DDoS attacks have evolved into precision-guided weapons of geopolitical influence capable of destabilising critical infrastructure, according to new research from NetScout, with hacktivist groups like NoName057(16) orchestrating hundreds of coordinated strikes each month targeting the communications, transportation, energy, and defence sectors.
DDoS-for-hire services have democratised attack tools, NetScout says, enabling novice actors to execute sophisticated attack campaigns. AI-enhanced automation, multi-vector attacks, and carpet bombing techniques challenge traditional defences. Botnets compromised tens of thousands of IoT devices, servers, and routers delivering sustained attacks and causing significant disruption. While each of these elements is dangerous on its own, in aggregate, they have formed the perfect storm – creating unprecedented cyber risk for organisations and service provider networks around the world.
Key findings from the research include:
- Massive global attack volume– NetScout observed more than 50 attacks greater than a terabit-per-second (Tbps) and multiple gigapacket-per-second (Gpps) attacks in the first half of 2025 – including a 3.12 Tbps attack in the Netherlands and a 1.5 Gpps attack in the US.
- Geopolitical events triggered unprecedented DDoS attacks – The India-Pakistan conflict saw hacktivist groups target the Indian government and financial sectors in May, while the Iran-Israel conflict generated more than 15 000 attacks against Iran and 279 against Israel in June.
- Botnet-driven attacks gained sophistication– More than 880 bot-driven DDoS attacks occurred daily in March, peaking at 1 600 incidents and with attack durations increasing to an average of 18 minutes.
- New threat actors emerged – Leveraging DDoS-for-hire infrastructure, DieNet orchestrated over 60 attacks since March, while Keymous+ launched 73 attacks across 28 industry sectors in 23 countries.
- NoName057(16) maintained dominance– Claiming more than 475 attacks in March alone – 337% more than the next most active group – the hacktivist group targeted government websites in Spain, Taiwan, and Ukraine.
“As hacktivist groups leverage more automation, shared infrastructure, and evolving tactics organisations must recognise that traditional defences are no longer sufficient,” says Richard Hummel, director, threat intelligence at NetScout. “The integration of AI assistants and the use of large language models (LLMs) such as WormGPT and FraudGPT, escalates that concern. And, while the recent takedown of NoName057(16) was successful in temporarily reducing the group’s DDoS botnet activities, preventing a future return to the top DDoS hacktivist threat is not guaranteed.
“Organisations need intelligence-driven, proven DDoS defences that can deal with the sophisticated attacks we see today,” Hummel says.