Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hyper-Volumetric DDoS Attacks Reach Record 7.3 Tbps, Targeting Key Global Sectors

Posted on July 15, 2025July 15, 2025 By CWS

Jul 15, 2025Ravie LakshmananBotnet / Community Safety
Cloudflare on Tuesday stated it mitigated 7.3 million distributed denial-of-service (DDoS) assaults within the second quarter of 2025, a major drop from 20.5 million DDoS assaults it fended off the earlier quarter.
“General, in Q2 2025, hyper-volumetric DDoS assaults skyrocketed,” Omer Yoachimik and Jorge Pacheco stated. “Cloudflare blocked over 6,500 hyper-volumetric DDoS assaults, a mean of 71 per day.”
In Q1 2025, the corporate stated an 18-day sustained marketing campaign towards its personal and different vital infrastructure protected by Cloudflare was answerable for 13.5 million of the assaults noticed throughout the time interval. Cumulatively, Cloudflare has blocked practically 28 million DDoS assaults, surpassing the variety of assaults it mitigated in all of 2024.

The notable of the assaults in Q2 2025 is a staggering DDoS assault that peaked at 7.3 terabits per second (Tbps) and 4.8 billion packets per second (Bpps) inside a span of 45 seconds.Large site visitors spikes like these make headlines—however what typically will get missed is how attackers at the moment are combining them with smaller, focused probes. As a substitute of simply overwhelming programs with brute pressure, they’re mixing large-scale floods with quiet scans to search out weak spots and slip previous defenses constructed to dam solely the plain.
Layer 3/Layer 4 (L3/4) DDoS assaults declined 81% quarter-over-quarter to three.2 million, whereas HTTP DDoS assaults rose 9% to 4.1 million. Greater than 70% of the HTTP DDoS assaults emanated from recognized botnets. The most typical L3/4 assault vectors have been flood assaults performed over DNS, TCP SYN, and UDP protocols.
Telecommunication service suppliers and carriers have been among the many most focused, adopted by the Web, IT companies, gaming, and playing sectors.
China, Brazil, Germany, India, South Korea, Turkey, Hong Kong, Vietnam, Russia, and Azerbaijan emerged as essentially the most attacked areas primarily based on the billing nation of the Cloudflare clients. Indonesia, Singapore, Hong Kong, Argentina, and Ukraine have been the highest 5 sources of DDoS assaults.
The online infrastructure and safety firm additionally revealed that the variety of hyper-volumetric DDoS assaults exceeding 100 million packets per second (pps) elevated by 592% in comparison with the earlier quarter.
One other vital side is the 68% improve in ransom DDoS assault, which happens when malicious actors try to extort cash from a corporation by threatening them with a DDoS assault. It additionally includes eventualities the place the assaults are carried out and a ransom is demanded to cease it from occurring once more.
“Whereas nearly all of DDoS assaults are small, hyper-volumetric DDoS assaults are rising in measurement and frequency,” Cloudflare stated. “Six out of each 100 HTTP DDoS assaults exceed 1M rps, and 5 out of each 10,000 L3/4 DDoS assaults exceed 1 Tbps — a 1,150% QoQ improve.”

The corporate additional has known as consideration to a botnet variant dubbed DemonBot that infects Linux-based programs, predominantly unsecured IoT units, through open ports or weak credentials to enlist them right into a DDoS botnet that may perform UDP, TCP, and application-layer floods.
“Assaults are sometimes command-and-control (C2) pushed and might generate vital volumetric site visitors, typically focusing on gaming, internet hosting, or enterprise companies,” it added. “To keep away from an infection, leverage antivirus software program and area filtering.”An infection vectors like these exploited by DemonBot spotlight broader challenges with unsecured IoT publicity, weak SSH credentials, and outdated firmware—widespread themes throughout DDoS botnet proliferation. Associated assault methods, comparable to TCP reflection, DNS amplification, and burst-layer evasion, are more and more mentioned in Cloudflare’s application-layer menace studies and API safety breakdowns.

Discovered this text attention-grabbing? Observe us on Twitter  and LinkedIn to learn extra unique content material we publish.

The Hacker News Tags:Attacks, DDoS, Global, HyperVolumetric, Key, Reach, Record, Sectors, Targeting, Tbps

Post navigation

Previous Post: Threat Actors Mimic CNN, BBC, and CNBC Websites to Promote Investment Scams
Next Post: NCSC Urges Organizations to Upgrade Microsoft Windows 11 to Defend Cyberattacks

Related Posts

Microsoft Patches 130 Vulnerabilities, Including Critical Flaws in SPNEGO and SQL Server The Hacker News
Why IT Leaders Must Rethink Backup in the Age of Ransomware The Hacker News
Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure The Hacker News
Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks The Hacker News
New Flodrix Botnet Variant Exploits Langflow AI Server RCE Bug to Launch DDoS Attacks The Hacker News
SinoTrack GPS Devices Vulnerable to Remote Vehicle Control via Default Passwords The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use Biometrics Securely
  • Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers
  • CISA Warns of Critical SunPower Device Vulnerability Let Attackers Gain Full Device Access
  • US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack
  • A Milestone Powering Crypto’s Global Reach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use Biometrics Securely
  • Malicious npm Packages Exploit Ethereum Smart Contracts to Target Crypto Developers
  • CISA Warns of Critical SunPower Device Vulnerability Let Attackers Gain Full Device Access
  • US Cybersecurity Agency Flags Wi-Fi Range Extender Vulnerability Under Active Attack
  • A Milestone Powering Crypto’s Global Reach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News