Malicious web applications analysis 2023

Posted by Relianoid Admin | 25 September, 2023 | Reports

The comprehensive report we present here delves into the evolving threat landscape of 2023, offering insights into the changing face of Denial-of-Service (DDoS) attacks. This analysis draws from a wealth of intelligence, sourced from various channels, including the mail cybersecurity experts and our dedicated threat intelligence research team. Additionally, valuable information was gleaned by bots set on several public messaging platforms widely popular among cybercriminals.
There has been a significant shift in DDoS attack patterns, urging organizations to proactively adapt to these evolving cyber threats.

Shift in DDoS Attack Patterns

In the dynamic global threat landscape of 2023, Denial-of-Service attacks are undergoing a fundamental redefinition in terms of tactics, vectors, size, complexity, and the rise of hacktivist offensives. A remarkable shift in DDoS attack patterns was observed, with the number of malicious web application transactions surging by 500 times compared to the same period in 2022. This shift signifies a move from network layer attacks to application layer attacks.
In the second quarter of 2023, attacks featuring a DNS Flood vector nearly doubled compared to the attack ratios observed in 2021 and most of 2022.
The relative number of large-scale attacks (exceeding 100Gbps) saw a sharp rise, increasing from nearly 4 times in 2022 to more than 10 times in 2023, outpacing the growth in smaller and mid-sized attacks. It also increased their complexity. Attacks exceeding 1Gbps featured more than two dissimilar attack vectors on average, while those surpassing 100Gbps boasted over eight dissimilar attack vectors.

Location and targets

The hacktivist-claimed DDoS attackes took place mostly in India, United States, Israel and Eastern Europe, aiming Government/public websites, followed by large corporations sites.

Industries under attack

The highest share accounted was suffered by Research and Education, that had more than 30% of the DDoS attack volume, followed by generic Service Providers and Technology.

These findings highlight the dynamic and evolving nature of cyber threats in 2023, emphasizing the critical importance of site reliability engineering and load balancing to fortify organizations against the changing landscape of cyberattacks. Vigilance and adaptability are key in staying ahead of malicious actors seeking to exploit vulnerabilities in online applications and infrastructure.

We encourage you to Enjoy the Site Reliability Experience! Contact us if you want to know more.

SHARE ON:

Related Blogs

Posted by reluser | 18 April 2024
It's with great concern that the French government has reported a series of intense cyberattacks affecting several government agencies. The attacks, which kicked off last March 11th, are believed to…
42 LikesComments Off on Critical DDoS attack to France Government
Posted by reluser | 09 January 2024
A critical vulnerability has been identified in SSH ProxyCommand, marked as CVE-2023-51385, with a severity rating of 9.8 on the CVSS scale. This flaw poses a significant risk, potentially allowing…
75 LikesComments Off on SSH ProxyCommand: unexpected code execution (CVE-2023-51385)
Posted by reluser | 28 December 2023
The global internet user base continues its upward trajectory, reaching 5.16 billion users in 2023, marking nearly a 2% increase from the previous year. This growth, fueled by the momentum…
75 LikesComments Off on The Global Internet Landscape: Insights and Trends in 2023