Threat Report 1h2023
Threat Report 1h2023
Threat Report 1h2023
NETSCOUT DDoS
Threat Intelligence Report
Complete Network Visibility Enables Total Network Control
CONTENTS
2 Key Findings
10 Revealing Adversary
Methodology
13 Geopolitical and
Technology Impact
in DDoS
“
14 Conclusion
You can’t win 51 Grand Prix victories without visibility. Alain Prost
needed it on the racetrack, and it’s the cornerstone of internet
security today. As internet connectivity becomes more complex
and more vital for organizations around the globe, the NETSCOUT
Visibility Without Borders® platform enables us to see around
corners with unparalleled insight into attacker behavior.
Internet Traffic Accelerating at amazing speeds, the growth of the internet necessitates increased visibility.
Growth and And NETSCOUT’s commitment to worldwide visibility granted us insights into an average of
Visibility 424Tbps of internet peering traffic in 1H 2023, a 5.7 percent increase over the 401Tbps reported
at the end of 2022. The internet’s rapid growth unfortunately experienced drag—a reduction
Accelerating
in capabilities because of an increase in DDoS attacks. For example, we witnessed a nearly
500 percent growth in HTTP/S application-layer and 17 percent increase DNS reflection/
amplification attack volumes in 1H 2023.
The Power of The majority of observed application-layer, reflection/amplification, and direct-path volumetric
Persistence DDoS attack traffic share a near-universal characteristic: a significant degree of attack source
persistence. NETSCOUT’s ASERT Team identified DDoS reflectors/amplifiers, DDoS botnet
nodes, and DDoS attack generators exhibit an average churn rate of only 10 percent over a
two-week interval from their inception. In practical terms, this means that 90 percent of verified
DDoS attack sources can be proactively blocked for as much as two weeks after initial discovery.
DDoS Attack ASERT examined several different types of abusable infrastructure leveraged in DDoS attacks
Infrastructure worldwide—DDoS botnets, open proxies, The Onion Router (Tor) nodes, and attacker-friendly
Telemetry networks commonly referred to as bulletproof hosting providers. In 1H 2023, we observed
open proxies consistently leveraged in HTTP/S application-layer DDoS attacks primarily
directed toward the higher education and national government sectors, whereas DDoS
botnets frequently target state and local governments.
Adversary The unmatched breadth and depth of our data horizon allows us to identify the exact point in
Discovery time when new DDoS attack vectors are discovered, tested, optimized, first utilized by adaptive
Lifecycle attackers, and eventually weaponized in DDoS-for-hire services. This DDoS Threat Intelligence
Report covers the evolution of the Apple remote management system (ARMS), TP240, and
Service Location Protocol (SLP) DDoS attack vectors from inception to weaponization.
Carpet-Bombing Domain Name System (DNS) water torture DDoS attacks have been steadily rising in
and DNS Water prevalence—with a sharp increase observed in June 2023. At the same time, carpet-bombing
Torture Attacks attacks continue to rise, and our new research demonstrates that most carpet-bombing attacks
are univector rather than multivector, with DNS reflection/amplification being the most prevalent
Increase Pace
attack type, followed by Session Traversal Utilities for Nat (STUN) reflection/amplification.
World Events Since the initiation of ground operations in the Russia/Ukraine conflict, ideologically motivated
Fuel DDoS DDoS attacks targeting the United States, Ukraine, Finland, Sweden, Russia, and other countries
Attack have remained constant. Last year, Finland experienced a wave of DDoS attacks before and
immediately after its NATO acceptance. Sweden has experienced a similar onslaught as that
Campaigns
country’s bid to join NATO moves forward. But it’s not just politics: A wave of DDoS attacks
hammered wireless telecommunications, no doubt a result of 5G wireless connectivity expanding
at a staggering rate and subscribers opting to use 5G as their primary internet connection.
Tbps
vast, interconnected digital universe. This 200
macro view of the internet’s transit traffic 150
yields many unique insights. We extracted 100
420
is essential to developing attack mitigation
strategies, because more than 75 percent 410
18,000
In racing, drivers often use a technique
16,000 called slipstreaming, drafting directly
14,000 behind another car to increase speed. Like
12,000 slipstreaming, adversaries use the resources
of others to steal “speed” to the detriment
Attack Count
10,000
of others. Unfortunately, the theft never ends,
8,000
and ISP networks always bear the cost. In
6,000 the first half of 2023, NETSCOUT observed a
4,000 staggering total of ~7.9 million DDoS attacks,
2,000 representing a 31 percent increase year over
year. This represents an unbelievable 44
0
01/01/23 02/01/23 03/01/23 04/01/23 05/01/23 06/01/23 07/01/23 thousand DDoS attacks per day (Figure 3).
1,800 5,000
1,600 4,500
4,000
1,400
3,500
1,200
Attack Count
Attack Count
3,000
1,000
2,500
800
2,000
600
1,500
400 1,000
200 500
0 0
01/23 07/23 01/23 07/23 01/23 07/23 01/23 07/23 01/23 07/23 01/23 07/23 01/23 07/23 01/23 07/23
MI TIGAT ED H T T P/S A PPLIC ATION-L AY ER AT TACKS IH 2 02 3 MI T IGAT ED DNS AMPL IF IC AT ION AT TACKS IH 202 3
T OP 5 INDUS T RIE S TA RGE T ED BY H T T P/S A PPL ICAT ION-L AY ER AT TACKS T OP 5 INDUS T RIE S TA RGE T ED BY DNS A MPL IF ICAT ION AT TACKS
159,701 480,905
2 Data Processing Hosting and Related Services 2 Wireless Telecommunications Carriers
(except Satellite)
48,227
Wireless Telecommunications Carriers
187,700
3
(except Satellite) 3 Data Processing Hosting and Related Services
34,791 83,359
4 Electronic Computer Manufacturing 4 Satellite Telecommunications
17,020 16,598
5 Internet Publishing and Broadcasting 5 All Other Telecommunications
11,208 16,348
70%
26.5%
Persistence Percentage
Brazil
60%
50%
10.3%
India
40%
30%
6.9%
China
20%
10%
6.7%
Netherlands
0%
01/03/23 02/01/23 03/01/23 04/01/23 05/01/23 06/01/23 3.2%
In addition to persistent attackers, NETSCOUT’s visibility provides a unique perspective into known
DDoS sources used in reflection/amplification and botnet attacks. A high day-to-day persistence
implies the attacker infrastructure NETSCOUT knew about yesterday is the same participating in
today’s DDoS activity (in other words, known DDoS sources).
1
Persistence Percentage
0.9
0.8
0.7
0.6
04/02/23 04/16/23 04/30/23 05/14/23 05/28/23 06/11/23 06/25/23
Bulletproof hosting (BPH) providers pose a unique and challenging threat. Their activity is T HREE T Y PE S OF BPH PROV IDERS
often disguised under a veil of legitimacy; however, due to their willful neglect of community
norms, their illicit activities often evade normal responses such as takedown requests. 1 M A L ICIOUS
Furthermore, inaction by their peers and upstream providers prolongs abusive behavior, often Practically no legitimate
across the course of many years, resulting in BPH providers becoming emboldened by the or lawful activity
internet community’s lack of response. This allows BPH providers to refine and enhance their
methods unencumbered while incident responders must search for ways to track and mitigate 2 A BUSIV E
their behavior. Many of the most notorious threats to internet safety and stability previously Significantly uncooperative,
have found safe havens at BPH providers, but this strategy is becoming less tenable as we unresponsive, or unwanted
uncover and provide defensive recommendations to our customers and the world. activity
As described in our recent blog focused on bulletproof hosting providers, we classify them
3 CONT ROVERSI A L
Legal, but often condemned
as belonging to one of three categories: malicious, abusive, or controversial.
for unwanted material
or activity
We focus our examination on the malicious and abusive categories of two well-known BPH
providers. We refer to these BPH providers as Provider X and Provider Y. Provider X operates
its own autonomous system (AS) and has dozens of small Internet Protocol version 4 (IPv4)
prefixes it announces into the global BGP routing table. In total, Provider X announces less
than a /16 of IPv4 address space. This is not a lot of addresses. However, when we consider
the frequency of attacks involving this provider (Figure 8 on the following page), it becomes
apparent Provider X is a significant source of attacks.
1,024 Attacks
Figure 8: BPH-X Attacks and Trend Line Per Day Singapore
Attack Count Trend Line
62 Attacks
180
United States
160
140
51 Attacks
120 Russia
Attack Count
100 40 Attacks
80
Netherlands
60
40 27 Attacks
20
0
01/01/23 02/01/23 03/01/23 04/01/23 05/01/23 06/01/23 07/01/23
All three types of attack sources display disproportionately high rates of activity in
security events targeting institutions of higher education and data-hosting services
30
Daily Alerts
(Figure 11). The Y-axis in the figure below represents the percentage above observed
baselines (proxies, Tor nodes, and botnet nodes) in comparison to other types of hosts. BO T NE T NODE S
DDoS botnets frequently are used in attacks targeting state and local governments,
whereas open proxies have seen disproportionate use in attacks against federal/
national governments. Proxy use against federal/national governments is notable 730
Daily Alerts
because proxies are a favorite tool of ideologically motivated adversaries such as Killnet
for launching application-layer DDoS attacks against web servers and online portals.
450%
INDUS T RY T OP TA RGE T S
400% 393%
50%
0%
Open Proxy Tor Botnet
Ar ARMS Reflection/Amplification
In mid-2019, NETSCOUT received notification of significant Figure 12: ARMS Related Activity
DDoS attack traffic sourced from UDP/3283, a previously 650
unused and unknown attack vector. ASERT researchers
600
immediately began reverse-engineering the attack. Within
550
four days, NETSCOUT had successfully replicated this
500
never-before-seen reflection/amplification DDoS attack,
which leveraged unpatched systems running ARMS. Our 450
350
NETSCOUT then created surgical deny lists of abused ARMS 300
reflectors/amplifiers, published customer and public advisories 250
on mitigating this new DDoS attack vector, and worked with
200
the vendor on mitigation/remediation recommendations.
150
At discovery, there were a total of 54,000 abusable nodes on
100
the public internet, and today that number is ~6,000 thanks
to in part to NETSCOUT visibility, remediation guidance 50
to network operators, education efforts, and patching by 0
Apple. This early identification of a new DDoS vector allowed 01/01/19 01/01/20 01/01/21 01/01/22 01/01/23
Reflection/Amplification 800
700
But this was not just lightning in a jar. Beginning in January
2022, NETSCOUT observed probes targeting services running 600
on UDP/10074 (Figure 13). Concurrently, NETSCOUT, via
partnerships with global network operators, vendors, and 500
Attack Count
Most recently, NETSCOUT witnessed the emergence of a Figure 14: SLP Related Activity
new vector with the greatest lead time yet. We discovered 400
the activity in 1H 2023, but after investigating traffic in our
global honeypot network found that adversaries started 350
Attack Count
characterized and provided mitigation recommendations and
surgical deny lists for this new DDoS attack vector, which is 200
capable of amplifying traffic at a ratio of 2200:1 with proper First initial probes
150
priming. At discovery, NETSCOUT identified more than 40,000 seen in NETSCOUT
abusable reflectors/amplifiers on the public internet. Today, Sensorium
100
that number is ~38,000 and declining. NETSCOUT mitigation
and remediation guidance has minimized this vector’s 50
effectiveness, ensuring customers are proactively protected
0
against SLP reflection/amplification attacks.
01/01/22 04/01/22 07/01/22 10/01/22 01/01/23 04/01/23 07/01/23 10/01/23
600
It should be noted that these figures are conservative and
500 are based on high-impact attacks on ISP networks. Given the
400 nature of these attacks—adversaries intentionally spreading
300 traffic to multiple hosts, thus decreasing bandwidth rates and
200 avoiding traffic threshold alerts—it is highly plausible these
100 numbers are an order of magnitude lower than the actual
number of carpet-bombing attacks present on the internet.
0
01/01/23 02/01/23 03/01/23 04/01/23 05/01/23 06/01/23 07/01/23
AT TACK ME T RIC S T OP 5
88 Average Attacked
IPs + Prefix 841 Maximum Attacked
IPs + Prefix
TA RGE T ED COUNT RIE S
1 United States
SOURCE COUN T RIE S
1 United States
2 Brazil 2 Netherlands
4
Spain
Japan
3
4
Great Britain
Germany
5 Italy 5 France
Because carpet-bombing attacks are designed to target a broad network footprint, it is no surprise that wired and
wireless telecommunications and cloud hosting providers bear the brunt of these attacks as they spread across
their networks. Most of the reflectors/amplifiers used to launch these attacks are sourced from the very same
networks they target.
DNS amplification features most prominently in carpet-bombing attacks, but perhaps slightly more surprising is that
STUN amplification is a close second (Figure 16). That is, until we realized that STUN is necessary for Webtrp-based
VoIP and video communications leveraged by services such as FaceTime, Skype, and Teams. This means that,
like DNS responses, it cannot be filtered wholesale at the network edge. Previously, carpet-bombing attacks were
almost always univector UDP reflection/amplification attacks. In the last 18 months, however, we have observed
an uptick in the use of TCP reflection/amplification with carpet-bombing attacks.
0 10,000 20,000 30,000 40,000 50,000 60,000 70,000 80,000 90,000 100,000
Number of Attacks
250
bid to join NATO. These attacks had
200 ramifications for Turkey and Hungary
as the two countries finally approved
150
Finland’s application. Fast-forward to
100 June 2023, and Sweden is on the verge
of joining NATO amidst a significant rise
50 in DDoS attacks coinciding with major
political dynamics.
0
02/26/23 03/19/23 04/09/23 04/30/23 05/21/23 06/11/23 07/02/23
On May 3, it was reported that the
Swedish parliament website had been
the target of a highly disruptive DDoS
Figure 19: Swedish Attacks Per Day attack. Sure enough, our global visibility
Minimum Maximum Average revealed a significant increase in attacks
600G against the country coinciding with
550G the timeline played out in the political
theater (Figure 18).
500G
300G
frequency. It is expected that DDoS
250G
attacks targeting Sweden will increase
200G yet again as the ratification of Sweden’s
150G bid to join NATO progresses through
100G the political process.
50G
0G
02/26/23 03/26/23 04/23/23 05/21/23 06/18/23 07/16/23
Attack / Day
600
Although we cannot confirm all these networks
were deployed, at least one service provider in 500
the region expanded significant 5G offerings
400
accounting for much of the increase in 2023. The
root cause of this shift is almost certainly tied to 300
many former broadband access users moving to
200
5G fixed wireless access, including gamers shifting
their network access. Historically, most attacks in 100
service provider networks have correlated back
0
to gaming in some fashion, prompting a shift 01/01/22 04/01/22 07/01/22 10/01/22 01/01/23 04/01/23 07/01/23
in this attack activity to the wireless space.
Conclusion CONTRIBUTORS
©2023 NETSCOUT SYSTEMS, INC. All rights reserved. NETSCOUT, and the NETSCOUT logo are registered trademarks of NETSCOUT SYSTEMS, INC.,
and/or its subsidiaries and/or affiliates in the USA and/or other countries. All other brands and product names and registered and unregistered trademarks
are the sole property of their respective owners.
SECR_001_EN-2302