Infrastructure Trends and Traffic Insights – December 2024

January 15, 2025
Infrastructure Trends and Traffic Insights – December 2024
Share on LinkedIn

Business operations rely on the organization’s digital infrastructure, with everything from internal applications to customer-facing websites relying on continued availability. Recognizing the importance of connectivity, cybercriminals increasingly target the digital infrastructure, seeking to disrupt operations.   

For security teams, threat intelligence provides some insight into the types of attacks deployed in the wild. However, many still face challenges in gaining insight into hard-to-track attack types, like Distributed Denial of Service (DDoS) attacks, where threat actors deploy evasion techniques with carpet bombing attacks. To protect business reputation and customer trust, organizations need to monitor for and protect against damaging service disruptions.  

This monthly roundup of reports provides information to help defenders manage their cloud-based security.   

Every month, Vercara reports on trends across three critical infrastructure domains: 

  • Distributed Denial of Service (DDoS) attacks 
  • Domain Name Service (DNS) traffic 
  • Web Application Firewall (WAF) attacks 

DDoS: Law enforcement operations impact attackers  

Overall, DDoS attacks saw a 36.17% month-over-month decrease, which is likely tied to law enforcement’s Operation PowerOff at the beginning of December to disrupt malicious actors’ ability to conduct DDoS attacks during the holiday season. Of the data gathered, the following highlights offer insights:  

  • 3,102 DDoS attacks detected, with Vercara’s monitoring and mitigation preventing approximately 1,137 hours of downtime 
  • 75% increase in mega attacks when compared to November 
  • 762.16% increase in attacks generating 500,000 to 1 million packets per second, indicating threat actors making tactical shifts to prioritize packet volume over bandwidth. 
  • Carpet bombing attacks accounted for 61% of all observed DDoS attacks in December 2024 

 For more details, see the DDoS Analysis report 

Carpet bombing continues to prevail 

In carpet bombing DDoS attacks, malicious actors target numerous IP addresses with smaller-sized attacks to evade detection, making mitigation more difficult. Small attacks between 0-0.5 GBPS accounted for 70.98% of December DDoS attacks.   

Carpet bombing attacks remain the primary threat, but the largest increase in gigabit per second attacks were attacks consisting of 10-50 Gbps which saw a 117.89% increase suggesting that malicious actors potentially shifted their Tactics, Techniques and Procedures (TTPs) to focus on larger packet attacks to degrade network performance more effectively. This shift in TTPs aligns with the observed trends in malicious actor behavior, where targeting high packet rates can overwhelm network infrastructure even when overall attack bandwidth decreases.  

Comparing month-to-month changes notes the following:  

  • Small attacks (0-0.5 gbps): -40.35% 
  • Mega Attacks (100+ Gbps): 75% 

While mega attacks (100+ Gbps) saw 75% increase in December compared to November, they only accounted for 7 of all DDoS attacks (approximately 0.23% of all DDoS attacks).  

Since most organizations typically set alert triggers at higher gigabit levels, carpet bombing DDoS attacks create mitigation challenges because the threat actors: 

  • Remain under alerting thresholds 
  • Flood networks 
  • Rotate target IPs and destinations 
  • Rotate targeting method

 

Top 3 attack vectors remain mostly static  

Total Traffic as an attack vector maintained its number one spot. While some shifts across the top four occurred in terms of percentages, the top three remained the same compared to November.   

The top four attack vectors for December were: 

  1. Total Traffic: 30.78% (compared to November’s 47.76%) 
  2. TCP ACK: 14.43% (compared to November’s 11.44%) 
  3. UDP: 14.07% (compared to November’s 16.86%)  
  4. TCP SYN/ACK Amplification: 10.91% 

The number of observed DDoS attacks consisting of one DDoS vector decreased from 78.81% in November to 48.65% in December.  

Top 3 industries 

December’s top three industries by percentage of events were: 

  1. Communication service providers: 69.36% (compared to November’s 28.16%) 
  2. Financial Services: 18.78% (compared to November’s 60.27%) 
  3. IT/Technical Services: 10.75%  

DNS: Small shifts offer larger insights 

As a longer month compared to November, Vercara Managed DNS noted a 1.49% increase in overall web traffic for December while marking a significant milestone of over 4.2 trillion DNS queries processed through the DNS servers. 

Vercara’s UltraDNS observed 157 DDoS attacks targeted against the platform in December, a 190.74% increase compared to November’s 101.  

To learn more, see the DNS Analysis report.

IPv4 and IPv6 trends 

Overall, December followed in November’s footsteps with the Top 3 DNS Query types: 

  1. A Record 
  2. AAAA record (quad-A) 
  3. Name Server (NS) 

The consistent percentage of quad-A record queries indicates a continued shift toward IPv6 and its additional security benefits.   

Notably, the Location (LOC) DNS record type, used to store geographic location data associated with a domain or host, saw a 4,220.67% increase compared to November.  

DNS response codes remain statistically stable 

The top two response codes remained the same month-over-month: 

  1. “No Error”: most prevalent response code at 78.25%, a 3.56% month-over-month increase 
  2. “NXDomain”: 21.33%, a 4.84% month-over-month decrease

The NX Domain response code can indicate a misconfiguration or attackers using DNS enumeration tools that can cause a DDoS attack.   

Industry sectors 

Industry sectors continue to work on and improve their DNS management, with December’s report showing both wins and areas for improvement.   

Generally, the DNS record-type queries provide insight into how the industry uses digital infrastructure. Some highlights include: 

  • Widespread requests for HTTPS records indicate an emphasis on secure web communications. 
  • Gaming and Gambling focus on MS records indicates the importance of reliable email communications.  

Software/Web Services and IT/Technical Services 

These two industries received the most DNS queries, representing 80.05% of all DNS queries. Software/Web Services accounted for 46.01%, while IT/Technical Services accounted for 34.04%. The number indicates the sectors’ extensive reliance on robust DNS services for: 

  • Web hosting 
  • Cloud services 
  • Technical operations 

Additionally, the Software/Web Services industry had a significant presence of ‘No Error’ responses, indicating effective DNS management. 

Financial Services and Health Care 

These two industries show a moderate presence of TXT records that indicate heightened emphasis on email authentication protocols like SPF or DKIM, signaling stronger cybersecurity awareness in sectors   

Web Application Firewall (WAF): Increased malicious and bot traffic 

During December, Vercara UltraWAF processed over 580 million web requests, a 1.72% decrease compared to November. Of these requests, 18.47% were malicious and 2.11% were identified as bot traffic.  

Notable payloads targeted vulnerabilities in frameworks like Sympfony, Jenkins, and Spring Boot. These payloads aimed to: 

  • Exfiltrate sensitive files 
  • Execute arbitrary code 
  • Exploit database errors 

To learn more, see the WAF Analysis report.

Get down…with malicious and bot activity  

December’s data found: 

  •  3.56% decrease in malicious activity compared to November 
  • 25.30% decrease in the amount of bot traffic compared to November

Top 3: the more things change, the more they stay the same 

Along with these overall increases, December showed additional changes: 

  1. Cookie threat category remained most prevalent, accounting for 41.56% of malicious traffic  
  2. Command Injection came in second, accounting for 26.53% of malicious traffic 
  3. Invalid RFC threat came in third, accounting for 14.15% of malicious traffic 

December countermeasure of the month 

Our featured countermeasure this month is Bot Trap, which detects scraping bots by adding unique links to an HTML page that only bots and other automated programs can follow. The system can effectively identify and block bots without impacting the user experience. 

Vercara recommends adding Bot Trap to a variety of pages that host or receive HTML forms, such as: 

  • Website search 
  • Shopping carts 
  • Login, logoff, and password reset 
  • Dynamically-generated pages backed by a database 
  • Contact us, talk to sales or any other incoming inquiries

Turnkey Cloud-based Security with Vercara 

Vercara provides a turnkey, multilayered approach to security with UltraDNS, UltraDDoS, and UltraWAF. With Vercara’s comprehensive suite of solutions, organizations gain advanced security capabilities, insights for informed decision-making, and improved resilience against cyber threats.   

To learn how Vercara’s suite of solutions can help defend your organization, contact our sales team.  

Published On: January 15, 2025
Last Updated: April 2, 2025

Interested in learning more?

Experience Unbeatable Protection
Schedule a demo to see our cloud solutions
  • Solutions
  • Products
  • Industries
  • Why Vercara
  • Plans
  • Partners
  • Resources
  • Company