><p><sup><i>Distribution of hyper-volumetric L3/4 DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>Attack size</h2>
      <a href="#attack-size">
        
      </a>
    </div>
    <p>The majority of HTTP DDoS attacks (63%) did not exceed 50,000 requests per second. On the other side of the spectrum, 3% of HTTP DDoS attacks exceeded 100 million requests per second.</p><p>Similarly, the majority of network layer DDoS attacks are also small. 93% did not exceed 500 Mbps and 87% did not exceed 50,000 packets per second. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/25TQ7mayQOrr3ZpG1yLADa/ce08756eec2fbb2b213aad1668d59b4f/unnamed.png" />
          </figure><p><sup><i>QoQ change in attack size by packet rate: 2024 Q4</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1eNqV8gIxZgukwropBeyvs/23f128993b6573a3acb6e2a33306813d/unnamed__1_.png" />
          </figure><p><sup><i>QoQ change in attack size by bit rate: 2024 Q4</i></sup></p>
    <div>
      <h2>Attack duration</h2>
      <a href="#attack-duration">
        
      </a>
    </div>
    <p>The majority of HTTP DDoS attacks (72%) end in under ten minutes. Approximately 22% of HTTP DDoS attacks last over one hour, and 11% last over 24 hours.</p><p>Similarly, 91% of network layer DDoS attacks also end within ten minutes. Only 2% last over an hour.</p><p>Overall, there was a significant QoQ decrease in the duration of DDoS attacks. Because the duration of most attacks is so short, it is not feasible, in most cases, for a human to respond to an alert, analyze the traffic, and apply mitigation. The short duration of attacks emphasizes the need for an <a href="https://www.cloudflare.com/ddos/">in-line, always-on, automated DDoS protection service</a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Yfb7JGpZ2GTXR2HYK5pAS/55a1dbf4eec229e7154cf223d542e3bf/unnamed__3_.png" />
          </figure><p><sup><i>QoQ change in attack duration: 2024 Q4</i></sup></p>
    <div>
      <h2>Attack sources</h2>
      <a href="#attack-sources">
        
      </a>
    </div>
    <p>In the last quarter of 2024, Indonesia remained the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#source-country"><u>largest source of DDoS attacks</u></a> worldwide for the second consecutive quarter. To understand where attacks are coming from, we map the source IP addresses launching HTTP DDoS attacks because they cannot be spoofed, and for Layer 3/Layer 4 DDoS attacks, we use the location of our data centers where the DDoS packets were ingested. This lets us overcome the spoofability that is possible in Layer 3/Layer 4. We’re able to achieve geographical accuracy due to our extensive network spanning over 330 cities around the world.</p><p>Hong Kong came in second, having moved up five spots from the previous quarter. Singapore advanced three spots, coming in third place.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Z7DgqDBlKbd3eDRv7ZVmL/49aabaee6301a3c93bb40851e645dd42/image2.png" />
          </figure><p><sup><i>Top 10 largest sources of DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h3>Top source networks</h3>
      <a href="#top-source-networks">
        
      </a>
    </div>
    <p>An <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system</u></a> (AS) is a large network or group of networks that has a unified routing policy. Every computer or device that connects to the Internet is connected to an AS. To find out what your AS is, visit <a href="https://radar.cloudflare.com/ip">https://radar.cloudflare.com/ip</a>.</p><p>When looking at where the DDoS attacks originate from, specifically HTTP DDoS attacks, there are a few autonomous systems that stand out.</p><p>The AS that we saw the most HTTP DDoS attack traffic from in 2024 Q4 was German-based <a href="https://radar.cloudflare.com/security-and-attacks/as24940"><u>Hetzner (AS24940)</u></a>. Almost 5% of all HTTP DDoS requests originated from Hetzer’s network, or in other words, 5 out of every 100 HTTP DDoS requests that Cloudflare blocked originated from Hetzner.</p><p>In second place we have the US-based <a href="https://radar.cloudflare.com/security-and-attacks/as14061"><u>Digital Ocean (AS14061)</u></a>, followed by France-based <a href="https://radar.cloudflare.com/security-and-attacks/as16276"><u>OVH (AS16276)</u></a> in third place.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7pQUunzZ0ioH48lTOJOLVe/8dc42b7904b0f0b838f117ce5f35a35a/image12.png" />
          </figure><p><sup><i>Top 10 largest source networks of DDoS attacks: 2024 Q4</i></sup></p><p>For many network operators such as the ones listed above, it can be hard to identify the malicious actors that abuse their infrastructure for launching attacks. To help network operators and service providers crack down on the abuse, we provide a <b>free</b> <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/"><u>DDoS Botnet threat intelligence feed</u></a> that provides ASN owners a list of their IP addresses that we’ve seen participating in DDoS attacks. </p>
    <div>
      <h2>Top threat actors</h2>
      <a href="#top-threat-actors">
        
      </a>
    </div>
    <p>When surveying Cloudflare customers that were targeted by DDoS attacks, the majority said they didn’t know who attacked them. The ones that did know reported their competitors as the number one threat actor behind the attacks (40%). Another 17% reported that a state-level or state-sponsored threat actor was behind the attack, and a similar percentage reported that a disgruntled user or customer was behind the attack.</p><p>Another 14% reported that an extortionist was behind the attacks. 7% claimed it was a self-inflicted DDoS, 2% reported hacktivism as the cause of the attack, and another 2% reported that the attacks were launched by former employees.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gThccj4k75gfFoGBn301W/403bd5cf3984611490e7d90f3435f3c1/image15.png" />
          </figure><p><sup><i>Top threat actors: 2024 Q4</i></sup></p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>In the final quarter of 2024, as anticipated, we observed a surge in <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/"><u>Ransom DDoS attacks</u></a>. This spike was predictable, given that Q4 is a prime time for cybercriminals, with increased online shopping, travel arrangements, and holiday activities. Disrupting these services during peak times can significantly impact organizations' revenues and cause real-world disruptions, such as flight delays and cancellations.</p><p>In Q4, 12% of Cloudflare customers that were targeted by DDoS attacks reported being threatened or extorted for a ransom payment. This represents a 78% QoQ increase and 25% YoY growth compared to 2023 Q4.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1BV3NoLbxwzO0ShVyCwQ97/7ccb684195b6efef0db209aefffff476/image17.png" />
          </figure><p><sup><i>Reported Ransom DDoS attacks by quarter: 2024</i></sup></p><p>Looking back at the entire year of 2024, Cloudflare received the most reports of Ransom DDoS attacks in May. In Q4, we can see the gradual increase starting from October (10%), November (13%), and December (14%) — a seven-month-high.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/EllNHd6iUWkQ6Z481gLss/a20b10f96d4f7a649dfa23beceebad8e/image9.png" />
          </figure><p><sup><i>Reported Ransom DDoS attacks by month: 2024</i></sup></p>
    <div>
      <h2>Target of attacks</h2>
      <a href="#target-of-attacks">
        
      </a>
    </div>
    <p>In 2024 Q4, China maintained its position as the most <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-country"><u>attacked country</u></a>. To understand which countries are subject to more attacks, we group DDoS attacks by our customers’ billing country. </p><p>Philippines makes its first appearance as the second most attacked country in the top 10. Taiwan jumped to third place, up seven spots compared to last quarter.</p><p>In the map below, you can see the top 10 most attacked locations and their ranking change compared to the previous quarter.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4TosbZ02NmNGbgpwkskUNs/6f96885b4de89c34403551a03a01e634/image5.png" />
          </figure><p><sup><i>Top 10 most attacked locations by DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>Most attacked industries</h2>
      <a href="#most-attacked-industries">
        
      </a>
    </div>
    <p>In the fourth quarter of 2024, the <i>Telecommunications, Service Providers and Carriers</i> industry jumped from the third place (last quarter) to the first place as the most <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-industry"><u>attacked industry</u></a>. To understand which industries are subject to more attacks, we group DDoS attacks by our customers’ industry. The <i>Internet</i> industry came in second, followed by <i>Marketing and Advertising</i> in third.</p><p>The <i>Banking &amp; Financial Services</i> industry dropped seven places from number one in 2024 Q3 to number eight in Q4.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/444JREdNrmb6yePqqfGI4B/a268a1d3d3cd1dd7d9e076ffcf5b06c5/image7.png" />
          </figure><p><sup><i>Top 10 most attacked industries by DDoS attacks: 2024 Q4</i></sup></p>
    <div>
      <h2>Our commitment to unmetered DDoS protection</h2>
      <a href="#our-commitment-to-unmetered-ddos-protection">
        
      </a>
    </div>
    <p>The fourth quarter of 2024 saw a surge in hyper-volumetric Layer 3/Layer 4 DDoS attacks, with the largest one breaking our previous record, peaking at 5.6 Tbps. This rise in attack size renders capacity-limited cloud DDoS protection services or on-premise DDoS appliances obsolete.</p><p>The growing use of powerful botnets, driven by geopolitical factors, has broadened the range of vulnerable targets. A rise in Ransom DDoS attacks is also a growing concern.</p><p>Too many organizations only implement DDoS protection after suffering an attack. Our observations show that organizations with proactive security strategies are more resilient. At Cloudflare, we invest in automated defenses and a comprehensive security portfolio to provide proactive protection against both current and emerging threats.</p><p>With our 321 Tbps network spanning 330 cities globally, we remain committed to providing <a href="https://www.cloudflare.com/ddos/">unmetered and unlimited DDoS protection</a> no matter the size, duration and quantity of the attacks.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[DDoS Alerts]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Mirai]]></category>
            <category><![CDATA[Attacks]]></category>
            <guid isPermaLink="false">1qstsc71dUKtPimn2nGewc</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[Bigger and badder: how DDoS attack sizes have evolved over the last decade]]></title>
            <link>https://blog.cloudflare.com/bigger-and-badder-how-ddos-attack-sizes-have-evolved-over-the-last-decade/</link>
            <pubDate>Wed, 20 Nov 2024 22:00:00 GMT</pubDate>
            <description><![CDATA[ If we plot the metrics associated with large DDoS attacks observed in the last 10 years, does it show a straight, steady increase in an exponential curve that keeps becoming steeper, or is it closer to a linear growth? Our analysis found the growth is not linear but rather is exponential, with the slope varying depending on the metric (rps, pps or bps).  ]]></description>
            <content:encoded><![CDATA[ <p><a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/"><u>Distributed Denial of Service</u></a> (DDoS) attacks are cyberattacks that aim to overwhelm and disrupt online services, making them inaccessible to users. By leveraging a network of distributed devices, DDoS attacks flood the target system with excessive requests, consuming its bandwidth or exhausting compute resources to the point of failure. These attacks can be highly effective against unprotected sites and relatively inexpensive for attackers to launch. Despite being one of the oldest types of attacks, DDoS attacks remain a constant threat, often targeting well-known or high traffic websites, services, or critical infrastructure. Cloudflare has mitigated over 14.5 million DDoS attacks since the start of 2024 — an average of 2,200 DDoS attacks per hour. (Our <a href="https://blog.cloudflare.com/ddos-threat-report-for-2024-q3/"><u>DDoS Threat Report for Q3 2024</u></a> contains additional related statistics).</p><p>If we look at the metrics associated with large attacks mitigated in the last 10 years, does the graph show a steady increase in an exponential curve that keeps getting steeper, especially over the last few years, or is it closer to linear growth? We found that the growth is not linear, but rather is exponential, with the slope dependent on the metric we are looking at.</p><p>Why is this question interesting? Simple. The answer to it provides valuable insights into the evolving strategies of attackers, the sophistication of their tools, and the readiness of defense mechanisms. </p><p>As an example, an upward curve of the number of requests per second (rps) suggests that the attackers are changing something on their side that enables them to generate larger volumes of requests. This is an insight that prompts us to investigate more and look at other data to understand if anything new is happening.</p><p>For instance, at one of those moments, we looked at the source of the traffic and saw a shift from subscriber/enterprise IP address space (suggesting IoT) to cloud provider IP address space (suggesting VMs), and realized there was a shift in the type and capabilities of devices used by attackers. </p><p>As another example: when the <a href="https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/"><u>HTTP/2 Rapid Reset</u></a> attack happened, the record number of requests per second seen at that time suggested that a new technique was being employed by attackers, prompting us to swiftly investigate what was being executed and adapt our defenses.</p>
    <div>
      <h2>Defining individual attacks</h2>
      <a href="#defining-individual-attacks">
        
      </a>
    </div>
    <p>Delimiting an individual attack in time is surprisingly blurry. First of all, an attack analysis can provide inconsistent observations at different layers of the <a href="https://www.cloudflare.com/en-gb/learning/ddos/glossary/open-systems-interconnection-model-osi/"><u>OSI model</u></a>. The footprint seen at all these different layers may tell different stories for the same attack. There are, however, some variables that together can allow us to create a fingerprint and enable us to group a set of events, establishing that they are part of the same individual attack. Examples include: </p><ul><li><p>Do we see the same <a href="https://www.cloudflare.com/en-gb/learning/security/glossary/attack-vector/"><u>attack vector(s)</u></a> being used across this set of events?</p></li><li><p>Are all the attack events focused on the same target(s)?</p></li><li><p>Do the payloads on events share the same signature? (Specific data payloads or request types unique to certain types of attacks or botnets, like Mirai, which may use distinctive HTTP request headers or packet structures).</p></li></ul>
    <div>
      <h2>DDoS attack sizes </h2>
      <a href="#ddos-attack-sizes">
        
      </a>
    </div>
    <p>Before we dive into a growth analysis of DDoS attacks over the last 10 years, let's take a step back and have a look at the metrics typically used to measure them: requests per second (rps), packets per second (pps), and bits per second (bps). Each metric captures a different aspect of the attack's scale and impact.</p><ul><li><p><b>Requests per second (rps)</b>: Measures the number of HTTP or similar protocol requests made each second. This metric is particularly relevant for application-layer attacks (Layer 7), where the intent is to <b>overwhelm a specific application or service by overloading its request handling</b>, and is useful for measuring attacks targeting web servers, APIs, or applications because it reflects the volume of requests, not just raw data transfer.</p></li><li><p><b>Packets per second (pps):</b> Represents the number of individual packets sent to the target per second, regardless of their size. This metric is critical for network-layer attacks (Layers 3 and 4), where the goal is to <b>overwhelm network infrastructure by exceeding its packet-processing capacity</b>. pps measurements are useful for volumetric attacks, identifying a quantity of packets that can impact routers, switches, or firewalls.</p></li><li><p><b>Bits per second (bps):</b> This measures the total data transferred per second and is especially useful in evaluating network-layer attacks that aim to saturate the bandwidth of the target or its upstream provider. bps is widely used measuring Layer 3 and 4 attacks, such as UDP floods, where the attack intends to clog network bandwidth. This metric is often highlighted for DDoS attacks because high bps values (often measured in gigabits or terabits) signal <b>bandwidth saturation</b>, which is a common goal of large-scale DDoS campaigns.</p></li></ul>
    <div>
      <h2>Evolution of DDoS attack sizes over the last decade</h2>
      <a href="#evolution-of-ddos-attack-sizes-over-the-last-decade">
        
      </a>
    </div>
    <p>So, how have DDoS attack sizes changed in the last decade? During this period, DDoS attacks have grown bigger and stronger, each year having the potential to be more disruptive. </p><p>If we look at the metrics associated with large attacks seen in the last 10 years, does it look like we have a steady increase in an exponential curve that keeps steepening, especially in the last few years, or is it closer to a linear growth?<b> </b>We found that it is exponential, so let’s have a look at the details around why we came to that conclusion.</p><p>In this analysis, we used <a href="https://cloud.google.com/blog/products/identity-security/how-to-protect-your-site-from-ddos-attacks-with-cloud-networking"><u>attacks that Google has seen from 2010 until 2022</u></a> as a baseline (Figure 1) that we extended with attacks that Cloudflare has seen in 2023 and 2024 (Figure 2). </p><p>Going back in time, early in the 2010s, the largest attacks were measured in the Gigabits per second (Gbps) scale, but these days, it’s all about Terabits per second (Tbps). The number of requests per second (rps) and bits per second (bps) are also significantly higher these days, as we will see.</p><p>The historical data from Google shown below in Figure 1 reveals a rising trend in requests per second during DDoS attacks observed between 2010 and 2022, peaking at 6 Million requests per second (Mrps) in 2020. The increase highlights a significant escalation in attack volume across the decade.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1OLkt2rSuO6OBGH8H1k1o6/d63d32df3f56eab0fe105a00dec45e03/BLOG-2616_2.png" />
          </figure><p><sup><i>Figure 1</i></sup><sup>.</sup><sup><i> Largest known DDoS attacks, 2010 - 2022. (</i></sup><a href="https://cloud.google.com/blog/products/identity-security/how-to-protect-your-site-from-ddos-attacks-with-cloud-networking"><sup><i>Source: Google</i></sup></a><sup><i>)</i></sup><sup> </sup></p><p>Figure 2 (below) provides a view of trends seen across the different metrics. The escalation seen in Google’s statistics is also visible in Cloudflare’s data regarding large mitigated DDoS attacks observed in 2023 and 2024, reaching 201 Mrps (green line) in September 2024. The rate of packets per second (pps) demonstrates (blue line) a slight exponential growth over time, rising from 230 Mpps in 2015 to 2,100 Mpps in 2024, suggesting that attackers are achieving higher throughput. For bits per second (bps), the trend is also exponential and with a steeper upwards curve (red line), building from a 309 Gbps attack in 2013 to a 5.6 Tbps (5,600 Gbps) attack in 2024. </p><p>Over roughly the last decade, attacks driving these metrics have seen significant growth rates:</p><ul><li><p>Bits per second increased by 20x between 2013 and 2024</p></li><li><p>Packets per second increased by 10x between 2015 and 2024</p></li><li><p>Requests per second increased by 70x between 2014 and 2024</p></li></ul>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/38ps28b6t40SAtoQxMp0z1/90d59911b3bcf8b55cf7ac36d56f8a5b/BLOG-2616_3.png" />
          </figure><p><sup><i>Figure 2. Data from Figure 1 extended with large attacks observed by Cloudflare in 2023 and 2024.</i></sup></p><p>The blog posts listed in Table 1 highlight some of the attacks that we observed from 2021 to 2024.</p><table><tr><td><p><b>Month</b></p></td><td><p><b>Attack size</b></p></td><td><p><b>Blog post</b></p></td></tr><tr><td><p>August 2021</p></td><td><p>17.2 Mrps</p></td><td><p><a href="https://blog.cloudflare.com/cloudflare-thwarts-17-2m-rps-ddos-attack-the-largest-ever-reported/"><i><u>Cloudflare thwarts 17.2M rps DDoS attack — the largest ever reported</u></i></a></p></td></tr><tr><td><p>April 2022</p></td><td><p>15 Mrps</p></td><td><p><a href="https://blog.cloudflare.com/15m-rps-ddos-attack/"><i><u>Cloudflare blocks 15M rps HTTPS DDoS attack</u></i></a></p></td></tr><tr><td><p>June 2022</p></td><td><p>26 Mrps</p></td><td><p><a href="https://blog.cloudflare.com/26m-rps-ddos/"><i><u>Cloudflare mitigates 26 million request per second DDoS attack</u></i></a></p></td></tr><tr><td><p>February 2023</p></td><td><p>71 Mrps</p></td><td><p><a href="https://blog.cloudflare.com/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/"><i><u>Cloudflare mitigates record-breaking 71 million request-per-second DDoS attack</u></i></a></p></td></tr><tr><td><p>September 2024</p></td><td><p>3.8 Tbps</p></td><td><p><a href="https://blog.cloudflare.com/how-cloudflare-auto-mitigated-world-record-3-8-tbps-ddos-attack/"><i><u>How Cloudflare auto-mitigated world record 3.8 Tbps DDoS attack</u></i></a></p></td></tr><tr><td><p>October 2024</p></td><td><p>4.2 Tbps</p></td><td><p><a href="https://blog.cloudflare.com/ddos-threat-report-for-2024-q3/"><i><u>4.2 Tbps of bad packets and a whole lot more: Cloudflare's Q3 DDoS report</u></i></a><i> </i></p></td></tr><tr><td><p>October 2024</p></td><td><p>5.6 Tbps</p></td><td><p><a href="https://x.com/Cloudflare/status/1851589717885649320"><u>5.6 Tbps attack</u></a></p></td></tr></table><p><sup><b>Table 1.</b></sup><sup> Notable DDoS attacks observed by Cloudflare between 2021 - 2024.</sup></p><p>An overview of other selected significant high volume DDoS attacks that have occurred over the last decade, including<a href="https://blog.cloudflare.com/memcrashed-major-amplification-attacks-from-port-11211/"><u> 2018’s Memcached abuse</u></a> and <a href="https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/"><u>2023’s HTTP/2 “Rapid Reset” attacks</u></a>, can be found <a href="https://www.cloudflare.com/learning/ddos/famous-ddos-attacks/"><u>on the Cloudflare Learning Center</u></a>.</p>
    <div>
      <h2>Attack duration as a metric</h2>
      <a href="#attack-duration-as-a-metric">
        
      </a>
    </div>
    <p>Attack duration is not an effective metric to use to qualify attack aggressiveness because establishing a duration of a single attack or campaign is challenging, due to their possible intermittent nature, the potential for a multitude of attack vectors being used at the same time, or how the different defense layers triggered over time. </p><p>The attack patterns can differ considerably, with some consisting of a single large spike, while others featuring multiple tightly grouped spikes, or a continuous load maintained over a period of time, along with other changing characteristics.</p>
    <div>
      <h2>Trend in types of devices used to create attacks</h2>
      <a href="#trend-in-types-of-devices-used-to-create-attacks">
        
      </a>
    </div>
    <p>DDoS attacks are increasingly shifting from IoT-based botnets to more powerful VM-based botnets. This change is primarily due to the higher computational and throughput capabilities of cloud-hosted virtual machines, which allow attackers to launch massive attacks with far fewer devices. </p><p>This shift is facilitated by several factors: VM botnets can be easier to establish than IoT botnets, as they don’t necessarily require widespread malware infections, since attackers can deploy them on cloud provider infrastructure anonymously using stolen payment details from data breaches or <a href="https://blog.cloudflare.com/navigating-the-maze-of-magecart/"><u>Magecart attacks</u></a>.</p><p>This trend points to the evolution of DDoS tactics, as attackers exploit both the processing power of VMs and anonymized access to cloud resources, enabling smaller, more efficient botnets capable of launching large-scale attacks without the complexities involved in infecting and managing fleets of IoT devices.</p>
    <div>
      <h2>How does Cloudflare help protect against DDoS attacks?</h2>
      <a href="#how-does-cloudflare-help-protect-against-ddos-attacks">
        
      </a>
    </div>
    <p>Cloudflare's Connectivity Cloud, built on our expansive anycast global network, plays a crucial role in defending against DDoS attacks by leveraging automated detection, traffic distribution, and rapid response capabilities. Here’s how it strengthens DDoS protection:</p><p><b>Automated attack detection and mitigation</b>: Cloudflare’s DDoS protection relies heavily on automation, using machine learning algorithms to identify suspicious traffic patterns in real time. By <a href="https://blog.cloudflare.com/training-a-million-models-per-day-to-save-customers-of-all-sizes-from-ddos/"><u>automating the detection process</u></a>, Cloudflare can quickly recognize and block DDoS attacks without requiring manual intervention, which is critical in high-volume attacks that would overwhelm human responders.</p><p><b>Global traffic distribution with IP anycast</b>: Cloudflare's network spans over 330 cities worldwide, and DDoS traffic gets distributed across our multiple data centers. <a href="https://www.cloudflare.com/learning/cdn/glossary/anycast-network/"><u>IP anycast</u></a> allows us to distribute traffic across this global network, and this wide distribution helps absorb and mitigate large-scale attacks, as attack traffic is not directed towards a single point, reducing strain on individual servers and networks. </p><p><b>Layered defense</b>: Cloudflare’s Connectivity Cloud offers defense across multiple layers, including network (Layer 3), transport (Layer 4), and application (Layer 7). This layered approach allows for tailored defense strategies depending on the attack type, ensuring that even complex, multi-layered attacks can be mitigated effectively. Learn more about DDoS protection at layers 3, 4, and 7 in <a href="https://developers.cloudflare.com/ddos-protection/"><u>our DDoS protection documentation</u></a>.</p><p><b>Unmetered DDoS mitigation</b>: Pioneering this approach since 2017 to ensure Internet security, Cloudflare provides <a href="https://blog.cloudflare.com/unmetered-mitigation/"><u>unmetered DDoS protection</u></a>, meaning customers are protected without worrying about bandwidth or cost limitations during attacks. This approach helps ensure that businesses, regardless of size or budget, can benefit from robust DDoS protection.</p><p>Cloudflare’s distributed cloud infrastructure and advanced technology allows us to detect, absorb, and mitigate DDoS attacks in a way that is both scalable and responsive, avoiding downtime and maintaining service reliability, providing a robust solution to tackle the rising intensity and frequency of DDoS attacks compared to traditional options.</p><p>Protecting against DDoS attacks is essential for organizations of every size. Although humans initiate these attacks, they’re carried out by bots, so effective defense requires automated tools to counter bot-driven threats. Real-time detection and mitigation should be as automated as possible, since relying solely on human intervention puts defenders at a disadvantage as attackers adapt to new barriers and can change attack vectors, traffic behavior, payload signatures, among others, creating an unpredicted scenario and thus rendering some manual configurations useless. Cloudflare’s automated systems continuously identify and block DDoS attacks on behalf of our customers, enabling tailored protection that meets individual needs.</p><p>Our mission is to help build a better Internet, and providing resilience in the face of DDoS threats is a part of accomplishing that mission.</p><p>Read more about Cloudflare DDoS protection in our public <a href="https://developers.cloudflare.com/ddos-protection/"><u>technical documentation</u></a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">5JhHzAWP0tvrl8ZolsnvyE</guid>
            <dc:creator>José Salvador</dc:creator>
        </item>
        <item>
            <title><![CDATA[4.2 Tbps of bad packets and a whole lot more: Cloudflare's Q3 DDoS report]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2024-q3/</link>
            <pubDate>Wed, 23 Oct 2024 13:05:00 GMT</pubDate>
            <description><![CDATA[ The number of DDoS attacks spiked in the third quarter of 2024. Cloudflare mitigated nearly 6 million DDoS attacks, representing a 49% increase QoQ and 55% increase YoY. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Welcome to the 19th edition of the Cloudflare DDoS Threat Report. Released <a href="https://blog.cloudflare.com/tag/ddos-reports"><u>quarterly</u></a>, these reports provide an in-depth analysis of the DDoS threat landscape as observed across the <a href="https://www.cloudflare.com/en-gb/network/"><u>Cloudflare network</u></a>. This edition focuses on the third quarter of 2024.</p><p>With a 296 Terabit per second (Tbps) network located in over 330 cities worldwide, Cloudflare is used as a reverse proxy by <a href="https://w3techs.com/technologies/overview/proxy"><u>nearly 20% of all websites</u></a>. Cloudflare holds a unique vantage point to provide valuable insights and trends to the broader Internet community.</p>
    <div>
      <h2>Key insights </h2>
      <a href="#key-insights">
        
      </a>
    </div>
    <ul><li><p>The number of DDoS attacks spiked in the third quarter of 2024. Cloudflare mitigated nearly 6 million DDoS attacks, representing a 49% increase QoQ and 55% increase YoY.</p></li><li><p>Out of those 6 million, Cloudflare’s autonomous DDoS defense systems detected and mitigated over 200 hyper-volumetric DDoS attacks exceeding rates of 3 terabits per second (Tbps) and 2 billion packets per second (Bpps). The largest attack peaked at 4.2 Tbps and lasted just a minute.</p></li><li><p>The Banking &amp; Financial Services industry was subjected to the most DDoS attacks. China was the country most targeted by DDoS attacks, and Indonesia was the largest source of DDoS attacks.</p></li></ul><p>To learn more about DDoS attacks and other types of cyber threats, visit our <a href="https://www.cloudflare.com/learning/"><u>Learning Center</u></a>, access <a href="https://blog.cloudflare.com/tag/ddos-reports"><u>previous DDoS threat reports</u></a> on the Cloudflare blog, or visit our interactive hub, <a href="https://radar.cloudflare.com/reports?q=DDoS"><u>Cloudflare Radar</u></a>. There's also a <a href="https://developers.cloudflare.com/radar/"><u>free API</u></a> for those interested in investigating these and other Internet trends. You can also learn more about the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/"><u>methodologies</u></a> used in preparing these reports.</p>
    <div>
      <h2>Hyper-volumetric campaign</h2>
      <a href="#hyper-volumetric-campaign">
        
      </a>
    </div>
    <p>In the first half of 2024, Cloudflare’s autonomous DDoS defense systems automatically detected and mitigated 8.5 million DDoS attacks: 4.5 million in Q1 and 4 million in Q2. In Q3, our systems mitigated nearly 6 million DDoS attacks bringing it to a total of 14.5 million DDoS attacks year-to-date. That’s an average of around 2,200 DDoS attacks every hour.</p><p>Of those attacks, Cloudflare mitigated over 200 hyper-volumetric network-layer DDoS attacks that exceeded 1 Tbps or 1 Bpps. The largest attacks peaked at 3.8 Tbps and 2.2 Bpps. <a href="https://blog.cloudflare.com/how-cloudflare-auto-mitigated-world-record-3-8-tbps-ddos-attack"><u>Read more</u></a> about these attacks and how our DDoS defense systems mitigated them autonomously.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2rcAeeVUGfBh72wYAdw3Ji/61403965d12e1da947ddb17bca5994a3/image6.png" />
          </figure><p><sup>Distribution of hyper-volumetric DDoS attacks over time</sup></p><p>As we were writing this blog post, our systems continued to detect and mitigate these massive attacks and a new record has just been broken again, only three weeks after our last disclosure. On October 21, 2024, Cloudflare’s systems autonomously detected and mitigated a 4.2 Tbps DDoS attack that lasted around a minute.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4PwoLat6XaxJkiSjQg6H8Y/f6c358ab5fbb7bce0c9167bfc5f8dcb7/image13.png" />
          </figure><p><sup><i>4.2 Tbps DDoS attack mitigated autonomously by Cloudflare</i></sup></p>
    <div>
      <h2>DDoS attack types and characteristics</h2>
      <a href="#ddos-attack-types-and-characteristics">
        
      </a>
    </div>
    <p>Of the 6 million DDoS attacks, half were HTTP (application layer) DDoS attacks and half were network layer DDoS attacks. Network layer DDoS attacks increased by 51% QoQ and 45% YoY, and HTTP DDoS attacks increased by 61% QoQ and 68% YoY.</p>
    <div>
      <h3>Attack duration</h3>
      <a href="#attack-duration">
        
      </a>
    </div>
    <p>90% of DDoS attacks, including the largest of attacks, were very short-lived. We did see, however, a slight increase (7%) in attacks lasting more than an hour. These longer attacks accounted for 3% of all attacks.</p>
    <div>
      <h3>Attack vectors</h3>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p>In Q3, we saw an even distribution in the number of network-layer DDoS attacks compared to HTTP DDoS attacks. Of the network-layer DDoS attacks, <a href="https://www.cloudflare.com/en-gb/learning/ddos/syn-flood-ddos-attack/"><u>SYN flood</u></a> was the top attack vector followed by <a href="https://www.cloudflare.com/en-gb/learning/ddos/dns-flood-ddos-attack/"><u>DNS flood attacks</u></a>, <a href="https://www.cloudflare.com/en-gb/learning/ddos/udp-flood-ddos-attack/"><u>UDP floods</u></a>, <a href="https://www.cloudflare.com/en-gb/learning/ddos/ssdp-ddos-attack/"><u>SSDP reflection attacks</u></a>, and <a href="https://www.cloudflare.com/en-gb/learning/ddos/ping-icmp-flood-ddos-attack/"><u>ICMP reflection attacks</u></a>.</p><p>On the application layer, 72% of HTTP DDoS attacks were launched by known botnets and automatically mitigated by our proprietary heuristics. The fact that 72% of DDoS attacks were mitigated by our home-grown heuristics showcases the advantages of operating a large network. The volume of traffic and attacks that we see let us craft, test, and deploy robust defenses against botnets.</p><p>Another 13% of HTTP DDoS attacks were mitigated due to their suspicious or unusual HTTP attributes, and another 9% were HTTP DDoS attacks launched by fake browsers or browser impersonators. The remaining 6% of “Other” includes attacks that targeted login endpoints and cache busting attacks.</p><p>One thing to note is that these attack vectors, or attack groups, are not necessarily exclusive. For example, known botnets also impersonate browsers and have suspicious HTTP attributes, but this breakdown is our attempt to categorize the HTTP DDoS attacks in a meaningful way.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7s2ClnOzWZcefqsiNRrs85/560a7cc1f256c24f733a6d784c2a6b83/image3.png" />
          </figure><p><sup><i>Distribution of DDoS attacks in 2024 Q3</i></sup></p><p>In Q3, we observed a 4,000% increase in <a href="https://www.cloudflare.com/en-gb/learning/ddos/ssdp-ddos-attack/"><u>SSDP amplification attacks</u></a> compared to the previous quarter. An SSDP (Simple Service Discovery Protocol) attack is a type of reflection and amplification DDoS attack that exploits the <a href="https://en.wikipedia.org/wiki/Universal_Plug_and_Play"><u>UPnP (Universal Plug and Play) protocol</u></a>. Attackers send SSDP requests to vulnerable UPnP-enabled devices such as routers, printers, and IP-enabled cameras, and <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/"><u>spoof</u></a> the source IP address to be the victim’s IP address. These devices respond to the victim’s IP address with large amounts of traffic, overwhelming the victim’s infrastructure. The amplification effect allows attackers to generate massive traffic from small requests, causing the victim’s service to go offline. Disabling UPnP on unnecessary devices and using DDoS mitigation strategies can help defend against this attack.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5hK3wMmUM2m7QbEi9zkNJe/fa4ba3f7d8c7a6e35a681ad068694cfd/image5.png" />
          </figure><p><sup><i>Illustration of an SSDP amplification attack</i></sup></p>
    <div>
      <h3>User agents used in HTTP DDoS attacks</h3>
      <a href="#user-agents-used-in-http-ddos-attacks">
        
      </a>
    </div>
    <p>When launching HTTP DDoS attacks, threat actors want to blend in to avoid detection. One tactic to achieve this is to spoof the user agent. This lets them appear as a legitimate browser or client if done successfully.</p><p>In Q3, 80% of HTTP DDoS attack traffic impersonated the <i>Google Chrome</i> browser, which was the most common user agent observed in attacks. More specifically, Chrome 118, 119, 120, and 121 were the most common versions.</p><p>In second place, no user agent was seen for 9% of HTTP DDoS attack traffic.</p><p>In third and fourth place, we observed attacks using the <a href="https://pkg.go.dev/net/http"><i><u>Go-http-client</u></i></a> and <a href="https://github.com/valyala/fasthttp"><i><u>fasthttp</u></i></a> user agents. The former is the default HTTP client in Go’s standard library and the latter is a high-performance alternative. <i>fasthttp</i> is used to build fast web applications, but is often used for DDoS attacks and web scraping too.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5KuRumdhH8nJkSHAddb0G/c22915c1a931a50304879d359f52e2b0/image11.png" />
          </figure><p><i><sup>Top user agents used in DDoS attacks</sup></i></p><p>The user agent <a href="https://github.com/benoitc/hackney"><i><u>hackney</u></i></a> came in fifth place. It’s an HTTP client library for Erlang. It's used for making HTTP requests and is popular in Erlang/Elixir ecosystems.</p><p>An interesting user agent shows up in the sixth place: <i>HITV_ST_PLATFORM</i>. This user agent appears to be associated with smart TVs or set-top boxes. Threat actors typically avoid using uncommon user agents, as evidenced by the frequent use of Chrome user agents in cyberattacks. Therefore, the presence of <i>HITV_ST_PLATFORM</i> likely suggests that the devices in question are indeed compromised smart TVs or set-top boxes.</p><p>In seventh place, we saw the <a href="https://www.utorrent.com/"><i><u>uTorrent</u></i></a> user agent being used in attacks. This user agent is associated with a popular BitTorrent client that’s used for downloading files.</p><p>Lastly, <a href="https://square.github.io/okhttp/"><i><u>okhttp</u></i></a> was the least common user agent in DDoS attacks despite its popularity as an HTTP client for Java and Android applications. </p>
    <div>
      <h3>HTTP attack attributes</h3>
      <a href="#http-attack-attributes">
        
      </a>
    </div>
    <p>While 89% of HTTP DDoS attack traffic used the GET method, it is also the most commonly used HTTP method. So when we normalize the attack traffic by dividing the number of attack requests by total request per HTTP method, we get a different picture.</p><p>Almost 12% of all requests that used the DELETE method were part of an HTTP DDoS attack. After DELETE, we see that HEAD, PATCH and GET are the methods most commonly used in DDoS attack requests.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2iJMmknCh32vPIdeCPAeyf/a526d605c7737de6f427fef2fa7cddcd/image15.png" />
          </figure><p>While 80% of DDoS attack requests were over HTTP/2 and 19% were over HTTP/1.1, they represented a much smaller portion when normalized by the total traffic by version. When we normalize the attack requests by all requests by version, we see a different picture. Over half of traffic to the non-standard or mislabeled “HTTP/1.2” version was malicious and part of DDoS attacks. It's important to note that “HTTP/1.2” is not an official version of the protocol.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1hyoIhxiRPFoyCWfReFrP4/eae8d02173b6d88d0310ca0c2769d3d9/image12.png" />
          </figure><p><sup><i>The vast majority of HTTP DDoS attacks are actually encrypted — almost 94% — using HTTPS.</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6w76h72BQxMQgFS5LyQGaC/bc2ce6cedbfd7ba59b7972f5d00096da/image8.png" />
          </figure>
    <div>
      <h2>Targets of DDoS attacks</h2>
      <a href="#targets-of-ddos-attacks">
        
      </a>
    </div>
    
    <div>
      <h3>Top attacked locations</h3>
      <a href="#top-attacked-locations">
        
      </a>
    </div>
    <p>China was the most attacked location in the third quarter of 2024. The United Arab Emirates was ranked second, with Hong Kong in third place, followed closely by Singapore, Germany, and Brazil.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7kxDlG9Rl6unfi1mXRmcN7/13ea1212c9a750b521fc0178ad982540/image7.png" />
          </figure><p>Canada was ranked seventh, followed by South Korea, the United States, and Taiwan as number ten.</p>
    <div>
      <h3>Top attacked industries</h3>
      <a href="#top-attacked-industries">
        
      </a>
    </div>
    <p>In the third quarter of 2024, Banking &amp; Financial Services was the most targeted by DDoS attacks. Information Technology &amp; Services was ranked in second place, followed by the Telecommunications, Service Providers, and Carriers sector.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1gKofo0gDvfX8CiOwL80pI/31a6b9bb9f0a6cfe2819cc16ba0e0acd/image4.png" />
          </figure><p>Cryptocurrency, Internet, Gambling &amp; Casinos, and Gaming followed closely behind as the next most targeted industries. Consumer Electronics, Construction &amp; Civil Engineering, and the Retail industries rounded out the top ten most attacked industries.</p>
    <div>
      <h2>Sources of DDoS attacks</h2>
      <a href="#sources-of-ddos-attacks">
        
      </a>
    </div>
    
    <div>
      <h3>Threat actors</h3>
      <a href="#threat-actors">
        
      </a>
    </div>
    <p>For a few years now, we’ve been surveying our customers that have been subjected to DDoS attacks. The survey covers various factors, such as the nature of the attack and the threat actors. In the case of threat actors, while 80% of survey respondents said that they don’t know who attacked them, 20% said they did. Of those, 32% said that the threat actors were extortionists. Another 25% said a competitor attacked them, and another 21% said that a disgruntled customer or user was behind the attack. 14% of respondents said that the attacks were carried out by a state or a state-sponsored group. Lastly, 7% said that they mistakenly attacked themselves. One example of when a self-DDoS attack occurs is a post-firmware update for IoT devices that causes all devices to <i>phone home</i> at the same time, resulting in a flood of traffic.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1F9u4X57yFohLq6qvLg2qd/cea67346e9b787a42b221fb9e242c61b/image2.png" />
          </figure><p><sup><i>Distribution of the top threat actors</i></sup></p><p>While extortionists were the most common threat actor, overall, reports of <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/"><u>Ransom DDoS attacks</u></a> decreased by 42% QoQ, but increased 17% YoY. A total of 7% of respondents reported being subjected to a Ransom DDoS attack or threatened by the attacker. In August, however, that figure increased to 10% — that’s one out of ten.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ImW8Gfe4c2WaASshJVDDf/fc715b31d347dc19ae198fcaac17787f/image10.png" />
          </figure><p><sup><i>Reports of Ransom DDoS attacks by quarter</i></sup></p>
    <div>
      <h3>Top source locations of DDoS attacks</h3>
      <a href="#top-source-locations-of-ddos-attacks">
        
      </a>
    </div>
    <p>Indonesia was the largest source of DDoS attacks in the third quarter of 2024. The Netherlands was the second-largest source, followed by Germany, Argentina, and Colombia.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/uWeX1HJBO9Omb2GpEODij/88ffec73cba860ca393b49df1fa0df36/image1.png" />
          </figure><p>The next five largest sources included Singapore, Hong Kong, Russia, Finland, and Ukraine.</p>
    <div>
      <h3>Top source networks of DDoS attacks</h3>
      <a href="#top-source-networks-of-ddos-attacks">
        
      </a>
    </div>
    <p>For service providers that operate their own networks and infrastructure, it can be difficult to identify who is using their infrastructure for malicious intent, such as generating DDoS attacks. For this reason, we provide a <a href="https://developers.cloudflare.com/ddos-protection/botnet-threat-feed/"><u>free threat intelligence feed to network operators</u></a>. This feed provides service providers information on IP addresses from within their networks that we’ve seen participate in subsequent DDoS attacks.</p><p>On that note, <a href="https://radar.cloudflare.com/as24940"><u>Hetzner (AS24940)</u></a>, a German-based IT provider, was the largest source of HTTP DDoS attacks in the third quarter of 2024. <a href="https://radar.cloudflare.com/as63949"><u>Linode (AS63949)</u></a>, a cloud computing platform acquired by Akamai in 2022, was the second-largest source of HTTP DDoS attacks. <a href="https://radar.cloudflare.com/as64515"><u>Vultr (AS64515)</u></a>, a Florida-based service provider, came in third place.</p><p><a href="https://radar.cloudflare.com/as197540"><u>Netcup (AS197540)</u></a>, another German-based IT provider, came in fourth place. <a href="https://radar.cloudflare.com/as15169"><u>Google Cloud Platform (AS15169)</u></a> followed in fifth place. <a href="https://radar.cloudflare.com/as14061"><u>DigitalOcean (AS14061)</u></a> came in sixth place, followed by French provider <a href="https://radar.cloudflare.com/as16276"><u>OVH (AS16276)</u></a>, <a href="https://radar.cloudflare.com/as44477"><u>Stark Industries (AS44477)</u></a>, <a href="https://radar.cloudflare.com/as16509"><u>Amazon Web Services (AS16509)</u></a>, and <a href="https://radar.cloudflare.com/as8075"><u>Microsoft (AS8075)</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2pomZ3ggzXm6RJBOqBCnHN/638c7e3523dd78376c5de607dc34ad0f/image9.png" />
          </figure><p><sup><i>Networks that were that largest sources of HTTP DDoS attacks in 2024 Q3</i></sup></p>
    <div>
      <h2>Key takeaways</h2>
      <a href="#key-takeaways">
        
      </a>
    </div>
    <p>This quarter, we observed an unprecedented surge in hyper-volumetric DDoS attacks, with peaks reaching 3.8 Tbps and 2.2 Bpps. This mirrors a similar trend from the same period last year, when application layer attacks in the <a href="https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack"><u>HTTP/2 Rapid Reset</u></a> campaign exceeded 200 million requests per second (Mrps). These massive attacks are capable of overwhelming Internet properties, particularly those relying on capacity-limited cloud services or on-premise solutions.</p><p>The increasing use of powerful botnets, fueled by geopolitical tensions and global events, is expanding the range of organizations at risk — many of which were not traditionally considered prime targets for DDoS attacks. Unfortunately, too many organizations reactively deploy DDoS protections after an attack has already caused significant damage.</p><p>Our observations confirm that businesses with well-prepared, comprehensive security strategies are far more resilient against these cyberthreats. At Cloudflare, we’re committed to safeguarding your Internet presence. Through significant investment in our automated defenses and a robust portfolio of security products, we ensure proactive protection against both current and emerging threats — so you don’t have to.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Advanced DDoS]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Attacks]]></category>
            <guid isPermaLink="false">1JcMVeEAlLozSywoEbjGoV</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare auto-mitigated world record 3.8 Tbps DDoS attack]]></title>
            <link>https://blog.cloudflare.com/how-cloudflare-auto-mitigated-world-record-3-8-tbps-ddos-attack/</link>
            <pubDate>Wed, 02 Oct 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ Over the past couple of weeks, Cloudflare's DDoS protection systems have automatically and successfully mitigated multiple hyper-volumetric L3/4 DDoS attacks exceeding 3 billion packets per second (Bpps). Our systems also automatically mitigated multiple attacks exceeding 3 terabits per second (Tbps), with the largest ones exceeding 3.65 Tbps. The scale of these attacks is unprecedented. ]]></description>
            <content:encoded><![CDATA[ <p>Since early September, <a href="https://developers.cloudflare.com/ddos-protection/about/components/#autonomous-edge"><u>Cloudflare's DDoS protection systems</u></a> have been combating a month-long campaign of hyper-volumetric L3/4 DDoS attacks. Cloudflare’s defenses mitigated over one hundred hyper-volumetric L3/4 DDoS attacks throughout the month, with many exceeding 2 billion packets per second (Bpps) and 3 terabits per second (Tbps). The largest attack peaked 3.8 Tbps — the largest ever disclosed publicly by any organization. Detection and mitigation was fully autonomous. The graphs below represent two separate attack events that targeted the same Cloudflare customer and were mitigated autonomously.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7hXUgmEd37kzZrMs0KPXLl/21a4779022bdff91f760dc66759eb955/BLOG-2586_2.png" />
          </figure><p><sup><i>A mitigated 3.8 Terabits per second DDoS attack that lasted 65 seconds</i></sup></p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1uxvtlkdFoH6KU6waXxK3o/d17fe7cf0e33c20e64a47b3ca0e6ca63/BLOG-2586_3.png" />
          </figure><p><sup><i>A mitigated 2.14 billion packet per second DDoS attack that lasted 60 seconds</i></sup></p>
    <div>
      <h2>Cloudflare customers are protected</h2>
      <a href="#cloudflare-customers-are-protected">
        
      </a>
    </div>
    <p>Cloudflare customers using Cloudflare’s HTTP reverse proxy services (e.g. <a href="https://developers.cloudflare.com/waf/"><u>Cloudflare WAF</u></a> and <a href="https://developers.cloudflare.com/cache/"><u>Cloudflare CDN</u></a>) are automatically protected.</p><p>Cloudflare customers using <a href="https://developers.cloudflare.com/spectrum/"><u>Spectrum</u></a> and <a href="https://developers.cloudflare.com/magic-transit/"><u>Magic Transit</u></a> are also automatically protected. Magic Transit customers can further optimize their protection by deploying <a href="https://developers.cloudflare.com/magic-firewall/"><u>Magic Firewall</u></a> rules to enforce a strict positive and negative security model at the packet layer.</p>
    <div>
      <h2>Other Internet properties may not be safe</h2>
      <a href="#other-internet-properties-may-not-be-safe">
        
      </a>
    </div>
    <p>The scale and frequency of these attacks are unprecedented. Due to their sheer size and bits/packets per second rates, these attacks have the ability to take down unprotected Internet properties, as well as Internet properties that are protected by on-premise equipment or by cloud providers that just don’t have sufficient network capacity or global coverage to be able to handle these volumes alongside legitimate traffic without impacting performance. </p><p>Cloudflare, however, does have the network capacity, global coverage, and intelligent systems needed to absorb and automatically mitigate these monstrous attacks. </p><p>In this blog post, we will review the attack campaign and why its attacks are so severe. We will describe the anatomy of a Layer 3/4 DDoS attack, its objectives, and how attacks are generated. We will then proceed to detail how Cloudflare’s systems were able to autonomously detect and mitigate these monstrous attacks without impacting performance for our customers. We will describe the key aspects of our defenses, starting with how our systems generate real-time (dynamic) signatures to match the attack traffic all the way to how we leverage kernel features to drop packets at wire-speed.</p>
    <div>
      <h2>Campaign analysis</h2>
      <a href="#campaign-analysis">
        
      </a>
    </div>
    <p>We have observed this attack campaign targeting multiple customers in the financial services, Internet, and telecommunication industries, among others. This attack campaign targets bandwidth saturation as well as resource exhaustion of in-line applications and devices.</p><p>The attacks predominantly leverage <a href="https://www.cloudflare.com/learning/ddos/glossary/user-datagram-protocol-udp/"><u>UDP</u></a> on a fixed port, and originated from across the globe with larger shares coming from Vietnam, Russia, Brazil, Spain, and the US. </p><p>The high packet rate attacks appear to originate from multiple types of compromised devices, including MikroTik devices, DVRs, and Web servers, orchestrated to work in tandem and flood the target with exceptionally large volumes of traffic. The high bitrate attacks appear to originate from a large number of compromised ASUS home routers, likely exploited using <a href="https://censys.com/june-20-improper-authentication-vulnerability-in-asus-routers/"><u>a CVE 9.8 (Critical) vulnerability that was recently discovered by Censys</u></a>.</p><div>
    <figure>
        <table>
            <colgroup>
                <col></col>
                <col></col>
            </colgroup>
            <tbody>
                <tr>
                    <td>
                        <p><span><span>Russia</span></span></p>
                    </td>
                    <td>
                        <p><span><span>12.1%</span></span></p>
                    </td>
                </tr>
                <tr>
                    <td>
                        <p><span><span>Vietnam</span></span></p>
                    </td>
                    <td>
                        <p><span><span>11.6%</span></span></p>
                    </td>
                </tr>
                <tr>
                    <td>
                        <p><span><span>United States</span></span></p>
                    </td>
                    <td>
                        <p><span><span>9.3%</span></span></p>
                    </td>
                </tr>
                <tr>
                    <td>
                        <p><span><span>Spain</span></span></p>
                    </td>
                    <td>
                        <p><span><span>6.5%</span></span></p>
                    </td>
                </tr>
                <tr>
                    <td>
                        <p><span><span>Brazil</span></span></p>
                    </td>
                    <td>
                        <p><span><span>4.7%</span></span></p>
                    </td>
                </tr>
                <tr>
                    <td>
                        <p><span><span>France</span></span></p>
                    </td>
                    <td>
                        <p><span><span>4.7%</span></span></p>
                    </td>
                </tr>
                <tr>
                    <td>
                        <p><span><span>Romania</span></span></p>
                    </td>
                    <td>
                        <p><span><span>4.4%</span></span></p>
                    </td>
                </tr>
                <tr>
                    <td>
                        <p><span><span>Taiwan</span></span></p>
                    </td>
                    <td>
                        <p><span><span>3.4%</span></span></p>
                    </td>
                </tr>
                <tr>
                    <td>
                        <p><span><span>United Kingdom</span></span></p>
                    </td>
                    <td>
                        <p><span><span>3.3%</span></span></p>
                    </td>
                </tr>
                <tr>
                    <td>
                        <p><span><span>Italy</span></span></p>
                    </td>
                    <td>
                        <p><span><span>2.8%</span></span></p>
                    </td>
                </tr>
            </tbody>
        </table>
    </figure>
</div><p><sup><i>Share of packets observed by source location</i></sup></p>
    <div>
      <h2>Anatomy of DDoS attacks</h2>
      <a href="#anatomy-of-ddos-attacks">
        
      </a>
    </div>
    <p>Before we discuss how Cloudflare automatically detected and mitigated the largest DDoS attacks ever seen, it‘s important to understand the basics of DDoS attacks. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7HLtAHnyjS33iiJAR1B9h9/2e1fc2cab871440fc95fa803989ae156/BLOG-2586_5.png" />
          </figure><p><sup><i>Simplified diagram of a DDoS attack</i></sup></p><p>The goal of a <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/"><u>Distributed Denial of Service (DDoS) attack</u></a> is to deny legitimate users access to a service. This is usually done by exhausting resources needed to provide the service. In the context of these recent Layer 3/4 DDoS attacks, that resource is CPU cycles and network bandwidth.</p>
    <div>
      <h3>Exhausting CPU cycles</h3>
      <a href="#exhausting-cpu-cycles">
        
      </a>
    </div>
    <p>Processing a packet consumes CPU cycles. In the case of regular (non-attack) traffic, a <i>legitimate</i> packet received by a service will cause that service to perform some action, and different actions require different amounts of CPU processing. However, before a packet is even delivered to a service there is per-packet work that needs to be done. Layer 3 packet headers need to be parsed and processed to deliver the packet to the correct machine and interface. Layer 4 packet headers need to be processed and routed to the correct socket (if any). There may be multiple additional processing steps that inspect every packet. Therefore, if an attacker sends at a high enough packet rate, then they can potentially saturate the available CPU resources, denying service to legitimate users.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3aBbNG4Fc7TY6MTugLl3BE/064fb17761aebbce737a5a4518a14235/BLOG-2586_6.png" />
          </figure><p>To defend against high packet rate attacks, you need to be able to inspect and discard the bad packets using as few CPU cycles as possible, leaving enough CPU to process the good packets. You can additionally acquire more, or faster, CPUs to perform the processing — but that can be a very lengthy process that bears high costs. </p>
    <div>
      <h3>Exhausting network bandwidth</h3>
      <a href="#exhausting-network-bandwidth">
        
      </a>
    </div>
    <p>Network bandwidth is the total amount of data per time that can be delivered to a server. You can think of bandwidth like a pipe to transport water. The amount of water we can deliver through a drinking straw is less than what we could deliver through a garden hose. If an attacker is able to push more garbage data into the pipe than it can deliver, then both the bad data <i>and</i> the good data will be discarded upstream, at the entrance to the pipe, and the DDoS is therefore successful.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/OehVItOhGfP9ApllRvDDM/fce73e6f375173a1a53bc22026e0b9b1/BLOG-2586_7.png" />
          </figure><p>
Defending against attacks that can saturate network bandwidth can be difficult because there is very little that can be done if you are on the downstream side of the saturated pipe. There are really only a few choices: you can get a bigger pipe, you can potentially find a way to move the good traffic to a new pipe that isn’t saturated, or you can hopefully ask the upstream side of the pipe to stop sending some or all of the data into the pipe.</p>
    <div>
      <h2>Generating DDoS attacks</h2>
      <a href="#generating-ddos-attacks">
        
      </a>
    </div>
    <p>If we think about what this means from the attackers point of view you realize there are similar constraints. Just as it takes CPU cycles to receive a packet, it also takes CPU cycles to create a packet. If, for example, the cost to send and receive a packet were equal, then the attacker would need an equal amount of CPU power to generate the attack as we would need to defend against it. In most cases this is not true — there is a cost asymmetry, as the attacker is able to generate packets using fewer CPU cycles than it takes to receive those packets. However, it is worth noting that generating attacks is not free and can require a large amount of CPU power.</p><p>Saturating network bandwidth can be even more difficult for an attacker. Here the attacker needs to be able to output more bandwidth than the target service has allocated. They actually need to be able to exceed the capacity of the receiving service. This is so difficult that the most common way to achieve a network bandwidth attack is to use a reflection/amplification attack method, for example a <a href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/"><u>DNS Amplification attack</u></a>. These attacks allow the attacker to send a small packet to an intermediate service, and the intermediate service will send a large packet to the victim.</p><p>In both scenarios, the attacker needs to acquire or gain access to many devices to generate the attack. These devices can be acquired in a number of different ways. They may be server class machines from cloud providers or hosting services, or they can be compromised devices like DVRs, routers, and webcams that have been infected with the attacker’s malware. These machines together form the botnet.</p>
    <div>
      <h2>How Cloudflare defends against large attacks</h2>
      <a href="#how-cloudflare-defends-against-large-attacks">
        
      </a>
    </div>
    <p>Now that we understand the fundamentals of how DDoS attacks work, we can explain how Cloudflare can defend against these attacks.</p>
    <div>
      <h3>Spreading the attack surface using global anycast</h3>
      <a href="#spreading-the-attack-surface-using-global-anycast">
        
      </a>
    </div>
    <p>The first not-so-secret ingredient is that Cloudflare’s network is built on <a href="https://www.cloudflare.com/learning/cdn/glossary/anycast-network/"><u>anycast</u></a>. In brief, anycast allows a single IP address to be advertised by multiple machines around the world. A packet sent to that IP address will be served by the closest machine. This means when an attacker uses their distributed botnet to launch an attack, the attack will be received in a distributed manner across the Cloudflare network. An infected DVR in Dallas, Texas will send packets to a Cloudflare server in Dallas. An infected webcam in London will send packets to a Cloudflare server in London.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/48tW6A6ACUT4Fd9h3l70F4/c6bcea8f037fc853477d0987c939e007/BLOG-2586_8.png" />
          </figure><p><sup><i>Anycast vs. Unicast networks</i></sup></p><p>Our anycast network additionally allows Cloudflare to allocate compute and bandwidth resources closest to the regions that need them the most. Densely populated regions will generate larger amounts of legitimate traffic, and the data centers placed in those regions will have more bandwidth and CPU resources to meet those needs. Sparsely populated regions will naturally generate less legitimate traffic, so Cloudflare data centers in those regions can be sized appropriately. Since attack traffic is mainly coming from compromised devices, those devices will tend to be distributed in a manner that matches normal traffic flows sending the attack traffic proportionally to datacenters that can handle it. And similarly, within the datacenter, traffic is distributed across multiple machines.</p><p>Additionally, for high bandwidth attacks, Cloudflare’s network has another advantage. A large proportion of traffic on the Cloudflare network does not consume bandwidth in a symmetrical manner. For example, an HTTP request to get a webpage from a site behind Cloudflare will be a relatively small incoming packet, but produce a larger amount of outgoing traffic back to the client. This means that the Cloudflare network tends to egress far more legitimate traffic than we receive. However, the network links and bandwidth allocated are symmetrical, meaning there is an abundance of ingress bandwidth available to receive volumetric attack traffic.</p>
    <div>
      <h3>Generating real-time signatures</h3>
      <a href="#generating-real-time-signatures">
        
      </a>
    </div>
    <p>By the time you’ve reached an individual server inside a datacenter, the bandwidth of the attack has been distributed enough that none of the upstream links are saturated. That doesn’t mean the attack has been fully stopped yet, since we haven’t dropped the bad packets. To do that, we need to sample traffic, qualify an attack, and create rules to block the bad packets. </p><p>Sampling traffic and dropping bad packets is the job of our <a href="https://blog.cloudflare.com/l4drop-xdp-ebpf-based-ddos-mitigations/"><u>l4drop</u></a> component, which uses <a href="https://netdevconf.info/2.1/papers/Gilberto_Bertin_XDP_in_practice.pdf"><u>XDP (eXpress Data Path)</u></a> and leverages an extended version of the Berkeley Packet Filter known as <a href="https://blog.cloudflare.com/tag/ebpf/"><u>eBPF (extended BPF)</u></a>. This enables us to execute custom code in kernel space and process (drop, forward, or modify) each packet directly at the network interface card (NIC) level. This component helps the system drop packets efficiently without consuming excessive CPU resources on the machine. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1NUxGTvKFs5l6G2UCSxvqw/3632f6728f9361123169d9694c807f0b/BLOG-2586_9.png" />
          </figure><p><sup><i>Cloudflare DDoS protection system overview</i></sup></p><p>We use XDP to sample packets to look for suspicious attributes that indicate an attack. The samples include fields such as the source IP, source port, destination IP, destination port, protocol, TCP flags, sequence number, options, packet rate and more. This analysis is conducted by the <i>denial of service daemon (dosd).</i> <i>Dosd</i> holds our secret sauce. It has many <i>filters</i> which instruct it, based on our curated heuristics, when to initiate mitigation. To our customers, these filters are logically grouped by attack vectors and exposed as the <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/"><u>DDoS Managed Rules</u></a>. Our customers can <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/adjust-rules/"><u>customize their behavior</u></a> to some extent, as needed.</p><p>As it receives samples from XDP, dosd will generate multiple permutations of fingerprints for suspicious traffic patterns. Then, using a data streaming algorithm, dosd will identify the most optimal fingerprints to mitigate the attack. Once an attack is qualified, dosd will push a mitigation rule inline as an eBPF program to surgically drop the attack traffic. </p><p>The detection and mitigation of attacks by dosd is done at the server level, at the data center level and at the global level — and it’s all software defined. This makes our network extremely resilient and leads to almost instant mitigation. There are no out-of-path “scrubbing centers” or “scrubbing devices”. Instead, each server runs the full stack of the Cloudflare product suite including the DDoS detection and mitigation component. And it is all done autonomously. Each server also <i>gossips (multicasts)</i> mitigation instructions within a data center between servers, and globally between data centers. This ensures that whether an attack is localized or globally distributed, dosd will have already installed mitigation rules inline to ensure a robust mitigation.</p>
    <div>
      <h2>Strong defenses against strong attacks</h2>
      <a href="#strong-defenses-against-strong-attacks">
        
      </a>
    </div>
    <p>Our software-defined, autonomous DDoS detection and mitigation systems run across our entire network. In this post we focused mainly on our dynamic fingerprinting capabilities, but our arsenal of defense systems is much larger. The <a href="https://developers.cloudflare.com/ddos-protection/tcp-protection/"><u>Advanced TCP Protection</u></a> system and <a href="https://developers.cloudflare.com/ddos-protection/dns-protection/"><u>Advanced DNS Protection</u></a> system work alongside our dynamic fingerprinting to identify sophisticated and highly randomized TCP-based DDoS attacks and also leverages statistical analysis to thwart complex DNS-based DDoS attacks. Our defenses also incorporate real-time threat intelligence, traffic profiling, and machine learning classification as part of our <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/adaptive-protection/"><u>Adaptive DDoS Protection</u></a> to mitigate traffic anomalies. </p><p>Together, these systems, alongside the full breadth of the Cloudflare Security portfolio, are built atop of the Cloudflare network — one of the largest networks in the world — to ensure our customers are protected from the largest attacks in the world.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">4j6QWqeVFn6qzs0Md0LK7h</guid>
            <dc:creator>Manish Arora</dc:creator>
            <dc:creator>Shawn Bohrer</dc:creator>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Cody Doucette</dc:creator>
            <dc:creator>Alex Forster</dc:creator>
            <dc:creator>Nick Wood</dc:creator>
        </item>
        <item>
            <title><![CDATA[Network trends and natural language: Cloudflare Radar’s new Data Explorer & AI Assistant]]></title>
            <link>https://blog.cloudflare.com/radar-data-explorer-ai-assistant/</link>
            <pubDate>Fri, 27 Sep 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ The Cloudflare Radar Data Explorer provides a simple Web-based interface to build more complex API queries, including comparisons and filters, and visualize the results. The accompanying AI Assistant translates a user’s natural language statements or questions into the appropriate Radar API calls. ]]></description>
            <content:encoded><![CDATA[ <p><b></b><a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a> showcases global Internet traffic patterns, attack activity, and technology trends and insights. It is powered by data from Cloudflare's global network, as well as aggregated and anonymized data from Cloudflare's <a href="https://1.1.1.1/dns"><u>1.1.1.1 public DNS Resolver</u></a>, and is built on top of a rich, publicly accessible <a href="https://developers.cloudflare.com/radar/"><u>API</u></a>. This API allows users to explore Radar data beyond the default set of visualizations, for example filtering by protocol, comparing metrics across multiple locations or autonomous systems, or examining trends over two different periods of time. However, not every user has the technical know-how to make a raw API query or process the JSON-formatted response.</p><p>Today, we are launching the <a href="https://radar.cloudflare.com/explorer"><u>Cloudflare Radar Data Explorer</u></a>, which provides a simple Web-based interface to enable users to easily build more complex API queries, including comparisons and filters, and visualize the results. And as a complement to the Data Explorer, we are also launching an AI Assistant, which uses <a href="https://developers.cloudflare.com/workers-ai/"><u>Cloudflare Workers AI</u></a> to translate a user’s natural language statements or questions into the appropriate Radar API calls, the results of which are visualized in the Data Explorer. Below, we introduce the AI Assistant and Data Explorer, and also dig into how we used Cloudflare Developer Platform tools to build the AI Assistant.</p>
    <div>
      <h2>Ask the AI Assistant</h2>
      <a href="#ask-the-ai-assistant">
        
      </a>
    </div>
    <p>Sometimes, a user may know what they are looking for, but aren’t quite sure how to build the relevant API query by selecting from the available options and filters. (The sheer number may appear overwhelming.) In those cases, they can simply pose a question to the AI Assistant, like “Has there been an uptick in malicious email over the last week?” The AI Assistant makes a series of Workers AI and Radar API calls to retrieve the relevant data, which is visualized within seconds:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3HRBy5Bm5aNQ1gUj1MBCj5/e0fcd717765a8f234996b9e98e43389a/image8.png" />
          </figure><p>The AI Assistant pane is found on the right side of the page in desktop browsers, and appears when the user taps the “AI Assistant” button on a mobile browser. To use the AI Assistant, users just need to type their question into the “Ask me something” area at the bottom of the pane and submit it. A few sample queries are also displayed by default to provide examples of how and what to ask, and clicking on one submits it.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/79srygHorwU84nyQg9KLSl/be609d62b0ebf4a708f6f523fed817f1/Screenshot_2024-09-26_at_20.32.43.png" />
          </figure><p>The submitted question is evaluated by the AI Assistant (more <a href="#AIAssistant"><u>below</u></a> on how that happens), and the resulting visualization is displayed in the <b>Results</b> section of the Data Explorer. In addition to the visualization of the results, the appropriate <b>Data</b>, <b>Filter</b>, and <b>Compare</b> options are selected in the <b>Query</b> section above the visualization, allowing the user to further tune or refine the results if necessary. The <i>Keep current filters</i> toggle within the AI Assistant pane allows users to build on the previous question. For example, with that toggle active, a user could ask “Traffic in the United States”, see the resultant graph, and then ask “Compare it with traffic in Mexico” to add Mexico’s data to the graph.</p>
    <div>
      <h2>Building a query directly</h2>
      <a href="#building-a-query-directly">
        
      </a>
    </div>
    <p>For users that prefer a more hands-on approach, a wide variety of Radar datasets are available to explore, including traffic metrics, attacks, Internet quality, email security, and more. Once the user selects a dataset, the <i>Breakdown By:</i> dropdown is automatically populated with relevant options (if any), and <b>Filter</b> options are also dynamically populated. As the user selects additional options, the visualization in the <b>Result</b> section is automatically updated.</p><p>In addition to building the query of interest, Data Explorer also enables the user to compare the results, both against a specific date range and/or another location or <a href="https://www.cloudflare.com/en-gb/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system (AS)</u></a>. To compare results with the immediately previous period (the last seven days with the seven days before that, for instance), just toggle on the <i>Previous period</i> switch. Otherwise, clicking on the <i>Date Range</i> field brings up a calendar that enables the user to select a starting date — the corresponding date range is intelligently selected, based on the date range selected in the <b>Filter</b> section. To compare results across locations or ASNs, clicking on the “Location or ASN” field brings up a search box in which the user can enter a location (country/region) name, AS name, or AS number, with search results updating as the user types. Note that locations can be compared with other locations or ASes, and ASes can be compared with other ASes or locations. This enables a user, for example, to compare trends for their ISP with trends for their country.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1R9F5Cxe8gkJCUHzLitNH3/87225186868c22f4a3b17a19c1bddd8c/image7.png" />
            
            </figure>
    <div>
      <h2>Visualizing the results</h2>
      <a href="#visualizing-the-results">
        
      </a>
    </div>
    <p>Much of the value of Cloudflare Radar comes from its visualizations – the graphs, maps, and tables that illustrate the underlying data, and Data Explorer does not disappoint here. Depending on the dataset and filters selected, and the volume of data returned, results may be visualized in a time series graph, bar chart, <a href="https://en.wikipedia.org/wiki/Treemapping"><u>treemap</u></a>, or global <a href="https://en.wikipedia.org/wiki/Choropleth_map"><u>choropleth map</u></a>. The visualization type is determined automatically based on the contents of the API response. For example, the presence of countryalpha2 keys in the response means a choropleth map will be used, the presence of timestamps in the response means a line graph (“xychart”) should be shown, and more than 40 items in the response selects a treemap as the visualization type.</p><p>To illustrate the extended visualizations available in Data Explorer, the figure below is an expanded version of one that would normally be found on <a href="https://radar.cloudflare.com/adoption-and-usage/us#http-1-x-vs-http-2-vs-http-3"><u>Radar’s </u><b><u>Adoption &amp; Usage</u></b><u> page</u></a>. The “standard” version of the graph plots the shares of the HTTP versions over the last seven days for the United States, as well as the summary share values. In this <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;groupBy=http_version&amp;loc=US&amp;filters=botClass%253DLikely_Human%252CdeviceType%253DMobile&amp;dt=7d&amp;timeCompare=1&amp;compareWith=701"><u>extended version of the graph generated in the Data Explorer</u></a>, we compare data for the United States with HTTP version share data for <a href="https://radar.cloudflare.com/as701"><u>AS701 (Verizon)</u></a>, for both the past seven days and the previous seven-day period. In addition to the comparisons plotted on the time series graph, the associated summary values are also compared in an accompanying bar chart. This comprehensive visualization makes comparisons easy.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Euh3n9A79zjXN05GQsTu0/e53fcfc5630beba215babd237875c610/image2.png" />
          </figure><p>For some combinations of datasets/filters/comparisons, time series graphs can get quite busy, with a significant number of lines being plotted. To isolate just a single line on the graph, double-click on the item in the legend. To add/remove additional lines back to/from the graph, single-click on the relevant legend item.</p><p>Similar to other visualizations on Radar, the resulting graphs or maps can be downloaded, copied, or embedded into another website or application. Simply click on the “Share” button above the visualization card to bring up the <b>Share</b> modal dialog. We hope to see these graphs shared in articles, blog posts, and presentations, and to see embedded visualizations with real-time data in your portals and operations centers!</p>
    <div>
      <h2>Still want to use the API? No problem.</h2>
      <a href="#still-want-to-use-the-api-no-problem">
        
      </a>
    </div>
    <p>Although Data Explorer was designed to simplify the process of building, and viewing the results of, more complex API queries, we recognize that some users may still want to retrieve data directly from the API. To enable that, Data Explorer’s <b>API</b> section provides copyable API calls as a direct request URL and a <a href="https://curl.se"><u>cURL</u></a> command. The raw data returned by the query is also available to copy or download as a JSON blob, for those users that want to save it locally, or paste it into another application for additional manipulation or analysis.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1W3Zqrpfdtb0BgTnyV0bhu/e65e49260a67d0460b3e6e5d41fb7ae7/image6.png" />
          </figure><h2>How we built the AI Assistant</h2><p>Knowing all that AI is capable of these days, we thought that creating a system for an <a href="https://www.cloudflare.com/en-gb/learning/ai/what-is-large-language-model/"><u>LLM</u></a> to answer questions didn’t seem like an overly complex task. While there were some challenges, Cloudflare’s developer platform tools thankfully made it fairly straightforward. </p>
    <div>
      <h3>LLM-assisted API querying</h3>
      <a href="#llm-assisted-api-querying">
        
      </a>
    </div>
    <p>The main challenge we encountered in building the API Assistant was the large number of combinations of datasets and parameters that can potentially be visualized in the Data Explorer. There are around 100 <a href="https://developers.cloudflare.com/radar/"><u>API endpoints</u></a> from which the data can be fetched, with most able to take multiple parameters.</p><p>There were a few potential approaches to getting started. One was to take a previously trained LLM and further train it with the API endpoint descriptions in order to have it return the output in the required structured format which would then be used to execute the API query. However, for the first version, we decided against this approach of <a href="https://developers.cloudflare.com/workers-ai/fine-tunes/"><u>fine-tuning</u></a>, as we wanted to quickly test a few different models supported by <a href="https://developers.cloudflare.com/workers-ai/"><u>Workers AI</u></a>, and we wanted the flexibility to easily add or remove parameter combinations, as Data Explorer development was still under way. As such, we decided to start with prompt engineering, where all the endpoint-specific information is placed in the instructions sent to the LLM.</p><p>Putting the full detailed description of the API endpoints supported by the Data Explorer into the system prompt would be possible for an LLM with a larger context window (the number of tokens the model takes as input before generating output). Newer models are getting better with the <a href="https://github.com/gkamradt/LLMTest_NeedleInAHaystack"><u>needle in a haystack problem</u></a>, which refers to the issue whereby LLMs do not retrieve information (the needle) equally well if it is placed in different positions within the long textual input (the haystack). However, <a href="https://cs.stanford.edu/~nfliu/papers/lost-in-the-middle.arxiv2023.pdf"><u>it has been empirically shown</u></a> that the position of information within the large context still matters. Additionally, many of the Radar API endpoints have quite similar descriptions, and putting all the descriptions in a single instruction could be more confusing for the model, and the processing time also increases with larger contexts. Based on this, we adopted the approach of having multiple inference calls to an LLM.</p><p>First, when the user enters a question, a <a href="https://workers.cloudflare.com/"><u>Worker</u></a> sends this question and a short general description of the available datasets to the LLM, asking it to determine the topic of the question. Then, based on the topic returned by the model, a system prompt is generated with the endpoint descriptions, including only those related to the topic. This prompt, along with the original question, is sent to the LLM asking it to select the appropriate endpoint and its specific parameters. At the same time, two parallel inference calls to the model are also made, one with the question and the system prompt related to the description of location parameters, and another with the description of time range parameters. Then, all three model outputs are put together and validated.</p><p>If the final output is a valid dataset and parameter combination, it is sent back to the Data Explorer, which executes the API query and displays the resulting visualization for the user. Different LLMs were tested for this task, and at the end, <a href="https://developers.cloudflare.com/workers-ai/models/openhermes-2.5-mistral-7b-awq/"><u>openhermes-2.5-mistral-7b</u></a>, trained on code datasets, was selected as the best option. To give the model more context, not only is the user’s current question sent to the model, but the previous one and its response are as well, in case the next question asked by the user is related to the previous one. In addition, calls to the model are sent through Cloudflare’s <a href="https://developers.cloudflare.com/ai-gateway/"><u>AI Gateway</u></a>, to allow for caching, rate limiting, and logging.</p><p>After the user is shown the result, they can indicate whether what was shown to them was useful or not by clicking the “thumbs up” or “thumbs down” icons in the response. This rating information is saved with the original question in <a href="https://developers.cloudflare.com/d1/"><u>D1</u></a>, our <a href="https://www.cloudflare.com/developer-platform/products/d1/">serverless SQL database</a>, so the results can be analyzed and applied to future AI Assistant improvements.</p><p>The full end-to-end data flow for the Cloudflare Radar AI Assistant is illustrated in the diagram below.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1EMv28isng00dvxUwmVKWE/958791d319985a3441cbce7234fa1588/image1.png" />
          </figure>
    <div>
      <h3>When the LLM doesn’t know the answer</h3>
      <a href="#when-the-llm-doesnt-know-the-answer">
        
      </a>
    </div>
    <p>In some cases, however, the LLM may not “know” the answer to the question posed by the user. If the model does not generate a valid final response, then the user is shown three alternative questions. The intent here is to guide the user into asking an answerable question — that is, a question that is answerable with data from Radar.</p><p>This is achieved using a previously compiled (static) list of various questions related to different Radar datasets. For each of these questions, their <a href="https://www.cloudflare.com/en-gb/learning/ai/what-are-embeddings/"><u>embedding</u></a> is calculated using an <a href="https://developers.cloudflare.com/workers-ai/models/bge-small-en-v1.5"><u>embeddings model</u></a>, and stored in our <a href="https://developers.cloudflare.com/vectorize/"><u>Vectorize</u></a> <a href="https://www.cloudflare.com/en-gb/learning/ai/what-is-vector-database/"><u>vector database</u></a>. “Embeddings” are  numerical representations of textual data (vectors) capturing their semantic meaning and relationships, with similar text having vectors that are closer. When a user’s question does not generate a valid model response, the embedding of that question is calculated, and its vector is compared against all the stored vectors from the vector database, and the three most similar ones are selected. These three questions, determined to be similar to the user's original question, are then shown to the user.</p><p>There are also cases when the LLM gives answers which do not correspond to what the user asked, as hallucinations <a href="https://arxiv.org/pdf/2401.11817"><u>are currently inevitable</u></a> in LLMs, or when time durations are calculated inaccurately, as LLMs sometimes struggle with mathematical calculations. To help guard against this, AI Assistant responses are first validated against the API schema to confirm that the dataset and the parameter combination is valid. Additionally, Data Explorer dropdown options are automatically populated based on the AI Assistant’s response, and the chart titles are also automatically generated, so the user always knows exactly what data is shown in the visualization, even if it might not answer their actual question. </p>
    <div>
      <h2>Looking ahead</h2>
      <a href="#looking-ahead">
        
      </a>
    </div>
    <p>We’re excited to enable more granular access to the rich datasets that currently power Cloudflare Radar. As we add new datasets in the future, such as DNS metrics, these will be available through Data Explorer and AI Assistant as well.</p><p>As noted above, Radar offers a predefined set of visualizations, and these serve as an excellent starting point for further exploration. We are adding links from each Radar visualization into Data Explorer, enabling users to further analyze the associated data to answer more specific questions. Clicking the “pie chart” icon next to a graph’s description brings up a Data Explorer page with the relevant metrics, options, and filters selected.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3O1sG7QnjASEX81lu6ooBy/d81664234dfc8024121eedba75aaef6d/image5.png" />
          </figure><p>Correlating observations across two different metrics is another capability that we are also working on adding to Data Explorer. For example, if you are investigating an Internet disruption, you will be able to plot traffic trends and announced IP address space for a given country or autonomous system on the same graph to determine if both dropped concurrently.</p><p>But for now, use the Data Explorer and AI Assistant to go beyond what Cloudflare Radar offers, finding answers to your questions about what’s happening on the Internet.  If you share Data Explorer visualizations on social media, be sure to tag us: <a href="https://x.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky). You can also reach out on social media, or contact us via email, with suggestions for future Data Explorer and AI Assistant functionality.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6LCKQEfkvBhOQFugqOGhy2/239db21c6fc18a830b8643171534372f/image4.png" />
          </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">4R2kUv9mZSgnAXmKOKTbLz</guid>
            <dc:creator>David Belson</dc:creator>
            <dc:creator>Sabina Zejnilovic</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2024 Q2]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2024-q2/</link>
            <pubDate>Tue, 09 Jul 2024 13:00:32 GMT</pubDate>
            <description><![CDATA[ Welcome to the 18th edition of the Cloudflare DDoS Threat Report. Released quarterly, these reports provide an in-depth analysis of the DDoS threat landscape as observed across the Cloudflare network. This edition focuses on the second quarter of 2024 ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6H7tZjcmMtTkqI4vnZh1cU/57e3e3bcf83b65ac75c5fcaa72389270/image13-1.png" />
            
            </figure><p>Welcome to the 18th edition of the Cloudflare DDoS Threat Report. Released quarterly, these reports provide an in-depth analysis of the DDoS threat landscape as observed across the <a href="https://www.cloudflare.com/en-gb/network/">Cloudflare network</a>. This edition focuses on the second quarter of 2024.</p><p>With a 280 terabit per second network located across over 320 cities worldwide, <a href="https://w3techs.com/technologies/details/cn-cloudflare">serving 19% of all websites</a>, Cloudflare holds a unique vantage point that enables us to provide valuable insights and trends to the broader Internet community.</p>
    <div>
      <h2>Key insights for 2024 Q2</h2>
      <a href="#key-insights-for-2024-q2">
        
      </a>
    </div>
    <ul><li><p>Cloudflare recorded a 20% year-over-year increase in DDoS attacks.</p></li><li><p>1 out of every 25 survey respondents said that DDoS attacks against them were carried out by state-level or state-sponsored threat actors.</p></li><li><p>Threat actor capabilities reached an all-time high as our automated defenses generated 10 times more fingerprints to counter and mitigate the ultrasophisticated DDoS attacks.</p></li></ul><p>View the interactive version of this report on <a href="https://radar.cloudflare.com/reports/ddos-2024-q2">Cloudflare Radar</a>.</p>
    <div>
      <h3>Quick recap - what is a DDoS attack?</h3>
      <a href="#quick-recap-what-is-a-ddos-attack">
        
      </a>
    </div>
    <p>Before diving in deeper, let's recap what a DDoS attack is. Short for <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service</a>, a DDoS attack is a type of cyber attack designed to take down or disrupt Internet services, such as websites or mobile apps, making them unavailable to users. This is typically achieved by overwhelming the victim's server with more traffic than it can handle — usually from multiple sources across the Internet, rendering it unable to handle legitimate user traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2S7TgrtK197L1YGvjBgZm2/0664811e82a92b1c9c1a178458f75550/unnamed-4.png" />
            
            </figure><p>Diagram of a DDoS attack</p><p>To learn more about DDoS attacks and other types of cyber threats, visit our <a href="https://www.cloudflare.com/learning/">Learning Center</a>, access <a href="/tag/ddos-reports">previous DDoS threat reports</a> on the Cloudflare blog or visit our interactive hub, <a href="https://radar.cloudflare.com/reports?q=DDoS">Cloudflare Radar</a>. There's also a <a href="https://developers.cloudflare.com/radar/">free API</a> for those interested in investigating these and other Internet trends.</p><p>To learn about our report preparation, refer to our <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/">Methodologies</a>.</p>
    <div>
      <h3>Threat actor sophistication fuels the continued increase in DDoS attacks</h3>
      <a href="#threat-actor-sophistication-fuels-the-continued-increase-in-ddos-attacks">
        
      </a>
    </div>
    <p>In the first half of 2024, we mitigated 8.5 million DDoS attacks: 4.5 million in Q1 and 4 million in Q2. Overall, the number of DDoS attacks in Q2 decreased by 11% quarter-over-quarter, but increased 20% year-over-year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ctaeSKgnNEYe46W7UEKGs/fa4f515c4ed4fcbeac3e685ebc9a721f/unnamed--1--3.png" />
            
            </figure><p>Distribution of DDoS attacks by types and vectors</p><p>For context, in the entire year of 2023, we mitigated 14 million DDoS attacks, and halfway through 2024, we have already mitigated 60% of last year’s figure.</p><p>Cloudflare successfully mitigated 10.2 trillion HTTP DDoS requests and 57 petabytes of network-layer DDoS attack traffic, preventing it from reaching our customers’ origin servers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/WyUYhLUD166Po7ah6ZEQp/16f3d7d1c48488ae6d4dc3475329a432/unnamed--2--2.png" />
            
            </figure><p>DDoS attacks stats for 2024 Q2</p><p>When we break it down further, those 4 million DDoS attacks were composed of 2.2 million network-layer DDoS attacks and 1.8 million HTTP DDoS attacks. This number of 1.8 million HTTP DDoS attacks has been normalized to compensate for the explosion in sophisticated and randomized HTTP DDoS attacks. Our automated mitigation systems generate real-time fingerprints for DDoS attacks, and due to the randomized nature of these sophisticated attacks, we observed many fingerprints being generated for single attacks. The actual number of fingerprints that was generated was closer to 19 million – over ten times larger than the normalized figure of 1.8 million. The millions of fingerprints that were generated to deal with the randomization stemmed from a few single rules. These rules did their job to stop attacks, but they inflated the numbers, so we excluded them from the calculation.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3NbYriDgdvtAormXB1spNP/c8ef433d3386dd7f44ee72c7625fd980/unnamed--3--2.png" />
            
            </figure><p>HTTP DDoS attacks by quarter, with the excluded fingerprints</p><p>This ten-fold difference underscores the dramatic change in the threat landscape. The tools and capabilities that allowed threat actors to carry out such randomized and sophisticated attacks were previously associated with capabilities reserved for state-level actors or state-sponsored actors. But, coinciding with the rise of generative AI and autopilot systems that can help actors write better code faster, these capabilities have made their way to the common cyber criminal.</p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>In May 2024, the percentage of attacked Cloudflare customers that reported being threatened by a DDoS attack threat actor, or subjected to a <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attack</a> reached 16% – the highest it’s been in the past 12 months. The quarter started relatively low, at 7% of customers reporting a threat or a ransom attack. That quickly jumped to 16% in May and slightly dipped in June to 14%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16Ppdz9v4IcH0Xgii7EhdM/5551f7fdf2b2d8db252ea7a9cf845dc9/unnamed--4--2.png" />
            
            </figure><p>Percentage of customers reporting DDoS threats or ransom extortion (by month)</p><p>Overall, ransom DDoS attacks have been increasing quarter over quarter throughout the past year. In Q2 2024, the percentage of customers that reported being threatened or extorted was 12.3%, slightly higher than the previous quarter (10.2%) but similar to the percentage of the year before (also 12.0%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/WxCgT7fCSV3btCf6PmAIw/212c7d54d431c8b0c4aef091b68eda25/unnamed--5--2.png" />
            
            </figure><p>Percentage of customers reporting DDoS threats or ransom extortion (by quarter)</p>
    <div>
      <h2>Threat actors</h2>
      <a href="#threat-actors">
        
      </a>
    </div>
    <p>75% of respondents reported that they did not know who attacked them or why. These respondents are Cloudflare customers that were targeted by HTTP DDoS attacks.</p><p>Of the respondents that claim they did know, 59% said it was a competitor who attacked them. Another 21% said the DDoS attack was carried out by a disgruntled customer or user, and another 17% said that the attacks were carried out by state-level or state-sponsored threat actors. The remaining 3% reported it being a self-inflicted DDoS attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2fktInA0cQbth4up5dPB6M/366eda36e7c414c4e114c9a1f3e2cb27/unnamed--6--2.png" />
            
            </figure><p>Percentage of threat actor type reported by Cloudflare customers, excluding unknown attackers and outliers</p>
    <div>
      <h2>Top attacked countries and regions</h2>
      <a href="#top-attacked-countries-and-regions">
        
      </a>
    </div>
    <p>In the second quarter of 2024, China was ranked the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#countries-as-source-or-target-of-attacks">most attacked country</a> in the world. This ranking takes into consideration HTTP DDoS attacks, network-layer DDoS attacks, the total volume and the percentage of DDoS attack traffic out of the total traffic, and the graphs show this overall DDoS attack activity per country or region. A longer bar in the chart means more attack activity.</p><p>After China, Turkey came in second place, followed by Singapore, Hong Kong, Russia, Brazil, and Thailand. The remaining countries and regions comprising the top 15 most attacked countries are provided in the chart below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6C3FspFSjHCEwIuauYTQYg/bcc283b99df5eb93428f138eea18a676/unnamed--7--2.png" />
            
            </figure><p>15 most attacked countries and regions in 2024 Q2</p>
    <div>
      <h2>Most attacked industries</h2>
      <a href="#most-attacked-industries">
        
      </a>
    </div>
    <p>The Information Technology &amp; Services was ranked as the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-industry">most targeted industry</a> in the second quarter of 2024. The ranking methodologies that we’ve used here follow the same principles as previously described to distill the total volume and relative attack traffic for both HTTP and network-layer DDoS attacks into one single DDoS attack activity ranking.</p><p>The Telecommunications, Services Providers and Carrier sector came in second. Consumer Goods came in third place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/M7x6hcaQ3rq20x0SZ61y9/a370d20f43aa968efd1892dd4e8619c6/unnamed--8--1.png" />
            
            </figure><p>15 most attacked industries in 2024 Q2</p><p>When analyzing only the HTTP DDoS attacks, we see a different picture. Gaming and Gambling saw the most attacks in terms of HTTP DDoS attack request volume. The per-region breakdown is provided below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ElWJHm7iaazkMY0i3FbAY/438d6fb1fd9f515cc8961c88770039c9/unnamed--9--1.png" />
            
            </figure><p>Top attacked industries by region (HTTP DDoS attacks)</p>
    <div>
      <h2>Largest sources of DDoS attacks</h2>
      <a href="#largest-sources-of-ddos-attacks">
        
      </a>
    </div>
    <p>Argentina was ranked as the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#countries-as-source-or-target-of-attacks">largest source</a> of DDoS attacks in the second quarter of 2024. The ranking methodologies that we’ve used here follow the same principles as previously described to distill the total volume and relative attack traffic for both HTTP and network-layer DDoS attacks into one single DDoS attack activity ranking.</p><p>Indonesia followed closely in second place, followed by the Netherlands in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5EsagO6GQdPElCwfU735Ed/ee71ca617bbd2281c45db36cebb6f0a8/unnamed--10--1.png" />
            
            </figure><p>15 largest sources of DDoS attacks in 2024 Q2</p>
    <div>
      <h2>DDoS attack characteristics</h2>
      <a href="#ddos-attack-characteristics">
        
      </a>
    </div>
    
    <div>
      <h3>Network-layer DDoS attack vectors</h3>
      <a href="#network-layer-ddos-attack-vectors">
        
      </a>
    </div>
    <p>Despite a 49% decrease quarter-over-quarter, DNS-based DDoS attacks remain the most common attack vector, with a combined share of 37% for <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/">DNS floods</a> and <a href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/">DNS amplification</a> attacks. <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> came in second place with a share of 23%, followed by RST floods accounting for a little over 10%. SYN floods and RST floods are both types of TCP-based DDoS attacks. Collectively, all types of TCP-based DDoS attacks accounted for 38% of all network-layer DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2C8gqiEuTXWaZJYOC4l29Z/eeb4e6734ec7c42f328c02dc46f3a0ba/unnamed--11--1.png" />
            
            </figure><p>Top attack vectors (network-layer)</p>
    <div>
      <h3>HTTP DDoS attack vectors</h3>
      <a href="#http-ddos-attack-vectors">
        
      </a>
    </div>
    <p>One of the advantages of operating a large network is that we see a lot of traffic and attacks. This helps us improve our detection and mitigation systems to protect our customers. In the last quarter, half of all <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/">HTTP DDoS attacks</a> were mitigated using proprietary heuristics that targeted botnets known to Cloudflare. These heuristics guide our systems on how to generate a real-time fingerprint to match against the attacks.</p><p>Another 29% were HTTP DDoS attacks that used fake user agents, impersonated browsers, or were from headless browsers. An additional 13% had suspicious HTTP attributes which triggered our automated system, and 7% were marked as generic floods. One thing to note is that these attack vectors, or attack groups, are not necessarily exclusive. For example, known botnets also impersonate browsers and have suspicious HTTP attributes, but this breakdown is our initial attempt to categorize the HTTP DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Q30Uxkud0qxOCbzTjgUjc/86ec3083a7d52167e143fd79ad847f77/unnamed--12-.png" />
            
            </figure><p>Top attack vectors (HTTP)</p>
    <div>
      <h3>HTTP versions used in DDoS attacks</h3>
      <a href="#http-versions-used-in-ddos-attacks">
        
      </a>
    </div>
    <p>In Q2, around half of all web traffic used HTTP/2, 29% used HTTP/1.1, an additional fifth used HTTP/3, nearly 0.62% used HTTP/1.0, and 0.01% for HTTP/1.2.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4iG2zFOZIR91P56H7DiNFw/30d39a97fadf6f974acc35f588418e5e/unnamed--13-.png" />
            
            </figure><p>Distribution of web traffic by HTTP version</p><p>HTTP DDoS attacks follow a similar pattern in terms of version adoption, albeit a larger bias towards HTTP/2. 76% of HTTP DDoS attack traffic was over the HTTP/2 version and nearly 22% over HTTP/1.1. HTTP/3, on the other hand, saw a much smaller usage. Only 0.86% of HTTP DDoS attack traffic were over HTTP/3 — as opposed to its much broader adoption of 20% by all web traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7qSkeg0USHPZn76shu5lAc/ce683586034c622a798326b4d8c05447/unnamed--14-.png" />
            
            </figure><p>Distribution of HTTP DDoS attack traffic by HTTP version</p>
    <div>
      <h3>DDoS attack duration</h3>
      <a href="#ddos-attack-duration">
        
      </a>
    </div>
    <p>The vast majority of DDoS attacks are short. Over 57% of HTTP DDoS attacks and 88% of network-layer DDoS attacks end within 10 minutes or less. This emphasizes the need for automated, in-line detection and mitigation systems. Ten minutes are hardly enough time for a human to respond to an alert, analyze the traffic, and apply manual mitigations.</p><p>On the other side of the graphs, we can see that approximately a quarter of HTTP DDoS attacks last over an hour, and almost a fifth last more than a day. On the network layer, longer attacks are significantly less common. Only 1% of network-layer DDoS attacks last more than 3 hours.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5THWXBww1SvjFhGz3faxvf/27b48ed6dac038a9342c84ec0661caa4/unnamed--15-.png" />
            
            </figure><p>HTTP DDoS attacks: distribution by duration</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1jCKPONG0sxuKYTVU1dne5/69f9f38dae5d46b0b2c5b40f9d97f2a3/unnamed--16-.png" />
            
            </figure><p>Network-layer DDoS attacks: distribution by duration</p>
    <div>
      <h3>DDoS attack size</h3>
      <a href="#ddos-attack-size">
        
      </a>
    </div>
    <p>Most DDoS attacks are relatively small. Over 95% of network-layer DDoS attacks stay below 500 megabits per second, and 86% stay below 50,000 packets per second.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6KtVJSY1wf4G0dcalUVRYu/7bf4d928903b3c69e29c251205046e79/unnamed--17-.png" />
            
            </figure><p>Distribution of network-layer DDoS attacks by bit rate</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Xdwy1icebxX20wmq3DE2g/8911a08a43185159155cf00317cc7dbd/unnamed--18-.png" />
            
            </figure><p>Distribution of network-layer DDoS attacks by packet rate</p><p>Similarly, 81% of HTTP DDoS attacks stay below 50,000 requests per second. Although these rates are small on Cloudflare’s scale, they can still be devastating for unprotected websites unaccustomed to such traffic levels.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1NMeVYFSRo9RKwnmPsqOBj/67655da4382355f8424a2525b2bf5f74/unnamed--19-.png" />
            
            </figure><p>Distribution of HTTP DDoS attacks by request rate</p><p>Despite the majority of attacks being small, the number of larger volumetric attacks has increased. One out of every 100 network-layer DDoS attacks exceed 1 million packets per second (pps), and two out of every 100 exceed 500 gigabits per second. On layer 7, four out of every 1,000 HTTP DDoS attacks exceed 1 million requests per second.</p>
    <div>
      <h2>Key takeaways</h2>
      <a href="#key-takeaways">
        
      </a>
    </div>
    <p>The majority of DDoS attacks are small and quick. However, even these attacks can disrupt online services that do not follow <a href="https://developers.cloudflare.com/ddos-protection/best-practices/respond-to-ddos-attacks/">best practices for DDoS defense</a>.</p><p>Furthermore, threat actor sophistication is increasing, perhaps due to the availability of Generative AI and developer copilot tools, resulting in attack code that delivers DDoS attacks that are harder to defend against. Even prior to the rise in attack sophistication, many organizations struggled to defend against these threats on their own. But they don’t need to. Cloudflare is here to help. We invest significant resources – so you don’t have to – to ensure our automated defenses, along with the entire portfolio of Cloudflare security products, to protect against existing and emerging threats.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[DNS Flood]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[SYN Flood]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">5zkxlKrbZNjy1jeKkohkyt</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[French elections: political cyber attacks and Internet traffic shifts]]></title>
            <link>https://blog.cloudflare.com/2024-french-elections-political-cyber-attacks-and-internet-traffic-shifts/</link>
            <pubDate>Mon, 08 Jul 2024 15:52:38 GMT</pubDate>
            <description><![CDATA[ Check the dynamics of the 2024 French legislative elections, the surprising election results’ impact on Internet traffic changes, and the cyber attacks targeting political parties ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7KsxKvcICbZUDvcC3VXPbO/8ea52921f9df4b5b546369afda2b304d/image3-8.png" />
            
            </figure><p>The <a href="https://en.wikipedia.org/wiki/2024_French_legislative_election">2024 French legislative election</a> runoff on July 7 yielded surprising results compared to the first round on June 30, with the New Popular Front (NPF) gaining the most seats, followed by French President Macron’s Ensemble, and the National Rally. Coalition negotiations will follow. In this post, we examine the ongoing online attacks against French political parties and how initial election predictions at 20:00 local time led to a noticeable drop in France’s Internet traffic.</p><p>This blog post is part of a <a href="/tag/election-security">series</a> tracking the numerous elections of 2024. We have covered elections in <a href="/internet-insights-on-2024-elections-in-the-netherlands-south-africa-iceland-india-and-mexico">South Africa, India, Iceland, Mexico</a>, the <a href="/exploring-the-2024-eu-election-internet-traffic-trends-and-cybersecurity-insights">European Union</a>, <a href="/uk-election-day-2024-traffic-trends-and-attacks-on-political-parties">the UK</a> and also the <a href="/how-the-first-2024-us-presidential-debate-influenced-internet-traffic-and-security-trends">2024 US presidential debate</a>. We also continuously update our <a href="https://radar.cloudflare.com/reports/elections-2024">election report</a> on Cloudflare Radar.</p><p>Let’s start with the attacks, and then move on to the Internet traffic trends.</p>
    <div>
      <h3>Political parties under attack</h3>
      <a href="#political-parties-under-attack">
        
      </a>
    </div>
    <p>As we <a href="/first-round-of-french-election-2024-party-attacks-and-a-modest-traffic-dip">highlighted last week</a>, the first round of the French elections saw specific DDoS (<a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service</a>) attacks targeting French political party websites. While online attacks are common and not always election-related, recent activities in <a href="/first-round-of-french-election-2024-party-attacks-and-a-modest-traffic-dip">France</a>, the <a href="/dutch-political-websites-hit-by-cyber-attacks-as-eu-voting-starts">Netherlands</a>, and <a href="/uk-election-day-2024-traffic-trends-and-attacks-on-political-parties">the UK</a> confirm that DDoS attacks frequently target political parties during election periods.</p><p>Two French political parties were attacked shortly before the first round of elections, and a third party was targeted on June 30. This third party, indicated in green on the chart below, faced attacks on the evening of June 29. Several attempts were thwarted by Cloudflare throughout election day, from 10:00 to 23:00 UTC (12:00 to 01:00 local time). The most intense attack occurred at 19:00 UTC (21:00 local time), reaching nearly 40,000 requests per second, with a total of 620 million DDoS requests recorded on that day (June 29).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1y46oB0jIcckK4ICs2LlKN/f60adecd41a1942702f2db4b39f711fa/unnamed--1--1.png" />
            
            </figure><p>Our data indicates that the most significant attack Cloudflare intercepted targeted a party shown in yellow on the chart above. The party had already been attacked on June 23, 2024, and this subsequent attack happened on July 3 at 21:36 UTC (23:36 local time), lasting four minutes and peaking at 151,000 requests per second (rps), making it the second-largest attack we’ve observed on political parties recently. This was comparable in intensity and duration to another attack on a <a href="/uk-election-day-2024-traffic-trends-and-attacks-on-political-parties">UK political party</a> right after their election.</p><p>On the runoff election day, July 7, the party represented by the blue line was again a target, having been attacked previously on June 24, 27, and 29. The most severe of these occurred on June 27, with attacks reaching 118,000 rps during a day that totaled 610 million daily DDoS requests. On July 7, the attacks resumed, with the first starting at 09:55 UTC (11:55 local time) and continuing sporadically until 23:18 UTC (01:18 local time on July 8). The peak of these attacks came at 11:40 UTC (13:40 local time), reaching 96,000 rps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/72FT5qz48qec9PmecY1pTL/bee98a12bb07d64931200391b4c70e20/unnamed-3.png" />
            
            </figure><p>While these rates may seem small to Cloudflare, they can be devastating for websites not well-protected against such high levels of traffic. DDoS attacks not only overwhelm systems but also serve, if successful, as a <a href="https://cloudflare.tv/shows/this-week-in-net/d-do-s-report-certificate-changes-qr-phishing-and-more/oZK6nra4">distraction for IT teams</a> while attackers attempt other types of breaches.</p>
    <div>
      <h3>Exit polls came with a 20:00 Internet traffic dip</h3>
      <a href="#exit-polls-came-with-a-20-00-internet-traffic-dip">
        
      </a>
    </div>
    <p>Each election brings its own unique circumstances. For instance, the UK’s snap election took place on Thursday, July 4, 2024, aligning with Britain’s <a href="https://www.standard.co.uk/news/politics/why-are-uk-general-elections-always-on-a-thursday-b1168631.html">tradition</a> of weekday elections. In contrast, France and many other countries hold elections on weekends, typically Sundays.</p><p>During the first round of the French elections on June 30, morning traffic was lower than the previous week and rose in the afternoon. The runoff, a week later, displayed a different pattern. Morning traffic remained stable compared to June 30, but it saw a significant decrease in the afternoon, especially after 17:30 local time. Polling stations in major cities closed at 20:00. At this time, TV media began broadcasting the first results, causing a 16% drop in traffic compared to the previous week. This trend, where traffic dips as initial results are announced, is also seen in other elections, like the <a href="/uk-election-day-2024-traffic-trends-and-attacks-on-political-parties">UK’s</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6v5m4DQEz5o8jcnnpaWNx6/ca81699e98aa58d093af743b1bf3afba/unnamed--2--1.png" />
            
            </figure><p>Traffic shifts during voting day, compared to the previous week, are more revealing when viewed in detail. The map and table below summarize the traffic changes observed at the state level within France, when voting closed and initial results predictions were revealed on TV at around 20:00 local time. This was the moment when, from Cloudflare’s data perspective, attention was diverted from online use.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2x6P9SdJCaTGo9P725cd5X/35e75dea02ea4dd6462486868f281f7c/image5-2.png" />
            
            </figure><p>(Source: Cloudflare; created with Datawrapper)</p><p>The table below shows the drops in traffic on July 7, at 20:00 local time, compared to the previous week.</p>
<table><thead>
  <tr>
    <th><span>State</span></th>
    <th><span>Drop in traffic (%)</span></th>
  </tr></thead>
<tbody>
  <tr>
    <td><span>Bourgogne-Franche-Comté</span></td>
    <td><span>-19%</span></td>
  </tr>
  <tr>
    <td><span>Grand Est</span></td>
    <td><span>-19%</span></td>
  </tr>
  <tr>
    <td><span>Brittany</span></td>
    <td><span>-15%</span></td>
  </tr>
  <tr>
    <td><span>Auvergne-Rhône-Alpes</span></td>
    <td><span>-15%</span></td>
  </tr>
  <tr>
    <td><span>Corsica</span></td>
    <td><span>-14%</span></td>
  </tr>
  <tr>
    <td><span>Occitanie</span></td>
    <td><span>-11%</span></td>
  </tr>
  <tr>
    <td><span>Nouvelle-Aquitaine</span></td>
    <td><span>-11%</span></td>
  </tr>
  <tr>
    <td><span>Normandy</span></td>
    <td><span>-10%</span></td>
  </tr>
  <tr>
    <td><span>Île-de-France</span></td>
    <td><span>-10%</span></td>
  </tr>
  <tr>
    <td><span>Hauts-de-France</span></td>
    <td><span>-9%</span></td>
  </tr>
  <tr>
    <td><span>Pays de la Loire</span></td>
    <td><span>-8%</span></td>
  </tr>
  <tr>
    <td><span>Provence-Alpes-Côte d’Azur</span></td>
    <td><span>-7%</span></td>
  </tr>
  <tr>
    <td><span>Centre-Val de Loire</span></td>
    <td><span>-6%</span></td>
  </tr>
</tbody></table><p>On election day in France, Internet traffic decreased most significantly in the regions of Bourgogne-Franche-Comté and Grand Est, both in the eastern part of the country and both experiencing a 19% drop. When comparing these regions to the Île-de-France region, where Paris is located, we see a smaller traffic decrease, at 10%. In the south, in regions like Provence-Alpes-Côte d’Azur, the drop was even less pronounced, at 7%.</p>
    <div>
      <h3>Mobile device usage</h3>
      <a href="#mobile-device-usage">
        
      </a>
    </div>
    <p>Also notable was the increase in mobile device request traffic share during both election days, driving the share to levels higher than usual. Over the past month, mobile device traffic share on Sundays typically ranged from 53% to 54%. However, it rose to 57% on the first election day, June 30, and increased further to 58% on the runoff day, July 7, 2024. Mobile device traffic share was especially elevated from 11:00 to 22:00 local time on these days.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6OIoWCtqHI7Th1MOztHjQs/b45a08bdfbe7ef1870c55e227a357776/unnamed--3--1.png" />
            
            </figure>
    <div>
      <h3>DNS trends: news outlets bring results</h3>
      <a href="#dns-trends-news-outlets-bring-results">
        
      </a>
    </div>
    <p>Switching focus to domain trends, our <a href="http://1.1.1.1">1.1.1.1</a> resolver DNS data reveals a targeted impact from the French elections, allowing for a comparison between the two election days. Analyzing French news media outlets, DNS traffic in France was significantly higher on the first election day, June 30, with a 250% increase at 20:00 local time compared to the previous week. This was 6% higher than on the runoff day, July 7.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1fp35VD76a7PzLHQKJq638/b3175a621d1d9ea668c895950ba6acdf/unnamed--4--1.png" />
            
            </figure><p>For French TV domains, the situation reversed during the runoff on July 7, showing 31% more DNS traffic at 20:00 local time than in the first round. On June 30, DNS traffic at that time was already 274% higher than the previous week, but the increase on July 7 was even more significant, at 391% compared to June 23, 2024—the Sunday before the two election days.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4stAz2OutDjqRW2d2qog30/2545d2d21dd82f0249c393b0996e6433/unnamed--5--1.png" />
            
            </figure><p>For microblogging social media in France, traffic was higher during the two election days, peaking on the first round. At the close of voting polls at 20:00 local time on June 30, traffic surged 38% compared to June 23, 2024. On July 7, runoff day, traffic increased by 32% at 20:00 local time compared to June 23, but was 4% lower than on June 30.​</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/OnmQkCY4ejYaFbRuFmwVs/8bb316c54657df186b2a91b45ee46270/unnamed--6--1.png" />
            
            </figure>
    <div>
      <h3>Conclusion: keeping track of elections</h3>
      <a href="#conclusion-keeping-track-of-elections">
        
      </a>
    </div>
    <p>In France, more attention was diverted from the Internet during the decisive runoff election day than in the first round, with a noticeable dip in traffic when TV stations announced predicted results at 20:00 local time.</p><p>If you want to follow more trends and insights about the Internet and elections in particular, you can check <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>, and more specifically our new <a href="https://radar.cloudflare.com/reports/elections-2024">2024 Elections Insights</a> report, which will be updated as elections take place throughout the year.</p><p>Since last week, we’ve updated our trends to include <a href="https://radar.cloudflare.com/reports/elections-2024#id-4-last-minute-voting-in-iran">last-minute voting during the elections in Iran</a> on June 28, 2024, and the <a href="https://radar.cloudflare.com/reports/elections-2024#id-3-mobile-networks-shutdown-following-mauritania-election">suspension of mobile Internet in Mauritania</a> following protests after the presidential elections on June 29, 2024, and the <a href="/uk-election-day-2024-traffic-trends-and-attacks-on-political-parties">UK election</a>.</p> ]]></content:encoded>
            <category><![CDATA[Elections]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[France]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Election Security]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <guid isPermaLink="false">4IZ7VTJ9ENK7a5ofJm9TPr</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[Automatically replacing polyfill.io links with Cloudflare’s mirror for a safer Internet]]></title>
            <link>https://blog.cloudflare.com/automatically-replacing-polyfill-io-links-with-cloudflares-mirror-for-a-safer-internet/</link>
            <pubDate>Wed, 26 Jun 2024 20:23:41 GMT</pubDate>
            <description><![CDATA[ polyfill.io, a popular JavaScript library service, can no longer be trusted and should be removed from websites ]]></description>
            <content:encoded><![CDATA[ <p></p><p>polyfill.io, a popular JavaScript library service, can no longer be trusted and should be removed from websites.</p><p><a href="https://sansec.io/research/polyfill-supply-chain-attack">Multiple reports</a>, corroborated with data seen by our own client-side security system, <a href="https://developers.cloudflare.com/page-shield/">Page Shield</a>, have shown that the polyfill service was being used, and could be used again, to inject malicious JavaScript code into users’ browsers. This is a real threat to the Internet at large given the popularity of this library.</p><p>We have, over the last 24 hours, released an automatic JavaScript URL rewriting service that will rewrite any link to polyfill.io found in a website proxied by Cloudflare <a href="https://cdnjs.cloudflare.com/polyfill/">to a link to our mirror under cdnjs</a>. This will avoid breaking site functionality while mitigating the risk of a supply chain attack.</p><p>Any website on the free plan has this feature automatically activated now. Websites on any paid plan can turn on this feature with a single click.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5R0ht5q4fAwm8gm3a2Xe5U/6b3ec28498e76ff75e37b58f3673e49a/image1-22.png" />
            
            </figure><p>You can find this new feature under <a href="https://dash.cloudflare.com/?to=/:account/:zone/security/settings">Security ⇒ Settings</a> on any zone using Cloudflare.</p><p>Contrary to what is stated on the polyfill.io website, Cloudflare has never recommended the polyfill.io service or authorized their use of Cloudflare’s name on their website. We have asked them to remove the false statement, and they have, so far, ignored our requests. This is yet another warning sign that they cannot be trusted.</p><p>If you are not using Cloudflare today, we still highly recommend that you remove any use of polyfill.io and/or find an alternative solution. And, while the automatic replacement function will handle most cases, the best practice is to remove polyfill.io from your projects and replace it with a secure alternative mirror like Cloudflare’s even if you are a customer.</p><p>You can do this by searching your code repositories for instances of polyfill.io and replacing it with <a href="https://cdnjs.cloudflare.com/polyfill/">cdnjs.cloudflare.com/polyfill/</a> (Cloudflare’s mirror). This is a non-breaking change as the two URLs will serve the same polyfill content. All website owners, regardless of the website using Cloudflare, should do this now.</p>
    <div>
      <h2>How we came to this decision</h2>
      <a href="#how-we-came-to-this-decision">
        
      </a>
    </div>
    <p>Back in February, the domain polyfill.io, which hosts a popular JavaScript library, was sold to a new owner: Funnull, a relatively unknown company. <a href="/polyfill-io-now-available-on-cdnjs-reduce-your-supply-chain-risk">At the time, we were concerned</a> that this created a supply chain risk. This led us to spin up our own mirror of the polyfill.io code hosted under cdnjs, a JavaScript library repository sponsored by Cloudflare.</p><p>The new owner was unknown in the industry and did not have a track record of trust to administer a project such as polyfill.io. The concern, <a href="https://x.com/triblondon/status/1761852117579427975">highlighted even by the original author</a>, was that if they were to abuse polyfill.io by injecting additional code to the library, it could cause far-reaching security problems on the Internet affecting several hundreds of thousands websites. Or it could be used to perform a targeted supply-chain attack against specific websites.</p><p>Unfortunately, that worry came true on June 25, 2024, as the polyfill.io service was being used to inject nefarious code that, under certain circumstances, redirected users to other websites.</p><p>We have taken the exceptional step of using our ability to modify HTML on the fly to replace references to the polyfill.io CDN in our customers’ websites with links to our own, safe, mirror created back in February.</p><p>In the meantime, additional threat feed providers have also taken the decision to <a href="https://github.com/uBlockOrigin/uAssets/commit/91dfc54aed0f0aa514c1a481c3e63ea16da94c03">flag the domain as malicious</a>. We have not outright blocked the domain through any of the mechanisms we have because we are concerned it could cause widespread web outages given how broadly polyfill.io is used with some estimates indicating <a href="https://w3techs.com/technologies/details/js-polyfillio">usage on nearly 4% of all websites</a>.</p>
    <div>
      <h3>Corroborating data with Page Shield</h3>
      <a href="#corroborating-data-with-page-shield">
        
      </a>
    </div>
    <p>The original report indicates that malicious code was injected that, under certain circumstances, would redirect users to betting sites. It was doing this by loading additional JavaScript that would perform the redirect, under a set of additional domains which can be considered Indicators of Compromise (IoCs):</p>
            <pre><code>https://www.googie-anaiytics.com/analytics.js
https://www.googie-anaiytics.com/html/checkcachehw.js
https://www.googie-anaiytics.com/gtags.js
https://www.googie-anaiytics.com/keywords/vn-keyword.json
https://www.googie-anaiytics.com/webs-1.0.1.js
https://www.googie-anaiytics.com/analytics.js
https://www.googie-anaiytics.com/webs-1.0.2.js
https://www.googie-anaiytics.com/ga.js
https://www.googie-anaiytics.com/web-1.0.1.js
https://www.googie-anaiytics.com/web.js
https://www.googie-anaiytics.com/collect.js
https://kuurza.com/redirect?from=bitget</code></pre>
            <p>(note the intentional misspelling of Google Analytics)</p><p>Page Shield, our client side security solution, is available on all paid plans. When turned on, it collects information about JavaScript files loaded by end user browsers accessing your website.</p><p>By looking at the database of detected JavaScript files, we immediately found matches with the IoCs provided above starting as far back as 2024-06-08 15:23:51 (first seen timestamp on Page Shield detected JavaScript file). This was a clear indication that malicious activity was active and associated with polyfill.io.</p>
    <div>
      <h3>Replacing insecure JavaScript links to polyfill.io</h3>
      <a href="#replacing-insecure-javascript-links-to-polyfill-io">
        
      </a>
    </div>
    <p>To achieve performant HTML rewriting, we need to make blazing-fast HTML alterations as responses stream through Cloudflare’s network. This has been made possible by leveraging <a href="/rust-nginx-module">ROFL (Response Overseer for FL)</a>. ROFL powers various Cloudflare products that need to alter HTML as it streams, such as <a href="https://developers.cloudflare.com/speed/optimization/content/fonts/">Cloudflare Fonts,</a> <a href="https://developers.cloudflare.com/waf/tools/scrape-shield/email-address-obfuscation/">Email Obfuscation</a> and <a href="https://developers.cloudflare.com/speed/optimization/content/rocket-loader/">Rocket Loader</a></p><p>ROFL is developed entirely in Rust. The memory-safety features of Rust are indispensable for ensuring protection against memory leaks while processing a staggering volume of requests, measuring in the millions per second. Rust's compiled nature allows us to finely optimize our code for specific hardware configurations, delivering performance gains compared to interpreted languages.</p><p>The performance of ROFL allows us to rewrite HTML on-the-fly and modify the polyfill.io links quickly, safely, and efficiently. This speed helps us reduce any additional latency added by processing the HTML file.</p><p>If the feature is turned on, for any HTTP response with an HTML Content-Type, we parse all JavaScript script tag source attributes. If any are found linking to polyfill.io, we rewrite the src attribute to link to our mirror instead. We map to the correct version of the polyfill service while the query string is left untouched.</p><p>The logic will not activate if a Content Security Policy (CSP) header is found in the response. This ensures we don’t replace the link while breaking the CSP policy and therefore potentially breaking the website.</p>
    <div>
      <h3>Default on for free customers, optional for everyone else</h3>
      <a href="#default-on-for-free-customers-optional-for-everyone-else">
        
      </a>
    </div>
    <p>Cloudflare proxies millions of websites, and a large portion of these sites are on our free plan. Free plan customers tend to have simpler applications while not having the resources to update and react quickly to security concerns. We therefore decided to turn on the feature by default for sites on our free plan, as the likelihood of causing issues is reduced while also helping keep safe a very large portion of applications using polyfill.io.</p><p>Paid plan customers, on the other hand, have more complex applications and react quicker to security notices. We are confident that most paid customers using polyfill.io and Cloudflare will appreciate the ability to virtually patch the issue with a single click, while controlling when to do so.</p><p>All customers can turn off the feature at any time.</p><p>This isn’t the first time we’ve decided a security problem was so widespread and serious that we’d enable protection for all customers regardless of whether they were a paying customer or not. Back in 2014, we enabled <a href="/shellshock-protection-enabled-for-all-customers">Shellshock protection</a> for everyone. In 2021, when the log4j vulnerability was disclosed <a href="/cve-2021-44228-log4j-rce-0-day-mitigation/">we rolled out protection</a> for all customers.</p>
    <div>
      <h2>Do not use polyfill.io</h2>
      <a href="#do-not-use-polyfill-io">
        
      </a>
    </div>
    <p>If you are using Cloudflare, you can remove polyfill.io with a single click on the Cloudflare dashboard by heading over to <a href="https://dash.cloudflare.com/?to=/:account/:zone/security/settings">your zone ⇒ Security ⇒ Settings</a>. If you are a free customer, the rewrite is automatically active. This feature, we hope, will help you quickly patch the issue.</p><p>Nonetheless, you should ultimately search your code repositories for instances of polyfill.io and replace them with an alternative provider, such as Cloudflare’s secure mirror under cdnjs (<a href="https://cdnjs.cloudflare.com/polyfill/">https://cdnjs.cloudflare.com/polyfill/</a>). Website owners who are not using Cloudflare should also perform these steps.</p><p>The underlying bundle links you should use are:</p><p>For minified: <a href="https://cdnjs.cloudflare.com/polyfill/v3/polyfill.min.js">https://cdnjs.cloudflare.com/polyfill/v3/polyfill.min.js</a>
For unminified: <a href="https://cdnjs.cloudflare.com/polyfill/v3/polyfill.js">https://cdnjs.cloudflare.com/polyfill/v3/polyfill.js</a></p><p>Doing this ensures your website is no longer relying on polyfill.io.</p> ]]></content:encoded>
            <category><![CDATA[CDNJS]]></category>
            <category><![CDATA[JavaScript]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Application Security]]></category>
            <category><![CDATA[Application Services]]></category>
            <category><![CDATA[Supply Chain Attacks]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Better Internet]]></category>
            <guid isPermaLink="false">3NHy1gOkql57RbBcdjWs5g</guid>
            <dc:creator>Matthew Prince</dc:creator>
            <dc:creator>John Graham-Cumming</dc:creator>
            <dc:creator>Michael Tremante</dc:creator>
        </item>
        <item>
            <title><![CDATA[Dutch political websites hit by cyber attacks as EU voting starts]]></title>
            <link>https://blog.cloudflare.com/dutch-political-websites-hit-by-cyber-attacks-as-eu-voting-starts/</link>
            <pubDate>Thu, 06 Jun 2024 19:23:17 GMT</pubDate>
            <description><![CDATA[ The 2024 European Parliament election began in the Netherlands on June 6. Cloudflare mitigated several multi-hour DDoS attacks on Dutch political websites on June 5 and 6 ]]></description>
            <content:encoded><![CDATA[ <p></p><p></p><p>The 2024 <a href="https://en.wikipedia.org/wiki/2024_European_Parliament_election">European Parliament election</a> started in the Netherlands today, June 6, 2024, and will continue through June 9 in the other 26 countries that are part of the European Union. Cloudflare observed DDoS attacks targeting multiple election or politically-related Internet properties on election day in the Netherlands, as well as the preceding day.</p><p>These elections are highly <a href="https://www.bbc.com/news/articles/cw4433yz73vo">anticipated</a>. It’s also the first European election without the UK after Brexit.</p><p>According to <a href="https://www.politico.eu/article/dutch-party-websites-attacked-as-eu-vote-kicks-off/">news reports</a>, several websites of political parties in the Netherlands suffered cyberattacks on Thursday, with a pro-Russian hacker group called HackNeT claiming responsibility.</p><p>On June 5 and 6, 2024, Cloudflare systems automatically detected and mitigated DDoS attacks that targeted at least three politically-related Dutch websites. Significant attack activity targeted two of them, and is described below.</p><p>A DDoS attack, short for <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service attack</a>, is a type of cyber attack that aims to take down or disrupt Internet services such as websites or mobile apps and make them unavailable for users. DDoS attacks are usually done by flooding the victim's server with more traffic than it can handle. To learn more about DDoS attacks and other types of attacks, visit our <a href="https://www.cloudflare.com/learning/">Learning Center</a>.</p><p>Attackers typically use DDoS attacks but also exploit other vulnerabilities and types of attacks simultaneously.</p><p>Daily DDoS mitigations on June 5 reached over 1 billion HTTP requests in the Netherlands, most of which targeted two election or political party websites. The attack continued on June 6. Attacks on one website peaked on June 5 at 14:00 UTC (16:00 local time) with 115 million requests per hour, with the attack lasting around four hours. Attacks on another politically-related website peaked at the same time at 65 million requests per hour.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/19rBhy6BT0gBR2M2H6NF1B/f70bf63c47c3bae67e00f7142373184c/image1-7.png" />
            
            </figure><p>On June 6, the first politically-related site with the highest peak on June 5 referenced above was attacked again for several hours. The main attack peak occurred at 11:00 UTC (13:00 local time), with 44 million requests per hour.</p><p>The main June 5 DDoS attack on one of the websites peaked at 14:13 UTC (16:13 local time), reaching 73,000 requests per second (rps) in an attack that lasted for a few hours. This attack is illustrated by the blue line in the graph below, which shows that it ramped slowly over the first half of the day, and then appeared to abruptly stop at 18:06. And on June 6, the main attack on the second website peaked at 11:01 UTC (13:01 local time) with 52,000 rps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3qlM9c8e6TCh26gf8VcVka/7f4dfa562fda07e6e0c5f5b9191425d7/image3-1.png" />
            
            </figure>
    <div>
      <h3>Geopolitical motivations</h3>
      <a href="#geopolitical-motivations">
        
      </a>
    </div>
    <p>Elections, geopolitical changes, and disputes also impact the online world and cyberattacks. Our <a href="/ddos-threat-report-for-2024-q1">DDoS threat report</a> for Q1 2024 gives a few recent examples. One notable case was the 466% surge in DDoS attacks on Sweden after its acceptance into the NATO alliance, mirroring the pattern observed during Finland’s NATO accession in 2023.</p><p>As we’ve seen in recent years, real-world conflicts, disputed and highly anticipated elections, and wars are always accompanied by cyberattacks. We reported (<a href="/internet-traffic-patterns-in-israel-and-palestine-following-the-october-2023-attacks">1</a>, <a href="/cyber-attacks-in-the-israel-hamas-war">2</a>) on an increase in cyberattacks following the start of the Israel-Hamas war on October 7, 2023. We’ve put together a <a href="https://developers.cloudflare.com/ddos-protection/best-practices/respond-to-ddos-attacks/">list of recommendations</a> to optimize your defenses against DDoS attacks, and you can also follow our step-by-step wizards to <a href="https://developers.cloudflare.com/learning-paths/application-security/">secure your applications</a> and <a href="https://developers.cloudflare.com/learning-paths/prevent-ddos-attacks/">prevent DDoS attacks</a>.</p><p>If you want to follow more trends and insights about the Internet and elections in particular, you can check <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>, and more specifically our new <a href="https://radar.cloudflare.com/reports/elections-2024">2024 Elections Insights report</a>, that we’re keeping up to date as national elections take place throughout the year.</p> ]]></content:encoded>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Politics]]></category>
            <category><![CDATA[Election Security]]></category>
            <category><![CDATA[Europe]]></category>
            <category><![CDATA[European Union]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Elections]]></category>
            <guid isPermaLink="false">3lWkqEOtDnWYtf5clNdhU1</guid>
            <dc:creator>João Tomé</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2024 Q1]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-for-2024-q1/</link>
            <pubDate>Tue, 16 Apr 2024 13:00:25 GMT</pubDate>
            <description><![CDATA[ 2024 started with a bang. Cloudflare’s autonomous systems mitigated over 4.5 million DDoS attacks in the first quarter of the year — a 50% increase compared to the previous year. 
Read the full coverage ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7CRUEQXjRjK9JCmDScvOe9/202241692c52e9b98d7c4609ae6a90b5/image13.png" />
            
            </figure><p>Welcome to the 17th edition of Cloudflare’s DDoS threat report. This edition covers the DDoS threat landscape along with key findings as observed from the <a href="https://www.cloudflare.com/network/">Cloudflare network</a> during the first quarter of 2024.</p>
    <div>
      <h3>What is a DDoS attack?</h3>
      <a href="#what-is-a-ddos-attack">
        
      </a>
    </div>
    <p>But first, a quick recap. A DDoS attack, short for <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service attack</a>, is a type of cyber attack that aims to take down or disrupt Internet services such as websites or mobile apps and make them unavailable for users. DDoS attacks are usually done by flooding the victim's server with more traffic than it can handle.</p><p>To learn more about DDoS attacks and other types of attacks, visit our <a href="https://www.cloudflare.com/learning/">Learning Center</a>.</p>
    <div>
      <h3>Accessing previous reports</h3>
      <a href="#accessing-previous-reports">
        
      </a>
    </div>
    <p>Quick reminder that you can access <a href="/tag/ddos-reports">previous editions of DDoS threat reports</a> on the Cloudflare blog. They are also available on our interactive hub, <a href="https://radar.cloudflare.com/reports?q=DDoS">Cloudflare Radar</a>. On Radar, you can find global Internet traffic, attacks, and technology trends and insights, with drill-down and filtering capabilities, so you can zoom in on specific countries, industries, and networks. There’s also a <a href="https://developers.cloudflare.com/radar/">free API</a> allowing academics, data sleuths, and other web enthusiasts to investigate Internet trends across the globe.</p><p>To learn how we prepare this report, refer to our <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/">Methodologies</a>.</p>
    <div>
      <h3>2024 Q1 key insights</h3>
      <a href="#2024-q1-key-insights">
        
      </a>
    </div>
    <p>Key insights from the first quarter of 2024 include:</p><ul><li><p>2024 started with a bang. Cloudflare’s defense systems automatically mitigated 4.5 million DDoS attacks during the first quarter — representing a 50% year-over-year (YoY) increase.</p></li><li><p>DNS-based DDoS attacks increased by 80% YoY and remain the most prominent attack vector.</p></li><li><p>DDoS attacks on Sweden surged by 466% after its acceptance to the NATO alliance, mirroring the pattern observed during Finland's NATO accession in 2023.</p></li></ul>
    <div>
      <h3>Starting 2024 with a bang</h3>
      <a href="#starting-2024-with-a-bang">
        
      </a>
    </div>
    <p>We’ve just wrapped up the first quarter of 2024, and, already, our automated defenses have mitigated 4.5 million DDoS attacks — an amount equivalent to 32% of all the DDoS attacks we mitigated in 2023.</p><p>Breaking it down to attack types, HTTP DDoS attacks increased by 93% YoY and 51% quarter-over-quarter (QoQ). Network-layer DDoS attacks, also known as L3/4 DDoS attacks, increased by 28% YoY and 5% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6QB3mXk7ACemlQBJcY05Wk/ecb4b32b415ac29a3c5fe673af3520da/image1-15.png" />
            
            </figure><p>2024 Q1: Cloudflare mitigated 4.5 million DDoS attacks</p><p>When comparing the combined number of HTTP DDoS attacks and L3/4 DDoS attacks, we can see that, overall, in the first quarter of 2024, the count increased by 50% YoY and 18% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3B6aKU9fQb6RGzcJYQmjVv/e8a91d10307dc429c47ca413cf134774/pasted-image-0--7--1.png" />
            
            </figure><p>DDoS attacks by year and quarter</p><p>In total, our systems mitigated 10.5 trillion HTTP DDoS attack requests in Q1. Our systems also mitigated over 59 petabytes of DDoS attack traffic — just on the network-layer.</p><p>Among those network-layer DDoS attacks, many of them exceeded the 1 terabit per second rate — almost on a weekly basis. The largest attack that we have mitigated so far in 2024 was launched by a Mirai-variant botnet. This attack reached 2 Tbps and was aimed at an Asian hosting provider protected by <a href="https://www.cloudflare.com/network-services/products/magic-transit/">Cloudflare Magic Transit</a>. Cloudflare’s systems automatically detected and mitigated the attack.</p><p>The <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai botnet</a>, infamous for its massive DDoS attacks, was primarily composed of infected IoT devices. It notably disrupted Internet access across the US in 2016 by targeting DNS service providers. Almost eight years later, Mirai attacks are still very common. Four out of every 100 HTTP DDoS attacks, and two out of every 100 L3/4 DDoS attacks are launched by a Mirai-variant botnet. The reason we say “variant” is that the Mirai source code was made public, and over the years there have been many permutations of the original.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2QN1Ndrb3e0EEiVNPu1chA/1c3a61ed355fd74c008955659d696661/pasted-image-0-3.png" />
            
            </figure><p>Mirai botnet targets Asian hosting provider with 2 Tbps DDoS attack</p>
    <div>
      <h3>DNS attacks surge by 80%</h3>
      <a href="#dns-attacks-surge-by-80">
        
      </a>
    </div>
    <p>In March 2024, we introduced one of our latest DDoS defense systems, the <a href="/advanced-dns-protection">Advanced DNS Protection</a> system. This system complements our existing systems, and is designed to protect against the most sophisticated DNS-based DDoS attacks.</p><p>It is not out of the blue that we decided to invest in this new system. DNS-based DDoS attacks have become the most prominent attack vector and its share among all network-layer attacks continues to grow. In the first quarter of 2024, the share of DNS-based DDoS attacks increased by 80% YoY, growing to approximately 54%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4eeimQquFTBhNCOKeGTcoe/d1ccde4a4468aa1a73ee7fb5711014ba/pasted-image-0--1--1.png" />
            
            </figure><p>DNS-based DDoS attacks by year and quarter</p><p>Despite the surge in DNS attacks and due to the overall increase in all types of DDoS attacks, the share of each attack type, remarkably, remains the same as seen in our previous report for the final quarter of 2023. HTTP DDoS attacks remain at 37% of all DDoS attacks, DNS DDoS attacks at 33%, and the remaining 30% is left for all other types of L3/4 attacks, such as <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN Flood</a> and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP Floods</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5lUZwA2pBOVNWP9nW5541d/c4460eeac1d3b5a40e84dbb1fb6cf89f/pasted-image-0--2-.png" />
            
            </figure><p>Attack type distribution</p><p>And in fact, SYN Floods were the second most common L3/4 attack. The third was RST Floods, another type of TCP-based DDoS attack. UDP Floods came in fourth with a 6% share.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6mQ0isNVD7dWQbtnq5DITg/0fb241b6fd61d552d3a579323e37f38b/pasted-image-0--3-.png" />
            
            </figure><p>Top attack vectors</p><p>When analyzing the most common attack vectors, we also check for the attack vectors that experienced the largest growth but didn’t necessarily make it into the top ten list. Among the top growing attack vectors (emerging threats), Jenkins Flood experienced the largest growth of over 826% QoQ.</p><p>Jenkins Flood is a DDoS attack that exploits vulnerabilities in the <a href="https://www.jenkins.io/">Jenkins automation server</a>, specifically through UDP multicast/broadcast and DNS multicast services. Attackers can send small, specially crafted requests to a publicly facing UDP port on Jenkins servers, causing them to respond with disproportionately large amounts of data. This can amplify the traffic volume significantly, overwhelming the target's network and leading to service disruption. Jenkins addressed this vulnerability (<a href="https://smartermsp.com/cybersecurity-threat-advisory-0013-20-jenkins-udp-ddos-attack-cve-2020-2100/">CVE-2020-2100</a>) in 2020 by disabling these services by default in later versions. However, as we can see, even 4 years later, this vulnerability is still being abused in the wild to launch DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/HZBbtghkPLvvRnFaTAw9d/f1030dfaed7500861fdbc83b1c4d02ab/pasted-image-0--4-.png" />
            
            </figure><p>Attack vectors that experienced the largest growth QoQ</p>
    <div>
      <h3>HTTP/2 Continuation Flood</h3>
      <a href="#http-2-continuation-flood">
        
      </a>
    </div>
    <p>Another attack vector that’s worth discussing is the HTTP/2 Continuation Flood. This attack vector is made possible by a vulnerability that was <a href="https://nowotarski.info/http2-continuation-flood-technical-details/">discovered and reported publicly by researcher Bartek Nowotarski</a> on April 3, 2024.</p><p>The HTTP/2 Continuation Flood vulnerability targets HTTP/2 protocol implementations that improperly handle HEADERS and multiple CONTINUATION frames. The threat actor sends a sequence of CONTINUATION frames without the END_HEADERS flag, leading to potential server issues such as out-of-memory crashes or CPU exhaustion. HTTP/2 Continuation Flood allows even a single machine to disrupt websites and APIs using HTTP/2, with the added challenge of difficult detection due to no visible requests in HTTP access logs.</p><p>This vulnerability poses a potentially severe threat more damaging than the previously known <a href="/technical-breakdown-http2-rapid-reset-ddos-attack/">HTTP/2 Rapid Reset</a>, which resulted in some of the largest HTTP/2 DDoS attack campaigns in recorded history. During that campaign, thousands of hyper-volumetric DDoS attacks targeted Cloudflare. The attacks were multi-million requests per second strong. The average attack rate in that campaign, recorded by Cloudflare, was 30M rps. Approximately 89 of the attacks peaked above 100M rps and the largest one we saw hit 201M rps. Additional coverage was published in our <a href="/ddos-threat-report-2023-q3/">2023 Q3 DDoS threat report</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/72mnC1iNyKm6RX3UAwsVG4/5d66586e5833ce492bd2cbfb1eb538eb/pasted-image-0--2--1.png" />
            
            </figure><p>HTTP/2 Rapid Reset campaign of hyper-volumetric DDoS attacks in 2023 Q3</p><p>Cloudflare's network, its HTTP/2 implementation, and customers using our <a href="https://www.cloudflare.com/application-services/products/waf/">WAF</a>/<a href="https://www.cloudflare.com/application-services/products/cdn/">CDN</a> services are not affected by this vulnerability. Furthermore, we are not currently aware of any threat actors exploiting this vulnerability in the wild.</p><p>Multiple CVEs have been assigned to the various implementations of HTTP/2 that are impacted by this vulnerability. A <a href="https://kb.cert.org/vuls/id/421644">CERT alert</a> published by Christopher Cullen at Carnegie Mellon University, which was covered by <a href="https://www.bleepingcomputer.com/news/security/new-http-2-dos-attack-can-crash-web-servers-with-a-single-connection/">Bleeping Computer</a>, lists the various CVEs:</p>
<table>
<colgroup>
<col></col>
<col></col>
<col></col>
</colgroup>
<thead>
  <tr>
    <th><span>Affected service </span></th>
    <th><span>CVE</span></th>
    <th><span>Details</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Node.js HTTP/2 server</span></td>
    <td><span>CVE-2024-27983</span></td>
    <td><span>Sending a few HTTP/2 frames can cause a race condition and memory leak, leading to a potential denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Envoy's oghttp codec</span></td>
    <td><span>CVE-2024-27919</span></td>
    <td><span>Not resetting a request when header map limits are exceeded can cause unlimited memory consumption which can potentially lead to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Tempesta FW</span></td>
    <td><span>CVE-2024-2758</span></td>
    <td><span>Its rate limits are not entirely effective against empty CONTINUATION frames flood, potentially leading to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>amphp/http</span></td>
    <td><span>CVE-2024-2653</span></td>
    <td><span>It collects CONTINUATION frames in an unbounded buffer, risking an out of memory (OOM) crash if the header size limit is exceeded, potentially resulting in a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Go's net/http and net/http2 packages</span></td>
    <td><span>CVE-2023-45288</span></td>
    <td><span>Allows an attacker to send an arbitrarily large set of headers, causing excessive CPU consumption, potentially leading to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>nghttp2 library</span></td>
    <td><span>CVE-2024-28182</span></td>
    <td><span>Involves an implementation using nghttp2 library, which continues to receive CONTINUATION frames, potentially leading to a denial of service event without proper stream reset callback.</span></td>
  </tr>
  <tr>
    <td><span>Apache Httpd</span></td>
    <td><span>CVE-2024-27316</span></td>
    <td><span>A flood of CONTINUATION frames without the END_HEADERS flag set can be sent, resulting in the improper termination of requests, potentially leading to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Apache Traffic Server</span></td>
    <td><span>CVE-2024-31309</span></td>
    <td><span>HTTP/2 CONTINUATION floods can cause excessive resource consumption on the server, potentially leading to a denial of service event.</span></td>
  </tr>
  <tr>
    <td><span>Envoy versions 1.29.2 or earlier</span></td>
    <td><span>CVE-2024-30255</span></td>
    <td><span>Consumption of significant server resources can lead to CPU exhaustion during a flood of CONTINUATION frames, which can potentially lead to a denial of service event.</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Top attacked industries</h3>
      <a href="#top-attacked-industries">
        
      </a>
    </div>
    <p>When analyzing attack statistics, we use our <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-industry">customer’s industry</a> as it is recorded in our systems to determine the most attacked industries. In the first quarter of 2024, the top attacked industry by HTTP DDoS attacks in North America was Marketing and Advertising. In Africa and Europe, the Information Technology and Internet industry was the most attacked. In the Middle East, the most attacked industry was Computer Software. In Asia, the most attacked industry was Gaming and Gambling. In South America, it was the Banking, Financial Services and Insurance (BFSI) industry. Last but not least, in Oceania, was the Telecommunications industry.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7ntlfFKUUah6DeHSlwJSq6/f488dbd9e68e2822a16c448aa55d0c12/Top-Attacked-Industry-by-Region-Q1-2024.png" />
            
            </figure><p>Top attacked industries by HTTP DDoS attacks, by region</p><p>Globally, the Gaming and Gambling industry was the number one most targeted by HTTP DDoS attacks. Just over seven of every 100 DDoS requests that Cloudflare mitigated were aimed at the <a href="https://www.cloudflare.com/gaming/">Gaming</a> and Gambling industry. In second place, the Information Technology and Internet industry, and in third, Marketing and Advertising.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/LNYVB8cgZhctz3H84y4is/c952e53b1475adcebaac1df63fd71352/pasted-image-0--5-.png" />
            
            </figure><p>Top attacked industries by HTTP DDoS attacks</p><p>With a share of 75% of all network-layer DDoS attack bytes, the Information Technology and Internet industry was the most targeted by network-layer DDoS attacks. One possible explanation for this large share is that Information Technology and Internet companies may be “super aggregators” of attacks and receive DDoS attacks that are actually targeting their end customers. The Telecommunications industry, the <a href="https://www.cloudflare.com/financial-services/">Banking, Financial Services and Insurance (BFSI)</a> industry, the Gaming and Gambling industry and the Computer Software industry accounted for the next three percent.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/61FwNZ9kUUqXnHpcSmVRaC/479e12abb25cd38a3d302bb28efa51dc/pasted-image-0--6--1.png" />
            
            </figure><p>Top attacked industries by L3/4 DDoS attacks</p><p>When normalizing the data by dividing the attack traffic by the total traffic to a given industry, we get a completely different picture. On the HTTP front, Law Firms and Legal Services was the most attacked industry, as over 40% of their traffic was HTTP DDoS attack traffic. The Biotechnology industry came in second with a 20% share of HTTP DDoS attack traffic. In third place, <a href="https://www.cloudflare.com/galileo/">Nonprofits</a> had an HTTP DDoS attack share of 13%. In fourth, Aviation and Aerospace, followed by Transportation, Wholesale, <a href="https://www.cloudflare.com/public-sector/">Government Relations</a>, Motion Pictures and Film, Public Policy, and Adult Entertainment to complete the top ten.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4I2FKWUobGjuyukeip0K5U/6f62640b53a76e3807743ed0b1865d03/pasted-image-0--8--1.png" />
            
            </figure><p>Top attacked industries by HTTP DDoS attacks (normalized)</p><p>Back to the network layer, when normalized, Information Technology and Internet remained the number one most targeted industry by L3/4 DDoS attacks, as almost a third of their traffic were attacks. In second, Textiles had a 4% attack share. In third, Civil Engineering, followed by Banking Financial Services and Insurance (BFSI), Military, Construction, Medical Devices, Defense and Space, Gaming and Gambling, and lastly Retail to complete the top ten.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4KNGEFTvu7T1NQj3nO9Jqo/28d249aa64cd6d23789ce5b6ba738642/pasted-image-0--9--1.png" />
            
            </figure><p>Top attacked industries by L3/4 DDoS attacks (normalized)</p>
    <div>
      <h3>Largest sources of DDoS attacks</h3>
      <a href="#largest-sources-of-ddos-attacks">
        
      </a>
    </div>
    <p>When analyzing the <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#source-country">sources of HTTP DDoS attacks</a>, we look at the source IP address to determine the origination location of those attacks. A country/region that's a large source of attacks indicates that there is most likely a large presence of botnet nodes behind <a href="https://www.cloudflare.com/learning/access-management/what-is-a-vpn/">Virtual Private Network (VPN)</a> or proxy endpoints that attackers may use to obfuscate their origin.</p><p>In the first quarter of 2024, the United States was the largest source of HTTP DDoS attack traffic, as a fifth of all DDoS attack requests originated from US IP addresses. China came in second, followed by Germany, Indonesia, Brazil, Russia, Iran, Singapore, India, and Argentina.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4wQLyRJrrtx54hGXPY2HHC/d6e9119a6d8996713f2f4d1befad518e/pasted-image-0--10-.png" />
            
            </figure><p>The top sources of HTTP DDoS attacks</p><p>At the network layer, source IP addresses can be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a>. So, instead of relying on IP addresses to understand the source, <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#source-country">we use the location of our data centers</a> where the attack traffic was ingested. We can gain geographical accuracy due to Cloudflare’s large global coverage in over 310 cities around the world.</p><p>Using the location of our data centers, we can see that in the first quarter of 2024, over 40% L3/4 DDoS attack traffic was ingested in our US data centers, making the US the largest source of L3/4 attacks. Far behind, in second, Germany at 6%, followed by Brazil, Singapore, Russia, South Korea, Hong Kong, United Kingdom, Netherlands, and Japan.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4vggccrQzkQy6yNuHMQboq/c4de452c39e00a1d38f4c1d7a114c585/pasted-image-0--11-.png" />
            
            </figure><p>The top sources of L3/4 DDoS attacks</p><p>When normalizing the data by dividing the attack traffic by the total traffic to a given country or region, we get a totally different lineup. Almost a third of the HTTP traffic originating from Gibraltar was DDoS attack traffic, making it the largest source. In second place, Saint Helena, followed by the British Virgin Islands, Libya, Paraguay, Mayotte, Equatorial Guinea, Argentina, and Angola.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1dYeSLU5tTKxZmMoqkF8y5/ac6ff10b445c97be9a1a5e07374b0643/pasted-image-0--12-.png" />
            
            </figure><p>The top sources of HTTP DDoS attacks (normalized)</p><p>Back to the network layer, normalized, things look rather different as well. Almost 89% of the traffic we ingested in our Zimbabwe-based data centers were L3/4 DDoS attacks. In Paraguay, it was over 56%, followed by Mongolia reaching nearly a 35% attack share. Additional top locations included Moldova, Democratic Republic of the Congo, Ecuador, Djibouti, Azerbaijan, Haiti, and Dominican Republic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/qpyO1vBpvAjoCe50RnZGT/2e6001062ff51ecc9f5bb2bb30e9cf6f/pasted-image-0--13-.png" />
            
            </figure><p>The top sources of L3/4 DDoS attacks (normalized)</p>
    <div>
      <h3>Most attacked locations</h3>
      <a href="#most-attacked-locations">
        
      </a>
    </div>
    <p>When analyzing DDoS attacks against our customers, we use their <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#target-country">billing country</a> to determine the “attacked country (or region)”. In the first quarter of 2024, the US was the most attacked by HTTP DDoS attacks. Approximately one out of every 10 DDoS requests that Cloudflare mitigated targeted the US. In second, China, followed by Canada, Vietnam, Indonesia, Singapore, Hong Kong, Taiwan, Cyprus, and Germany.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5cGyvb0ljLm8wOQTzLHYfV/b3650336a30e2bafb717e42fc5255098/pasted-image-0--14-.png" />
            
            </figure><p>Top attacked countries and regions by HTTP DDoS attacks</p><p>When normalizing the data by dividing the attack traffic by the total traffic to a given country or region, the list changes drastically. Over 63% of HTTP traffic to Nicaragua was DDoS attack traffic, making it the most attacked location. In second, Albania, followed by Jordan, Guinea, San Marino, Georgia, Indonesia, Cambodia, Bangladesh, and Afghanistan.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6if6kI4aS8Kph16cSCEWjf/20be20d9cfe02034bf123003042dfbbb/pasted-image-0--15-.png" />
            
            </figure><p>Top attacked countries and regions by HTTP DDoS attacks (normalized)</p><p>On the network layer, China was the number one most attacked location, as 39% of all DDoS bytes that Cloudflare mitigated during the first quarter of 2024 were aimed at Cloudflare’s Chinese customers. Hong Kong came in second place, followed by Taiwan, the United States, and Brazil.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Nzw0zyRFnxer3C1SQmeHI/ae2081521fd12b399c9776a5a54748c4/pasted-image-0--16-.png" />
            
            </figure><p>Top attacked countries and regions by L3/4 DDoS attacks</p><p>Back to the network layer, when normalized, Hong Kong takes the lead as the most targeted location. L3/4 DDoS attack traffic accounted for over 78% of all Hong Kong-bound traffic. In second place, China with a DDoS share of 75%, followed by Kazakhstan, Thailand, Saint Vincent and the Grenadines, Norway, Taiwan, Turkey, Singapore, and Brazil.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2sUX9I80bmFLo0vrTNRiDu/4a96fd8283f2a5156ff02cd95fcdbda5/pasted-image-0--17-.png" />
            
            </figure><p>Top attacked countries and regions by L3/4 DDoS attacks (normalized)</p>
    <div>
      <h3>Cloudflare is here to help - no matter the attack type, size, or duration</h3>
      <a href="#cloudflare-is-here-to-help-no-matter-the-attack-type-size-or-duration">
        
      </a>
    </div>
    <p>Cloudflare's mission is to help build a better Internet, a vision where it remains secure, performant, and accessible to everyone. With four out of every 10 HTTP DDoS attacks lasting over 10 minutes and approximately three out of 10 extending beyond an hour, the challenge is substantial. Yet, whether an attack involves over 100,000 requests per second, as is the case in one out of every 10 attacks, or even exceeds a million requests per second — a rarity seen in only four out of every 1,000 attacks — Cloudflare’s defenses remain impenetrable.</p><p>Since pioneering <a href="/unmetered-mitigation">unmetered DDoS Protection</a> in 2017, Cloudflare has steadfastly honored its promise to provide enterprise-grade <a href="https://www.cloudflare.com/ddos/">DDoS protection</a> at no cost to all organizations, ensuring that our advanced technology and robust network architecture do not just fend off attacks but also preserve performance without compromise.</p> ]]></content:encoded>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Mirai]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[DNS Flood]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">bRA8E8DuG6NNpZ1vHZCwP</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[Eliminate VPN vulnerabilities with Cloudflare One]]></title>
            <link>https://blog.cloudflare.com/eliminate-vpn-vulnerabilities-with-cloudflare-one/</link>
            <pubDate>Wed, 06 Mar 2024 14:00:32 GMT</pubDate>
            <description><![CDATA[ The Cybersecurity & Infrastructure Security Agency (CISA) recently issued an Emergency Directive due to the Ivanti Connect Secure and Policy Secure vulnerabilities. In this blog, we discuss the threat actor tactics exploiting these vulnerabilities ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7dkFzKpbp6dNWRPtmhzmF/c38942d12f78bff0cba968474c923a17/image1-17.png" />
            
            </figure><p>On January 19, 2024, the Cybersecurity &amp; Infrastructure Security Agency (CISA) issued <a href="https://www.cisa.gov/news-events/directives/ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure-vulnerabilities">Emergency Directive 24-01: Mitigate Ivanti Connect Secure and Ivanti Policy Secure Vulnerabilities</a>. CISA has the authority to issue emergency directives in response to a known or reasonably suspected information security threat, vulnerability, or incident. U.S. Federal agencies are required to comply with these directives.</p><p>Federal agencies were directed to apply a mitigation against two recently discovered vulnerabilities; the mitigation was to be applied within three days. Further monitoring by CISA revealed that threat actors were continuing to exploit the vulnerabilities and had developed some workarounds to earlier mitigations and detection methods. On January 31, CISA issued <a href="https://www.cisa.gov/news-events/directives/supplemental-direction-v1-ed-24-01-mitigate-ivanti-connect-secure-and-ivanti-policy-secure">Supplemental Direction V1</a> to the Emergency Directive instructing agencies to immediately disconnect all instances of Ivanti Connect Secure and Ivanti Policy Secure products from agency networks and perform several actions before bringing the products back into service.</p><p>This blog post will explore the threat actor’s tactics, discuss the high-value nature of the targeted products, and show how Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/">Secure Access Service Edge</a> (SASE) platform <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protects against such threats</a>.</p><p>As a side note and showing the value of layered protections, Cloudflare’s WAF had <a href="/how-cloudflares-ai-waf-proactively-detected-ivanti-connect-secure-critical-zero-day-vulnerability">proactively detected</a> the Ivanti zero-day vulnerabilities and deployed emergency rules to protect Cloudflare customers.</p>
    <div>
      <h2>Threat Actor Tactics</h2>
      <a href="#threat-actor-tactics">
        
      </a>
    </div>
    <p>Forensic investigations (see the <a href="https://www.volexity.com/blog/2024/01/10/active-exploitation-of-two-zero-day-vulnerabilities-in-ivanti-connect-secure-vpn/">Volexity</a> blog for an excellent write-up) indicate that the attacks began as early as December 2023. Piecing together the evidence shows that the threat actors chained two previously unknown vulnerabilities together to gain access to the Connect Secure and Policy Secure appliances and achieve unauthenticated remote code execution (RCE).</p><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46805">CVE-2023-46805</a> is an authentication bypass vulnerability in the products’ web components that allows a remote attacker to bypass control checks and gain access to restricted resources. <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21887">CVE-2024-21887</a> is a command injection vulnerability in the products’ web components that allows an authenticated administrator to execute arbitrary commands on the appliance and send specially crafted requests. The remote attacker was able to bypass authentication and be seen as an “authenticated” administrator, and then take advantage of the ability to execute arbitrary commands on the appliance.</p><p>By exploiting these vulnerabilities, the threat actor had near total control of the appliance. Among other things, the attacker was able to:</p><ul><li><p>Harvest credentials from users logging into the VPN service</p></li><li><p>Use these credentials to log into protected systems in search of even more credentials</p></li><li><p>Modify files to enable remote code execution</p></li><li><p>Deploy web shells to a number of web servers</p></li><li><p>Reverse tunnel from the appliance back to their command-and-control server (C2)</p></li><li><p>Avoid detection by disabling logging and clearing existing logs</p></li></ul>
    <div>
      <h2>Little Appliance, Big Risk</h2>
      <a href="#little-appliance-big-risk">
        
      </a>
    </div>
    <p>This is a serious incident that is exposing customers to significant risk. CISA is justified in issuing their directive, and Ivanti is working hard to mitigate the threat and develop patches for the software on their appliances. But it also serves as another indictment of the legacy “<a href="https://www.cloudflare.com/learning/access-management/castle-and-moat-network-security/">castle-and-moat</a>” security paradigm. In that paradigm, remote users were outside the castle while protected applications and resources remained inside. The moat, consisting of a layer of security appliances, separated the two. The moat, in this case the Ivanti appliance, was responsible for authenticating and authorizing users, and then connecting them to protected applications and resources. Attackers and other bad actors were blocked at the moat.</p><p>This incident shows us what happens when a bad actor is able to take control of the moat itself, and the challenges customers face to recover control. Two typical characteristics of vendor-supplied appliances and the legacy security strategy highlight the risks:</p><ul><li><p>Administrators have access to the internals of the appliance</p></li><li><p>Authenticated users indiscriminately have access to a wide range of applications and resources on the corporate network, increasing the risk of bad actor <a href="https://www.cloudflare.com/learning/security/glossary/what-is-lateral-movement/">lateral movement</a></p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1ijcyO0LP8vTx3RE2vVdtF/878a0dac9efef21e54aa17e340657a83/image2-13.png" />
            
            </figure>
    <div>
      <h2>A better way: Cloudflare’s SASE platform</h2>
      <a href="#a-better-way-cloudflares-sase-platform">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/zero-trust/">Cloudflare One</a> is Cloudflare’s <a href="https://www.cloudflare.com/learning/access-management/security-service-edge-sse/">SSE</a> and single-vendor SASE platform. While Cloudflare One spans broadly across security and networking services (and you can read about the latest additions <a href="/single-vendor-sase-announcement-2024/">here</a>), I want to focus on the two points noted above.</p><p>First, Cloudflare One employs the principles of Zero Trust, including the <a href="https://www.cloudflare.com/learning/access-management/principle-of-least-privilege/">principle of least privilege</a>. As such, users that authenticate successfully only have access to the resources and applications necessary for their role. This principle also helps in the event of a compromised user account as the bad actor does not have indiscriminate network-level access. Rather, least privilege limits the range of lateral movement that a bad actor has, effectively reducing the blast radius.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2JO2DWzmnzBQMpfyxgdetM/11056f797c5b712d9babb88b40a05ff2/image3-15.png" />
            
            </figure><p>Second, while customer administrators need to have access to configure their services and policies, Cloudflare One does not provide any external access to the system internals of Cloudflare’s platform. Without that access, a bad actor would not be able to launch the types of attacks executed when they had access to the internals of the Ivanti appliance.  </p>
    <div>
      <h2>It’s time to eliminate the legacy VPN</h2>
      <a href="#its-time-to-eliminate-the-legacy-vpn">
        
      </a>
    </div>
    <p>If your organization is impacted by the CISA directive, or you are just ready to modernize and want to augment or replace your current VPN solution, Cloudflare is here to help. Cloudflare’s <a href="https://cfl.re/ztna-product-overview">Zero Trust Network Access (ZTNA) service</a>, part of the Cloudflare One platform, is the fastest and safest way to connect any user to any application.</p><p>Contact us to get immediate onboarding help or to schedule an architecture workshop to help you <a href="https://www.cloudflare.com/vpn-vulnerability/">augment or replace your Ivanti (or any) VPN solution</a>.Not quite ready for a live conversation? Read our learning path article on how to <a href="https://www.cloudflare.com/products/zero-trust/vpn-replacement/">replace your VPN</a> with Cloudflare or our <a href="https://developers.cloudflare.com/reference-architecture/architectures/sase/">SASE reference architecture</a> for a view of how all of our SASE services and on-ramps work together.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[VPN]]></category>
            <category><![CDATA[Cloudflare One]]></category>
            <category><![CDATA[Cloudflare Access]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Application Services]]></category>
            <guid isPermaLink="false">5rEwvIjtLi0zxozkXfCbOY</guid>
            <dc:creator>Dan Hall</dc:creator>
            <dc:creator>Michael Keane</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2023 Q4]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-2023-q4/</link>
            <pubDate>Tue, 09 Jan 2024 14:00:25 GMT</pubDate>
            <description><![CDATA[ Welcome to the sixteenth edition of Cloudflare’s DDoS Threat Report. This edition covers DDoS trends and key findings for the fourth and final quarter of the year 2023, complete with a review of major trends throughout the year ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1dLcyHxuJpOmtuilCdmlMv/226d5f6d0704e7ef443e924750799873/image14-1.png" />
            
            </figure><p>Welcome to the sixteenth edition of Cloudflare’s DDoS Threat Report. This edition covers DDoS trends and key findings for the fourth and final quarter of the year 2023, complete with a review of major trends throughout the year.</p>
    <div>
      <h2>What are DDoS attacks?</h2>
      <a href="#what-are-ddos-attacks">
        
      </a>
    </div>
    <p>DDoS attacks, or <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">distributed denial-of-service attacks</a>, are a type of cyber attack that aims to disrupt websites and online services for users, making them unavailable by overwhelming them with more traffic than they can handle. They are similar to car gridlocks that jam roads, preventing drivers from getting to their destination.</p><p>There are three main types of DDoS attacks that we will cover in this report. The first is an <a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/">HTTP request</a> intensive DDoS attack that aims to overwhelm HTTP servers with more requests than they can handle to cause a denial of service event. The second is an <a href="https://www.cloudflare.com/learning/network-layer/what-is-a-packet/">IP packet</a> intensive DDoS attack that aims to overwhelm in-line appliances such as routers, firewalls, and servers with more packets than they can handle. The third is a bit-intensive attack that aims to saturate and clog the Internet link causing that ‘gridlock’ that we discussed. In this report, we will highlight various techniques and insights on all three types of attacks.</p><p>Previous editions of the report can be found <a href="/tag/ddos-reports">here</a>, and are also available on our interactive hub, <a href="https://radar.cloudflare.com/reports?q=DDoS">Cloudflare Radar</a>. Cloudflare Radar showcases global Internet traffic, attacks, and technology trends and insights, with drill-down and filtering capabilities for zooming in on insights of specific countries, industries, and service providers. Cloudflare Radar also offers a <a href="https://developers.cloudflare.com/radar/">free API</a> allowing academics, data sleuths, and other web enthusiasts to investigate Internet usage across the globe.</p><p>To learn how we prepare this report, refer to our <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/">Methodologies</a>.</p>
    <div>
      <h2>Key findings</h2>
      <a href="#key-findings">
        
      </a>
    </div>
    <ol><li><p>In Q4, we observed a 117% year-over-year increase in network-layer DDoS attacks, and overall increased DDoS activity targeting retail, shipment and public relations websites during and around Black Friday and the holiday season.</p></li><li><p>In Q4, DDoS attack traffic targeting Taiwan registered a 3,370% growth, compared to the previous year, amidst the upcoming general election and reported tensions with China. The percentage of DDoS attack traffic targeting Israeli websites grew by 27% quarter-over-quarter, and the percentage of DDoS attack traffic targeting Palestinian websites grew by 1,126% quarter-over-quarter — as the military conflict between Israel and Hamas continues.</p></li><li><p>In Q4, there was a staggering 61,839% surge in DDoS attack traffic targeting Environmental Services websites compared to the previous year, coinciding with the 28th United Nations Climate Change Conference (COP 28).</p></li></ol><p>For an in-depth analysis of these key findings and additional insights that could redefine your understanding of current cybersecurity challenges, read on!</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2UZbT93S5MJZLC4lm3oEFA/2beb24271129aabf3ca98b66f69f92cb/image1.png" />
            
            </figure><p>Illustration of a DDoS attack</p>
    <div>
      <h2>Hyper-volumetric HTTP DDoS attacks</h2>
      <a href="#hyper-volumetric-http-ddos-attacks">
        
      </a>
    </div>
    <p>2023 was the year of uncharted territories. DDoS attacks reached new heights — in size and sophistication. The wider Internet community, including Cloudflare, faced a persistent and deliberately engineered campaign of thousands of hyper-volumetric DDoS attacks at never before seen rates.</p><p>These attacks were highly complex and exploited an <a href="/technical-breakdown-http2-rapid-reset-ddos-attack">HTTP/2 vulnerability</a>. Cloudflare developed purpose-built technology to mitigate the vulnerability’s effect and worked with others in the industry to responsibly disclose it.</p><p>As part of this DDoS campaign, in Q3 our systems mitigated the largest attack we’ve ever seen — 201 million requests per second (rps). That’s almost 8 times larger than our previous 2022 record of 26 million rps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/49CXz2EGW8rzgjsaRcSFyT/f6f06108590316e1a3bdf0e0f69dbc89/pasted-image-0.png" />
            
            </figure><p>Largest HTTP DDoS attacks as seen by Cloudflare, by year</p>
    <div>
      <h2>Growth in network-layer DDoS attacks</h2>
      <a href="#growth-in-network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>After the hyper-volumetric campaign subsided, we saw an unexpected drop in HTTP DDoS attacks. Overall in 2023, our automated defenses mitigated over 5.2 million HTTP DDoS attacks consisting of over 26 trillion requests. That averages at 594 HTTP DDoS attacks and 3 billion mitigated requests every hour.</p><p>Despite these astronomical figures, the amount of HTTP DDoS attack requests actually declined by 20% compared to 2022. This decline was not just annual but was also observed in 2023 Q4 where the number of HTTP DDoS attack requests decreased by 7% YoY and 18% QoQ.</p><p>On the network-layer, we saw a completely different trend. Our automated defenses mitigated 8.7 million network-layer DDoS attacks in 2023. This represents an 85% increase compared to 2022.</p><p>In 2023 Q4, Cloudflare’s automated defenses mitigated over 80 petabytes of network-layer attacks. On average, our systems auto-mitigated 996 network-layer DDoS attacks and 27 terabytes every hour. The number of network-layer DDoS attacks in 2023 Q4 increased by 175% YoY and 25% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Da5bEJbgh9FT5UQb6qPWo/4cf631e2688ca806bcbe996a357e5d5f/HTTP-and-Network-layer-DDoS-attacks-by-quarter-1.png" />
            
            </figure><p>HTTP and Network-layer DDoS attacks by quarter</p>
    <div>
      <h3>DDoS attacks increase during and around COP 28</h3>
      <a href="#ddos-attacks-increase-during-and-around-cop-28">
        
      </a>
    </div>
    <p>In the final quarter of 2023, the landscape of cyber threats witnessed a significant shift. While the Cryptocurrency sector was initially leading in terms of the volume of HTTP DDoS attack requests, a new target emerged as a primary victim. The Environmental Services industry experienced an unprecedented surge in HTTP DDoS attacks, with these attacks constituting half of all its HTTP traffic. This marked a staggering 618-fold increase compared to the previous year, highlighting a disturbing trend in the cyber threat landscape.</p><p>This surge in cyber attacks coincided with COP 28, which ran from November 30th to December 12th, 2023. The conference was a pivotal event, signaling what many considered the <a href="https://unfccc.int/news/cop28-agreement-signals-beginning-of-the-end-of-the-fossil-fuel-era">'beginning of the end' for the fossil fuel era</a>. It was observed that in the period leading up to COP 28, there was a noticeable spike in HTTP attacks targeting Environmental Services websites. This pattern wasn't isolated to this event alone.</p><p>Looking back at historical data, particularly during COP 26 and COP 27, as well as other UN environment-related resolutions or announcements, a similar pattern emerges. Each of these events was accompanied by a corresponding increase in cyber attacks aimed at Environmental Services websites.</p><p>In February and March 2023, significant environmental events like the UN's resolution on <a href="https://www.unep.org/news-and-stories/story/un-resolution-billed-turning-point-climate-justice">climate justice</a> and the launch of United Nations Environment Programme’s <a href="https://www.unep.org/news-and-stories/press-release/largest-river-and-wetland-restoration-initiative-history-launched-un">Freshwater Challenge</a> potentially heightened the profile of environmental websites, possibly correlating with an increase in attacks on these sites​​​​.</p><p>This recurring pattern underscores the growing intersection between environmental issues and cyber security, a nexus that is increasingly becoming a focal point for attackers in the digital age.</p>
    <div>
      <h2>DDoS attacks and Iron Swords</h2>
      <a href="#ddos-attacks-and-iron-swords">
        
      </a>
    </div>
    <p>It’s not just UN resolutions that trigger DDoS attacks. Cyber attacks, and particularly DDoS attacks, have long been a tool of war and disruption. We witnessed an increase in DDoS attack activity in the Ukraine-Russia war, and now we’re also witnessing it in the Israel-Hamas war. We first reported the cyber activity in our report <a href="/cyber-attacks-in-the-israel-hamas-war/">Cyber attacks in the Israel-Hamas war</a>, and we continued to monitor the activity throughout Q4.</p><p>Operation “Iron Swords” is the <a href="https://en.wikipedia.org/wiki/2023_Israel%E2%80%93Hamas_war#Israeli_response">military offensive launched by Israel against Hamas</a> following the <a href="https://en.wikipedia.org/wiki/2023_Hamas-led_attack_on_Israel">Hamas-led 7 October attack</a>. During this ongoing armed conflict, we continue to see DDoS attacks targeting both sides.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/31johknCeQ8F1pbczj7Neq/2f91e03e355a539043c734e7c5140ff1/pasted-image-0--1-.png" />
            
            </figure><p>DDoS attacks targeting Israeli and Palestinian websites, by industry</p><p>Relative to each region's traffic, the Palestinian territories was the second most attacked region by HTTP DDoS attacks in Q4. Over 10% of all HTTP requests towards Palestinian websites were DDoS attacks, a total of 1.3 billion DDoS requests — representing a 1,126% increase in QoQ. 90% of these DDoS attacks targeted Palestinian Banking websites. Another 8% targeted Information Technology and Internet platforms.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6uYrGNHSPfp3nEmFkhTGpa/317d1cb4ead40504677565360d836641/pasted-image-0--2-.png" />
            
            </figure><p>Top attacked Palestinian industries</p><p>Similarly, our systems automatically mitigated over 2.2 billion HTTP DDoS requests targeting Israeli websites. While 2.2 billion represents a decrease compared to the previous quarter and year, it did amount to a larger percentage out of the total Israel-bound traffic. This normalized figure represents a 27% increase QoQ but a 92% decrease YoY. Notwithstanding the larger amount of attack traffic, Israel was the 77th most attacked region relative to its own traffic. It was also the 33rd most attacked by total volume of attacks, whereas the Palestinian territories was 42nd.</p><p>Of those Israeli websites attacked, Newspaper &amp; Media were the main target — receiving almost 40% of all Israel-bound HTTP DDoS attacks. The second most attacked industry was the Computer Software industry. The Banking, Financial Institutions, and Insurance (BFSI) industry came in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2N6E8K9fZJZUFID7t0liAB/c0e58eb814bd8f6ee51319c6fa9ac97d/pasted-image-0--3-.png" />
            
            </figure><p>Top attacked Israeli industries</p><p>On the network layer, we see the same trend. Palestinian networks were targeted by 470 terabytes of attack traffic — accounting for over 68% of all traffic towards Palestinian networks. Surpassed only by China, this figure placed the Palestinian territories as the second most attacked region in the world, by network-layer DDoS attack, relative to all Palestinian territories-bound traffic. By absolute volume of traffic, it came in third. Those 470 terabytes accounted for approximately 1% of all DDoS traffic that Cloudflare mitigated.</p><p>Israeli networks, though, were targeted by only 2.4 terabytes of attack traffic, placing it as the 8th most attacked country by network-layer DDoS attacks (normalized). Those 2.4 terabytes accounted for almost 10% of all traffic towards Israeli networks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Fk4fxxDf20Wt6BmMTDPNq/bf0d999fc9f6b4ca98eb3f4c5b819432/pasted-image-0--5-.png" />
            
            </figure><p>Top attacked countries</p><p>When we turned the picture around, we saw that 3% of all bytes that were ingested in our Israeli-based data centers were network-layer DDoS attacks. In our Palestinian-based data centers, that figure was significantly higher — approximately 17% of all bytes.</p><p>On the application layer, we saw that 4% of HTTP requests originating from Palestinian IP addresses were DDoS attacks, and almost 2% of HTTP requests originating from Israeli IP addresses were DDoS attacks as well.</p>
    <div>
      <h2>Main sources of DDoS attacks</h2>
      <a href="#main-sources-of-ddos-attacks">
        
      </a>
    </div>
    <p>In the third quarter of 2022, China was the largest source of HTTP DDoS attack traffic. However, since the fourth quarter of 2022, the US took the first place as the largest source of HTTP DDoS attacks and has maintained that undesirable position for five consecutive quarters. Similarly, our data centers in the US are the ones ingesting the most network-layer DDoS attack traffic — over 38% of all attack bytes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1LQRkEFpGgYH1o7Ld5m3LH/6e3452323058567ed6e244024644a379/imageLikeEmbed.png" />
            
            </figure><p>HTTP DDoS attacks originating from China and the US by quarter</p><p>Together, China and the US account for a little over a quarter of all HTTP DDoS attack traffic in the world. Brazil, Germany, Indonesia, and Argentina account for the next twenty-five percent.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4OJH3XgpVKTtd93Lhv9pQd/1a4d6d5fb7d6349609c62c9ed5524471/pasted-image-0--6-.png" />
            
            </figure><p>Top source of HTTP DDoS attacks</p><p>These large figures usually correspond to large markets. For this reason, we also normalize the attack traffic originating from each country by comparing their outbound traffic. When we do this, we often get small island nations or smaller market countries that a disproportionate amount of attack traffic originates from. In Q4, 40% of Saint Helena’s outbound traffic were HTTP DDoS attacks — placing it at the top. Following the ‘<a href="https://en.wikipedia.org/wiki/Saint_Helena">remote volcanic tropical island</a>’, Libya came in second, <a href="https://en.wikipedia.org/wiki/Eswatini">Swaziland</a> (also known as Eswatini) in third. Argentina and Egypt follow in fourth and fifth place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4hyX9SLpTS3ncRB5QZnR9R/447df8e913314ab249c0d5a430efcdcc/pasted-image-0--7-.png" />
            
            </figure><p>Top source of HTTP DDoS attacks with respect to each country’s traffic</p><p>On the network layer, Zimbabwe came in first place. Almost 80% of all traffic we ingested in our Zimbabwe-based data center was malicious. In second place, Paraguay, and Madagascar in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7sln1Hbv1Wz7j4oCCL9XRA/56f1f5fa42ab7846b0a0dc33c796afd0/pasted-image-0--8-.png" />
            
            </figure><p>Top source of Network-layer DDoS attacks with respect to each country’s traffic</p>
    <div>
      <h2>Most attacked industries</h2>
      <a href="#most-attacked-industries">
        
      </a>
    </div>
    <p>By volume of attack traffic, Cryptocurrency was the most attacked industry in Q4. Over 330 billion HTTP requests targeted it. This figure accounts for over 4% of all HTTP DDoS traffic for the quarter. The second most attacked industry was Gaming &amp; Gambling. These industries are known for being coveted targets and attract a lot of traffic and attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5UoOV6PIx9DqJ0monxhfwu/20411132ba585c3314941bc2aec93e43/pasted-image-0--9-.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks</p><p>On the network layer, the Information Technology and Internet industry was the most attacked — over 45% of all network-layer DDoS attack traffic was aimed at it. Following far behind were the Banking, Financial Services and Insurance (BFSI), Gaming &amp; Gambling, and Telecommunications industries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/tlGK3k5YutHhSEbvm1va0/5842c447cbb6c8dd18630bbb0c63db1f/pasted-image-0--10-.png" />
            
            </figure><p>Top industries targeted by Network-layer DDoS attacks</p><p>To change perspectives, here too, we normalized the attack traffic by the total traffic for a specific industry. When we do that, we get a different picture.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6DxEla6GwSvU7OBnjGmhJX/dc12c491f1444662e00636b63cf92637/Top-Attacked-Industry-by-Region-Q4-2023.png" />
            
            </figure><p>Top attacked industries by HTTP DDoS attacks, by region</p><p>We already mentioned in the beginning of this report that the Environmental Services industry was the most attacked relative to its own traffic. In second place was the Packaging and Freight Delivery industry, which is interesting because of its timely correlation with online shopping during Black Friday and the winter holiday season. Purchased gifts and goods need to get to their destination somehow, and it seems as though attackers tried to interfere with that. On a similar note, DDoS attacks on retail companies increased by 16% compared to the previous year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/14CXtsmUxjRwOB1kmYHA6Q/9c8b079ac33d94f8494e53d1ef50c4a6/pasted-image-0--11-.png" />
            
            </figure><p>Top industries targeted by HTTP DDoS attacks with respect to each industry’s traffic</p><p>On the network layer, Public Relations and Communications was the most targeted industry — 36% of its traffic was malicious. This too is very interesting given its timing. Public Relations and Communications companies are usually linked to managing public perception and communication. Disrupting their operations can have immediate and widespread reputational impacts which becomes even more critical during the Q4 holiday season. This quarter often sees increased PR and communication activities due to holidays, end-of-year summaries, and preparation for the new year, making it a critical operational period — one that some may want to disrupt.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2NLJAkykpHhrRuFA2OVuKg/a6ca3bebb6f29c610292cd630a6746cc/pasted-image-0--12-.png" />
            
            </figure><p>Top industries targeted by Network-layer DDoS attacks with respect to each industry’s traffic</p>
    <div>
      <h2>Most attacked countries and regions</h2>
      <a href="#most-attacked-countries-and-regions">
        
      </a>
    </div>
    <p>Singapore was the main target of HTTP DDoS attacks in Q4. Over 317 billion HTTP requests, 4% of all global DDoS traffic, were aimed at Singaporean websites. The US followed closely in second and Canada in third. Taiwan came in as the fourth most attacked region — amidst the upcoming <a href="https://www.bbc.co.uk/news/world-asia-67770782">general elections and the tensions with China</a>. Taiwan-bound attacks in Q4 traffic increased by 847% compared to the previous year, and 2,858% compared to the previous quarter. This increase is not limited to the absolute values. When normalized, the percentage of HTTP DDoS attack traffic targeting Taiwan relative to all Taiwan-bound traffic also significantly increased. It increased by 624% quarter-over-quarter and 3,370% year-over-year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/730lynQatPwtsRfi10TXOi/fc993988b6f38b8d00501f3451a16c18/pasted-image-0--13-.png" />
            
            </figure><p>Top targeted countries by HTTP DDoS attacks</p><p>While China came in as the ninth most attacked country by HTTP DDoS attacks, it's the number one most attacked country by network-layer attacks. 45% of all network-layer DDoS traffic that Cloudflare mitigated globally was China-bound. The rest of the countries were so far behind that it is almost negligible.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5MIf27g0zSIEZYQxUsFlTh/62c50ec1d0c25ae82045a71cd41c24c2/pasted-image-0--14-.png" />
            
            </figure><p>Top targeted countries by Network-layer DDoS attacks</p><p>When normalizing the data, Iraq, Palestinian territories, and Morocco take the lead as the most attacked regions with respect to their total inbound traffic. What’s interesting is that Singapore comes up as fourth. So not only did Singapore face the largest amount of HTTP DDoS attack traffic, but that traffic also made up a significant amount of the total Singapore-bound traffic. By contrast, the US was second most attacked by volume (per the application-layer graph above), but came in the fiftieth place with respect to the total US-bound traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4LX2zl13YVM9hZB60Ucedg/1b2ba78c2aeac99a3d9725ea4e418bd4/pasted-image-0--15-.png" />
            
            </figure><p>Top targeted countries by HTTP DDoS attacks with respect to each country’s traffic</p><p>Similar to Singapore, but arguably more dramatic, China is both the number one most attacked country by network-layer DDoS attack traffic, and also with respect to all China-bound traffic. Almost 86% of all China-bound traffic was mitigated by Cloudflare as network-layer DDoS attacks. The Palestinian territories, Brazil, Norway, and again Singapore followed with large percentages of attack traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2n9rHcScBY63Q4yX01yKu5/d19a7fc7ccd43c72911897245cc91dc3/pasted-image-0--16-.png" />
            
            </figure><p>Top targeted countries by Network-layer DDoS attacks with respect to each country’s traffic</p>
    <div>
      <h2>Attack vectors and attributes</h2>
      <a href="#attack-vectors-and-attributes">
        
      </a>
    </div>
    <p>The majority of DDoS attacks are short and small relative to Cloudflare’s scale. However, unprotected websites and networks can still suffer disruption from short and small attacks without proper inline automated protection — underscoring the need for organizations to be proactive in <a href="https://www.cloudflare.com/cybersecurity-risk-management/">adopting a robust security posture</a>.</p><p>In 2023 Q4, 91% of attacks ended within 10 minutes, 97% peaked below 500 megabits per second (mbps), and 88% never exceeded 50 thousand packets per second (pps).</p><p>Two out of every 100 network-layer DDoS attacks lasted more than an hour, and exceeded 1 gigabit per second (gbps). One out of every 100 attacks exceeded 1 million packets per second. Furthermore, the amount of network-layer DDoS attacks exceeding 100 million packets per second increased by 15% quarter-over-quarter.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YPOZlyzEHc5u5DeFbQXqW/d8dc22556a3f9510ee075b507b699a42/DDoS-attacks-stats-2023-Q4_a.png" />
            
            </figure><p>DDoS attack stats you should know</p><p>One of those large attacks was a Mirai-botnet attack that peaked at 160 million packets per second. The packet per second rate was not the largest we’ve ever seen. The largest we’ve ever seen was <a href="/mitigating-a-754-million-pps-ddos-attack-automatically">754 million packets per second</a>. That attack occurred in 2020, and we have yet to see anything larger.</p><p>This more recent attack, though, was unique in its bits per second rate. This was the largest network-layer DDoS attack we’ve seen in Q4. It peaked at 1.9 terabits per second and originated from a <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai botnet</a>. It was a multi-vector attack, meaning it combined multiple attack methods. Some of those methods included UDP fragments flood, UDP/Echo flood, SYN Flood, ACK Flood, and TCP malformed flags.</p><p>This attack targeted a known European Cloud Provider and originated from over 18 thousand unique IP addresses that are assumed to be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a>. It was automatically detected and mitigated by Cloudflare’s defenses.</p><p>This goes to show that even the largest attacks end very quickly. Previous large attacks we’ve seen ended within seconds — underlining the need for an in-line automated defense system. Though still rare, attacks in the terabit range are becoming more and more prominent.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/10QBHlFJPubkFIG1R2uPf1/06c522bfa3aca7713d823d44d9f6c002/pasted-image-0--17-.png" />
            
            </figure><p>1.9 Terabit per second Mirai DDoS attacks</p><p>The use of Mirai-variant botnets is still very common. In Q4, almost 3% of all attacks originate from Mirai. Though, of all attack methods, DNS-based attacks remain the attackers’ favorite. Together, DNS Floods and DNS Amplification attacks account for almost 53% of all attacks in Q4. <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN Flood</a> follows in second and <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP floods</a> in third. We’ll cover the two DNS attack types here, and you can visit the hyperlinks to learn more about UDP and SYN floods in our Learning Center.</p>
    <div>
      <h3>DNS floods and amplification attacks</h3>
      <a href="#dns-floods-and-amplification-attacks">
        
      </a>
    </div>
    <p>DNS floods and DNS amplification attacks both exploit the <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">Domain Name System (DNS)</a>, but they operate differently. DNS is like a phone book for the Internet, translating human-friendly domain names like "<a href="http://www.cloudflare.com">www.cloudflare.com</a>" into numerical IP addresses that computers use to identify each other on the network.</p><p>Simply put, DNS-based DDoS attacks comprise the method computers and servers used to identify one another to cause an outage or disruption, without actually ‘taking down’ a server. For example, a server may be up and running, but the DNS server is down. So clients won't be able to connect to it and will experience it as an outage.</p><p>A <b>DNS flood</b> attack bombards a DNS server with an overwhelming number of DNS queries. This is usually done using a <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-botnet/">DDoS botnet</a>. The sheer volume of queries can overwhelm the DNS server, making it difficult or impossible for it to respond to legitimate queries. This can result in the aforementioned service disruptions, delays or even an outage for those trying to access the websites or services that rely on the targeted DNS server.</p><p>On the other hand, a <b>DNS amplification</b> attack involves sending a small query with a spoofed IP address (the address of the victim) to a DNS server. The trick here is that the DNS response is significantly larger than the request. The server then sends this large response to the victim's IP address. By exploiting open DNS resolvers, the attacker can amplify the volume of traffic sent to the victim, leading to a much more significant impact. This type of attack not only disrupts the victim but also can congest entire networks.</p><p>In both cases, the attacks exploit the critical role of DNS in network operations. Mitigation strategies typically include securing DNS servers against misuse, implementing rate limiting to manage traffic, and filtering DNS traffic to identify and block malicious requests.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5UolIGOVG2jx7ST3CeoF0j/2b78eeb7eb633c49394390086a641dc5/pasted-image-0--18--1.png" />
            
            </figure><p>Top attack vectors</p><p>Amongst the emerging threats we track, we recorded a 1,161% increase in ACK-RST Floods as well as a 515% increase in CLDAP floods, and a 243% increase in SPSS floods, in each case as compared to last quarter. Let’s walk through some of these attacks and how they’re meant to cause disruption.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ac5D51H55vXbKPbWnSGEx/c4c12e4aadc06d6843f7d4c33b60679f/pasted-image-0--19-.png" />
            
            </figure><p>Top emerging attack vectors</p>
    <div>
      <h3>ACK-RST floods</h3>
      <a href="#ack-rst-floods">
        
      </a>
    </div>
    <p>An ACK-RST Flood exploits the <a href="https://www.cloudflare.com/learning/ddos/glossary/tcp-ip/">Transmission Control Protocol (TCP)</a> by sending numerous ACK and RST packets to the victim. This overwhelms the victim's ability to process and respond to these packets, leading to service disruption. The attack is effective because each ACK or RST packet prompts a response from the victim’s system, consuming its resources. ACK-RST Floods are often difficult to filter since they mimic legitimate traffic, making detection and mitigation challenging.</p>
    <div>
      <h3>CLDAP floods</h3>
      <a href="#cldap-floods">
        
      </a>
    </div>
    <p>CLDAP (Connectionless Lightweight Directory Access Protocol) is a variant of LDAP (Lightweight Directory Access Protocol). It's used for querying and modifying directory services running over IP networks. CLDAP is connectionless, using UDP instead of TCP, making it faster but less reliable. Because it uses UDP, there’s no handshake requirement which allows attackers to spoof the IP address thus allowing attackers to exploit it as a reflection vector. In these attacks, small queries are sent with a spoofed source IP address (the victim's IP), causing servers to send large responses to the victim, overwhelming it. Mitigation involves filtering and monitoring unusual CLDAP traffic.</p>
    <div>
      <h3>SPSS floods</h3>
      <a href="#spss-floods">
        
      </a>
    </div>
    <p>Floods abusing the SPSS (Source Port Service Sweep) protocol is a network attack method that involves sending packets from numerous random or spoofed source ports to various destination ports on a targeted system or network. The aim of this attack is two-fold: first, to overwhelm the victim's processing capabilities, causing service disruptions or network outages, and second, it can be used to scan for open ports and identify vulnerable services. The flood is achieved by sending a large volume of packets, which can saturate the victim's network resources and exhaust the capacities of its firewalls and intrusion detection systems. To mitigate such attacks, it's essential to leverage in-line automated detection capabilities.</p>
    <div>
      <h2>Cloudflare is here to help - no matter the attack type, size, or duration</h2>
      <a href="#cloudflare-is-here-to-help-no-matter-the-attack-type-size-or-duration">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet, and we believe that a better Internet is one that is secure, performant, and available to all. No matter the attack type, the attack size, the attack duration or the motivation behind the attack, Cloudflare’s defenses stand strong. Since we pioneered <a href="/unmetered-mitigation">unmetered DDoS Protection in 2017</a>, we’ve made and kept our commitment to make enterprise-grade DDoS protection free for all organizations alike — and of course, without compromising performance. This is made possible by our <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">unique technology</a> and robust network architecture.</p><p>It’s important to remember that security is a process, not a single product or flip of a switch. Atop of our automated DDoS protection systems, we offer comprehensive bundled features such as <a href="https://developers.cloudflare.com/waf/">firewall</a>, <a href="https://developers.cloudflare.com/bots/">bot detection</a>, <a href="https://developers.cloudflare.com/api-shield/">API protection</a>, and <a href="https://developers.cloudflare.com/cache/">caching</a> to bolster your defenses. Our multi-layered approach optimizes your security posture and minimizes potential impact. We’ve also put together a <a href="https://developers.cloudflare.com/ddos-protection/best-practices/respond-to-ddos-attacks/">list of recommendations</a> to help you optimize your defenses against DDoS attacks, and you can follow our step-by-step wizards to <a href="https://developers.cloudflare.com/learning-paths/application-security/">secure your applications</a> and <a href="https://developers.cloudflare.com/learning-paths/prevent-ddos-attacks/">prevent DDoS attacks</a>. And, if you’d like to benefit from our easy to use, best-in-class protection against DDoS and other attacks on the Internet, you can sign up — for free! — at <a href="https://www.cloudflare.com/plans/">cloudflare.com</a>. If you’re under attack, register or call the <a href="https://www.cloudflare.com/under-attack-hotline/">cyber emergency hotline number</a> for a rapid response.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Black Friday]]></category>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[China]]></category>
            <category><![CDATA[Israel]]></category>
            <guid isPermaLink="false">78R5sLaHmAgKy9ndDVHkN7</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS threat report for 2023 Q3]]></title>
            <link>https://blog.cloudflare.com/ddos-threat-report-2023-q3/</link>
            <pubDate>Thu, 26 Oct 2023 13:00:58 GMT</pubDate>
            <description><![CDATA[ In the past quarter, DDoS attacks surged by 65%. Gaming and Gambling companies were the most attacked and Cloudflare mitigated thousands of hyper-volumetric DDoS attacks. The largest attacks we saw peaked at 201 million rps and 2.6 Tbps. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7vJM3Cw70UHjDC2hq8rRqv/7d62354485355a253d2b997d3249df82/image19.png" />
            
            </figure><p>Welcome to the third DDoS threat report of 2023. DDoS attacks, or <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">distributed denial-of-service attacks</a>, are a type of cyber attack that aims to disrupt websites (and other types of Internet properties) to make them unavailable for legitimate users by overwhelming them with more traffic than they can handle — similar to a driver stuck in a traffic jam on the way to the grocery store.</p><p>We see a lot of DDoS attacks of all types and sizes, and our <a href="https://www.cloudflare.com/network/">network</a> is one of the largest in the world spanning more than 300 cities in over 100 countries. Through this network we serve over 64 million HTTP requests per second at peak and about 2.3 billion DNS queries every day. On average, we mitigate 140 billion cyber threats each day. This colossal amount of data gives us a unique vantage point to understand the threat landscape and provide the community access to insightful and actionable DDoS trends.</p><p>In recent weeks, we've also observed a surge in DDoS attacks and other cyber attacks against Israeli newspaper and media websites, as well as financial institutions and government websites. Palestinian websites have also seen a significant increase in DDoS attacks. View the full coverage <a href="/cyber-attacks-in-the-israel-hamas-war/">here</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6ZyOmncoxhr4spfWrvzu4I/fb65af9e3364a5c9c10551e622f6acb2/pasted-image-0--7--1.png" />
            
            </figure><p>HTTP DDoS attacks against Israeli websites using Cloudflare</p>
    <div>
      <h2>The global DDoS threat landscape</h2>
      <a href="#the-global-ddos-threat-landscape">
        
      </a>
    </div>
    <p>In the third quarter of 2023, Cloudflare faced one of the most sophisticated and persistent DDoS attack campaigns in recorded history.</p><ol><li><p>Cloudflare mitigated thousands of hyper-volumetric HTTP DDoS attacks, 89 of which exceeded 100 million requests per second (rps) and with the largest peaking at 201 million rps — a figure three times higher than the previous <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/?">largest attack on record</a> (71M rps).</p></li><li><p>The campaign contributed to an overall increase of 65% in HTTP DDoS attack traffic in Q3 compared to the previous quarter. Similarly, L3/4 DDoS attacks also increased by 14% alongside numerous attacks in the terabit-per-second range — the largest attack targeted Cloudflare’s free DNS resolver <a href="https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/">1.1.1.1</a> and peaked at 2.6 Tbps.</p></li><li><p>Gaming and Gambling companies were bombarded with the largest volume of HTTP DDoS attack traffic, overtaking the Cryptocurrency industry from last quarter.</p></li></ol><p><i>Reminder: an interactive version of this report is also available as a</i> <a href="https://radar.cloudflare.com/reports/ddos-2023-q3"><i>Cloudflare Radar Report</i></a><i>. On</i> <a href="https://radar.cloudflare.com/"><i>Radar</i></a><i>, you can also dive deeper and explore traffic trends, attacks, outages and many more insights for your specific industry, network and country.</i></p>
    <div>
      <h3>HTTP DDoS attacks and hyper-volumetric attacks</h3>
      <a href="#http-ddos-attacks-and-hyper-volumetric-attacks">
        
      </a>
    </div>
    <p>An <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/">HTTP DDoS attack</a> is a DDoS attack over the <a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/">Hypertext Transfer Protocol (HTTP)</a>. It targets HTTP Internet properties such as mobile application servers, ecommerce websites, and API gateways.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4MzFZZekp5KTt2jQlOoG0M/69a332e07a45dcb6c922f7d7f7cc82c0/Untitled.png" />
            
            </figure><p>Illustration of an HTTP DDoS attack</p><p><a href="https://developers.cloudflare.com/support/network/understanding-cloudflare-http2-and-http3-support/#http2">HTTP/2</a>, which accounts for 62% of HTTP traffic, is a version of the protocol that’s meant to improve application performance. The downside is that HTTP/2 can also help <i>improve</i> a botnet’s performance.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7gt0Zfq2TByTxHFxMJe6BP/ccba571bf7ffb3e37782e64ebaa5e0cf/pasted-image-0-1.png" />
            
            </figure><p>Distribution of HTTP versions by Radar</p>
    <div>
      <h3>Campaign of hyper-volumetric DDoS attacks exploiting HTTP/2 Rapid Resets</h3>
      <a href="#campaign-of-hyper-volumetric-ddos-attacks-exploiting-http-2-rapid-resets">
        
      </a>
    </div>
    <p>Starting in late August 2023, Cloudflare and various other vendors were subject to a sophisticated and persistent DDoS attack campaign that exploited the <a href="/zero-day-rapid-reset-http2-record-breaking-ddos-attack/">HTTP/2 Rapid Reset</a> vulnerability (<a href="https://www.cve.org/CVERecord?id=CVE-2023-44487">CVE-2023-44487</a>).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1zfCtXueNXLlsmlk7A8coq/84f13ed42f5dc510dfc9bad46ed7b8b3/pasted-image-0--1--1.png" />
            
            </figure><p>Illustration of an HTTP/2 Rapid Reset DDoS attack</p><p>The DDoS campaign included thousands of hyper-volumetric DDoS attacks over HTTP/2 that peaked in the range of millions of requests per second. The average attack rate was 30M rps. Approximately 89 of the attacks peaked above 100M rps and the largest one we saw hit 201M rps.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6WoXAia8UYzUqUvdwsxuXW/eccf1cdae4f0cb46d709b89395004e6a/pasted-image-0--2--1.png" />
            
            </figure><p>HTTP/2 Rapid Reset campaign of hyper-volumetric DDoS attacks</p><p>Cloudflare’s systems automatically detected and mitigated the vast majority of attacks. We deployed emergency countermeasures and improved our mitigation systems’ efficacy and efficiency to ensure the availability of our network and of our customers’.</p><p>Check out our engineering blog that <a href="/technical-breakdown-http2-rapid-reset-ddos-attack/">dives deep into the land of HTTP/2</a>, what we learned and what actions we took to make the Internet safer.</p>
    <div>
      <h3>Hyper-volumetric DDoS attacks enabled by VM-based botnets</h3>
      <a href="#hyper-volumetric-ddos-attacks-enabled-by-vm-based-botnets">
        
      </a>
    </div>
    <p>As we’ve seen in this campaign and previous <a href="/ddos-threat-report-2023-q1/">ones</a>, botnets that leverage cloud computing platforms and exploit HTTP/2 are able to generate up to <b>x5,000</b> more force per botnet node. This allowed them to launch hyper-volumetric DDoS attacks with a small botnet ranging 5-20 thousand nodes alone. To put that into perspective, in the past, IoT based botnets consisted of fleets of millions of nodes and barely managed to reach a few million requests per second.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6aY3QDbXwT06ndT5ruv6Ms/4acf652835acec7f5bd28b0aca80bf32/pasted-image-0--3--1.png" />
            
            </figure><p>Comparison of an Internet of Things (IoT) based botnet and a Virtual Machine (VM) based botnet</p><p>When analyzing the two-month-long DDoS campaign, we can see that Cloudflare infrastructure was the main target of the attacks. More specifically, 19% of all attacks targeted Cloudflare websites and infrastructure. Another 18% targeted Gaming companies, and 10% targeted well known VoIP providers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5TsjdpB4iSwOB0brlTf454/b0dbbad2c5d475fc719d76423328337a/pasted-image-0--4--1.png" />
            
            </figure><p>Top industries targeted by the HTTP/2 Rapid Reset DDoS attacks</p>
    <div>
      <h3>HTTP DDoS attack traffic increased by 65%</h3>
      <a href="#http-ddos-attack-traffic-increased-by-65">
        
      </a>
    </div>
    <p>The attack campaign contributed to an overall increase in the amount of attack traffic. Last quarter, the volume of HTTP DDoS attacks increased by 15% QoQ. This quarter, it grew even more. Attacks volume increased by 65% QoQ to a total staggering figure of 8.9 trillion HTTP DDoS requests that Cloudflare systems automatically detected and mitigated.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3GZPXFg1uZKMn9HLpcTQSS/cb9d2cd146b5a2d68baa1b94651f315e/Untitled9.png" />
            
            </figure><p>Aggregated volume of HTTP DDoS attack requests by quarter</p><p>Alongside the 65% increase in HTTP DDoS attacks, we also saw a minor increase of 14% in L3/4 DDoS attacks — similar to the figures we saw in the first quarter of this year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/60R9Zo2MFYlW9w8KfNge4C/78c978588db6977529abebcfbb8221d3/pasted-image-0--5--1.png" />
            
            </figure><p>L3/4 DDoS attack by quarter</p><p>A rise in large volumetric DDoS attacks contributing to this increase. In Q3, our DDoS defenses automatically detected and mitigated numerous DDoS attacks in the terabit-per-second range. The largest attacks we saw peaked at 2.6 Tbps. This attack was part of a broader campaign that targeted Cloudflare’s free DNS resolver <a href="https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/">1.1.1.1</a>. It was a <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP flood</a> that was launched by a <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai-variant botnet</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Uxn6gNTYNEWO9KACtfKpN/8cc96fb699be51869db0691269335008/pasted-image-007.png" />
            
            </figure>
    <div>
      <h2>Top sources of HTTP DDoS attacks</h2>
      <a href="#top-sources-of-http-ddos-attacks">
        
      </a>
    </div>
    <p>When comparing the global and country-specific HTTP DDoS attack request volume, we see that the US remains the largest source of HTTP DDoS attacks. One out of every 25 HTTP DDoS requests originated from the US. China remains in second place. Brazil replaced Germany as the third-largest source of HTTP DDoS attacks, as Germany fell to fourth place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/50dCj8uTPa6ovls8JnBbeV/0e84a5263c930cb59616544d82bc91fd/pasted-image-0--6-.png" />
            
            </figure><p>HTTP DDoS attacks: Top sources compared to all attack traffic</p><p>Some countries naturally receive more traffic due to various factors such as the population and Internet usage, and therefore also receive/generate more attacks. So while it’s interesting to understand the total amount of attack traffic originating from or targeting a given country, it is also helpful to remove that bias by normalizing the attack traffic by all traffic to a given country.</p><p>When doing so, we see a different pattern. The US doesn’t even make it into the top ten. Instead, Mozambique is in first place (again). One out of every five HTTP requests that originated from Mozambique was part of an HTTP DDoS attack traffic.</p><p>Egypt remains in second place — approximately 13% of requests originating from Egypt were part of an HTTP DDoS attack. Libya and China follow as the third and fourth-largest source of HTTP DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/wuw45dUbZjsMYTpxcaFrv/b065d46bbfcbff8466a570a97d3c022b/pasted-image-0--8-.png" />
            
            </figure><p>HTTP DDoS attacks: Top sources compared to their own traffic</p>
    <div>
      <h2>Top sources of L3/4 DDoS attacks</h2>
      <a href="#top-sources-of-l3-4-ddos-attacks">
        
      </a>
    </div>
    <p>When we look at the origins of L3/4 DDoS attacks, we ignore the source IP address because it can be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a>. Instead, we rely on the location of Cloudflare’s data center where the traffic was ingested. Thanks to our large network and global coverage, we’re able to achieve geographical accuracy to understand where attacks come from.</p><p>In Q3, approximately 36% of all <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">L3/4 DDoS attack</a> traffic that we saw originated from the US. Far behind, Germany came in second place with 8% and the UK followed in third place with almost 5%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/RrBJ1xpV90NhBGOAmP3Au/bb3251e7566f5715b2e70737569efc75/pasted-image-0--9-.png" />
            
            </figure><p>L3/4 DDoS attacks: Top sources compared to all attack traffic</p><p>When normalizing the data, we see that Vietnam dropped to the second-largest source of L3/4 DDoS attacks after being first for two consecutive quarters. New Caledonia, a French territory comprising dozens of islands in the South Pacific, grabbed the first place. Two out of every four bytes ingested in Cloudflare’s data centers in New Caledonia were attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2m7OrC60ttRI190S1ripAi/acc86e9508f687fbb4e1d7afb2199994/pasted-image-0--10-.png" />
            
            </figure><p>L3/4 DDoS attacks: Top sources compared to their own traffic</p>
    <div>
      <h2>Top attacked industries by HTTP DDoS attacks</h2>
      <a href="#top-attacked-industries-by-http-ddos-attacks">
        
      </a>
    </div>
    <p>In terms of absolute volume of HTTP DDoS attack traffic, the Gaming and Gambling industry jumps to first place overtaking the Cryptocurrency industry. Over 5% of all HTTP DDoS attack traffic that Cloudflare saw targeted the Gaming and Gambling industry.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4g1US6Pgze6K9cktcoxExV/356942816a4b30030ba953059f5462e3/pasted-image-0--11--2.png" />
            
            </figure><p>HTTP DDoS attacks: Top attacked industries compared to all attack traffic</p><p>The Gaming and Gambling industry has long been one of the most attacked industries compared to others. But when we look at the HTTP DDoS attack traffic relative to each specific industry, we see a different picture. The Gaming and Gambling industry has so much user traffic that, despite being the most attacked industry <i>by volume</i>, it doesn’t even make it into the top ten when we put it into the per-industry context.</p><p>Instead, what we see is that the Mining and Metals industry was targeted by the most attacks compared to its total traffic — 17.46% of all traffic to Mining and Metals companies were DDoS attack traffic.</p><p>Following closely in second place, 17.41% of all traffic to Non-profits were HTTP DDoS attacks. Many of these attacks are directed at more than 2,400 Non-profit and independent media organizations in 111 countries that Cloudflare protects for free as part of Project Galileo, which celebrated its <a href="/nine-years-of-project-galileo-and-how-the-last-year-has-changed-it/">ninth anniversary</a> this year. Over the past quarter alone, Cloudflare mitigated an average of 180.5 million cyber threats against Galileo-protected websites every day.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4IdazsRvY8JcFF5ByZprTK/e7d3886bde7415b9ebca9509dc0d5b91/pasted-image-0--12--2.png" />
            
            </figure><p>HTTP DDoS attacks: Top attacked industries compared to their own traffic</p><p>Pharmaceuticals, Biotechnology and Health companies came in third, and US Federal Government websites in fourth place. Almost one out of every 10 HTTP requests to US Federal Government Internet properties were part of an attack. In fifth place, Cryptocurrency and then Farming and Fishery not far behind.</p>
    <div>
      <h3>Top attacked industries by region</h3>
      <a href="#top-attacked-industries-by-region">
        
      </a>
    </div>
    <p>Now let’s dive deeper to understand which industries were targeted the most in each region.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1SgX9S1bbrxWXAQHtWECiz/ec7a1d4c2cfc8c65aa82943d721249e2/Top-Attacked-Industry-by-Region-Q3-2023.png" />
            
            </figure><p>HTTP DDoS attacks: Top industries targeted by HTTP DDoS attacks by region</p>
    <div>
      <h2>Regional deepdives</h2>
      <a href="#regional-deepdives">
        
      </a>
    </div>
    
    <div>
      <h3>Africa</h3>
      <a href="#africa">
        
      </a>
    </div>
    <p>After two consecutive quarters as the most attacked industry, the Telecommunications industry dropped from first place to fourth. Media Production companies were the most attacked industry in Africa. The Banking, Financial Services and Insurance (BFSI) industry follows as the second most attacked. Gaming and Gambling companies in third.</p>
    <div>
      <h3>Asia</h3>
      <a href="#asia">
        
      </a>
    </div>
    <p>The Cryptocurrency industry remains the most attacked in APAC for the second consecutive quarter. Gaming and Gambling came in second place. Information Technology and Services companies in third.</p>
    <div>
      <h3>Europe</h3>
      <a href="#europe">
        
      </a>
    </div>
    <p>For the fourth consecutive quarter, the Gaming and Gambling industry remains the most attacked industry in Europe. Retail companies came in second, and Computer Software companies in third.</p>
    <div>
      <h3>Latin America</h3>
      <a href="#latin-america">
        
      </a>
    </div>
    <p>Farming was the most targeted industry in Latin America in Q3. It accounted for a whopping 53% of all attacks towards Latin America. Far behind, Gaming and Gambling companies were the second most targeted. Civic and Social Organizations were in third.</p>
    <div>
      <h3>Middle East</h3>
      <a href="#middle-east">
        
      </a>
    </div>
    <p>Retail companies were the most targeted in the Middle East in Q3. Computer Software companies came in second and the Gaming and Gambling industry in third.</p>
    <div>
      <h3>North America</h3>
      <a href="#north-america">
        
      </a>
    </div>
    <p>After two consecutive quarters, the Marketing and Advertising industry dropped from the first place to the second. Computer Software took the lead. In third place, Telecommunications companies.</p>
    <div>
      <h3>Oceania</h3>
      <a href="#oceania">
        
      </a>
    </div>
    <p>The Telecommunications industry was, by far, the most targeted in Oceania in Q3 — over 45% of all attacks to Oceania. Cryptocurrency and Computer Software companies came in second and third places respectively.</p>
    <div>
      <h2>Top attacked industries by L3/4 DDoS attacks</h2>
      <a href="#top-attacked-industries-by-l3-4-ddos-attacks">
        
      </a>
    </div>
    <p>When descending the layers of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>, the Internet networks and services that were most targeted belonged to the Information Technology and Services industry. Almost 35% of all L3/4 DDoS attack traffic (in bytes) targeted the Information Technology and Internet industry.</p><p>Far behind, Telecommunication companies came in second with a mere share of 3%. Gaming and Gambling came in third, Banking, Financial Services and Insurance companies (BFSI) in fourth.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2MfrOUrxk9nvOVu3UJz4VN/f8297c3bb90969df2b1a5530621c0fd5/pasted-image-0--13--1.png" />
            
            </figure><p>L3/4 DDoS attacks: Top attacked industries compared to all attack traffic</p><p>When comparing the attacks on industries to all traffic for that specific industry, we see that the Music industry jumps to the first place, followed by Computer and Network Security companies, Information Technology and Internet companies and Aviation and Aerospace.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3DfOZGUxDtZjNG32es9K4K/ecb5f8a71a998a896dfd71592c6f4896/pasted-image-0--14--1.png" />
            
            </figure><p>L3/4 DDoS attacks: Top attacked industries compared to their own traffic</p>
    <div>
      <h2>Top attacked countries by HTTP DDoS attacks</h2>
      <a href="#top-attacked-countries-by-http-ddos-attacks">
        
      </a>
    </div>
    <p>When examining the total volume of attack traffic, the US remains the main target of HTTP DDoS attacks. Almost 5% of all HTTP DDoS attack traffic targeted the US. Singapore came in second and China in third.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6UGa4GWaTX9dLLMudmE8x8/c781750cd8b72074946581454d350ed0/pasted-image-0--15--2.png" />
            
            </figure><p>HTTP DDoS attacks: Top attacked countries compared to all traffic</p><p>If we normalize the data per country and region and divide the attack traffic by the total traffic, we get a different picture. The top three most attacked countries are Island nations.</p><p>Anguilla, a small set of islands east of Puerto Rico, jumps to the first place as the most attacked country. Over 75% of all traffic to Anguilla websites were HTTP DDoS attacks. In second place, American Samoa, a group of islands east of Fiji. In third, the British Virgin Islands.</p><p>In fourth place, Algeria, and then Kenya, Russia, Vietnam, Singapore, Belize, and Japan.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4dKlIvgbduDoug2Zlxn49q/2f8fdf78b30024ddb05e7b2aedef3da3/pasted-image-0--16-.png" />
            
            </figure><p>HTTP DDoS attacks: Top attacked countries compared to their own traffic</p>
    <div>
      <h3>Top attacked countries by L3/4 DDoS attacks</h3>
      <a href="#top-attacked-countries-by-l3-4-ddos-attacks">
        
      </a>
    </div>
    <p>For the second consecutive quarter, Chinese Internet networks and services remain the most targeted by L3/4 DDoS attacks. These China-bound attacks account for 29% of all attacks we saw in Q3.</p><p>Far, far behind, the US came in second place (3.5%) and Taiwan in third place (3%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1MliH893yCW3CV3jqpjZmw/0ca7b37530fc93682052961774b52c19/pasted-image-0--17-.png" />
            
            </figure><p>L3/4 DDoS attacks: Top attacked countries compared to all traffic</p><p>When normalizing the amount of attack traffic compared to all traffic to a country, China remains in first place and the US disappears from the top ten. Cloudflare saw that 73% of traffic to China Internet networks were attacks. However, the normalized ranking changes from second place on, with the Netherlands receiving the second-highest proportion of attack traffic (representing 35% of the country’s overall traffic), closely followed by Thailand, Taiwan and Brazil.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2m9M6zzn5dSwaubzw5PXQG/a3b6cdff495954f94a9173206142d8c3/pasted-image-0--18-.png" />
            
            </figure><p>L3/4 DDoS attacks: Top attacked countries compared to their own traffic</p>
    <div>
      <h2>Top attack vectors</h2>
      <a href="#top-attack-vectors">
        
      </a>
    </div>
    <p>The Domain Name System, or <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a>, serves as the phone book of the Internet. DNS helps translate the human-friendly website address (e.g., <a href="https://www.cloudflare.com/">www.cloudflare.com</a>) to a machine-friendly IP address (e.g., 104.16.124.96). By disrupting DNS servers, attackers impact the machines’ ability to connect to a website, and by doing so making websites unavailable to users.</p><p>For the second consecutive quarter, <a href="https://www.cloudflare.com/learning/ddos/dns-flood-ddos-attack/">DNS-based DDoS attacks</a> were the most common. Almost 47% of all attacks were DNS-based. This represents a 44% increase compared to the previous quarter. <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a> remain in second place, followed by RST floods, <a href="https://www.cloudflare.com/learning/ddos/udp-flood-ddos-attack/">UDP floods</a>, and <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai attacks</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5YGOLx5BKnhvVEXB8awpxU/2b651344c3572a0c0aa2e5fdf3dbf9f2/pasted-image-0--19-.png" />
            
            </figure><p>Top attack vectors</p>
    <div>
      <h3>Emerging threats - <i>reduced, reused and recycled</i></h3>
      <a href="#emerging-threats-reduced-reused-and-recycled">
        
      </a>
    </div>
    <p>Aside from the most common attack vectors, we also saw significant increases in lesser known attack vectors. These tend to be very volatile as threat actors try to <i>“reduce, reuse and recycle”</i> older attack vectors. These tend to be UDP-based protocols that can be exploited to launch amplification and reflection DDoS attacks.</p><p>One well-known tactic that we continue to see is the use of amplification/reflection attacks. In this attack method, the attacker bounces traffic off of servers, and aims the responses towards their victim. Attackers are able to aim the bounced traffic to their victim by various methods such as <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">IP spoofing</a>.</p><p>Another form of reflection can be achieved differently in an attack named ‘DNS Laundering attack’. In a DNS Laundering attack, the attacker will query subdomains of a domain that is managed by the victim’s DNS server. The prefix that defines the subdomain is randomized and is never used more than once or twice in such an attack. Due to the randomization element, recursive DNS servers will never have a cached response and will need to forward the query to the victim’s authoritative DNS server. The authoritative DNS server is then bombarded by so many queries until it cannot serve legitimate queries or even crashes all together.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7sMVuA99lvODrsKQNBXFqs/e67a7b2cc1c7f07ba0642b25768a7142/pasted-image-0--20-.png" />
            
            </figure><p>Illustration of a reflection and amplification attack</p><p>Overall in Q3, Multicast DNS (mDNS) based DDoS attacks was the attack method that increased the most. In second place were attacks that exploit the Constrained Application Protocol (CoAP), and in third, the Encapsulating Security Payload (ESP). Let’s get to know those attack vectors a little better.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7zpAljr3yzAfQXITi9rSnX/83db014c34690385fa4f09f15171b0af/pasted-image-0--21-.png" />
            
            </figure><p>Main emerging threats</p>
    <div>
      <h3>mDNS DDoS attacks increased by 456%</h3>
      <a href="#mdns-ddos-attacks-increased-by-456">
        
      </a>
    </div>
    <p>Multicast DNS (mDNS) is a UDP-based protocol that is used in local networks for service/device discovery. Vulnerable mDNS servers respond to unicast queries originating outside the local network, which are ‘spoofed’ (altered) with the victim's source address. This results in amplification attacks. In Q3, we noticed a large increase of mDNS attacks; a 456% increase compared to the previous quarter.</p>
    <div>
      <h3>CoAP DDoS attacks increased by 387%</h3>
      <a href="#coap-ddos-attacks-increased-by-387">
        
      </a>
    </div>
    <p>The Constrained Application Protocol (CoAP) is designed for use in simple electronics and enables communication between devices in a low-power and lightweight manner. However, it can be abused for DDoS attacks via <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">IP spoofing</a> or amplification, as malicious actors exploit its multicast support or leverage poorly configured CoAP devices to generate large amounts of unwanted network traffic. This can lead to service disruption or overloading of the targeted systems, making them unavailable to legitimate users.</p>
    <div>
      <h3>ESP DDoS attacks increased by 303%</h3>
      <a href="#esp-ddos-attacks-increased-by-303">
        
      </a>
    </div>
    <p>The Encapsulating Security Payload (<a href="https://www.cloudflare.com/learning/network-layer/what-is-ipsec/#:~:text=Encapsulating%20Security%20Protocol%20(ESP)">ESP</a>) protocol is part of <a href="https://www.cloudflare.com/learning/network-layer/what-is-ipsec/">IPsec</a> and provides confidentiality, authentication, and integrity to network communications. However, it could potentially be abused in DDoS attacks if malicious actors exploit misconfigured or vulnerable systems to reflect or amplify traffic towards a target, leading to service disruption. Like with other protocols, securing and properly configuring the systems using ESP is crucial to mitigate the risks of DDoS attacks.</p>
    <div>
      <h2>Ransom DDoS attacks</h2>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <p>Occasionally, DDoS attacks are carried out to extort ransom payments. We’ve been surveying Cloudflare customers over three years now, and have been tracking the occurrence of <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attack</a> events.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/78OHC3lsv0ffsK9Yul14GD/d7006d3f770e766373d0c334204f668b/Untitled--1--1.png" />
            
            </figure><p>Comparison of Ransomware and Ransom DDoS attacks</p><p>Unlike <a href="https://www.cloudflare.com/learning/security/ransomware/what-is-ransomware/">Ransomware</a> attacks, where victims typically fall prey to downloading a malicious file or clicking on a compromised email link which locks, deletes, or leaks their files until a ransom is paid, <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attacks</a> can be much simpler for threat actors to execute. Ransom DDoS attacks bypass the need for deceptive tactics such as luring victims into opening dubious emails or clicking on fraudulent links, and they don't necessitate a breach into the network or access to corporate resources.</p><p>Over the past quarter, reports of Ransom DDoS attacks continue to decrease. Approximately 8% of respondents reported being threatened or subject to Random DDoS attacks, which continues a decline we've been tracking throughout the year. Hopefully it is because threat actors have realized that organizations will not pay them (which is our <a href="https://www.cloudflare.com/ransom-ddos/">recommendation</a>).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/19HOqqLzAWDtf28tnsQg5w/03bb32015896bb211edcb3f63e142e09/pasted-image-0--22-.png" />
            
            </figure><p>Ransom DDoS attacks by quarter</p><p>However, keep in mind that this is also very seasonal, and we can expect an increase in ransom DDoS attacks during the months of November and December. If we look at Q4 numbers from the past three years, we can see that Ransom DDoS attacks have been significantly increasing YoY in November. In previous Q4s, it reached a point where one out of every four respondents reported being subject to Ransom DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ch5GcIORAOzfXzBwd8XsM/3d881a3b619861bb82bb1d93d11f01f4/pasted-image-0--23-.png" />
            
            </figure>
    <div>
      <h2>Improving your defenses in the era of hyper-volumetric DDoS attacks</h2>
      <a href="#improving-your-defenses-in-the-era-of-hyper-volumetric-ddos-attacks">
        
      </a>
    </div>
    <p>In the past quarter, we saw an unprecedented surge in DDoS attack traffic. This surge was largely driven by the hyper-volumetric HTTP/2 DDoS attack campaign.</p><p>Cloudflare customers using our HTTP reverse proxy, i.e. our CDN/WAF services, are <a href="https://www.cloudflare.com/h2/">already protected</a> from these and other HTTP DDoS attacks. Cloudflare customers that are using non-HTTP services and organizations that are not using Cloudflare at all are strongly encouraged to use an automated, always-on HTTP DDoS Protection service for their HTTP applications.</p><p>It’s important to remember that security is a process, not a single product or flip of a switch. Atop of our automated DDoS protection systems, we offer comprehensive bundled features such as <a href="https://developers.cloudflare.com/firewall/cf-firewall-rules/">firewall</a>, <a href="https://developers.cloudflare.com/bots/">bot detection</a>, <a href="https://www.cloudflare.com/application-services/solutions/api-security/">API protection</a>, and <a href="https://developers.cloudflare.com/cache/">caching</a> to bolster your defenses. Our multi-layered approach optimizes your security posture and minimizes potential impact. We’ve also put together a <a href="https://developers.cloudflare.com/ddos-protection/best-practices/respond-to-ddos-attacks/">list of recommendations</a> to help you optimize your defenses against DDoS attacks, and you can follow our step-by-step wizards to <a href="https://developers.cloudflare.com/learning-paths/application-security/">secure your applications</a> and <a href="https://developers.cloudflare.com/learning-paths/prevent-ddos-attacks/">prevent DDoS attacks</a>.</p><p>...<b>Report methodologies</b>Learn more about our methodologies and how we generate these insights: <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports">https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports</a></p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[HTTP2]]></category>
            <category><![CDATA[Rapid Reset]]></category>
            <guid isPermaLink="false">M67SmSyk26u5hjiQgLBKv</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cyber attacks in the Israel-Hamas war]]></title>
            <link>https://blog.cloudflare.com/cyber-attacks-in-the-israel-hamas-war/</link>
            <pubDate>Mon, 23 Oct 2023 13:32:05 GMT</pubDate>
            <description><![CDATA[ Since the October 7 Hamas attack, DDoS attackers have been targeting Israeli newspaper and media websites as well as software companies and financial institutions.  ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5hPpyyUgUESidx85xM0vwS/b9caf55d788a9ea08a485760f94484b9/image11-1.png" />
            
            </figure><p>On October 7, 2023, at 03:30 GMT (06:30 AM local time), Hamas attacked Israeli cities and fired thousands of rockets toward populous locations in southern and central Israel, including Tel Aviv and Jerusalem. Air raid sirens began sounding, instructing civilians to take cover.</p><p>Approximately twelve minutes later, Cloudflare systems automatically detected and mitigated DDoS attacks that targeted websites that provide critical information and alerts to civilians on rocket attacks. The initial attack peaked at 100k requests per second (rps) and lasted ten minutes. Forty-five minutes later, a second much larger attack struck and peaked at 1M rps. It lasted six minutes. Additional smaller DDoS attacks continued hitting the websites in the next hours.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5T9nPeyiDM1nkxIzzsXRtD/c9fbbff0ae332fc16d2fe9bc2592338c/image9.png" />
            
            </figure><p>DDoS attacks against Israeli websites that provide civilians information and alerts on rocket attacks</p>
    <div>
      <h3>Not just DDoS attacks</h3>
      <a href="#not-just-ddos-attacks">
        
      </a>
    </div>
    <p>Multiple Israeli websites and mobile apps have become targets of various pro-Palestinian hacktivist groups. According to <a href="https://cybernews.com/cyber-war/israel-redalert-breached-anonghost-hamas/">Cybernews</a>, one of those groups, AnonGhost, exploited a vulnerability in a mobile app that alerts Israeli civilians of incoming rockets, “Red Alert: Israel”. The exploit allowed them to intercept requests, expose servers and APIs, and send fake alerts to some app users, including a message that a “<a href="https://www.bitdefender.co.uk/blog/hotforsecurity/hacktivists-send-fake-nuclear-attack-warning-via-israeli-red-alert-app/">nuclear bomb is coming</a>”. AnonGhost also claimed to have attacked various other rocket alert apps.</p><p>On October 14, we revealed the findings of one of our investigations that was conducted by the <a href="/introducing-cloudforce-one-threat-operations-and-threat-research/">Cloudforce One</a> Threat Operations team, who identified malicious Android mobile applications impersonating the legitimate RedAlert - Rocket Alerts application. The malicious apps obtained access to sensitive user information such as mobile phone’s contacts list, SMS messages, phone call logs, installed applications, and information about the phone and SIM card themselves. More technical information about our investigation can be found <a href="/malicious-redalert-rocket-alerts-application-targets-israeli-phone-calls-sms-and-user-information/">here</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Kg7GPzXQFxZ9SdCs32vLW/974a879ec6252d7103f7a26cdddbd912/image10.png" />
            
            </figure><p>Screenshot of the malicious site linking to malicious mobile apps</p><p>Furthermore, Cloudflare has identified an Israeli website that was partially defaced by AnonGhost. This website was not using Cloudflare, but we have reached out to the organization to offer support.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1F8LCkvQVy1UfmnJRYjnfT/0960e99927d0e76f20cb2552d2243707/image1-7.png" />
            
            </figure><p>“Death to all Jews” in a part of a website that was hacked and defaced by AnonGhost</p>
    <div>
      <h3>Continued DDoS bombardment</h3>
      <a href="#continued-ddos-bombardment">
        
      </a>
    </div>
    <p>In the days following the October 7 attack, Israeli websites have been heavily targeted by DDoS attacks. Cloudflare has been helping onboard and <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protect</a> many of them.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2lycz9VOEUzaHsy2NaePa5/c33b76468cc3efba8ed141934adb4bac/pasted-image-0--7-.png" />
            
            </figure><p>HTTP DDoS attacks against Israeli websites using Cloudflare</p><p>Since the October 7, 2023, attack, Newspaper and Media websites have been the main target of DDoS attacks — accounting for 56% of all attacks against Israeli websites. We saw the same trends when Russia attacked Ukraine. Ukrainian media and broadcasting websites were highly targeted. The war on the ground is often accompanied by cyber attacks on websites that provide crucial information for civilians.</p><p>The second most targeted industry in Israel was the Computer Software industry. Almost 34% of all DDoS attacks targeted computer software companies. In third place, and more significantly, Banking, Financial Services and Insurance (BFSI) companies were attacked. Government Administration websites came in fourth place.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3FRvEJoNnw3qEgW32epI50/9e1332d2c1da54e22dbcafab6ec4ede6/pasted-image-0.png" />
            
            </figure><p>Top Israeli industries targeted by HTTP DDoS attacks</p><p>We can also see that Israeli newspaper and media websites were targeted immediately after the October 7 attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5c1zBhgtBTLzcvUHZP700N/9a8e47ecc5c725e7ddd75a01c6b8e308/pasted-image-0--1-.png" />
            
            </figure><p>HTTP DDoS attacks against Israeli websites using Cloudflare by industry</p><p>Since October 1, 2023, Cloudflare automatically detected and mitigated over 5 billion HTTP requests that were part of DDoS attacks. Before October 7, there were barely any HTTP DDoS attack requests towards Israeli websites using Cloudflare.</p><p>However, on the day of the Hamas attack, the percentage of DDoS attack traffic increased. Nearly 1 out of every 100 requests towards Israeli websites using Cloudflare were part of an HTTP DDoS attack. That figure quadrupled on October 8.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6IpDQo3fmSaSxChpOjuueC/4dd8aa2ce801bf9957e68de2557ae746/pasted-image-0--2-.png" />
            
            </figure><p>Percentage of DDoS requests out of all requests towards Israeli websites using Cloudflare</p>
    <div>
      <h3>Cyber attacks against Palestinian websites</h3>
      <a href="#cyber-attacks-against-palestinian-websites">
        
      </a>
    </div>
    <p>During the same time frame, from October 1, Cloudflare automatically detected and mitigated over 454 million HTTP DDoS attack requests that targeted Palestinian websites using Cloudflare. While that figure is barely a tenth of the amount of attack requests we saw against Israeli websites using Cloudflare, it represented a proportionately larger portion of the overall traffic towards Palestinian websites using Cloudflare.</p><p>On the days before the Hamas attack, we didn't see any DDoS attacks against Palestinian websites using Cloudflare. That changed on October 7; over 46% of all traffic to Palestinian websites using Cloudflare were part of HTTP DDoS attacks.</p><p>On October 9, that figure increased to almost 60%. Nearly 6 out of every 10 HTTP requests towards Palestinian websites using Cloudflare were part of DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5FkzbFNIWGQUCcBTgqFwcs/57093f7c528e7f5ce1b51d5362324fba/pasted-image-0--3-.png" />
            
            </figure><p>Percentage of DDoS requests out of all requests towards Palestinian websites using Cloudflare</p><p>We can also see these attacks represented in the spikes in the graph below after the Hamas attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/29mYQeyKRvU9rIfMUQV4bl/c30752bae7e014c370582e81acb093c2/pasted-image-0--4-.png" />
            
            </figure><p>HTTP DDoS attacks against Palestinian websites using Cloudflare</p><p>There were three Palestinian industries that were attacked in the past weeks. The absolute majority of HTTP DDoS attacks were against Banking websites — nearly 76% of all attacks. The second most attacked industry was the Internet industry with a share of 24% of all DDoS attacks. Another small share targeted Media Production websites.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/XrX9Uu8Gl5RyDkbA7JTTS/8041903f4aaef7e89f81b2bc6b8869d0/pasted-image-0--5-.png" />
            
            </figure><p>HTTP DDoS attacks against Palestinian websites using Cloudflare by industry</p>
    <div>
      <h3>Securing your applications and preventing DDoS attacks</h3>
      <a href="#securing-your-applications-and-preventing-ddos-attacks">
        
      </a>
    </div>
    <p>As we’ve seen in recent years, real-world conflicts and wars are always accompanied by cyberattacks. We’ve put together a <a href="https://developers.cloudflare.com/ddos-protection/best-practices/respond-to-ddos-attacks/">list of recommendations</a> to optimize your defenses against DDoS attacks. You can also follow our step-by-step wizards to <a href="https://developers.cloudflare.com/learning-paths/application-security/">secure your applications</a> and <a href="https://developers.cloudflare.com/learning-paths/prevent-ddos-attacks/">prevent DDoS attacks</a>.</p><p>Readers are also invited to dive in deeper in the Radar dashboard to view traffic and attack insights and trends in <a href="https://radar.cloudflare.com/il?dateRange=28d">Israel</a> and <a href="https://radar.cloudflare.com/ps?dateRange=28d">Palestine</a>. You can also read more about the <a href="/internet-traffic-patterns-in-israel-and-palestine-following-the-october-2023-attacks/">Internet traffic and attack trend in Israel and Palestine</a> following the October 7 attack.</p><p><b><i>Under attack or need additional protection?</i></b> <a href="https://www.cloudflare.com/under-attack-hotline/"><b><i>Click here to get help</i></b></a><b><i>.</i></b></p><p><a href="https://1.1.1.1/family/"><b><i>Click here</i></b></a> <b><i>to protect against malicious mobile apps</i></b></p>
    <div>
      <h3>A note about our methodologies</h3>
      <a href="#a-note-about-our-methodologies">
        
      </a>
    </div>
    <p>The insights that we provide is based on traffic and attacks that we see against websites that are using Cloudflare, unless otherwise stated or referenced to a third party source. More information about our methodologies can be found <a href="https://developers.cloudflare.com/radar/reference/quarterly-ddos-reports/#quarterly-ddos-threat-reports">here</a>.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Israel]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">6noA0WeFtBLBNoUMidTP92</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Jorge Pacheco</dc:creator>
        </item>
        <item>
            <title><![CDATA[HTTP/2 Rapid Reset: deconstructing the record-breaking attack]]></title>
            <link>https://blog.cloudflare.com/technical-breakdown-http2-rapid-reset-ddos-attack/</link>
            <pubDate>Tue, 10 Oct 2023 12:02:28 GMT</pubDate>
            <description><![CDATA[ This post dives into the details of the HTTP/2 protocol, the feature that attackers exploited to generate the massive Rapid Reset attacks ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Starting on Aug 25, 2023, we started to notice some unusually big HTTP attacks hitting many of our customers. These attacks were detected and mitigated by our automated DDoS system. It was not long however, before they started to reach record-breaking sizes — and eventually peaked just above 201 million requests per second. This was nearly 3x bigger than our <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">previous biggest attack on record</a>.</p><em><small>Under attack or need additional protection? <a href="https://www.cloudflare.com/h2/">Click here to get help</a>.</small></em><br /><p>Concerning is the fact that the attacker was able to generate such an attack with a botnet of merely 20,000 machines. There are botnets today that are made up of hundreds of thousands or millions of machines. Given that the entire web typically sees only between 1–3 billion requests per second, it's not inconceivable that using this method could focus an entire web’s worth of requests on a small number of targets.</p>
    <div>
      <h2>Detecting and Mitigating</h2>
      <a href="#detecting-and-mitigating">
        
      </a>
    </div>
    <p>This was a novel attack vector at an unprecedented scale, but Cloudflare's existing protections were largely able to absorb the brunt of the attacks. While initially we saw some impact to customer traffic — affecting roughly 1% of requests during the initial wave of attacks — today we’ve been able to refine our mitigation methods to stop the attack for any Cloudflare customer without it impacting our systems.</p><p>We noticed these attacks at the same time two other major industry players — Google and AWS — were seeing the same. We worked to harden Cloudflare’s systems to ensure that, today, all our customers are protected from this new DDoS attack method without any customer impact. We’ve also participated with Google and AWS in a coordinated disclosure of the attack to impacted vendors and critical infrastructure providers.</p><p>This attack was made possible by abusing some features of the HTTP/2 protocol and server implementation details (see  <a href="https://www.cve.org/CVERecord?id=CVE-2023-44487">CVE-2023-44487</a> for details). Because the attack abuses an underlying weakness in the HTTP/2 protocol, we believe any vendor that has implemented HTTP/2 will be subject to the attack. This included every modern web server. We, along with Google and AWS, have disclosed the attack method to web server vendors who we expect will implement patches. In the meantime, the best defense is using a DDoS mitigation service like Cloudflare’s in front of any web-facing web or API server.</p><p>This post dives into the details of the HTTP/2 protocol, the feature that attackers exploited to generate these massive attacks, and the mitigation strategies we took to ensure all our customers are protected. Our hope is that by publishing these details other impacted web servers and services will have the information they need to implement mitigation strategies. And, moreover, the HTTP/2 protocol standards team, as well as teams working on future web standards, can better design them to <a href="https://www.cloudflare.com/learning/ddos/how-to-prevent-ddos-attacks/">prevent such attacks</a>.</p>
    <div>
      <h2>RST attack details</h2>
      <a href="#rst-attack-details">
        
      </a>
    </div>
    <p>HTTP is the application protocol that powers the Web. <a href="https://www.rfc-editor.org/rfc/rfc9110.html">HTTP Semantics</a> are common to all versions of HTTP — the overall architecture, terminology, and protocol aspects such as request and response messages, methods, status codes, header and trailer fields, message content, and much more. Each individual HTTP version defines how semantics are transformed into a "wire format" for exchange over the Internet. For example, a client has to serialize a request message into binary data and send it, then the server parses that back into a message it can process.</p><p><a href="https://www.rfc-editor.org/rfc/rfc9112.html">HTTP/1.1</a> uses a textual form of serialization. Request and response messages are exchanged as a stream of ASCII characters, sent over a reliable transport layer like TCP, using the following <a href="https://www.rfc-editor.org/rfc/rfc9112.html#section-2.1">format</a> (where CRLF means carriage-return and linefeed):</p>
            <pre><code> HTTP-message   = start-line CRLF
                   *( field-line CRLF )
                   CRLF
                   [ message-body ]</code></pre>
            <p>For example, a very simple GET request for <code>https://blog.cloudflare.com/</code> would look like this on the wire:</p><p><code>GET / HTTP/1.1 CRLFHost: blog.cloudflare.comCRLFCRLF</code></p><p>And the response would look like:</p><p><code>HTTP/1.1 200 OK CRLFServer: cloudflareCRLFContent-Length: 100CRLFtext/html; charset=UTF-8CRLFCRLF&lt;100 bytes of data&gt;</code></p><p>This format <b>frames</b> messages on the wire, meaning that it is possible to use a single TCP connection to exchange multiple requests and responses. However, the format requires that each message is sent whole. Furthermore, in order to correctly correlate requests with responses, strict ordering is required; meaning that messages are exchanged serially and can not be multiplexed. Two GET requests, for <code>https://blog.cloudflare.com/</code> and <code>https://blog.cloudflare.com/page/2/</code>, would be:</p><p><code>GET / HTTP/1.1 CRLFHost: blog.cloudflare.comCRLFCRLFGET /page/2/ HTTP/1.1 CRLFHost: blog.cloudflare.comCRLFCRLF</code></p><p>With the responses:</p><p><code>HTTP/1.1 200 OK CRLFServer: cloudflareCRLFContent-Length: 100CRLFtext/html; charset=UTF-8CRLFCRLF&lt;100 bytes of data&gt;CRLFHTTP/1.1 200 OK CRLFServer: cloudflareCRLFContent-Length: 100CRLFtext/html; charset=UTF-8CRLFCRLF&lt;100 bytes of data&gt;</code></p><p>Web pages require more complicated HTTP interactions than these examples. When visiting the Cloudflare blog, your browser will load multiple scripts, styles and media assets. If you visit the front page using HTTP/1.1 and decide quickly to navigate to page 2, your browser can pick from two options. Either wait for all of the queued up responses for the page that you no longer want before page 2 can even start, or cancel in-flight requests by closing the TCP connection and opening a new connection. Neither of these is very practical. Browsers tend to work around these limitations by managing a pool of TCP connections (up to 6 per host) and implementing complex request dispatch logic over the pool.</p><p><a href="https://www.rfc-editor.org/rfc/rfc9113">HTTP/2</a> addresses many of the issues with HTTP/1.1. Each HTTP message is serialized into a set of <b>HTTP/2 frames</b> that have type, length, flags, stream identifier (ID) and payload. The stream ID makes it clear which bytes on the wire apply to which message, allowing safe multiplexing and concurrency. Streams are bidirectional. Clients send frames and servers reply with frames using the same ID.</p><p>In HTTP/2 our GET request for <code>https://blog.cloudflare.com</code> would be exchanged across stream ID 1, with the client sending one <a href="https://www.rfc-editor.org/rfc/rfc9113#name-headers">HEADERS</a> frame, and the server responding with one HEADERS frame, followed by one or more <a href="https://www.rfc-editor.org/rfc/rfc9113#name-data">DATA</a> frames. Client requests always use odd-numbered stream IDs, so subsequent requests would use stream ID 3, 5, and so on. Responses can be served in any order, and frames from different streams can be interleaved.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/UgsMj35BXBaxK2dKVIvC2/8b6db7d94e03f2a0f9f0f9a2c2a55df6/Screenshot-2023-10-09-at-2.13.29-PM.png" />
            
            </figure><p>Stream multiplexing and concurrency are powerful features of HTTP/2. They enable more efficient usage of a single TCP connection. HTTP/2 optimizes resources fetching especially when coupled with <a href="/better-http-2-prioritization-for-a-faster-web/">prioritization</a>. On the flip side, making it easy for clients to launch large amounts of parallel work can increase the peak demand for server resources when compared to HTTP/1.1. This is an obvious vector for denial-of-service.</p><p>In order to provide some guardrails, HTTP/2 provides a notion of maximum active <a href="https://www.rfc-editor.org/rfc/rfc9113#section-5.1.2">concurrent streams</a>. The <a href="https://www.rfc-editor.org/rfc/rfc9113#SETTINGS_MAX_FRAME_SIZE">SETTINGS_MAX_CONCURRENT_STREAMS</a> parameter allows a server to advertise its limit of concurrency. For example, if the server states a limit of 100, then only 100 requests can be active at any time. If a client attempts to open a stream above this limit, it must be rejected by the server using a <a href="https://www.rfc-editor.org/rfc/rfc9113#section-6.4">RST_STREAM</a> frame. Stream rejection does not affect the other in-flight streams on the connection.</p><p>The true story is a little more complicated. Streams have a <a href="https://www.rfc-editor.org/rfc/rfc9113#section-5.1">lifecycle</a>. Below is a diagram of the HTTP/2 stream state machine. Client and server manage their own views of the state of a stream. HEADERS, DATA and RST_STREAM frames trigger transitions when they are sent or received. Although the views of the stream state are independent, they are synchronized.</p><p>HEADERS and DATA frames include an END_STREAM flag, that when set to the value 1 (true), can trigger a state transition.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2iRGsrf6eBGkrJ0rpqZtSx/a4c47fc7f29ec562660aa75c3e26e13c/Request-stream-states.png" />
            
            </figure><p>Let's work through this with an example of a GET request that has no message content. The client sends the request as a HEADERS frame with the END_STREAM flag set to 1. The client first transitions the stream from <b>idle</b> to <b>open</b> state, then immediately transitions into <b>half-closed</b> state. The client half-closed state means that it can no longer send HEADERS or DATA, only <a href="https://www.rfc-editor.org/rfc/rfc9113.html#section-6.9">WINDOW_UPDATE</a>, <a href="https://www.rfc-editor.org/rfc/rfc9113.html#section-6.3">PRIORITY</a> or RST_STREAM frames. It can receive any frame however.</p><p>Once the server receives and parses the HEADERS frame, it transitions the stream state from idle to open and then half-closed, so it matches the client. The server half-closed state means it can send any frame but receive only WINDOW_UPDATE, PRIORITY or RST_STREAM frames.</p><p>The response to the GET contains message content, so the server sends HEADERS with END_STREAM flag set to 0, then DATA with END_STREAM flag set to 1. The DATA frame triggers the transition of the stream from <b>half-closed</b> to <b>closed</b> on the server. When the client receives it, it also transitions to closed. Once a stream is closed, no frames can be sent or received.</p><p>Applying this lifecycle back into the context of concurrency, HTTP/2 <a href="https://www.rfc-editor.org/rfc/rfc9113#section-5.1.2-2">states</a>:</p><p><i>Streams that are in the "open" state or in either of the "half-closed" states count toward the maximum number of streams that an endpoint is permitted to open. Streams in any of these three states count toward the limit advertised in the</i> <a href="https://www.rfc-editor.org/rfc/rfc9113#SETTINGS_MAX_CONCURRENT_STREAMS"><i>SETTINGS_MAX_CONCURRENT_STREAMS</i></a> <i>setting.</i></p><p>In theory, the concurrency limit is useful. However, there are practical factors that hamper its effectiveness— which we will cover later in the blog.</p>
    <div>
      <h3>HTTP/2 request cancellation</h3>
      <a href="#http-2-request-cancellation">
        
      </a>
    </div>
    <p>Earlier, we talked about client cancellation of in-flight requests. HTTP/2 supports this in a much more efficient way than HTTP/1.1. Rather than needing to tear down the whole connection, a client can send a RST_STREAM frame for a single stream. This instructs the server to stop processing the request and to abort the response, which frees up server resources and avoids wasting bandwidth.</p><p>Let's consider our previous example of 3 requests. This time the client cancels the request on stream 1 after all of the HEADERS have been sent. The server parses this RST_STREAM frame before it is ready to serve the response and instead only responds to stream 3 and 5:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7dnYO0saZeIgGlocFRxKLb/45b3c1197559ee9f5547efad0a88b00a/Screenshot-2023-10-09-at-2.12.04-PM.png" />
            
            </figure><p>Request cancellation is a useful feature. For example, when scrolling a webpage with multiple images, a web browser can cancel images that fall outside the viewport, meaning that images entering it can load faster. HTTP/2 makes this behaviour a lot more efficient compared to HTTP/1.1.</p><p>A request stream that is canceled, rapidly transitions through the stream lifecycle. The client's HEADERS with END_STREAM flag set to 1 transitions the state from <b>idle</b> to <b>open</b> to <b>half-closed</b>, then RST_STREAM immediately causes a transition from <b>half-closed</b> to <b>closed.</b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4XHuuWwKaQkVyDclt2ktaT/983c5d5531c2987a90382548e8618f50/Request-stream-states-reset.png" />
            
            </figure><p>Recall that only streams that are in the open or half-closed state contribute to the stream concurrency limit. When a client cancels a stream, it instantly gets the ability to open another stream in its place and can send another request immediately. This is the crux of what makes <a href="https://www.cve.org/CVERecord?id=CVE-2023-44487">CVE-2023-44487</a> work.</p>
    <div>
      <h3>Rapid resets leading to denial of service</h3>
      <a href="#rapid-resets-leading-to-denial-of-service">
        
      </a>
    </div>
    <p>HTTP/2 request cancellation can be abused to rapidly reset an unbounded number of streams. When an HTTP/2 server is able to process client-sent RST_STREAM frames and tear down state quickly enough, such rapid resets do not cause a problem. Where issues start to crop up is when there is any kind of delay or lag in tidying up. The client can churn through so many requests that a backlog of work accumulates, resulting in excess consumption of resources on the server.</p><p>A common HTTP deployment architecture is to run an HTTP/2 proxy or load-balancer in front of other components. When a client request arrives it is quickly dispatched and the actual work is done as an asynchronous activity somewhere else. This allows the proxy to handle client traffic very efficiently. However, this separation of concerns can make it hard for the proxy to tidy up the in-process jobs. Therefore, these deployments are more likely to encounter issues from rapid resets.</p><p>When Cloudflare's <a href="https://www.rfc-editor.org/rfc/rfc9110#section-3.7-6">reverse proxies</a> process incoming HTTP/2 client traffic, they copy the data from the connection’s socket into a buffer and process that buffered data in order. As each request is read (HEADERS and DATA frames) it is dispatched to an upstream service. When RST_STREAM frames are read, the local state for the request is torn down and the upstream is notified that the request has been canceled. Rinse and repeat until the entire buffer is consumed. However, this logic can be abused: when a malicious client started sending an enormous chain of requests and resets at the start of a connection, our servers would eagerly read them all and create stress on the upstream servers to the point of being unable to process any new incoming request.</p><p>Something that is important to highlight is that stream concurrency on its own cannot mitigate rapid reset. The client can churn requests to create high request rates no matter the server's chosen value of <a href="https://www.rfc-editor.org/rfc/rfc9113#SETTINGS_MAX_CONCURRENT_STREAMS">SETTINGS_MAX_CONCURRENT_STREAMS</a>.</p>
    <div>
      <h3>Rapid Reset dissected</h3>
      <a href="#rapid-reset-dissected">
        
      </a>
    </div>
    Here's an example of rapid reset reproduced using a proof-of-concept client attempting to make a total of 1000 requests. I've used an off-the-shelf server without any mitigations; listening on port 443 in a test environment. The traffic is dissected using Wireshark and filtered to show only HTTP/2 traffic for clarity. <a href="http://staging.blog.mrk.cfdata.org/content/images/rapidreset.pcapng">Download the pcap</a> to follow along.
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3wv6U0bsO7wQ2Ofw0qp5f9/9d974117608d62c9eef6e276890f336b/Untitled--2-.png" />
            
            </figure><p>It's a bit difficult to see, because there are a lot of frames. We can get a quick summary via Wireshark's Statistics &gt; HTTP2 tool:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1STsop3XklVVe7phIL1mg0/69bb1269474936146e529c969aaecd18/Screenshot-2023-10-09-at-10.50.42-PM.png" />
            
            </figure><p>The first frame in this trace, in packet 14, is the server's SETTINGS frame, which advertises a maximum stream concurrency of 100. In packet 15, the client sends a few control frames and then starts making requests that are rapidly reset. The first HEADERS frame is 26 bytes long, all subsequent HEADERS are only 9 bytes. This size difference is due to a compression technology called <a href="/hpack-the-silent-killer-feature-of-http-2/">HPACK</a>. In total, packet 15 contains 525 requests, going up to stream 1051.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/JkezErQ90qEV2L0JuKNuK/c75695ef3a2b192eb1cb7a93a546cb7f/Untitled--3-.png" />
            
            </figure><p>Interestingly, the RST_STREAM for stream 1051 doesn't fit in packet 15, so in packet 16 we see the server respond with a 404 response.  Then in packet 17 the client does send the RST_STREAM, before moving on to sending the remaining 475 requests.</p><p>Note that although the server advertised 100 concurrent streams, both packets sent by the client sent a lot more HEADERS frames than that. The client did not have to wait for any return traffic from the server, it was only limited by the size of the packets it could send. No server RST_STREAM frames are seen in this trace, indicating that the server did not observe a concurrent stream violation.</p>
    <div>
      <h2>Impact on customers</h2>
      <a href="#impact-on-customers">
        
      </a>
    </div>
    <p>As mentioned above, as requests are canceled, upstream services are notified and can abort requests before wasting too many resources on it. This was the case with this attack, where most malicious requests were never forwarded to the origin servers. However, the sheer size of these attacks did cause some impact.</p><p>First, as the rate of incoming requests reached peaks never seen before, we had reports of increased levels of 502 errors seen by clients. This happened on our most impacted data centers as they were struggling to process all the requests. While our network is meant to deal with large attacks, this particular vulnerability exposed a weakness in our infrastructure. Let's dig a little deeper into the details, focusing on how incoming requests are handled when they hit one of our data centers:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2FNw47et7A6A8yQ8FTJWeB/4a244ae8faed2fca1afc45de7ccb2600/Untitled-2023-10-04-1953.png" />
            
            </figure><p>We can see that our infrastructure is composed of a chain of different proxy servers with different responsibilities. In particular, when a client connects to Cloudflare to send HTTPS traffic, it first hits our TLS decryption proxy: it decrypts TLS traffic, processes HTTP 1, 2 or 3 traffic, then forwards it to our "business logic" proxy. This one is responsible for loading all the settings for each customer, then routing the requests correctly to other upstream services — and more importantly in our case, <b>it is also responsible for security features</b>. This is where L7 attack mitigation is processed.</p><p>The problem with this attack vector is that it manages to send a lot of requests very quickly in every single connection. Each of them had to be forwarded to the business logic proxy before we had a chance to block it. As the request throughput became higher than our proxy capacity, the pipe connecting these two services reached its saturation level in some of our servers.</p><p>When this happens, the TLS proxy cannot connect anymore to its upstream proxy, this is why some clients saw a bare "502 Bad Gateway" error during the most serious attacks. It is important to note that, as of today, the logs used to create HTTP analytics are also emitted by our business logic proxy. The consequence of that is that these errors are not visible in the Cloudflare dashboard. Our internal dashboards show that about 1% of requests were impacted during the initial wave of attacks (before we implemented mitigations), with peaks at around 12% for a few seconds during the most serious one on August 29th. The following graph shows the ratio of these errors over a two hours while this was happening:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/lNZyUoAWzVfyQ66xIPJ9i/d9907d299155b8b6e80c9de3f4a4f032/imageLikeEmbed.png" />
            
            </figure><p>We worked to reduce this number dramatically in the following days, as detailed later on in this post. Both thanks to changes in our stack and to our mitigation that reduce the size of these attacks considerably, this number today is effectively zero.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6PDIKg6O07UYWjQk30YkIH/e542a06392b680737ec2256c0919a33e/imageLikeEmbed--2-.png" />
            
            </figure>
    <div>
      <h3>499 errors and the challenges for HTTP/2 stream concurrency</h3>
      <a href="#499-errors-and-the-challenges-for-http-2-stream-concurrency">
        
      </a>
    </div>
    <p>Another symptom reported by some customers is an increase in 499 errors. The reason for this is a bit different and is related to the maximum stream concurrency in a HTTP/2 connection detailed earlier in this post.</p><p>HTTP/2 settings are exchanged at the start of a connection using SETTINGS frames. In the absence of receiving an explicit parameter, default values apply. Once a client establishes an HTTP/2 connection, it can wait for a server's SETTINGS (slow) or it can assume the default values and start making requests (fast). For SETTINGS_MAX_CONCURRENT_STREAMS, the default is effectively unlimited (stream IDs use a 31-bit number space, and requests use odd numbers, so the actual limit is 1073741824). The specification recommends that a server offer no fewer than 100 streams. Clients are generally biased towards speed, so don't tend to wait for server settings, which creates a bit of a race condition. Clients are taking a gamble on what limit the server might pick; if they pick wrong the request will be rejected and will have to be retried. Gambling on 1073741824 streams is a bit silly. Instead, a lot of clients decide to limit themselves to issuing 100 concurrent streams, with the hope that servers followed the specification recommendation. Where servers pick something below 100, this client gamble fails and streams are reset.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ZdAxnNVz1PsuG1BCE3wsT/d4b02d4d1b8f6cf8ecebdddbed194c74/Untitled-2023-10-04-1953--1-.png" />
            
            </figure><p>There are many reasons a server might reset a stream beyond concurrency limit overstepping. HTTP/2 is strict and requires a stream to be closed when there are parsing or logic errors. In 2019, Cloudflare developed several mitigations in response to <a href="/on-the-recent-http-2-dos-attacks/">HTTP/2 DoS vulnerabilities</a>. Several of those vulnerabilities were caused by a client misbehaving, leading the server to reset a stream. A very effective strategy to clamp down on such clients is to count the number of server resets during a connection, and when that exceeds some threshold value, close the connection with a <a href="https://www.rfc-editor.org/rfc/rfc9113#section-6.8">GOAWAY</a> frame. Legitimate clients might make one or two mistakes in a connection and that is acceptable. A client that makes too many mistakes is probably either broken or malicious and closing the connection addresses both cases.</p><p>While responding to DoS attacks enabled by <a href="https://www.cve.org/CVERecord?id=CVE-2023-44487">CVE-2023-44487</a>, Cloudflare reduced maximum stream concurrency to 64. Before making this change, we were unaware that clients don't wait for SETTINGS and instead assume a concurrency of 100. Some web pages, such as an image gallery, do indeed cause a browser to send 100 requests immediately at the start of a connection. Unfortunately, the 36 streams above our limit all needed to be reset, which triggered our counting mitigations. This meant that we closed connections on legitimate clients, leading to a complete page load failure. As soon as we realized this interoperability issue, we changed the maximum stream concurrency to 100.</p>
    <div>
      <h2>Actions from the Cloudflare side</h2>
      <a href="#actions-from-the-cloudflare-side">
        
      </a>
    </div>
    <p>In 2019 several <a href="/on-the-recent-http-2-dos-attacks/">DoS vulnerabilities</a> were uncovered related to implementations of HTTP/2. Cloudflare developed and deployed a series of detections and mitigations in response.  <a href="https://www.cve.org/CVERecord?id=CVE-2023-44487">CVE-2023-44487</a> is a different manifestation of HTTP/2 vulnerability. However, to mitigate it we were able to extend the existing protections to monitor client-sent RST_STREAM frames and close connections when they are being used for abuse. Legitimate client uses for RST_STREAM are unaffected.</p><p>In addition to a direct fix, we have implemented several improvements to the server's HTTP/2 frame processing and request dispatch code. Furthermore, the business logic server has received improvements to queuing and scheduling that reduce unnecessary work and improve cancellation responsiveness. Together these lessen the impact of various potential abuse patterns as well as giving more room to the server to process requests before saturating.</p>
    <div>
      <h3>Mitigate attacks earlier</h3>
      <a href="#mitigate-attacks-earlier">
        
      </a>
    </div>
    <p>Cloudflare already had systems in place to efficiently mitigate very large attacks with less expensive methods. One of them is named "IP Jail". For hyper volumetric attacks, this system collects the client IPs participating in the attack and stops them from connecting to the attacked property, either at the IP level, or in our TLS proxy. This system however needs a few seconds to be fully effective; during these precious seconds, the origins are already protected but our infrastructure still needs to absorb all HTTP requests. As this new botnet has effectively no ramp-up period, we need to be able to neutralize attacks before they can become a problem.</p><p>To achieve this we expanded the IP Jail system to protect our entire infrastructure: once an IP is "jailed", not only it is blocked from connecting to the attacked property, we also forbid the corresponding IPs from using HTTP/2 to any other domain on Cloudflare for some time. As such protocol abuses are not possible using HTTP/1.x, this limits the attacker's ability to run large attacks, while any legitimate client sharing the same IP would only see a very small performance decrease during that time. IP based mitigations are a very blunt tool — this is why we have to be extremely careful when using them at that scale and seek to avoid false positives as much as possible. Moreover, the lifespan of a given IP in a botnet is usually short so any long term mitigation is likely to do more harm than good. The following graph shows the churn of IPs in the attacks we witnessed:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3tsViCTkDispBbBmIY57vy/3c49903f3c4a1ac60f98efae6c1e3fb4/ip-churn.png" />
            
            </figure><p>As we can see, many new IPs spotted on a given day disappear very quickly afterwards.</p><p>As all these actions happen in our TLS proxy at the beginning of our HTTPS pipeline, this saves considerable resources compared to our regular L7 mitigation system. This allowed us to weather these attacks much more smoothly and now the number of random 502 errors caused by these botnets is down to zero.</p>
    <div>
      <h3>Observability improvements</h3>
      <a href="#observability-improvements">
        
      </a>
    </div>
    <p>Another front on which we are making change is <a href="https://www.cloudflare.com/learning/performance/what-is-observability/">observability</a>. Returning errors to clients without being visible in customer analytics is unsatisfactory. Fortunately, a project has been underway to overhaul these systems since long before the recent attacks. It will eventually allow each service within our infrastructure to log its own data, instead of relying on our business logic proxy to consolidate and emit log data. This incident underscored the importance of this work, and we are redoubling our efforts.</p><p>We are also working on better connection-level logging, allowing us to spot such protocol abuses much more quickly to improve our DDoS mitigation capabilities.</p>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>While this was the latest record-breaking attack, we know it won’t be the last. As attacks continue to become more sophisticated, Cloudflare works relentlessly to proactively identify new threats — deploying countermeasures to our global network so that our millions of customers are immediately and automatically protected.</p><p>Cloudflare has provided free, unmetered and unlimited DDoS protection to all of our customers since 2017. In addition, we offer a range of additional security features to suit the needs of organizations of all sizes. <a href="https://www.cloudflare.com/h2">Contact us</a> if you’re unsure whether you’re protected or want to understand how you can be.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">3WjbDYiA84ghLhFzgsMfYp</guid>
            <dc:creator>Lucas Pardue</dc:creator>
            <dc:creator>Julien Desgats</dc:creator>
        </item>
        <item>
            <title><![CDATA[HTTP/2 Zero-Day vulnerability results in record-breaking DDoS attacks]]></title>
            <link>https://blog.cloudflare.com/zero-day-rapid-reset-http2-record-breaking-ddos-attack/</link>
            <pubDate>Tue, 10 Oct 2023 12:02:09 GMT</pubDate>
            <description><![CDATA[ The “HTTP/2 Rapid Reset” attack exploits a weakness in the HTTP/2 protocol to generate enormous, hyper-volumetric DDoS attacks. Cloudflare has mitigated a barrage of these attacks in recent months, including an attack three times larger than any previous attack we’ve observed ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ZiKpisozgw41RMD8tyuhu/006388958a618bffa6609ad532da5b91/Screenshot-2023-10-09-at-10.41.56-PM.png" />
            
            </figure><p>Earlier today, Cloudflare, along with Google and Amazon AWS, disclosed the existence of a novel zero-day vulnerability dubbed the “HTTP/2 Rapid Reset” attack. This attack exploits a weakness in the HTTP/2 protocol to generate enormous, hyper-volumetric Distributed Denial of Service (DDoS) attacks. Cloudflare has mitigated a barrage of these attacks in recent months, including an attack three times larger than <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">any previous attack we’ve observed</a>, which exceeded 201 million requests per second (rps). Since the end of August 2023, Cloudflare has mitigated more than 1,100 other attacks with over 10 million rps — and 184 attacks that were greater than our previous DDoS record of 71 million rps.</p><em><small>Under attack or need additional protection? <a href="https://www.cloudflare.com/h2/">Click here to get help</a>.</small></em><br /><p>This zero-day provided threat actors with a critical new tool in their Swiss Army knife of vulnerabilities to exploit and attack their victims at a magnitude that has never been seen before. While at times complex and challenging to combat, these attacks allowed Cloudflare the opportunity to develop purpose-built technology to mitigate the effects of the zero-day vulnerability.</p><p>If you are using Cloudflare for HTTP DDoS mitigation, you are protected. And below, we’ve included more information on this vulnerability, and resources and recommendations on what you can do to secure yourselves.</p>
    <div>
      <h3>Deconstructing the attack: What every CSO needs to know</h3>
      <a href="#deconstructing-the-attack-what-every-cso-needs-to-know">
        
      </a>
    </div>
    <p>In late August 2023, our team at Cloudflare noticed a new zero-day vulnerability, developed by an unknown threat actor, that exploits the standard HTTP/2 protocol — a fundamental protocol that is critical to how the Internet and all websites work. This novel zero-day vulnerability attack, dubbed Rapid Reset, leverages HTTP/2’s stream cancellation feature by sending a request and immediately canceling it over and over.  </p><p>By automating this trivial “request, cancel, request, cancel” pattern at scale, threat actors are able to create a denial of service and take down any server or application running the standard implementation of HTTP/2. Furthermore, one crucial thing to note about the record-breaking attack is that it involved a modestly-sized botnet, consisting of roughly 20,000 machines. Cloudflare regularly detects botnets that are orders of magnitude larger than this — comprising hundreds of thousands and even millions of machines. For a relatively small botnet to output such a large volume of requests, with the potential to incapacitate nearly any server or application supporting HTTP/2, underscores how menacing this vulnerability is for unprotected networks.</p><p>Threat actors used botnets in tandem with the HTTP/2 vulnerability to amplify requests at rates we have never seen before. As a result, our team at Cloudflare experienced some intermittent edge instability. While our systems were able to mitigate the overwhelming majority of incoming attacks, the volume overloaded some components in our network, impacting a small number of customers’ performance with intermittent 4xx and 5xx errors — all of which were quickly resolved.</p><p>Once we successfully mitigated these issues and halted potential attacks for all customers, our team immediately kicked off a responsible disclosure process. We entered into conversations with industry peers to see how we could work together to help move our mission forward and safeguard the large percentage of the Internet that relies on our network prior to releasing this vulnerability to the general public.</p><p>We cover the technical details of the attack in more detail in a separate blog post: <a href="https://cfl.re/rapid-reset-breakdown">HTTP/2 Rapid Reset: deconstructing the record-breaking attack</a>.</p>
    <div>
      <h3>How is Cloudflare and the industry thwarting this attack?</h3>
      <a href="#how-is-cloudflare-and-the-industry-thwarting-this-attack">
        
      </a>
    </div>
    <p>There is no such thing as a “perfect disclosure.” Thwarting attacks and responding to emerging incidents requires organizations and security teams to live by an assume-breach mindset — because there will always be another zero-day, new evolving threat actor groups, and never-before-seen novel attacks and techniques.</p><p>This “assume-breach” mindset is a key foundation towards information sharing and ensuring in instances such as this that the Internet remains safe. While Cloudflare was experiencing and mitigating these attacks, we were also working with industry partners to guarantee that the industry at-large could withstand this attack.  </p><p>During the process of mitigating this attack, our Cloudflare team developed and purpose-built new technology to stop these DDoS attacks and further improve our own mitigations for this and other future attacks of massive scale. These efforts have significantly increased our overall mitigation capabilities and resiliency. If you are using Cloudflare, we are confident that you are protected.</p><p>Our team also alerted web server software partners who are developing patches to ensure this vulnerability cannot be exploited — check their websites for more information.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Ud1AqrVrYtnC11Bu0pwCh/eac88347347a8dc9420d6d13285f1d28/Zero-Day-protection-4.png" />
            
            </figure><p>Disclosures are never one and done. The lifeblood of Cloudflare is to ensure a better Internet, which stems from instances such as these. When we have the opportunity to work with our industry partners and governments to ensure there are no widespread impacts on the Internet, we are doing our part in increasing the cyber resiliency of every organization no matter the size or vertical.</p><p>To gain more of an understanding around mitigation tactics and next steps on patching, <a href="https://event.on24.com/wcc/r/4378646/EC4EB4A6CE2B363BC6378891E495BEBF">register for our webinar</a>.</p>
    <div>
      <h3>What are the origins of the HTTP/2 Rapid Reset and these record-breaking attacks on Cloudflare?</h3>
      <a href="#what-are-the-origins-of-the-http-2-rapid-reset-and-these-record-breaking-attacks-on-cloudflare">
        
      </a>
    </div>
    <p>It may seem odd that Cloudflare was one of the first companies to witness these attacks. Why would threat actors attack a company that has some of the most robust defenses against DDoS attacks in the world?  </p><p>The reality is that Cloudflare often sees attacks before they are turned on more vulnerable targets. Threat actors need to develop and test their tools before they deploy them in the wild. Threat actors who possess record-shattering attack methods can have an extremely difficult time testing and understanding how large and effective they are, because they don't have the infrastructure to absorb the attacks they are launching. Because of the transparency that we share on our network performance, and the measurements of attacks they could glean from our public performance charts, this threat actor was likely targeting us to understand the capabilities of the exploit.</p><p>But that testing, and the ability to see the attack early, helps us develop mitigations for the attack that benefit both our customers and industry as a whole.</p>
    <div>
      <h3>From CSO to CSO: What should you do?</h3>
      <a href="#from-cso-to-cso-what-should-you-do">
        
      </a>
    </div>
    <p>I have been a CSO for over 20 years, on the receiving end of countless disclosures and  announcements like this. But whether it was <a href="/exploitation-of-cve-2021-44228-before-public-disclosure-and-evolution-of-waf-evasion-patterns/">Log4J</a>, <a href="/solarwinds-orion-compromise-trend-data/">Solarwinds</a>, <a href="https://www.cloudflare.com/learning/security/ransomware/how-to-prevent-ransomware/">EternalBlue</a> <a href="https://www.cloudflare.com/learning/security/ransomware/petya-notpetya-ransomware/">WannaCry/NotPetya</a>, <a href="/heartbleed-revisited/">Heartbleed</a>, or <a href="/inside-shellshock/">Shellshock</a>, all of these security incidents have a commonality. A tremendous explosion that ripples across the world and creates an opportunity to completely disrupt any of the organizations that I have led — regardless of the industry or the size.</p><p>Many of these were attacks or vulnerabilities that we may have not been able to control. But regardless of whether the issue arose from something that was in my control or not, what has set any successful initiative I have led apart from those that did not lean in our favor was the ability to respond when zero-day vulnerabilities and exploits like this are identified.    </p><p>While I wish I could say that Rapid Reset may be different this time around, it is not. I am calling all CSOs — no matter if you’ve lived through the decades of security incidents that I have, or this is your first day on the job — this is the time to <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">ensure you are protected</a> and stand up your cyber incident response team.</p><p>We’ve kept the information restricted until today to give as many security vendors as possible the opportunity to react. However, at some point, the responsible thing becomes to publicly disclose zero-day threats like this. Today is that day. That means that after today, threat actors will be largely aware of the HTTP/2 vulnerability; and it will inevitably become trivial to exploit and kickoff the race between defenders and attacks — first to patch vs. first to exploit. Organizations should assume that systems will be tested, and take proactive measures to ensure protection.</p><p>To me, this is reminiscent of a vulnerability like Log4J, due to the many variants that are emerging daily, and will continue to come to fruition in the weeks, months, and years to come. As more researchers and threat actors experiment with the vulnerability, we may find different variants with even shorter exploit cycles that contain even more advanced bypasses.  </p><p>And just like Log4J, managing incidents like this isn’t as simple as “run the patch, now you’re done”. You need to turn incident management, patching, and evolving your security protections into ongoing processes — because the patches for each variant of a vulnerability reduce your risk, but they don’t eliminate it.</p><p>I don’t mean to be alarmist, but I will be direct: you must take this seriously. Treat this as a full active incident to ensure nothing happens to your organization.</p>
    <div>
      <h3>Recommendations for a New Standard of Change</h3>
      <a href="#recommendations-for-a-new-standard-of-change">
        
      </a>
    </div>
    <p>While no one security event is ever identical to the next, there are lessons that can be learned. CSOs, here are my recommendations that must be implemented immediately. Not only in this instance, but for years to come:</p><ul><li><p>Understand your external and partner network’s external connectivity to remediate any Internet facing systems with the mitigations below.</p></li><li><p>Understand your existing security protection and capabilities you have to protect, detect and respond to an attack and immediately remediate any issues you have in your network.</p></li><li><p>Ensure your DDoS Protection resides outside of your data center because if the traffic gets to your datacenter, it will be difficult to mitigate the DDoS attack.</p></li><li><p>Ensure you have DDoS protection for Applications (Layer 7) and ensure you have Web Application Firewalls. Additionally as a best practice, ensure you have complete DDoS protection for DNS, Network Traffic (Layer 3) and API Firewalls</p></li><li><p>Ensure web server and operating system patches are deployed across all Internet Facing Web Servers. Also, ensure all automation like Terraform builds and images are fully patched so older versions of web servers are not deployed into production over the secure images by accident.</p></li><li><p>As a last resort, consider turning off HTTP/2 and HTTP/3 (likely also vulnerable) to mitigate the threat.  This is a last resort only, because there will be a significant performance issues if you downgrade to HTTP/1.1</p></li><li><p>Consider a secondary, cloud-based DDoS L7 provider at perimeter for resilience.</p></li></ul><p>Cloudflare’s mission is to help build a better Internet. If you are concerned with your current state of DDoS protection, we are more than happy to provide you with our DDoS capabilities and resilience for free to mitigate any attempts of a successful DDoS attack.  We know the stress that you are facing as we have fought off these attacks for the last 30 days and made our already best in class systems, even better.</p><p>If you’re interested in finding out more, <a href="https://event.on24.com/wcc/r/4378646/EC4EB4A6CE2B363BC6378891E495BEBF">view our webinar</a> on the details of the zero-day and how to respond. <a href="https://www.cloudflare.com/h2/">Contact us</a> if you’re unsure whether you’re protected or want to understand how you can be. We also have more technical details of the attack in more detail in a separate blog post: <a href="https://cfl.re/rapid-reset-breakdown">HTTP/2 Rapid Reset: deconstructing the record-breaking attack</a>. Finally, if you’re being targeted or need immediate protection, please contact your local Cloudflare representative or visit the <a href="https://www.cloudflare.com/under-attack-hotline/">Cloudflare under attack page</a>.</p> ]]></content:encoded>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[DDoS]]></category>
            <guid isPermaLink="false">7fD3yG9bGZ8HGwcaFR5mP4</guid>
            <dc:creator>Grant Bourzikas</dc:creator>
        </item>
    </channel>
</rss>