The Philippine National Police (PNP) has announced a state of 'full alert' for its cybersecurity divisions in response to credible threats of a coordinated Distributed Denial-of-Service (DDoS) campaign targeting government websites. The anticipated attacks are expected to commence on November 5, 2025. In a proactive move, the PNP is collaborating with other key government bodies, including the Department of Information and Communications Technology (DICT), to reinforce the security of critical online platforms and databases. This heightened posture aims to prevent disruption of essential public services and protect sensitive law enforcement data from being compromised or made inaccessible.
The threat is a potential wave of DDoS attacks specifically aimed at the digital infrastructure of the Philippine government. While the actors behind the threat have not been publicly named, the announcement of a specific start date suggests a planned and coordinated campaign rather than random attacks. The primary goal of a DDoS attack is to overwhelm a target's servers with a flood of internet traffic, rendering websites and online services unavailable to legitimate users. This falls under the MITRE ATT&CK technique T1498 - Network Denial of Service. The PNP is particularly concerned about protecting key systems such as:
A successful large-scale DDoS campaign against Philippine government websites could have several negative impacts:
Security teams should be monitoring for the following indicators of a DDoS attack:
| Type | Value | Description |
|---|---|---|
| network_traffic_pattern | Sudden, massive spike in inbound traffic | The most common indicator of a volumetric DDoS attack. |
| source_ip | Traffic from a large number of geographically diverse IPs | Indicates a distributed attack from a botnet. |
| protocol | High volume of SYN, UDP, or ICMP packets | Common vectors for volumetric and protocol-based DDoS attacks. |
| url_pattern | Repeated requests to a specific, resource-intensive page | Characteristic of an application-layer DDoS attack. |
The PNP Anti-Cybercrime Group is leading the response, in coordination with the DICT, the Cybercrime Investigation and Coordinating Center (CICC), and the National Telecommunications Commission.
Inbound Traffic Filtering.The PNP has stated it is implementing several preventative measures:
Use DDoS mitigation services and properly configured firewalls to filter out malicious attack traffic.
Implement specific anti-DDoS technologies and have a response plan in place to handle denial of service attacks.
To defend against the anticipated DDoS attacks, the Philippine government should employ a multi-layered Inbound Traffic Filtering strategy. The first layer should be a cloud-based DDoS scrubbing service that absorbs and filters volumetric attacks before they reach the government's own network infrastructure. Secondly, on-premise firewalls and load balancers should be configured with rate-limiting policies to prevent application-layer attacks from overwhelming web servers. These devices should also be configured to drop malformed packets and traffic from known malicious IP addresses sourced from threat intelligence feeds. This combination of off-site and on-site filtering provides a robust defense against a wide range of DDoS attack types.
Leveraging a Content Delivery Network (CDN) is a highly effective proactive measure against DDoS attacks. By distributing government website content across a global network of servers, a CDN can absorb and diffuse the traffic from a DDoS attack, preventing any single server from being overwhelmed. The CDN's distributed nature makes it inherently resilient to volumetric attacks. Furthermore, many modern CDNs include advanced DDoS protection and Web Application Firewall (WAF) capabilities at the edge, providing an additional layer of defense against both network-layer and application-layer attacks. The PNP and DICT should ensure all public-facing government websites are fronted by a reputable CDN service as a foundational element of their defense strategy.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats