Discover our new Cybersecurity Report 2025! Free download – valuable insights.

Example view of a DDoS attack

What is a DDoS attack?

7 out of 10 organizations expect serious damage from DDoS attacks.” – Lünendonk 2023
 
For more than 20 years, criminals have been using DDoS attacks to deliberately harm companies and institutions. Due to their immensely powerful nature, they are an incalculable and very serious threat. Thanks to Myra DDoS protection, your IT infrastructure is safe.

Explore the Myra DDoS Protection
Explanation graphic in which 3 layers DDoS attacks are defended against by Myra.

01

What is „DDoS“?

A DDoS attack is a special type of cybercrime. As its name says, a Distributed Denial of Service (DDoS) attack is a Denial of Service (DoS) attack that is “distributed.” This means that a requested service is no longer available or only to a very limited extent. In most cases, this is caused by an intentional overloading of the IT infrastructure. Attackers use this kind of cybercrime to extort money from unprotected organizations or to carry out, cover up, or prepare for other criminal activities.

Security camera

02

What Does a DDoS Attack Look Like?

During a DDoS attack, the attackers target a service or server to make it unavailable. One of the ways they do this is by infecting multiple computers with malware, which they then use to take control of these computers unnoticed. The attackers misuse this infected computer network—also called a botnet—to carry out remote-controlled DDoS attacks. Via the botnet, they launch simultaneous attacks on their target, bombarding its infrastructure with countless requests.

 

The more computers are linked together, the more potent the attack is. When vulnerable servers are attacked, they are overwhelmed by the enormous number of requests, and their Internet connection is overloaded. As a result, websites only operate very slowly or are no longer available at all.

Person works on a laptop

03

Distributed Reflection Denial of Service Attack (DRDoS)

A Distributed Reflection Denial of Service attack is a special form of DoS. In this case, malicious requests do not originate from e.g. a botnet, but from normal internet services. Via IP spoofing (sending IP packets with forged IP sender addresses), attackers manipulate these services to direct traffic towards the target. This approach make it possible to conceal attacks. DRDoS attacks take place e.g. via DNS services, as DNS amplification attacks, in which massive amounts of data flood the victim. In an attack on the anti-spam organization spamhaus.org, one such DNS amplification attack led to peak loads of 300 Gbit/s.

4. Who Are the Attackers?

The motives of the attackers are varied. They range from blackmail and destruction to political protest or boredom. However, the goal is always the same: to slow down and paralyze the targeted applications and infrastructures with artificial requests.

Icon group of cyber criminals

Script Kiddies

The term “script kiddies” is primarily used to describe cyber attackers with limited technical skills who use ready-made tools and freely available scripts for their attacks. Although they are often dismissed as “amateurs”, their actions can cause considerable damage - especially if the attacked applications and infrastructures do not have dedicated protection systems.

Icon group of cyber criminals

Cybercriminals & Hacktivists

The absolute majority of all DDoS attacks are carried out by cybercriminals and hacktivists. While cybercriminals primarily pursue monetary goals with their attacks, for example to extort ransom money, hacktivists strive to cause as much damage as possible with a high public profile in order to pursue a political agenda with the resulting uncertainty among the population.

Icon group of cyber criminals

State-Sponsored Cyber Actors

In hybrid warfare, state cyber actors of authoritarian regimes use DDoS attacks to destabilize the infrastructure of enemy countries. Examples of this include attacks on energy suppliers or government networks, which are increasing in the wake of geopolitical tensions. Such attacks are often part of larger cyber warfare strategies.

05

Targets of DDoS Attacks

DDoS attacks are not just a technical challenge; they are often part of a larger strategy by cybercriminals. The target of these attacks can be multi-faceted and it is crucial to understand the motives behind the attacks to take effective security measures.

Blackmail and financial motivation

A widespread aim of DDoS attacks is to blackmail companies. Attackers often use DDoS attacks as leverage to demand a ransom. They threaten to disrupt a company's services for a certain period of time unless they receive payment. This can be particularly devastating for companies that rely on their online presence.

Damage to reputation and crowding out competition

DDoS attacks can also be used to damage a company's reputation. If a company is offline during an attack, this can deter potential customers and damage credibility. In highly competitive industries, some players use DDoS attacks to weaken competitors or reduce their market share.

Spreading political or activist messages

Sometimes DDoS attacks are a tool of activism. Groups campaigning for social or political change use DDoS attacks to draw attention to their causes. These so-called “hacktivists” see their actions as forms of protest, even if in many cases they enter legal and ethical gray areas.

Distraction for other attacks

DDoS attacks can also be used as a distraction to carry out other, more subtle attacks. While an organization's IT department is busy fending off the DDoS attack, attackers may attempt to infiltrate the network and steal sensitive data. This tactic underscores the need for a holistic approach to security that does not view DDoS protection in isolation.

Exploring vulnerabilities

Another reason for DDoS attacks can be the intention to test a company's defense mechanisms. Cybercriminals can use DDoS attacks as a way to find out how well a company responds to such threats and what vulnerabilities may exist.

Cybercriminal in a dark room

06

What Methods Do Attackers Use?

Cybercriminals use different kinds of DDoS attacks. The methods used can be divided into different categories based on what layers (according to the Open System Interconnection model for network protocols, or OSI model for short) are the focus of the attack.

 

One of the most common methods is to overload system resources or network bandwidths (layers 3 and 4). In the last few years, there has been a trend among cybercriminals to shift attacks to the user level (layer 7). But the patterns and bandwidths of DDoS attacks change on a daily basis. With the right DDoS security measures, you are protected against all attack patterns.

DDoS Attacks on Layers 3 and 4

CP SYN floods and UDP-based reflection attacks are among the most frequent attacks on the network and transport layer (layers 3 and 4). Other typical methods of attack include ICMP flood, UDP fragmentation, UDP amplification via DNS, NTP, rpcbind, SSDP, ACK flood, and RST flood. All of these attacks either overload the target with very high bandwidth or enormous packet rates. Legitimate attempts to access the data channel to establish communication are no longer possible.

In a SYN-ACK flood attack (or SYN and ACK floods), for example, a botnet remotely controlled by attackers bombards a server with SYN packets. They are usually part of what is called at three-way handshake, which occurs when a TCP connection is established between client and server. A SYN/ACK attack produces a huge number of half-open connections by sending many SYN, but none of the ACK packets needed to establish a full connection. As a result, no new connections can be established and the website is no longer accessible.

Myra Cloud Scrubbing protects IT infrastructure against such volumetric attacks on the network and transport layers. Detailed traffic analyses are provided by automatic flow monitoring. The failover of affected networks in case of an attack is fully automated.

DDoS Attacks on Layer 7

DDoS attacks on the application layer (layer 7) are based on connections that have already been established and have become one of the most common forms of attack. HTTP GET, POST, and other flood attacks as well as low and slow attacks are particularly popular with cybercriminals. They seek to penetrate the weakest component of an infrastructure, causing an overload of the web application.

For example, an attacker uses an HTTP GET flood attack to flood a web server with HTTP requests that specifically request pages with a large load volume. This causes the server to overload and it is no longer able to process legitimate requests. As a result, the website is no longer accessible to users.

Attacks on the application layer are usually not detected by the sensors used to protect the network and transport layers. Since they consist of standard URL requests, flood attacks are difficult to distinguish from normal traffic. Layer 3 and 4 protection systems, for example, cannot distinguish between an HTTP GET flood attack and a valid download. Accordingly, securing a web application requires IT security on all relevant layers. Specifically, attacks aimed at stealing sensitive data can only be detected and fended off by using Layer 7 protection.

Myra DDoS Web Protection protects web applications on layer 7 fully automatically. With full traffic visibility, Myra enables intelligent load balancing and site failover with high reliability and minimal response times.

07

AI Botnets and AI Operators Increase DDoS Risk

The widespread availability of large language models (LLM) and other AI solutions is exacerbating the cyber threat situation. Attackers are abusing these advanced technologies to disguise DDoS attacks, adapt their attack methods to existing defenses and search for vulnerabilities in applications and infrastructures.

The integration of AI technologies into DDoS attacks leads to a qualitative and quantitative escalation of the threat situation. AI-driven botnets such as Zergeca or DDoSia use advanced technologies such as DNS-over-HTTPS (DoH) for obfuscated communication and automated attack adaptations in real time. These systems analyze vulnerabilities much faster than traditional tools - newly published vulnerabilities are exploited within hours to generate tailored exploits that combine targeted WAF evasion techniques and multi-vector attacks.

AI operators also enable dynamic attack patterns: algorithms continuously vary parameters such as packet sizes, header data or query frequencies during ongoing attacks in order to outwit mitigation systems. The ability of modern AI bots to imitate human usage patterns (e.g. click behavior, session duration) is particularly critical, which makes it considerably more difficult to differentiate between legitimate access and attack traffic.

08

Case Study: DDoS Attack Wave Before Austrian National Elections

In September 2024, a significant increase in DDoS attacks on Austrian organizations in connection with the national elections was observed over a longer period of time. On 16 September, the Austrian Computer Emergency Response Team (CERT.at) warned of a large-scale DDoS attack campaign against authorities and organizations in the country.

 

Websites of ministries, administrative authorities, energy suppliers, public transport systems and political parties were particularly affected. The attacks led to temporary outages at several important institutions, including the websites of the ÖVP and SPÖ parties, the Ministry of Defense, the Austrian Court of Audit and the Public Employment Service (AMS), according to media reports.

 

Thanks to Myra's protection systems, a central state authority was able to fend off a 24-hour attack so that no consequences were recorded. The graphic (left) shows the traffic flow of the attack: the attackers attempt to paralyze the servers in several waves and using different attack vectors.

Person on laptop and with cell phone in hand writing code

09

When is DoS/DDoS a criminal offense?

In general, DoS/DDoS attacks on a service on the internet are to be regarded as computer sabotage in Germany pursuant to Section 303b of the Criminal Code (StGB) and are hence prosecutable under criminal law. It is irrelevant whether the attack has a criminal intent (e.g. for ransom demands) or takes place as part of a politically motivated act of protest. In some countries, downloading or possessing DoS or DDoS software is itself a criminal offense. Such attacks may generally only be within the law when applied to one’s own hardware on one’s own network. Exceptions apply to hired security auditors as part of penetration testing.

What Are the Consequences of an Attack?

An attack always harms affected companies and institutions, regardless of which method is chosen. Victim organizations still suffer from the consequences even years later. It is therefore extremely important to be adequately protected against DDoS attacks.

Icon attention danger

Economic Damages

A few minutes offline can quickly cost thousands of euros. Lost profits and wasted marketing budgets are only one example of the financial damages suffered.

Icon attention danger

Image Damage

The extent of damage to a company’s reputation caused by a successful DDoS attack is incalculable. Recovery costs a great deal of resources and may take years.

Icon attention danger

Data Theft

During a DDoS attack, systems no longer operate normally. The heavy load or overload causes some systems to suddenly become vulnerable and opens up new vectors of attack.

11

Why the IoT is a DDoS accelerator

The collective term IoT (Internet of Things) encompasses a variety of networked devices, e.g. from private households, such as IP cameras, but also networked industrial production systems, as well as intelligent control elements in public infrastructure. These devices connected to the internet make an attractive target for cybercriminals, since they can be used as tools for DDoS and other attacks. In order to gain control over IoT devices, cybercriminals employ special malware which spreads independently in networks. The goal is usually to compromise as many systems as possible in order to use them for botnet attacks. One popular example of this kind of malicious software is the malware Mirai, used by cybercriminals to set up botnets. Mirai is associated with the attack on the internet service provider Dyn in 2016. A network of several thousand IP cameras, printers, smart TVs and other devices carried out the attack as a DDoS network and crippled Dyn’s servers for hours on end.

Thermal image train station

12

Which Industries Are Affected?

Any industry and any company can be the victim of a DDoS attack, regardless of its size. The question is when—not whether—an attack will be leveled against your company and how quickly it will be discovered. The main targets of cybercriminals and extortionists are e-commerce businesses, banks, FinTech companies and insurance companies, manufacturing companies, media, and the health sector. Data centers and public sector organizations are also preferred targets of DDoS attackers. The motives of these criminals go way beyond demanding money: With their attacks, they want to paralyze production plants and processes, interrupt the supply of power or energy, and influence reporting.

13

How to prevent DDoS attacks

DDoS mitigation requires the use of special protection technologies. These are available both as an appliance for use on premises as well as a SECaaS service. The latter variant is not throttled by the available bandwidth of the company’s own connection and can therefore be used much more agilely. Anti-DDoS solutions filter incoming traffic and thus differentiate between valid requests and malicious access. Companies that are particularly frequent targets of DDoS attacks leave their security measures permanently enabled, whereas others only use the solutions when necessary to reduce the costs and work involved.

14

Evolution of DDoS attacks

The frequency and intensity of DDoS attacks has continued to increase exponentially in recent years. While the strength of attacks increased massively in 2013 due to the use of DNS servers for DRDoS attacks, the attacks reached a new dimension in 2016 with the Mirai malware. This malware used a botnet of over 100,000 IoT devices to carry out a 1.2 Tbit/s attack on the service provider Dyn. In 2018, the coding platform GitHub was overloaded with traffic spikes of 1.35 Tbit/s and another US company experienced an attack with over 1.7 Tbit/s.

The situation has worsened in recent years. In 2024, the number of attacks fended off by Myra increased by 25 percent compared to the previous year. The public sector, the financial and insurance industry and critical infrastructures are particularly affected. The intensity of attacks has also increased: A record value of 5.6 Tbit/s was reached in October 2024. Complex attacks with multiple attack vectors have also increased.

15

Insights from the Myra Security Operations Center

Myra, as a specialist protection service provider for organizations in highly regulated industries, provides an accurate picture of traffic developments in areas such as finance and insurance, healthcare, the public sector and critical infrastructure (KRITIS).

 

  • In the first half of 2024, there was a significant increase in malicious traffic flows of 53% compared to the previous year, with a peak in July.

  • Over the course of the year as a whole, there was an increase in malicious requests of around 25% compared to the previous year.

  • The malicious traffic flows are made up of DDoS attacks, bot attacks and malicious attempts to access databases via cross-site scripting (XSS), cross-site request forgery (CSRF) or SQL injection.

FAQ on DDoS attacks

About the author

Stefan Bordel

Editor

About the author

Stefan Bordel has been working as an editor and technical writer at Myra Security since 2020. In this role, he is responsible for creating and maintaining website content, reports, whitepapers, social media content and documentation. This role allows him to bring his extensive experience in IT journalism and technical knowledge to an innovative cyber security company. Stefan previously worked at Ebner Verlag (formerly Neue Mediengesellschaft Ulm) for 7 years and joined the online editorial team at com! professional after working for Telecom Handel. He gained his first journalistic experience during various internships, including at the IT website Chip Online. As a passionate Linux user, he follows the IT scene closely, both privately and professionally.