Q3 2025 DDoS, bad bots, and BGP incidents statistics and overview
Reports

Executive summary

  • The largest number of DDoS attacks in Q3 2025 targeted the FinTech (26.1%), E-commerce (22.0%), Media (15.8%), and Information and communication technology (14.5%) segments. Together, these four accounted for nearly 80% of all recorded attacks.
  • Among microsegments, the most frequently targeted in Q3 were Media, TV, radio, and bloggers (14.1%), Payment systems (13.9%), Food retail (13.0%), Digital education (7.2%), and Hosting platforms (6.6%).
  • The most intensive L3-L4 DDoS attack of Q3 targeted an organization in the Online retail microsegment, reaching a peak bitrate of 1.15 Tbps — slightly higher than the 2024 record of 1.14 Tbps.
  • The longest DDoS attack in Q3 lasted more than nine days (225.9 hours). For comparison, the 2024 record was 19 days (463.9 hours).
  • In Q3, we recorded another attack launched by a multi-million-device DDoS botnet that we have been tracking for the past six months. This time, the attack involved 5.76 million infected devices, primarily from Brazil, Vietnam, the United States, India, and Argentina.
  • In Q3, Brazil became the largest source of L7 DDoS attacks (19%), surpassing Russia (18.4%) and the United States (10.3%).
  • We attribute the emergence of such large-scale DDoS botnets and the growing share of developing countries among L7 DDoS sources to the rapid increase in the number of vulnerable devices connected to high-speed Internet and the active use of AI-powered tools by attackers.
  • After a sharp increase in bad bot activity in Q2 2025 — mainly driven by a single, exceptionally long-lasting attack — the figures dropped significantly quarter over quarter in Q3 (-37%).
  • At the same time, the bot index declined noticeably: the share of bot traffic in the total traffic to protected resources decreased from 2.34% to 1.36%.
  • In Q3 2025, the number of unique ASes responsible for route leaks remained almost unchanged compared to previous periods. However, the number of ASes involved in BGP hijacks was lower than usual due to a noticeable decline in July.
  • After a significant increase in Q2 2025, the number of global BGP incidents dropped sharply. In Q3, we recorded only five such incidents — four global route leaks and one global BGP hijack.
Read more
Massive L7 DDoS botnet expands to 5.76M devices, Qrator Labs reports
Qrator

On September 1, 2025, Qrator.AntiDDoS detected and mitigated another large-scale attack carried out by the largest L7 DDoS botnet observed to date. The target was an organization in the government sector. In total, 5.76 million IP addresses were blocked during the incident.

Read more
The top 7 DDoS protection myths that are putting your business at risk
Qrator

DDoS attacks are still one of the most dangerous types of cyber threats, and they are getting bigger and more complicated. In 2024, there were more than 15 million DDoS attacks reported around the world. Our most recent study estimates application-layer DDoS attacks are up 74% compared to last year. But many businesses still don't know how to keep themselves safe from these kinds of threats. In this article, we'll talk about seven of the most common myths about protecting against DDoS attacks

Read more
Q2 2025 DDoS, bots and BGP incidents statistics and overview
Reports

Executive summary

  • The total number of L3-L4 DDoS attacks in Q2 2025 increased significantly compared to Q2 2024 (+43%).
  • The largest share of L3-L4 DDoS attacks in Q2 targeted the “FinTech” (22.6%), “E-commerce” (20.6%), and “Information and communication technology” (16.1%).
  • The most intense L3-L4 DDoS attack of Q2 reached a peak bitrate of 965 Gbps — just shy of last year’s record (1,140 Gbps). The attack targeted an organization in the “Betting shops” microsegment and was likely linked to Alexander Ovechkin setting a new NHL all-time scoring record.
  • The longest L3-L4 DDoS attack of Q2 lasted just over four days (96.5 hours). For comparison, the 2024 record was 19 days (463.9 hours).
  • The number of L7 DDoS attacks in Q2 2025 rose dramatically compared to Q2 2024 (+74%).
  • The most frequent targets of L7 DDoS attacks in Q2 2025 were the “FinTech” (43.6%), “E-commerce” (22.6%), and “Information and communication technology” (18.2%) segments.
  • At the microsegment level, the largest share of L7 DDoS attacks targeted “Banks” (24.7%), “Software services” (12.9%), “Food retail” (10.9%), “Payment systems” (8.5%), and “Online retail” (6.1%).
  • The longest L7 DDoS attack in Q2 2025 lasted 65.5 hours.
  • In Q2, we recorded an attack that involved the largest DDoS botnet to date, comprising 4.6 million devices. This is 3.5 times larger than the previous record set in Q1 (1.3 million) and 20 times larger than the biggest botnet we detected in 2024 (227,000 devices).
  • The top three countries from which L7 DDoS attacks originated in Q2 2025 remained unchanged from 2024: “Russia” (17%), the “United States” (16.6%), and “Brazil” (13.2%), with Brazil’s share continuing to grow steadily over several consecutive quarters.
  • Bad bot activity in Q2 2025 increased by 31% compared to the previous quarter, with most of the traffic surge occurring in April and May.
  • This growth was primarily driven by a single prolonged attack targeting the “E-commerce” segment, which began in April and lasted for over a month, ending in May. As part of the mitigation efforts, we blocked approximately 2 billion bad bot requests — equivalent to an entire month’s worth of bot traffic.
  • The number of unique autonomous systems involved in route leaks and BGP hijacks in Q2 2025 remained roughly in line with the levels observed over the previous several quarters.
  • After a sharp decline recorded in the previous quarter, the number of global BGP incidents rose significantly in Q2 and set a new quarterly record. We observed 14 such incidents: 10 global route leaks and 4 global BGP hijacks.
Read more
Q1 2025 DDoS, bots and BGP incidents statistics and overview
Reports

Qrator Labs' findings on DDoS attacks, BGP incidents and bot activity in the 1st quarter of 2025.

Read more
Q3 2024 DDoS, Bots and BGP Incidents Statistics and Overview
Reports

Qrator Labs presents statistics on DDoS attacks, BGP incidents and bot activity in the 3rd quarter of 2024.

Read more
Q2 2024 DDoS, Bots and BGP Incidents Statistics and Overview
Qrator

Dive into Q2 DDoS and BGP Incidents Statistics and Overview.

Read more
The Differences Between Layer 4 And Layer 7 DDoS Attacks
Qrator

Learn about the distinct methodologies and impacts of layer 4 and layer 7 DDoS attacks, from SYN floods and UDP floods at the transport layer to HTTP floods and Slowloris attacks at the application layer. Understand how cybercrime services like booters facilitate these attacks and explore notable case studies, including the Dyn and GitHub incidents.

 

Read more
Meet the Сharming Radar Application Look and Updated Weekly Reports
Radar

In our ongoing commitment to providing a convenient tool for everyday use, we are excited to announce a complete revamp of the UI/UX design of the Qrator.Radar web application. 

Our team enjoyed working to create a more user-friendly interface, improved navigation, and better data visualization.

These updates aim to improve our users’ experience and simplify the processes of connectivity troubleshooting and network anomaly analysis.

These and other interesting features await you on our updated Qrator.Radar website. 

 Dive in and explore all the changes we've made firsthand.

CHECK OUT THE NEW LOOK

https://radar.qrator.net

 

Read more
The Top 4 Ways to Mitigate HTTP/2 Rapid Reset (CVE-2023-44487)
Qrator

In August 2023, a vulnerability in the HTTP/2 protocol, known as CVE-2023-44487 or "Rapid Reset," was discovered. This article provides an in-depth understanding of how CVE-2023-44487 works, its impact on HTTP/2, and offers 4 mitigation strategies to defend against this vulnerability.

 

Read more