Malicious DDoS Attacks Rise 150% in 2022 According to New Report

Radware, a provider of cyber security and application delivery solutions, released its 2022 Global Threat Analysis Report. The full-year report leverages intelligence provided by network and application attack activity sourced from Radware’s Cloud and Managed Services, Global Deception Network and threat research team.

“‘More’ is the operative word for the global threat landscape in 2022. Compared to 2021, there were not only more DDoS attacks in terms of sheer number, but they were also more powerful, frequent and complex, spanning more attack vectors,” said Pascal Geenens, director of threat intelligence for Radware. “The surge can be attributed in part to digitalization, the war in Ukraine, and a long-tail of new vulnerabilities and exposed services driven by work-from-home remote access during Covid. The ongoing tensions between major world powers have also led to a rise in state-sponsored cyberattacks and espionage activities.”

Global Attack Trends: The Unrelenting Rise of DDoS

The global DDoS landscape is rapidly evolving. In 2022, DDoS attack profiles were redefined by gains in number, frequency, volume, power, duration and complexity.

  • Number of attacks: In 2022, the number of DDoS attacks grew 150% on a global basis compared to the previous year. The number of attacks in the Americas rose even faster, increasing 212% compared to 2021. More than half of the attacks were aimed at organizations in EMEA. The Americas accounted for 35% of the attacks while 7% of the attacks targeted APAC organizations.
  • Attack frequency: The frequency of DDoS attacks also saw a significant and concerning uptick. Globally, organizations mitigated an average of 29.3 attacks per day during the fourth quarter of 2022, 3.5 times more compared to 8.4 attacks per day at the end of 2021. Attacks in EMEA grew even faster than the global average and outpaced both the Americas and APAC. Organizations in EMEA averaged 45 attacks per day in the fourth quarter of 2022, four-times more compared to 11.3 attacks per day during the same period in 2021.
  • Attack volume: While the total global attack volume recorded in 2022 was 4.44PB, an increase of 32% compared to 2021, the Americas faced the heftiest increases. Last year, attack volumes in the Americas outpaced global volumes, growing 110% compared to 2021. While EMEA topped the Americas in frequency of attacks, it saw total attack volume decline in 2022, decreasing by 44% compared to the previous year.
  • Attack power: Globally, the largest recorded attack in 2022 was 1.46Tbps, which is 2.8 times larger than the largest attack recorded in 2021.
  • Attack duration: The longest attacks in 2022 ranged between 100 and 250Gbps on a global basis, where on average the attacks lasted 66 hours or 2.75 days.
  • Attack complexity: DDoS attacks continue to increase in complexity. Attackers typically leverage multiple and dissimilar vectors to increase the impact and make attack mitigation harder. On a global basis in 2022, attacks above 1Gbps on average had more than two dissimilar attack vectors per attack, which doubled in complexity for attacks above 10Gbps. Attacks above 100Gbps had on average more than nine dissimilar attack vectors with the most complex attacks leveraging 38 dissimilar attack vectors.

“In 2023, the democratization of DDoS and patriotic hacktivism will continue to drive an increase in smaller, more frequent attacks – a trend we are already seeing in the increased frequency of lower volume attacks in EMEA. At the same time, expect the cybercrime underground to become even better organized and funded in its pursuit of hard-hitting attacks,” said Geenens. “Attackers are always looking for new more sophisticated ways to advance their cyber agendas. As a result, organizations find themselves in an escalating state of risk, trying to defend themselves against next-generation threats.”

Most Attacked Industries

On a global basis, finance was the most attacked industry in 2022, with 53% of the overall attack activity, followed by technology (20%) and healthcare (11%).

Even on a geographic distribution, finance and technology were among the industries shouldering the brunt of the DDoS activity.

  • In America, finance represented 32% of the attack activity, followed by healthcare (24%) and technology (17%).
  • In EMEA, finance (71%) also topped the list as the most-attacked industry, followed by technology (16%) and government (4%).
  • In APAC, technology was the most attacked industry, with 70% of the attack activity, followed by finance (9%) and government (8%).

Web Application, API Attacks

Web application and API attacks grew exponentially in 2022.

  • Web application and API attacks increased 128% year over year, significantly out pacing the 88% increase in attacks between 2020 and 2021.
  • Predictable resource location attacks accounted for almost half of the attack activity. Together, code injection (14%) and SQL injection (11%) attacks represented another quarter of the web application attacks.
  • The most attacked industries were retail and wholesale trade (25%), followed by high-tech (20%), and carriers (15%), together accounting for 60% of blocked web application attacks.

Featured

  • 7 Reasons Why Governments Need to Regulate AI

    Recently, Elon Musk unveiled two remarkable AI applications. A humanoid robot named Optimus, with its remarkable human-like speech and movements, and a fully autonomous car, absent steering wheel and pedals, called Cybercab. While these examples represent a broad trend of AI integration across industries, they highlight technology’s transformative potential, prompting a need for regulation to ensure it is used responsibly, securely and ethically. Read Now

  • OR Code Phishing on the Rise According to New Report

    KnowBe4 recently released its Q3 2024 Phishing Report. This quarter's findings reveal the most frequently clicked email subjects in simulated phishing tests, demonstrating the continued efficacy of HR and IT-related phishing attempts. KnowBe4’s Q3 2024 Phishing Report reveals that HR and IT-related phishing emails claim a significant 48.6% share of top-clicked phishing types globally. Despite evolving techniques by bad actors, phishing emails remain among the most prevalent tools for executing cyberattacks. Read Now

  • United HealthCare CEO Killed in Targeted Attack in New York City

    United HealthCare CEO Brian Thompson was killed in a targeted attack early Wednesday in Manhattan Read Now

  • Theft, Crime Driving Retail Workers to Look for New Jobs

    More than four in ten retail workers in the U.S. say they are likely to leave their current job in the next 12 months due to personal safety concerns, according to new research conducted by the Loss Prevention Research Council (LPRC) in partnership with Verkada. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3