A new threat report from global infrastructure provider Gcore reveals a dramatic escalation in the frequency and power of Distributed Denial-of-Service (DDoS) attacks. Comparing Q4 2024 to Q4 2025, the total number of DDoS attacks observed surged by 150%, from 512,000 to 1.3 million. More alarmingly, the sheer volume of these attacks has grown sixfold, with peak attack power reaching an unprecedented 12 Terabits per second (Tbps). The report underscores that attacks are becoming cheaper to launch, more frequent, and more sophisticated. Key targets remain industries where uptime is critical: technology (34%), financial services (20%), and gaming (19%). The findings point to a highly volatile threat landscape where organizations must be prepared for short, overwhelming bursts of malicious traffic.
The report, which analyzes DDoS trends from Q3 and Q4 2025, highlights several key shifts in attacker methodology:
DDoS attacks are becoming more accessible due to the proliferation of DDoS-for-hire or 'booter' services, which make it cheap and easy for even unskilled actors to launch powerful attacks. The evolving TTPs include:
T1498 - Network Denial of Service). The 12 Tbps volume is likely the result of a large-scale amplification attack.T1499 - Endpoint Denial of Service).Using cloud-based scrubbing services and on-premise appliances to filter out malicious DDoS traffic.
To combat the massive 12 Tbps DDoS attacks described by Gcore, organizations must leverage large-scale, cloud-based inbound traffic filtering, commonly known as a 'scrubbing center'. On-premise firewalls cannot handle this volume. The defense works by redirecting all of an organization's internet traffic (via BGP or DNS) to the DDoS mitigation provider's global network. This provider has massive bandwidth capacity and specialized hardware to absorb the attack traffic. It 'scrubs' the traffic, using signatures and behavioral analysis to separate the malicious packets from legitimate user requests. Only the clean, legitimate traffic is then forwarded to the organization's actual servers through a private connection. This is the only viable strategy to withstand multi-terabit attacks.
To defend against the longer, more sophisticated application-layer (L7) DDoS attacks, rate limiting is a crucial technique. This should be implemented at the Web Application Firewall (WAF) or Application Delivery Controller (ADC) level. It involves setting thresholds for the number of requests allowed from a single IP address to a specific URL within a given timeframe. For example, you could limit each IP to 10 login attempts per minute. If an IP exceeds this rate, it is automatically blocked for a period of time. This effectively mitigates attacks that rely on a high volume of HTTP requests from a botnet to overwhelm application resources, without impacting legitimate users.
Rapid detection is key, especially for the short-burst attacks mentioned in the report. Organizations should use network traffic analysis tools that ingest flow data (like NetFlow or sFlow) from their edge routers. These tools can provide a real-time, high-level view of traffic patterns. A DDoS detection system would use this data to baseline normal traffic volumes and protocol mixes. When a sudden, massive spike in UDP traffic on a specific port is detected, the system can automatically trigger an alert and, in a more advanced setup, initiate the BGP redirection to a cloud scrubbing provider. This automated detection-to-mitigation workflow is essential for responding to attacks that last less than a minute.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats