Why DDoS Attacks Surged 203% in H1 2022: Insights from Radware Report

The 2022 H1 Radware report reveals a 203% rise in malicious DDoS attacks, a shift from pandemic‑related threats to patriotic hacker activity driven by the Russia‑Ukraine conflict, record‑size attacks, resurging RDoS ransomware, and retail and high‑tech sectors emerging as top targets.

MaGe Linux Operations
MaGe Linux Operations
MaGe Linux Operations
Why DDoS Attacks Surged 203% in H1 2022: Insights from Radware Report

According to Radware’s latest report, the number of malicious DDoS attacks in the first half of 2022 increased by 203% compared with the same period in 2021.

DDoS attacks surge

The volume of malicious DDoS attacks grew 203% year‑over‑year.

Malicious DDoS events in the first half of 2022 were 60% higher than the entire year of 2021.

In May 2022, Radware mitigated a massive carpet‑bombing attack delivering 2.9 PB of traffic, lasting 36 hours with a peak of 1.5 Tbps and sustained rates over 700 Gbps, making it one of the largest recorded DDoS attacks.

Patriotic hacker activity spikes

Pro‑Ukraine and pro‑Russia cyber militias intensified information theft, leakage, and denial‑of‑service attacks.

Groups such as DragonForce Malaysia, OpsBedil Reloaded, and OpsPatuk launched politically motivated operations against various nations.

DDoS attacks linked to the 2022 Philippine election targeted major media and communication outlets including CNN, ABS‑CBN, Rappler, and VERA Files.

The report warns that no organization is immune to cyber retaliation, and new large‑scale actors could increase unpredictability and misattribution, potentially escalating cyber conflict.

RDoS ransomware services resurge

A group claiming to be REvil launched a new RDoS campaign in H1 2022, embedding ransom notes in the payload.

In May 2022, Radware identified ransom letters from a group masquerading as Phantom Squad.

Retail and high‑tech sectors most targeted

Malicious web‑application transactions rose 38% in H1 2022 versus the same period in 2021, surpassing 2020 levels.

Predictable resource‑location attacks accounted for 48% of all attacks, followed by code injection (17%) and SQL injection (10%).

The most attacked industries were retail and wholesale trade (27%) and high‑tech (26%); telecom operators and SaaS providers ranked third and fourth with 14% and 7% respectively.

Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

DDoSthreat intelligenceransomwarenetwork attacks2022 trends
MaGe Linux Operations
Written by

MaGe Linux Operations

Founded in 2009, MaGe Education is a top Chinese high‑end IT training brand. Its graduates earn 12K+ RMB salaries, and the school has trained tens of thousands of students. It offers high‑pay courses in Linux cloud operations, Python full‑stack, automation, data analysis, AI, and Go high‑concurrency architecture. Thanks to quality courses and a solid reputation, it has talent partnerships with numerous internet firms.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.