Key TakeAWAYS
  • A record-breaking DDoS attack in late 2025 hit over 200 million requests per second, signalling a new era of hyper-volumetric cyber assaults.
  • DDoS activity surged dramatically, with Cloudflare mitigating 47.1 million attacks in 2025, more than double the previous year.
  • Attacks are becoming cheaper and easier to launch due to commoditised tools and the rapid growth of vulnerable, internet-connected devices.

In the final weeks of 2025, a massive botnet of infected Android TVs launched a holiday cyber assault so large it had a name: "The Night Before Christmas." This digital siege bombarded global internet infrastructure, culminating in a hyper-volumetric strike that hit over 200 million requests per second.

To put that in human terms, it was like the entire combined populations of the UK, Germany, and Spain trying to access a website at the same microsecond. According to Cloudflare's Q4 2025 DDoS Threat Report, this record-shattering campaign was the loudest explosion in a year where digital attacks evolved into a full-scale arms race.

MORE INSIGHTS ON THIS TOPIC:

Why DDoS Attacks Are in Overdrive

The most striking trend from 2025 is the sheer increase in the frequency of attacks. The total number of DDoS attacks mitigated by Cloudflare more than doubled year-over-year, reaching 47.1 million attacks for the year.

Security analysts point to the increasing commoditisation of attack tools and the explosive growth of vulnerable, internet-connected devices. Building a powerful botnet is cheaper and easier than ever.

According to Cloudflare's analysis, “most DDoS attacks are coming from IP addresses associated with Cloud Computing Platforms and Cloud Infrastructure Providers, including DigitalOcean (AS 14061), Microsoft (AS 8075), Tencent (AS 132203), Oracle (AS 31898), and Hetzner (AS 24940).” Attackers are effectively renting firepower from the same global infrastructure that businesses rely on, weaponising the cloud itself.

This translated to a relentless pace of attacks: on average, 5,376 DDoS attacks were launched every hour throughout 2025. Of these, the overwhelming majority, roughly 73%, were network-layer attacks, which attempt to flood internet pipes with garbage data. This category saw the most extreme growth, more than tripling from 2024 to reach 34.4 million attacks.

Targeting the Internet's Heart

For years, the Information Technology sector bore the brunt of these assaults. In 2025, the bullseye moved decisively to Telecommunications, Service Providers, and Carriers.

The reason is one of maximum impact. Crippling a single company's website causes limited, localised damage. But overwhelming a major telecom provider or internet service carrier can disrupt connectivity for entire cities, regions, or business ecosystems, creating waves of chaos far beyond the initial target.

This strategic intent was on clear display in the first quarter during an 18-day campaign that launched approximately 13.5 million attacks directly at global internet infrastructure. Attackers are no longer just targeting buildings; they’re trying to take out the foundations.

The Era of the Hyper-Volumetric Blast

If 2025 saw more attacks targeting more critical targets, it also saw attacks of previously unimaginable scale. The industry defines the most extreme strikes as "hyper-volumetric," and their frequency grew by 40% in the final quarter alone.

The size of the largest recorded attacks in late 2025 grew by over 700% compared to their counterparts just a year earlier. This trend of one-upmanship culminated in multiple public world records, including a single, blindingly fast attack that reached 31.4 Terabits per second, a flood of data capable of saturating the connections of the world's largest data centers—before being neutralised in just 35 seconds.

This leap in destructive power is fueled by botnets like Aisuru-Kimwolf. By compromising millions of always-on, high-bandwidth consumer devices, attackers assemble distributed digital armies with unprecedented combined strength. The humble smart TV in a living room, when marshaled with millions of its kind, becomes an artillery piece in a global barrage.

Crypto Users Are Losing Millions to Address Poisoning Scams
Address poisoning and signature phishing scams drained tens of millions of dollars in January, as attackers exploited user habits and lower transaction fees to steal crypto at scale.

A Shifting Global Battlefield

The geography of this conflict is also in constant flux, revealing its dynamic and opportunistic nature. In the final quarter, the United Kingdom experienced a dramatic surge, leaping 36 places to become the world's sixth most-attacked location. Simultaneously, Argentina soared an incredible 20 spots to become the fourth-largest source country for attack traffic.

These sudden shifts highlight a core truth: there are no permanent safe havens or fixed enemy territories. Attackers continuously probe for and exploit new concentrations of vulnerable targets or regions with transient weaknesses in network security, making the threat landscape unpredictably global.

The Imperative for Autonomous Defense

Confronting an onslaught of this speed, scale, and sophistication has rendered traditional, human-monitored defence systems obsolete. An attack that peaks and ends in less than a minute cannot be stopped by a team of analysts. The industry's necessary evolution has been toward fully autonomous, AI-driven mitigation systems that can detect, analyse, and neutralise threats in milliseconds, often before any human is even aware an attack is underway.

The final, crucial layer of modern defence is collaboration. Recognising that botnets are a shared problem infecting devices across countless independent networks, security firms and infrastructure providers have begun sharing real-time threat intelligence. This allows an internet service provider in Asia or a cloud host in Europe to quickly identify and quarantine infected devices on their own networks, working to dismantle botnets at their source. In this new arms race, collective vigilance is as vital as any single company's defensive technology.

The lesson from 2025 is unequivocal. The DDoS threat has evolved from periodic digital vandalism to a continuous, automated, and existential test of global resilience. For any organisation operating online, reliance on outdated defences is a profound risk.

Survival in this new era depends on deploying intelligent, autonomous protection and participating in the collective effort to safeguard the interconnected infrastructure we all depend on. The next record-breaking attack is not a matter of "if," but "when," and the clock is ticking.

DDoS attacks were down in the second quarter of 2025
But, DDoS attacks are getting smarter, not just louder.