{"id":126076,"date":"2023-02-21T10:00:00","date_gmt":"2023-02-21T18:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=126076"},"modified":"2024-07-03T08:01:53","modified_gmt":"2024-07-03T15:01:53","slug":"2022-in-review-ddos-attack-trends-and-insights","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/02\/21\/2022-in-review-ddos-attack-trends-and-insights\/","title":{"rendered":"2022 in review: DDoS attack trends and insights"},"content":{"rendered":"\n

As organizations strengthen their defenses and take a more proactive approach to protection, attackers<\/a> are adapting their techniques and increasing the sophistication of their operations. Cybercrime continues to rise with the industrialization of the cybercrime economy providing cybercriminals with greater access to tools and infrastructure.<\/p>\n\n\n\n

In the first half of 2022, the cyberthreat landscape was focused around the war in Ukraine and the rise of nation state attacks and hacktivism across the world. In February, Ukraine was hit with the largest distributed denial of service (DDoS) attack<\/a> ever in the country\u2019s history, impacting government websites and banking web services. As the conflict continued, there was a ripple effect to western countries, including the UK, US, and Germany. UK financial services firms experienced a significant increase in DDoS attacks<\/a> as they were heavily targeted by nation state attackers and hacktivists looking to disrupt Ukraine\u2019s allies.<\/p>\n\n\n\n

Hacktivism continued to be rampant throughout the year, including Taiwanese websites<\/a> experiencing outages in August 2022 due to DDoS attacks ahead of House Speaker Nancy Pelosi\u2019s arrival in Taiwan. Beyond attacks with political motives, DDoS attacks also impacted a wide range of industries. In particular, the gaming industry continued to be highly targeted. In March 2022, a DDoS attack<\/a> brought down the game servers of Among Us, preventing players from accessing the popular multiplayer game for a few days. A new version of RapperBot<\/a> (heavily inspired by the Mirai botnet) was used in the second half of 2022 to target game servers running Grand Theft Auto: San Andreas.<\/p>\n\n\n\n

In this blog, we share trends and insights into DDoS attacks we observed and mitigated throughout 2022.<\/p>\n\n\n\n

2022 DDoS attack trends<\/h2>\n\n\n\n

Large volume of attacks during the holiday season<\/h3>\n\n\n\n

In 2022, Microsoft mitigated an average of 1,435 attacks per day. The maximum number of attacks in a day recorded was 2,215 attacks on September 22, 2022. The minimum number of attacks in a day was 680 on August 22, 2022. In total, we mitigated upwards of 520,000 unique attacks against our global infrastructure during 2022.<\/p>\n\n\n\n

\"Chart
Figure 1. Attack volume<\/figcaption><\/figure>\n\n\n\n

This year, we saw a lower volume of attacks in June through August and a high volume of attacks during the holiday season until the last week of December. This is in line with attacks trends we have seen in the last few years, except for 2021 where there were fewer attacks during the holiday season<\/a>. In May, we mitigated a 3.25 terabits per second (TBps) attack in Azure, the largest attack in 2022.<\/p>\n\n\n\n

DDoS protection tip:<\/em><\/strong> <\/em>Make sure to avoid having a single virtual machine backend so it is less likely to get overwhelmed. <\/em>Azure DDoS Protection<\/em><\/a> covers scaled out costs incurred for all resources during an attack, so configure autoscaling to absorb the initial burst of attack traffic while mitigation kicks in.<\/em><\/p>\n\n\n\n

TCP attacks remain the most common attack vector<\/h3>\n\n\n\n

TCP attacks were the most frequent form of DDoS attack encountered in 2022, comprising 63% of all attack traffic, which includes all TCP attack vectors: TCP SYN, TCP ACK, TCP floods, etc. Since TCP remains the most common networking protocol, we expect TCP-based attacks to continue to make up most DDoS attacks. UDP attacks were significant as well with 22% of all attacks (combined for UDP flood and UDP amplification attacks), while Packet anomaly attacks made up 15% of attacks.<\/p>\n\n\n\n

\"Sunburst
Figure 2. Attack type<\/figcaption><\/figure>\n\n\n\n

Out of UDP flood attacks, spoofed floods consumed most of the attack volume with 53%. The remaining attack vectors were reflected amplification attacks, with the main types being CLDAP, NTP, and DNS.<\/p>\n\n\n\n

We observed TCP reflected amplification attacks<\/a> becoming more prevalent, with attacks on Azure resources using diverse types of reflectors and attack vectors. This new attack vector is taking advantage of improper TCP stack implementation in middleboxes, such as firewalls and deep packet inspection devices, to elicit amplified responses that can reach infinite amplification in some cases. As an example, in April 2022, we monitored a reflected amplified SYN+ACK attack on an Azure resource in Asia. The attack reached 30 million packets per second (pps) and lasted 15 seconds. Attack throughput was not very high, however there were 900 reflectors involved, each with retransmissions, resulting in high pps rate that can bring down the host and other network infrastructure.<\/p>\n\n\n\n

DDoS protection tip: <\/em><\/strong>To protect against UDP and TCP attacks, we recommend using Azure DDoS Protection. For gaming customers, consider using <\/em>A10 virtual appliances<\/em><\/a> and Azure Gateway Load Balancers to help with volume-based attacks.<\/em><\/p>\n\n\n\n

Shorter attacks continue to be popular<\/h3>\n\n\n\n
\"Bar
Figure 3. Attack duration<\/figcaption><\/figure>\n\n\n\n

Shorter duration attacks were more commonly observed this past year, with 89% of attacks lasting less than one hour. Attacks spanning one to two minutes made up 26% of the attacks seen this year. This is not a new trend as attacks that are shorter require less resources and are more challenging to mitigate for legacy DDoS defenses. Attackers often use multiple short attacks over the span of multiple hours to make the most impact while using the fewest number of resources.<\/p>\n\n\n\n

Short attacks take advantage of the time it takes systems to detect the attack and for mitigation to kick in. While time to mitigation may only take one or two minutes, the information from those short attacks can make it into the backend of services, impacting legitimate usage. If a short attack can cause a reboot of the systems, this can then trigger multiple internal attacks as every legitimate user tries to reconnect at the same time.<\/p>\n\n\n\n

DDoS protection tip: <\/em><\/strong>Use <\/em>Azure Web Application Firewall<\/em><\/a> to protect web applications.<\/em><\/p>\n\n\n\n

US, India, and East Asia top regions targeted by attacks<\/h3>\n\n\n\n
\"Sunburst
Figure 4. Attack destinations<\/figcaption><\/figure>\n\n\n\n

As with previous years, most attacks were launched against US-based resources, with India, East Asia, and Europe making up a large portion of remaining attacks. The rising adoption of smartphones and popularity of online gaming in Asia will likely contribute to increased exposure to DDoS attacks. This also applies to countries accelerating digital transformation and cloud adoption.<\/p>\n\n\n\n

DDoS Protection Tip: <\/em><\/strong>Frequent and regular DDoS simulation testing done by any of our <\/em>testing partners<\/em><\/a> helps ensure consistent protection for services.<\/em><\/p>\n\n\n\n

Hacktivism is back<\/h3>\n\n\n\n

We saw politically motivated DDoS attacks ramping up on a large scale in 2022. Notably, a hacking group named Killnet targeted western government, healthcare, education, and financial firms. Killnet has been a vocal supporter of Russia\u2019s war in Ukraine, using DDoS attacks as its primary weapon to create chaos in western countries. The Cybersecurity & Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and Multi-State Information Sharing and Analysis (MS-ISAC) published a guide<\/a> to help governments and organizations respond effectively against DDoS attacks, especially those launched by hacker groups like Killnet.<\/p>\n\n\n\n

IoT devices increasingly used to launch DDoS attacks<\/h3>\n\n\n\n

In 2022, Internet of Things (IoT) devices were consistently used in DDoS attacks, which expanded into use in cyber warfare, such as in Ukraine. A growing number of attacks repurposed existing malware or leveraged the modular nature of botnets to carry out these attacks. Threat actors have also turned to a growing criminal black market to purchase malware and solutions to grow their malicious toolkit.<\/p>\n\n\n\n

Well-known botnets, such as Mirai, have also been observed in use by nation-state threat actors and growing criminal enterprises. The persistence of malware like Mirai from year to year has highlighted its adaptability and its potential to infect a wide range of IoT devices and compromise new attack vectors. While Mirai is still a major player in the field of botnets, the threat landscape in the field of IoT malware is evolving, with new botnets emerging such as Zerobot<\/a> and MCCrash<\/a>.<\/p>\n\n\n\n

What\u2019s ahead for 2023?<\/h2>\n\n\n\n

In 2023, cybercrime will likely continue to rise as new threats and attack techniques emerge. We increasingly see DDoS attacks becoming used as distractions to hide more sophisticated attacks happening at the same time, such as extortion and data theft. New IoT DDoS botnets will emerge and attacks from them will continue to be prevalent and cause significant disruption. We are also observing a rise in DDoS attacks from account takeovers where malicious actors gain unauthorized access to resources to launch DDoS attacks. As geopolitical tensions continue to emerge globally, we will likely continue to see DDoS being used as a primary tool for cyberattacks by hacktivists.<\/p>\n\n\n\n

With DDoS attacks becoming more frequent, sophisticated, and inexpensive to launch, it\u2019s important for organizations of all sizes to be proactive, stay protected all year round, and develop a DDoS response strategy.<\/p>\n\n\n\n

Cloud-native DDoS protection at any scale<\/strong><\/h2>\n\n\n\n

Azure provides comprehensive solutions to protect your valuable data and resources from the most sophisticated DDoS attacks at any scale. Azure DDoS Protection<\/a> provides always-on traffic monitoring to automatically mitigate an attack when detected, adaptive real time tuning that compares your actual traffic against predefined thresholds, and full visibility on DDoS attacks with real-time telemetry, monitoring, and alerts. Customers using Azure DDoS Protection have access to the DDoS Rapid Response support (DRR) team to engage experts for help during an active attack. Protection is simple to enable<\/a> and designed to meet the needs of all organizations, including a cost-effective SKU<\/a> for small and medium businesses (SMBs).<\/p>\n\n\n\n

For more insights on the latest threat intelligence, visit Security Insider<\/a>.<\/p>\n\n\n\n

References<\/h2>\n\n\n\n