DDoS Holiday Infographic 2022
DDoS Holiday Infographic 2022
yourself from
holiday-season
DDoS attacks
While distributed denial-of-service (DDoS)
attacks happen all year round, the holidays are
one of the most popular times and where some
of the most high-profile attacks occur.
DDoS refresher
DDoS attacks are carried out by individual devices What? Why? How?
(bots) or network of devices (botnet) that have been
infected with malware and used to flood websites or
services with high volumes of traffic. DDoS attacks A DDoS attack Criminals use Thanks to the
can last a few hours, or even days. floods a site or DDoS attacks cybercrime as a
server with to extort site service business
errant traffic to owners for model, a DDoS
disrupt service financial, attack can be
or knock competitive ordered from
it offline. advantage, or a DDoS
Rise of the political subscription
hacktivists reasons. service for as
little as $500.1
Politically motivated attackers, also
Example:
known as “hacktivists,” use DDoS
attacks to disrupt political processes. In a February 2022 prelude to invasion, anti-Ukraine
hacktivist attackers launched what has been described
as the largest DDoS attack in history against Ukrainian
banking and government websites.2
1 2 3
Organizations typically Traffic volume is at an For attackers seeking
have reduced resources all-time high, especially for financial gain, the
dedicated to monitoring e-commerce websites and opportunity for more
their networks and gaming providers, making lucrative payouts can be
applications—providing it harder for IT staff to higher during the holidays
easier opportunities for distinguish between as revenues are at the
threat actors to execute an legitimate and illegitimate highest and service uptime
attack. traffic. is critical.
Targets bandwidth. They are Targets resources. They exploit Targets web application packets.
designed to overwhelm the weaknesses in the layer 3 and They disrupt the transmission of
network layer with traffic. layer 4 protocol stack. data between hosts.
Example Example Example
A DNS (domain name server) A SYN (synchronization An SQL injection attack, which
amplification attack, which uses packet flood) attack, which inserts malicious code into
open DNS servers to flood a consumes all available server strings that are later passed to
target with DNS response traffic. resources (thus making an instance of SQL Server for
a server unavailable). parsing and execution.
Attackers can use multiple attack types, including ones from different categories, against a network.
With DDoS attacks at an all-time high during the holidays, you need a DDoS protection
service with advanced mitigation capabilities that can handle attacks at any scale. Look
for service features such as traffic monitoring; adaptive real-time tuning; DDoS
protection telemetry, monitoring, and alerting; and access to a rapid response team.
If you think you are experiencing an attack, reach out to the appropriate technical
professionals, such as an established DDoS response team, for help with attack
investigation during an attack as well as post-attack analysis once it has concluded.
While you’ll likely want to move on as quickly as possible if you’ve experienced an attack,
it’s important to continue to monitor your resources and conduct a retrospective after an
attack. Make sure your post-attack analysis considers the following:
©2022 Microsoft Corporation. All rights reserved. This document is provided “as-is.” Information and views
expressed in this document, including URL and other Internet Web site references, may change without notice.
You bear the risk of using it.
1 Microsoft Digital Defense Report 2022 | Microsoft Security 2 Ukraine Suffers Biggest DDoS Attack on Record in Russia Standoff - Bloomberg