Gcore’s latest DDoS Radar report analyzes attack data from Q3–Q4 2024, revealing a 56% YoY rise in the total number of DDoS attacks with the largest attack peaking at a record 2 Tbps. The financial services sector saw the most dramatic increase, with a 117% rise in attacks, while gaming remained the most-targeted industry. This period’s findings emphasize the need for robust, adaptive DDoS mitigation as attacks become more precise and frequent. Let’s dive into the numbers.
Key takeaways: the future of DDoS defense
Here are the four key takeaways from Gcore Radar:
- DDoS attacks are increasing in volume and sophistication. The 17% growth in total attacks and new peak volume of 2 Tbps highlight the need for advanced protection.
- Financial services face growing risks. With a 117% increase in attacks, this sector requires heightened security measures.
- Shorter, high-intensity attacks are now the norm. Traditional mitigation approaches must adapt to rapid burst attacks that can evade detection.
- Geopolitical factors influence attack patterns. Understanding attack origins can help strengthen defenses in high-risk regions.
DDoS attack frequency increases to new high
The report highlights a sustained increase in attack frequency. Compared to Q3–Q4 2023, DDoS attacks have risen by 56%, underscoring the long-term growth trend.
![Gcore DDoS Radar Gcore DDoS Radar](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Svdk8SlQ-PT7zFlLi8sIaaErNes6xE70iDbU1eux9VD6-OkNOr_lGCMuTJiRCaKVo7xc7vEr-yK-YCyVG8gs3hHwIprM6tPsBBYW9GIPU1MGcl-Jx2WhVfTHTxyGYxtc-0TalhB-GhtJjCFn7zIYI4QDgrHowoZpnTK6MYRSXczN6TD54LkIItPmAGE/s728-rw-e365/1.png)
Gcore identifies several technological and environmental factors that are likely contributing to the rising number of attacks:
- Easy access to attack tools: DDoS-for-hire services and botnets have lowered the barrier for launching attacks.
- Expanding IoT vulnerabilities: Poorly secured IoT devices continue to fuel larger botnets.
- Geopolitical and economic tensions: Political conflicts and financial motivations drive targeted attacks.
- More sophisticated attack strategies: Multi-vector and application-layer attacks make mitigation more difficult.
Largest attack reaches 2 Tbps
The largest recorded attack in Q3–Q4 2024 hit 2 Tbps, targeting a major global gaming company. This represents an 18% increase from the previous peak of 1.7 Tbps in Q1–Q2 2024.
While large-scale attacks like these are often mitigated quickly, their destructive potential continues to grow. Terabit-level attacks can cause widespread service outages and financial losses, particularly for businesses reliant on real-time operations.
![Gcore DDoS Radar Gcore DDoS Radar](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5UykitoN7TTwGqAEX6J8QiISFeyzRL66HoqoRompADbmmYLkWVTer4VjvGK39bEglkIddw5NU3Q-o__nCXJGj0B0RYKcJE9FYuLxdVNnAOYygtPOlkoCRauphSnzE1bfX0kv1I_qtKdoGkKEP8Vny7Odx8gKfZjONqDjQzrYCeMCkPI61SwUBgVydwes/s728-rw-e365/2.png)
Financial services face attack surge, but gaming remains the top target
Gaming remains the most-attacked sector, though its share of total attacks dropped from 49% in Q3–Q4 2023 to 34%. Possible explanations include:
- Improved DDoS protection forcing attackers to shift focus
- Ongoing motivation for attacks due to competitive gaming and financial incentives
- High revenue impact from service downtime
Also notable is the uptick in attacks on financial services, rising from 12% to 26% of total incidents. The sector’s heavy regulation, critical online services, and susceptibility to ransom-based attacks make it a prime target.
The full Gcore Radar report shares industry data for media and entertainment, retail, telecommunications, technology, and other industries.
Rise of ACK floods and shorter bursts
The distribution of DDoS attacks across the network and application layers during H2 2024 highlights a greater prevalence of network-layer attacks.
![Gcore DDoS Radar Gcore DDoS Radar](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgL8DY07jz3YZ0I3LSVBNtygYHnDKdAfN7s5fE7JVnJ26YLHYZwgda9uGewQM00EtvBPakhMBefXwOe9KHWIPrZxK14Oy-BMXvW91a-oq5oXkvhfdLhWE_LofOPZJkrmXQkdpMVksy0MqsKGRzGu9AK1a7TuyMYRJ7wFEe-pccByayOcX379z8bgnmSXqo/s728-rw-e365/3.png)
At the network layer, UDP flood attacks remain the most common method, accounting for 60% of all network-layer attacks. However, ACK flood attacks are on the rise, now making up 7% of total attacks. These attacks mimic legitimate traffic, making mitigation more challenging.
At the application layer, L7 UDP flood attacks accounted for 45%, while L7 TCP flood attacks rose to 37%. Gcore notes that the latter is gaining traction due to its ability to evade traditional filtering mechanisms.
Shorter but more disruptive attacks
One of the most notable shifts is the decrease in attack duration. The longest recorded attack in Q3–Q4 2024 lasted just five hours, compared to 16 hours in the previous period.
Shorter, high-intensity burst attacks are becoming more common. These attacks:
- Disrupt services quickly while avoiding sustained detection.
- Mimic legitimate traffic patterns, making mitigation more complex.
- Serve as smokescreens for other cyberattacks, including ransomware.
![Gcore DDoS Radar Gcore DDoS Radar](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgN-jpGk2sKWym1CPgSHi0tUwuSPpeb6-MKRU3JEkz21duJBvt6fxB1QCVUW4gxmm7VndlvhfecIrjNfYyJxh7jEFxn6LHAZ5XZhwy4HUqaZd2fI2NoJGnnDn1XsE99gYE_wmcbhpNl9OGQ6VCEOSEdzAFuodDzdxIaSJii1EUtUZ13JhN8tbT-Lp04e3w/s728-rw-e365/4.png)
![Gcore DDoS Radar Gcore DDoS Radar](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEih1BSo-3eDx6rpqZQu5-qwI0Xp7NuSnE7z8B2JvvnFqlCUqejXLyttf8OJQch44F8XE-3C9VitDel5RUpSAWrCUOZr6ky2Yu5iVdvyBzKWUFHoS2_MJHjUF0oKcQwr8B_KI1y5f5LrjqaOvvRIjfPYsnnZS4sd3LY4juuxPF1R4kFU1pUx1VmCzVAci4c/s728-rw-e365/5.png)
Geopolitical influences
Geopolitical tensions and economic rivalries continue to shape the DDoS landscape, with politically motivated attacks targeting financial services, critical infrastructure, and high-value enterprises. Meanwhile, regions with dense internet infrastructure—such as the Netherlands, the US, and China—serve as both launch points and battlegrounds for cybercriminal groups leveraging botnets, proxy networks, and DDoS-for-hire services.
The report identifies key regions contributing to DDoS attack traffic:
- The US and the Netherlands are top sources for both attack layers.
- Brazil is a growing hub for network-layer attacks.
- China and Indonesia both contribute significantly to global attack volumes.
![Gcore DDoS Radar Gcore DDoS Radar](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMArGEzMnhNGVwAlvle4EOMcdH6GrLQHOi-zrDBNRPcvrBWX3u8-QLXn10mAMihloizZ33JS2PaCY4NlIksIuhoQV7bCOEPqtpjVhISBTfp5Yk9JWc_1MMGdom1anCkSBvBf9HeEQNd_nuqb05Gkp8xvjLuEsDRVY1srDAXe2RJhcl1bs35Db8V-eRivM/s728-rw-e365/6.png)
Download the full report for application-layer attack geographic data.
Gcore DDoS Protection: mitigating the new wave of attacks
Gcore DDoS Protection leverages 200+ Tbps filtering capacity across six continents to neutralize attacks in real time. As DDoS threats evolve, organizations must adopt proactive defense strategies to safeguard their digital assets.
Note: This article is expertly written and contributed by Andrey Slastenov, Head of Security at Gcore.