Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Tech Overtakes Gaming as Top DDoS Attack Target, New Gcore Radar Report Finds

Posted on September 25, 2025September 25, 2025 By CWS

The most recent Gcore Radar report analyzing assault knowledge from Q1–Q2 2025, reveals a 41% year-on-year improve in complete assault quantity. The most important assault peaked at 2.2 Tbps, surpassing the two Tbps report in late 2024. Assaults are rising not solely in scale however in sophistication, with longer durations, multi-layered methods, and a shift in goal industries. Expertise now overtakes gaming as probably the most attacked sector, whereas the monetary providers business continues to face heightened dangers.
Key takeaways: the evolving DDoS panorama
Listed below are 5 key insights from the Q1–Q2 2025 Gcore Radar report:

Assault volumes are rising. Complete assaults climbed from 969,000 in H2 2024 to 1.17 million in H1 2025, a 21% improve over the earlier two quarters and 41% YoY development.
Assault measurement continues to develop. The height assault of two.2 Tbps demonstrates the growing scale and harmful potential of recent DDoS campaigns.
Assaults have gotten longer and extra refined. Prolonged durations and multi-layered ways enable menace actors to bypass defenses and maximize disruption.
The industries focused are shifting. Expertise overtakes gaming as the highest goal, whereas monetary providers is being more and more focused.
Software-layer assaults are on the rise. Multi-vector assaults concentrating on internet functions and APIs now account for 38% of complete assaults, up from 28% in Q3–This fall 2024.

DDoS assault frequency has surged
Gcore Radar highlights a continued upward trajectory in DDoS exercise. In comparison with H2 2024, assault volumes rose 21%, whereas YoY development reached 41%, underscoring a long-term escalation pattern. A number of elements contribute to this rise:

Accessible assault instruments: Low cost DDoS-for-hire providers empower extra menace actors.
Susceptible IoT gadgets: Unsecured gadgets are hijacked into large-scale botnets, amplifying assault volumes.
Geopolitical and financial tensions: World instability drives extra frequent and focused assaults.
Superior assault methods: Multi-vector and application-layer assaults improve each complexity and affect.

The most important assault reached 2.2 Tbps
The height assault in Q1–Q2 2025 hit 2.2 Tbps, surpassing late 2024’s 2 Tbps assault. Whereas assaults exceeding 1 Tbps stay uncommon, their frequency is rising, highlighting attackers’ rising ambition to overwhelm networks, functions, and providers. Even smaller assaults can incapacitate unprotected methods.

Industries focused are shifting
Expertise now represents 30% of all DDoS assaults, overtaking gaming (19%). Internet hosting suppliers supporting SaaS, e-commerce, gaming, and monetary purchasers are significantly weak, as a single assault can set off ripple results throughout a number of dependent companies.
Monetary providers account for 21% of assaults. Banks and cost methods are prime targets as a result of excessive disruption potential, regulatory sensitivity, and ransomware danger.
Gaming continues to face important threats, however improved defenses and strategic attacker shifts diminished its share from 34% in H2 2024 to 19% in H1 2025. Key drivers of ongoing assaults embody aggressive benefit and income affect.
Telecommunications now make up 13% of assaults, reflecting their position as crucial web infrastructure.
Media, leisure, and retail see extra average assault ranges, with media at 10% and retail at 5–6%.

Assault length and ways
Latest knowledge reveals a shift towards longer, extra sustained assaults. Assaults underneath 10 minutes decreased by roughly 33%, whereas 10–30 minute assaults practically quadrupled. Most assault length barely decreased, from 5 hours to a few, indicating a give attention to concentrated, high-impact campaigns.
Quick bursts stay most well-liked. Regardless of longer assaults gaining prevalence, temporary assaults stay extremely disruptive, evading automated defenses and sometimes serving as smokescreens for multi-stage cyberattacks.

Assault vectors
By way of network-layer assault vectors, UDP flood assaults stay dominant, accounting for 56% of network-layer assaults, adopted by SYN floods (17%), TCP floods (10%), ACK floods (8%), and ICMP (6%). Multi-vector approaches enable attackers to masks malicious exercise as authentic visitors.
ACK flood assaults proceed to rise, now making up 8% of network-layer visitors, highlighting their potential to bypass detection.

Software-layer assault vectors
L7 UDP floods dominate (62%), adopted by L7 TCP floods (33%), with different assault sorts at 5%. Attackers more and more exploit enterprise logic and APIs to disrupt operations past conventional community overload.

Geographical traits
America and the Netherlands stay high sources for network-layer assaults. Hong Kong emerges as a brand new important supply, contributing 17% of network-layer and 10% of application-layer assaults.
These findings spotlight the necessity for proactive, geographically conscious defenses.

Multi-layered assaults spotlight the crucial position of WAAP
Attackers are more and more concentrating on internet functions and APIs, exploiting stock methods, cost flows, and buyer interplay factors. These assaults typically mix volumetric disruption with manipulation of financial logic, affecting sectors akin to e-commerce, logistics, on-line banking, and public providers.
Gcore DDoS Safety: defending towards evolving threats
Gcore DDoS Safety leverages 200+ Tbps filtering capability throughout 210+ PoPs worldwide, neutralizing assaults in actual time. Built-in Net Software and API Safety (WAAP) combines DDoS mitigation, bot administration, and API safety to guard crucial property whereas sustaining efficiency.
Obtain the complete report.

Discovered this text fascinating? This text is a contributed piece from considered one of our valued companions. Comply with us on Google Information, Twitter and LinkedIn to learn extra unique content material we put up.

The Hacker News Tags:Attack, DDoS, Finds, Gaming, Gcore, Overtakes, Radar, Report, Target, Tech, Top

Post navigation

Previous Post: Volvo Group Employee Data Stolen in Ransomware Attack
Next Post: Volvo Group Discloses Data Breach After Ransomware Attack on HR Supplier

Related Posts

Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties The Hacker News
BadIIS Malware Spreads via SEO Poisoning — Redirects Traffic, Plants Web Shells The Hacker News
Transforming Your Cybersecurity Practice Into An MRR Machine The Hacker News
Beware the Hidden Risk in Your Entra Environment The Hacker News
Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods The Hacker News
CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News