Botnets and Familiar Foes Drive DDoS Attack Activity - Netscout
- Tony Fortunato
- 6 days ago
- 1 min read
In March 2025, NETSCOUT observed over 27,000 distributed denial-of-service (DDoS) attacks, primarily driven by botnets exploiting longstanding vulnerabilities in web servers, routers, and Internet of Things (IoT) devices. These attacks did not rely on novel exploits but instead utilized known weaknesses to launch persistent campaigns, with service providers experiencing an average of one attack every two minutes. The peak occurred on March 10, with more than 1,600 incidents recorded in a single day .(NETSCOUT)
The most prevalent attack vector was TCP SYN floods, accounting for approximately 20% of all incidents. Attackers frequently employed multivector strategies, combining methods such as TCP SYN with DNS flooding or TCP ACK to amplify their impact. This approach reflects a shift towards more sophisticated and sustained DDoS campaigns, emphasizing the need for robust defense mechanisms .(NETSCOUT)

The continued exploitation of known vulnerabilities underscores the importance of proactive cybersecurity measures. Organizations are encouraged to regularly update and patch systems, particularly those involving IoT devices, to mitigate potential threats. Implementing comprehensive DDoS protection strategies is crucial in safeguarding against the evolving tactics employed by attackers.