The fifth anniversary of the DDoS Threat Intelligence Report by Netscout revealed that the number of application-layer and botnet-based direct-path attacks since 2019 has jumped by 487%, according to SiliconANGLE.
According to the report, the largest surge took place during the second half of 2022. The distributed denial-of-service alert traffic peaked at 436 petabits and more than 75 trillion packets in one day.
In the last three years, there was an 18% rise in direct-path attacks, which, combined with a nearly equal rate of increase in traditional reflection and amplification attacks, suggests a hybrid defense approach may be needed to address the fluctuating attack methodology, according to researchers.
Most of the increase can be attributed to the pro-Russian group Killnet and similar groups that specifically attack websites, with the U.S. national security sector experiencing a 16,815% jump in attacks associated with Killnet.
Meanwhile, more than 1.35 million bots from malware families such as Mirai, Meris, and Dvinis were tracked by Netscouts ASERT analysts and carpet-bombing attacks rose by 110% from the first half of 2022 to the second.
Aside from featuring over 40 million signals from the DNS Research Federation's data platform and the Global Anti-Scam Alliance's comprehensive stakeholder network, the Global Signal Exchange will also contain more than 100,000 bad merchant URLs and one million scam signals from Google.
While some threat actors established fraudulent disaster relief websites as part of phishing attacks aimed at exfiltrating financial details and Social Security numbers from individuals seeking aid, others impersonated Federal Emergency Management Agency assistance providers to create fake claims that enabled relief fund and personal data theft.
Malicious GitHub pages and YouTube videos containing links for purported cracked office software, automated trading bots, and game cheats, have been leveraged to facilitate the download of self-extracting password-protected archives.