Friend
Professional
- Messages
- 2,653
- Reaction score
- 850
- Points
- 113
The power of DDoS attacks increased by 7 times, reaching 1.2 Tbit/s.
In the first half of 2024, the number of DDoS attacks on Russian organizations reached 355 thousand, which is 16% more compared to the total figures for the whole of 2023. The main trend of this period was short-term multi-vector attacks with high power, which are much more difficult to detect and prevent. Such data were published in the report of the Solar Group of Companies. The study involved 700 organizations from different sectors.
According to the report, the power of a single attack in the first half of 2024 increased by almost 7 times compared to the same period of the previous year, reaching 1.2 Tbps. It is important to note that today attackers form botnets not only from infected devices, but also rent computing power in cloud data centers.
The duration of attacks has also changed. The maximum duration of the attack decreased by more than three times, amounting to 35 days, and the average duration decreased by 24 times, to 8 minutes. These changes indicate that hackers are prioritizing shorter, more targeted attacks, allowing them to avoid detection and make better use of their resources.
Multi-vector DDoS attacks have become the most common type of attack in the first half of 2024. This type of attack involves multiple vectors at the same time, such as SYN Flood, UDP Flood, ICMP, and others. Shifting from one type of attack to another complicates the detection and defense process, allowing attackers to deliver more destructive strikes.
The changes also affected the list of industries targeted by attacks. The first four places are consistently occupied by IT, telecommunications, the public sector and financial institutions. However, the fifth place this year was taken by energy, on which the number of attacks increased 19 times. This indicates the growing interest of hackers in critical infrastructure, on which the country's economy and security depend.
Moscow remains the leader in the number of attacks, accounting for 150,000 DDoS attacks in the first half of the year. The Urals are in second place with 50 thousand attacks. In the Volga region, the number of attacks increased sixfold compared to the same period last year, which is due to the growth of economic activity and the development of the region's infrastructure. This region ranked third with 47 thousand attacks. The fourth place was taken by Siberia with 24 thousand attacks, and the fifth place was shared by the Northwestern and Southern Federal Districts - 19 thousand attacks each.
Experts note that in 2023, attackers mainly carried out weak DDoS attacks in order to study the weaknesses of companies, and then launched more targeted attacks. In the first half of 2024, hackers began to carry out massive and short-term attacks with destructive power aimed at critical resources of organizations, in order to destabilize their work and harm the economy and citizens of the country. Experts recommend that Russian companies strengthen the protection of critical systems by introducing constant filtering of DDoS attacks to reduce the time to detect and neutralize them.
Source
In the first half of 2024, the number of DDoS attacks on Russian organizations reached 355 thousand, which is 16% more compared to the total figures for the whole of 2023. The main trend of this period was short-term multi-vector attacks with high power, which are much more difficult to detect and prevent. Such data were published in the report of the Solar Group of Companies. The study involved 700 organizations from different sectors.
According to the report, the power of a single attack in the first half of 2024 increased by almost 7 times compared to the same period of the previous year, reaching 1.2 Tbps. It is important to note that today attackers form botnets not only from infected devices, but also rent computing power in cloud data centers.
The duration of attacks has also changed. The maximum duration of the attack decreased by more than three times, amounting to 35 days, and the average duration decreased by 24 times, to 8 minutes. These changes indicate that hackers are prioritizing shorter, more targeted attacks, allowing them to avoid detection and make better use of their resources.
Multi-vector DDoS attacks have become the most common type of attack in the first half of 2024. This type of attack involves multiple vectors at the same time, such as SYN Flood, UDP Flood, ICMP, and others. Shifting from one type of attack to another complicates the detection and defense process, allowing attackers to deliver more destructive strikes.
The changes also affected the list of industries targeted by attacks. The first four places are consistently occupied by IT, telecommunications, the public sector and financial institutions. However, the fifth place this year was taken by energy, on which the number of attacks increased 19 times. This indicates the growing interest of hackers in critical infrastructure, on which the country's economy and security depend.
Moscow remains the leader in the number of attacks, accounting for 150,000 DDoS attacks in the first half of the year. The Urals are in second place with 50 thousand attacks. In the Volga region, the number of attacks increased sixfold compared to the same period last year, which is due to the growth of economic activity and the development of the region's infrastructure. This region ranked third with 47 thousand attacks. The fourth place was taken by Siberia with 24 thousand attacks, and the fifth place was shared by the Northwestern and Southern Federal Districts - 19 thousand attacks each.
Experts note that in 2023, attackers mainly carried out weak DDoS attacks in order to study the weaknesses of companies, and then launched more targeted attacks. In the first half of 2024, hackers began to carry out massive and short-term attacks with destructive power aimed at critical resources of organizations, in order to destabilize their work and harm the economy and citizens of the country. Experts recommend that Russian companies strengthen the protection of critical systems by introducing constant filtering of DDoS attacks to reduce the time to detect and neutralize them.
Source