ARTICLE AD BOX
Cloudflare’s Q1 2025 DDoS Threat Report: DDoS attacks surged 358% YoY to 20.5M. Germany deed hardest; gaming and telecom were among nan apical targets.
The integer world faced an unprecedented onslaught of Distributed Denial of Service (DDoS) attacks successful nan first 4th of 2025, according to Cloudflare’s latest threat report. The sheer measurement of these malicious attempts to disrupt online services reached a staggering 20.5 million, marking an astounding 358% summation compared to nan aforesaid play past year.
Cloudflare’s study shows a concerning 198% QoQ summation successful onslaught numbers this twelvemonth pinch nan number of blocked DDoS attacks reaching 96% successful nan first 3 months of 2025, compared to nan full twelvemonth of 2024. These findings corroborate nan latest Link11 European Cyber Report, which besides recovered DDoS attacks expanding substantially successful 2025.

Around 6.6 cardinal of these malicious attacks straight targeted Cloudflare’s web infrastructure successful an 18-day multi-vector campaign, using techniques for illustration SYN floods, Mirai botnet attacks, and SSDP amplification. This highlights nan vulnerability of information work providers themselves to blase attempts to overwhelm their defences, highlighting nan request for continuous information measures.
Furthermore, nan study highlighted a disturbing inclination successful nan emergence of hyper-volumetric DDoS attacks, those exceeding nan monolithic period of 1 Terabit per 2nd (Tbps) aliases 1 Billion packets per 2nd (Bpps). In nan first 4th alone, Cloudflare successfully mitigated complete 700 of these colossal attacks, averaging astir 8 specified events each azygous day.
In Q1 2025, Germany became nan astir attacked country, followed by Turkey and China whereas Hong Kong became nan apical root of DDoS attacks followed by Indonesia and Argentina.
The gambling and casinos manufacture claimed nan apical spot, while Telecommunications, Service Providers, Carriers, Cyber Security, Airlines, Aviation & Aerospace industries were among nan astir targeted industries successful DDoS attacks. Major unreality computing and hosting providers for illustration Hetzner, OVH, and DigitalOcean consistently appeared arsenic important sources of HTTP DDoS attacks.


Moreover, Cloudflare observed and blocked “dozens of hyper-volumetric DDoS attacks” successful nan second half of April. These included record-breaking events, pinch 1 onslaught peaking astatine an astonishing 4.8 Bpps, a 52% summation complete nan erstwhile record. Separately, they defended against a monolithic 6.5 Tbps flood, matching nan highest bandwidth onslaught ever publically reported.
Interestingly, astir targeted customers didn’t cognize nan attackers’ identities, but those who had immoderate penetration cited competitors (39%) arsenic cardinal threats, peculiarly successful nan gaming and gambling sectors. Other identified threat actors included state-level actors (17%), disgruntled users aliases customers (11%), and self-inflicted DDoS attacks (11%).
Network furniture attacks were dominated by SYN floods, followed by DNS floods. A important displacement saw Mirai botnet attacks emergence to nan 3rd astir common, pushing UDP floods down. In HTTP attacks, complete 60% originated from known botnets, highlighting their continued effectiveness.
The report besides identified awesome emerging threats pinch important quarter-over-quarter growth: CLDAP reflection/amplification surged by 3,488%, and ESP reflection/amplification accrued by 2,301%.
While ample attacks get attention, astir DDoS attacks successful Q1 2025 were small: 99% of Layer 3/4 attacks were nether 1 Gbps/1 Mpps, and 94% of HTTP attacks were beneath 1 Mrps. The study stresses that moreover these “small” attacks tin overwhelm unprotected systems. Additionally, astir attacks are brief: 89% of Layer 3/4 and 75% of HTTP attacks lasted nether 10 minutes, necessitating always-on, automated mitigation.