Radware® (NASDAQ: RDWR), a number one world supplier of utility safety and supply options for multi-cloud environments, has launched menace intelligence insights highlighting a year-over-year enhance in cyber actions throughout the APAC area.
These insights are derived from Radware’s 2024 community and utility assault knowledge collected by its cloud and managed companies, in addition to its devoted menace intelligence analysis crew. The evaluation additionally incorporates data gathered from Telegram, a public messaging platform ceaselessly utilized by cybercriminals.
Key findings
Between 2023 and 2024 in APAC:
- Common mitigated DDoS assault volumes rose 364%
- The variety of DNS flood queries rose 93%
- Authorities establishments had been the highest hacktivist targets, adopted by schooling.
“Throughout APAC, there was a pointy escalation within the frequency and depth of cyberattacks and DDoS incidents are main the cost,” stated Kenichiro Sasaki, Radware’s county supervisor in Japan. “A number of catalysts are driving the menace revolution, together with geopolitical conflicts, greater and extra complicated menace surfaces, and extra subtle and protracted threats. Add to that the impression of AI, which is reducing obstacles to entry, and what you’ve got is a extremely dynamic menace atmosphere that calls for equally dynamic protection methods.”
Community-layer DDoS assaults develop 3 times greater
In 2024, community DDoS assault exercise and depth witnessed a big uptick in APAC. In accordance with Radware’s menace intelligence:
- Assault exercise: The typical variety of DDoS assaults per buyer elevated 72% in comparison with 2023
- Assault quantity: The typical mitigated DDoS assault quantity climbed 364% over 2023
- Trade targets: Providers suppliers bore 55% of the community DDoS assault quantity, adopted by expertise at 21% and gaming at 11%
Software-layer DNS DDoS assaults put up main beneficial properties
Final 12 months was a pivotal 12 months within the world evolution of Layer 7 DNS DDoS assaults. Throughout 2024 in APAC:
- Assault exercise: The variety of DNS flood queries rose 93% in comparison with 2023
- Assault quantity: Malicious DNS quantity elevated 93% over 2023
- Trade targets: The manufacturing sector accounted for 43% of malicious DNS Question Flood exercise. Telecom (40%) ranked second, adopted by vitality (14%)
Hacktivist campaigns intensify, marked by retaliation and disruption
Propelled by political and ideological tensions, hacktivism remained a number one driver of cyberattacks. On a worldwide foundation, the whole variety of hacktivist-claimed DDoS assaults elevated by 20% between 2023 and 2204, in response to knowledge gathered from Telegram.
Throughout APAC, 2024 Telegram knowledge revealed:
- Geographic targets: The highest focused nation was India with 761 claimed assaults, adopted by Indonesia (614), Taiwan (281), Thailand (220), and Bangladesh (188)
- Trade targets: Authorities establishments had been the highest hacktivist targets, accounting for 17% of hacktivist exercise, adopted by schooling (12%) and finance (9%)
- High claiming actors: Executor DDoS was essentially the most prolific menace actor with 513 claimed DDoS assaults, adopted by RipperSec (467), and NoName057(16) (362)
A complete world view of the menace panorama will be present in Radware’s new 2025 International Risk Evaluation Report.
About Radware
Radware® (NASDAQ: RDWR) is a worldwide chief in utility safety and supply options for multi-cloud environments. The corporate’s cloud utility, infrastructure, and API safety options use AI-driven algorithms for exact, hands-free, real-time safety from essentially the most subtle internet, utility, and DDoS assaults, API abuse, and unhealthy bots. Enterprises and carriers worldwide depend on Radware’s options to handle evolving cybersecurity challenges and defend their manufacturers and enterprise operations whereas lowering prices. For extra data, please go to the Radware website.
