Skip to content
Information Technology

Radware 2024 report: malicious web application and API transactions rise 171% driven by layer 7 web DDoS attacks

Radware 2 mins read

 

  • DDoS attacks per customer nearly double
  • Web DDoS attacks relentlessly continue throughout the year
  • DNS query flood vectors increase more than three fold
  • Government, business/economy, and travel websites face the most hacktivist claimed DDoS attacks worldwide

 

Radware® (NASDAQ: RDWR), a leading provider of cyber security and application delivery solutions, released its 2024 Global Threat Analysis Report.

 

“The technological race between good and bad actors has never been more intense,” said Pascal Geenens, Radware’s director of threat intelligence. “With advancements like Generative AI,

inexperienced threat actors are becoming more proficient and skilled attackers more emboldened. In 2024, look for attack numbers to climb and attack patterns, like the shift in Web DDoS attacks, to continue to evolve.”

 

Radware’s comprehensive report leverages intelligence provided by network and application attack activity sourced from Radware’s Cloud and Managed Services, Global Deception Network, and threat intelligence research team during 2023. In addition, it draws from information found on Telegram, a public messaging platform often used by cyber criminals.

 

Radware’s report reveals key themes about the emerging threat landscape.

 

DDoS Attacks Surge Unprosecuted

“With almost two years of illegal denial of service left un-prosecuted following Russia’s invasion of Ukraine and the unfettered rise of hacktivism, the threshold into a life of cyber crime has reached a new low,” said Geenens. “We have yet to see DDoS attacks used as a mainstream vehicle to settle disagreements or differences, but plenty of groundwork has been laid by proficient hacktivists.”

 

Between the close of 2022 and 2023 DDoS attacks rose worldwide:

  • Globally, the average number of DDoS attacks per customer grew by 94%. On a regional basis, the increase in the number of DDoS attacks targeting customers varied:
    • EMEA rose 43%
    • The Americas grew 196%
    • APAC climbed 260%
  • The Americas were targeted by almost half of all global DDoS attacks. The EMEA region, accounting for 39% of the DDoS attacks, mitigated 65% of the global DDoS attack volume. The APAC region accounted for almost 12% of global DDoS attacks.

 

Hacktivists Attack with Unrelenting Conviction

“In 2023, geopolitical conflicts and ideological and religious motivations fuelled cyber operations and online campaigns,” explained Geenens. “New hacktivist tactics first introduced in 2022 after Russia invaded Ukraine spread and accelerated. Hacktivist-driven DDoS activity peaked in October of 2023, reaching record levels,following the conflict between Israel and Hamas.”

 

According to data gathered from Telegram:

  • Number of attacks: In the first half of 2023, threat actors claimed 5,606 attacks. During the second half, this number increased by 24% to 6,971 claimed DDoS attacks.
  • Geographic targets: In 2023, Israel was the country most targeted by hacktivists with 1480 DDoS attacks, followed by India (1242 attacks) and the United States (1164 attacks).
  • Top claiming actors: With 3,391 claimed DDoS attacks, NoName057(16) was by far the most active hacker group in 2023, followed by Anonymous Sudan (793 attacks) and Executor DDoS v2 (765attacks).
  • Website targets: Globally, the most targeted web category in 2023 was government with 2,694 claimed attacks. Business/economy and travel websites ranked second and third, with 1793 and 1624 attacks respectively.

 

Web DDoS Attacks Emerge as a Threat

“Throughout 2023, we observed a global shift in DDoS tactics as attacks grew more sophisticated, catchingcompanies off guard and hitting where it hurts most,” reported Geenens. “Increasingly, DoS attacks progressed toLayer 7, giving rise to damaging Web DDoS threats. Layer 7 attacks target not just online applications and their APIs, but also essential infrastructure, such as the Domain

Name System.”

  • In 2023, almost 95% of the attacks targeting DNS services leveraged DNS-A query floods.
  • DNS query flood vectors increased more than three-fold from fewer than 9 out of every 1,000 attack vectors before the fourth quarter of 2022 to 28 out of every 1,000 during the fourth quarter of 2023.
  • The total malicious web application and API transactions increased by 171% in 2023 compared to 2022. A significant part of this increase in activity can be attributed to layer encrypted web application attacks or Web DDoS attacks.

 

Industries Face Disproportionate Assaults

“In 2023, finance, retail and research and education saw the highest share of cyber attacks among leading industries worldwide,” said Geenens. “These high-value targets attract malicious actors because of the lucrative and sensitive data they store, the widespread disruption and publicity they generate when breached, and the tactical advantage they serve in hybrid warfare.”

 

  • Global DDoS attack activity:
    • Finance and technology organisations bore 29% and 22% of the attacks respectively, approximately half of which were encrypted web attacks.

 

    • Healthcare experienced 14% of the attacks, with 92% of the attack activity consisting of TCPattack vectors.
    •  
    • The government had to fend off 12% of the attacks, with the most aggressive attacks (45%)coming in the form of DNS-A query floods.

 

  • Global web application and API attack activity:
    • Retail (37%) and transportation (19%) were the most attacked industries. Software as a service (8%), carrier (8%), and utility (4%) rounded out the top five most attacked industries.
    • Organisations in research and education (32%), telecom (25%), technology (19%), finance (10%), and healthcare (6%) were most targeted by DNS flood attacks.

 

Radware’s complete 2024 Global Threat Analysis Report can be downloaded here.

 

 

More from this category

  • Information Technology
  • 18/04/2024
  • 19:07
Egress Software Technologies Ltd

New Egress Report Reveals Millennials are the Key Target, as AI, Quishing, and Multi-channel Attacks Top Phishing Trends

Brisbane, Australia.– April 18th, 2024 – Leading cybersecurity company Egress has today launched its third Phishing Threat Trends Report 2024 (April 2024), detailing key trends, new data, and threat intelligence insights surrounding phishing attacks. The report explores evolving payloads, AI’s rise in cybercrime, the success of multi-channel attacks, and how secure email gateways (SEGs) are trailing behind in an advancing threat landscape. Key stats from the Phishing Threat Trends Report (April 2024): Quishing has risen from 0.8% in 2021 to 10.8% in 2024, whereas attachment-based payloads halved from 72.7% to 35.7% in the same timeframe. 77% of impersonation attacks imitated well-known brands. DocuSign…

  • Agriculture Farming Rural, Information Technology
  • 18/04/2024
  • 15:39
TP-Link Australia / New Zealand

Introducing TP-Link’s Omada EAP215 Bridge KIT with an Impressive 5km Range!

Sydney, AUSTRALIA, 18 April 2024 – Network innovator TP-Link continues to deliverpractical solutions designed to revolutionalise wireless connectivity with the announcement of a new…

  • Contains:
  • Crime, Information Technology
  • 18/04/2024
  • 13:25
Monash University

Monash expert: Australian cybercriminals arrested following global sting

A Monash expert is available to comment on the arrest of five Australians in relation to an alleged global phishing scam that used the platform LabHost to trick victims into providing their personal information. Professor of Practice Nigel Phair, Department of Software Systems & Cybersecurity, Faculty of Information Technology Contact details: +61 450 501 248 or media@monash.edu Impact of cyber crime Governance of technology Intersection of technology, crime and society The following can be attributed to Professor Phair: “This is a great day not just for Australian policing, but also the international coordination of cyber crime investigations. “These types of…

Media Outreach made fast, easy, simple.

Feature your press release on Medianet's News Hub every time you distribute with Medianet. Pay per release or save with a subscription.