quinta-feira, janeiro 30, 2025
HomeCloud ComputingNavigating the 2024 holiday season: Insights into Azure's DDoS defense

Navigating the 2024 holiday season: Insights into Azure’s DDoS defense


The 2024 holiday season revealed a complex and evolving threat landscape for Distributed Denial-of-Service (DDoS) attacks. This year’s trends included advanced tactics such as an increase in DDoS-for-hire operations, the assembly of massive DDoS botnets by script kiddies, politically motivated attack campaigns, and the bypass of CDN (Content Delivery Network) protections among other evolving threats.

The 2024 holiday season revealed a complex and evolving threat landscape for Distributed Denial-of-Service (DDoS) attacks. This year’s trends included advanced tactics such as an increase in DDoS-for-hire operations, the assembly of massive DDoS botnets by script kiddies, politically motivated attack campaigns, and the bypass of CDN (Content Delivery Network) protections among other evolving threats.

The 2024 holiday season attack landscape in Azure

During the holiday season, we noted a shift in attack patterns from last year, highlighting how malicious actors continuously refine their tactics to bypass DDoS protection.

Daily attack volume

Azure’s security infrastructure mitigates up to 3,800 attacks daily. Large-scale attacks over one million packets per second (pps) make up about 20% of these, similar to last year’s analysis. Highly volumetric attacks exceeding 10M pps are rare, at just 0.2% of all attacks, reflecting attackers’ aim to minimize resources and avoid detection.

A graph of data showing the number of daily ddos attacks

Attack protocols

The 2024 holiday season saw a predominant use of TCP-based attacks (Transport Control Protocol), targeting various web applications and resources, accounting for 77% of the attacks. This is in contrast to last year when UDP-based attacks (User Datagram Protocol) accounted for nearly 80% of the attacks on gaming and other resources. The main TCP attack vectors this year were TCP SYN (Synchronize) and ACK (Acknowledge) floods.

Attack protocols chart

Azure blocks massive typhon attack

A staggering attack on gaming resources reached 100-125 million pps in multiple waves. This attack, whose signatures link to Typhon botnet, was fully mitigated by Azure’s defenses.

A graph attack throughputs

Attacks duration

This holiday season again we witnessed the same adversaries’ tactics of trying to bypass DDoS mitigation strategies by launching burst or short-lived attacks. 49% of all attacks lasted up to 5 minutes, whereas 83% of attacks lasted less than 40 minutes. It is insightful to understand that any DDoS mitigation countermeasure we implement to protect our application should kick in effective mitigation as soon as possible.

A graph of attack lengths

Political motives and DDoS-for-hire surge

This holiday season, Azure’s attack trends reflect global patterns. Politically motivated attacks, driven by geopolitical tensions, persist. DDoS threats remain a significant concern as new actors use available tools to cause disruption.

The rise of DDoS-for-hire services, often referred to as stressers and booters, has gained significant popularity among attackers. These platforms, which are readily accessible on cybercriminal forums, have democratized the capability to launch robust DDoS attacks, making them attainable for less sophisticated criminals at minimal costs. In recent years, there has been an increase in both the availability and utilization of these services. During this holiday season, international law enforcement agencies conducted operations such as Operation PowerOFF last December, resulting in the arrest of three individuals and the shutdown of 27 domains associated with DDoS-for-hire platforms. Despite these efforts, DDoS stressers continue to thrive, offering a variety of attack methods and power, and are likely to persist in their prevalence.

Preparing for 2025

The 2024 holiday season has emphasized the ongoing threat of DDoS attacks. Organizations must enhance their cybersecurity strategies to counter these evolving threats in the new year. Strengthening defenses and staying vigilant to new tactics is crucial in 2025. Azure’s resilience against advanced DDoS threats highlights the importance of robust security measures for protecting digital assets and ensuring business continuity.

Identifying exposure points

Start by pinpointing which of your applications are exposed to the public internet. Evaluating the potential risks and vulnerabilities of these applications is crucial to understanding where you may be most susceptible to attacks.

Recognizing normal operations 

Familiarize yourself with the normal behavior of your applications. Azure provides monitoring services and best practices to help you gain insights into the health of your applications and diagnose issues effectively.

Simulating attack scenarios 

Regularly running attack simulations is an effective way to test your services’ responses to potential DDoS attacks. During testing, validate that your services or applications continue to function as expected and that there’s no disruption to the user experience. Identify gaps from both a technology and process standpoint and incorporate them into your DDoS response strategy.

Ensuring robust protection

With the high risk of DDoS attacks, it’s essential to have a DDoS protection service like Azure DDoS Protection. This service provides always-on traffic monitoring, automatic attack mitigation upon detection, adaptive real-time tuning, and full visibility of DDoS attacks with real-time telemetry, monitoring, and alerts.

Implementing layered security 

For comprehensive protection, set up a multi-layered defense by deploying Azure DDoS Protection with Azure Web Application Firewall (WAF). Azure DDoS Protection secures the network layer (Layer 3 and 4), while Azure WAF safeguards the application layer (Layer 7). This combination ensures protection against various types of DDoS attacks.

Configuring alerts 

Azure DDoS Protection can identify and mitigate attacks without user intervention. Configuring alerts for active mitigations can keep you informed about the status of protected public IP resources.

Formulating a response plan 

Establish a DDoS response team with clearly defined roles and responsibilities. This team should be adept at identifying, mitigating, and monitoring an attack, as well as coordinating with internal stakeholders and customers. Use simulation testing to identify any gaps in your response strategy, ensuring your team is prepared for various attack scenarios.

Seeking expert assistance 

In the event of an attack, reaching out to technical professionals is vital. Azure DDoS Protection customers have access to the DDoS Rapid Response (DRR) team for assistance during and after attacks. Following an attack, continue monitoring resources and conduct a retrospective analysis. Apply learnings to improve your DDoS response strategy, ensuring better preparedness for future incidents.

Call to action

The 2024 holiday season highlighted the evolving threat landscape of DDoS attacks, with a significant increase in DDoS-for-hire operations, massive botnets, and politically motivated campaigns. These threats emphasize the need for robust DDoS protection and a DDoS response plan. Azure supports organizations to stay ahead of these threats. Customers should enable multi-layer protection by deploying Azure DDoS Protection with Azure Web Application Firewall (WAF). Additionally, customers should enable telemetry and alerting capabilities to monitor and respond to active mitigations effectively.



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments