Radware has released its 2025 Global Threat Analysis Report.
Radware’s new report leverages intelligence provided by 2024 network and application attack activity sourced from the company’s cloud and managed services and threat intelligence research team. In addition, it draws from information found on Telegram, a public messaging platform often used by cybercriminals.
2024 report highlights
- The average duration of network DDoS attacks increases 37% over 2023
- North America faces 66% of web application and API attacks
- Nearly 400% year-over-year growth in DDoS attack volume strikes finance and transportation
- Hacktivist claims rise 20% globally; governments top targets
- Number of attacks: Total Web DDoS attacks surged 550% compared to 2023.
- Geographic targets: EMEA remained the primary target, accounting for 78% of global incidents.
- Attack volume: The average mitigated attack volume rose 120% compared to 2023.
- Attack duration: The average duration of attacks increased 37% over 2023.
- Geographic targets: Organizations in Europe faced the highest proportion of network DDoS activity, accounting for 45% of the global attack volume, followed by North America (21%).
- Industry targets: Telecommunications bore 43% of the global network DDoS attack volume, followed by finance at 30%. Growing faster than the global average of 120%, finance experienced the steepest growth in attack volume per organization, increasing 393% year-over-year, followed by transportation and logistics (375%), e-commerce (238%), and service providers (237%).
- Attack activity: The amount of DNS flood queries rose 87% over 2023.
- Industry targets: The financial sector accounted for 44% of the total L7 DNS attack activity. Healthcare (13%) ranked second, followed by telecom (10%), and communications (8%).
- Number of attacks: The total number of claimed DDoS attacks increased by 20% compared to 2023.
- Geographic targets: Ukraine was the most targeted nation with 2,052 claimed attacks, followed by Israel (1,550). The United States became a prime target for DDoS-as-a-service providers.
- Industry targets: Government institutions were the top hacktivist targets, accounting for 20% of hacktivist activity, followed by business services (9%), finance (9%) and transportation (7%).
- Top claiming actors: Pro-Russian hacker NoName057(16), the most prolific threat actor in 2024, claimed 4,767 DDoS attacks, followed by RipperSec (1,388), Executor DDoS (1,002) and the Cyber Army of Russia Reborn (716).
- Number of attacks: Web application and API attacks climbed 41% compared to 2023.
- Attack vector: Vulnerability exploitation remained the most prominent attack type, comprising more than one-third of all malicious requests.
- Geographic targets: North America experienced 66% of these attacks, followed by EMEA (26%).