
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Thu, 02 Apr 2026 12:02:01 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Russian Internet users are unable to access the open Internet]]></title>
            <link>https://blog.cloudflare.com/russian-internet-users-are-unable-to-access-the-open-internet/</link>
            <pubDate>Thu, 26 Jun 2025 22:33:30 GMT</pubDate>
            <description><![CDATA[ Since June 9, 2025, Internet users located in Russia and connecting to the open Internet have been throttled by Russian Internet Service Providers (ISPs). ]]></description>
            <content:encoded><![CDATA[ <p>Since June 9, 2025, Internet users located in Russia and connecting to web services protected by Cloudflare have been throttled by Russian Internet Service Providers (ISPs).</p><p>As the throttling is being applied by local ISPs, the action is outside of Cloudflare’s control and we are unable, at this time, to restore reliable, high performance access to Cloudflare products and protected websites for Russian users in a lawful manner. </p><p>Internal data analysis suggests that the throttling allows Internet users to load only the first 16 KB of any web asset, rendering most web navigation impossible.</p><p>Cloudflare has not received any formal outreach or communication from Russian government entities about the motivation for such an action. Unfortunately, the actions are consistent with <a href="https://blog.cloudflare.com/what-cloudflare-is-doing-to-keep-the-open-internet-flowing-into-russia-and-keep-attacks-from-getting-out/"><u>longstanding</u></a> Russian efforts to isolate the Internet within its borders and reduce reliance on Western technology by replacing it with domestic alternatives. Indeed, Russian President Vladimir Putin recently publicly <a href="https://www.barrons.com/news/putin-threatens-to-throttle-western-firms-remaining-in-russia-8bb06070"><u>threatened</u></a> to throttle US tech companies operating inside Russia. </p><p><a href="https://en.zona.media/article/2025/06/19/cloudflare"><u>External reports</u></a> corroborate our analysis, and further suggest that a number of other service providers are also affected by throttling or other disruptive actions in Russia, including at least Hetzner, DigitalOcean, and OVH.</p>
    <div>
      <h2>The impact</h2>
      <a href="#the-impact">
        
      </a>
    </div>
    <p>Cloudflare is seeing disruptions across connections initiated from inside Russia, even when the connection reaches our servers outside of Russia. Consistent with <a href="https://dl.acm.org/doi/10.1145/3517745.3561461"><u>public reporting</u></a> on Russia's practices, this suggests that the disruption is happening inside Russian ISPs, close to users.</p><p>Russian Internet Services Providers (ISPs) confirmed to be implementing these disruptive actions include, but are not limited to, Rostelecom, Megafon, Vimpelcom, MTS, and MGTS.</p><p>Based on our observations, Russian ISPs are using several throttling and blocking mechanisms affecting sites protected by Cloudflare, including injected packets to halt the connection and blocking packets so the connection times out. A new tactic that began on June 9 limits the amount of content served to 16 KB, which renders many websites barely usable.</p><p>The throttling affects all connection methods and protocols, including HTTP/1.1 and HTTP/2 on TCP and TLS, as well as HTTP/3 on QUIC.</p>
    <div>
      <h2>The view from Cloudflare data</h2>
      <a href="#the-view-from-cloudflare-data">
        
      </a>
    </div>
    
    <div>
      <h3>Traffic trends</h3>
      <a href="#traffic-trends">
        
      </a>
    </div>
    <p>Cloudflare Radar exists to share insights and bring transparency to Internet trends. The high rate of connectivity errors to all our data centers has resulted in an overall decrease in traffic served to Russian users. The reduction in traffic can be observed on <a href="https://radar.cloudflare.com/ru?dateStart=2025-06-01&amp;dateEnd=2025-06-26"><u>Cloudflare Radar</u></a>:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/64iapMiGlMvgHJXPyPH9Xo/bec47ff9147019ffa01e365f9bc11309/BLOG-2859_2.png" />
          </figure>
    <div>
      <h3>Client-side reports via Network Error Logging</h3>
      <a href="#client-side-reports-via-network-error-logging">
        
      </a>
    </div>
    <p>Some customers elect to enable <a href="https://www.w3.org/TR/network-error-logging/"><u>W3C</u></a>-defined <a href="https://developers.cloudflare.com/network-error-logging/"><u>Network Error Logging</u></a> (NEL), a feature that embeds error-reporting instructions inside the headers of web content that users request. The instructions tell web browsers what errors to report, and how to do so. Below is a view of NEL reports that show an increase of TCP connections being ‘reset’ prematurely (as explained in our <a href="https://blog.cloudflare.com/connection-tampering/"><u>tampering</u></a> and Radar <a href="https://blog.cloudflare.com/tcp-resets-timeouts/"><u>resets</u></a> blogs). Separately, the large growth in h3.protocol.error shows that QUIC connections have been greatly affected:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7hduiNgSSfVk6FaJ4JLyGN/9f4f014796d000e919b5794c37eda18c/BLOG-2859_3.png" />
          </figure>
    <div>
      <h3>Corroboration of throttling using internal data</h3>
      <a href="#corroboration-of-throttling-using-internal-data">
        
      </a>
    </div>
    <p>The effects of the throttling can also be observed in our internal tooling. The chart below shows packet loss to our Russian data centers, each data center represented by a different line. The Y-axis is the proportion of packet loss:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7DIMgYxjPniMlPS2q2PIbP/c9762738b31278bfd9809457546303c6/BLOG-2859_4.png" />
          </figure><p>High packet loss is a strong signal but does not on its own indicate throttling, since there might be other explanations. For example, an explanation may be our servers trying to resend packets multiple times in during some other mass failure that hinders, but does not completely halt, communication.</p><p>However, we have two additional pieces of information to work with. The first consists of public reports that “throttling” in this case means blocking all connections after <a href="https://en.zona.media/article/2025/06/19/cloudflare"><u>16 KB of data</u></a> has been transmitted, which takes 10 to 14 packets (depending on the underlying technology). Second, we have our recently deployed “<a href="https://blog.cloudflare.com/tcp-resets-timeouts/"><u>Resets and Timeouts</u></a>” data that captures anomalous behaviour in TCP when it occurs within the first 10 packets. Since 10 packets can contain 16 KB of data, some connections that are blocked around 16 KB will be visible at the “Post PSH” stage in the Radar data. In TCP, the ‘PSH’ message means Cloudflare got the initial request and data transfer has begun. If the connection is blocked at this stage, then many of the sent packets will be lost. </p><p>The graph below uses Radar’s <a href="https://radar.cloudflare.com/embed/DataExplorerVisualizer?path=tcp_resets_timeouts%2Ftimeseries_groups&amp;dateRange=28d&amp;mainLocation=ru&amp;locale=en-US&amp;widgetState=%7B%22showAnnotations%22%3Atrue%2C%22xy.hiddenSeries%22%3A%5B%22Post+SYN%22%2C%22Later%22%2C%22Post+ACK%22%2C%22No+match%22%5D%2C%22xy.highlightedSeries%22%3Anull%2C%22xy.hoveredSeries%22%3Anull%2C%22xy.previousVisible%22%3Atrue%7D&amp;ref=%2Fexplorer%3FdataSet%3Dtcp_resets_timeouts%26loc%3Dru%26dt%3D28d"><u>Data Explorer</u></a> to focus on just the Post-PSH stage, where there is a dip followed by an immediate and proportionally large increase before June 11. This pattern corresponds closely with the loss data seen above:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3RNvY4vrO6LQZ8qFeW5ENK/1f0f79701a46e2c2d43eb1b5aa812351/BLOG-2859_5.png" />
          </figure>
    <div>
      <h2>If you run Internet sites for Russian users</h2>
      <a href="#if-you-run-internet-sites-for-russian-users">
        
      </a>
    </div>
    <p>If you are using Cloudflare to protect your sites, unfortunately, at this time, Cloudflare does not have the ability to restore Internet connectivity for Russia-based users. We advise you to reach out and solicit Russian entities to lift the throttling measures that have been put in place.</p><p>If you are a Cloudflare enterprise customer, please reach out to your account team for further assistance.</p><p>Access to a free and open Internet is critical for individual rights and economic development. We condemn any attempt to prevent Russian citizens from accessing it.</p> ]]></content:encoded>
            <category><![CDATA[Internet Shutdown]]></category>
            <category><![CDATA[Russia]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">vyxFL3zp5DqpF5RpHznRv</guid>
            <dc:creator>Michael Tremante</dc:creator>
            <dc:creator>Alissa Starzak</dc:creator>
        </item>
        <item>
            <title><![CDATA[Disrupting FlyingYeti's campaign targeting Ukraine]]></title>
            <link>https://blog.cloudflare.com/disrupting-flyingyeti-campaign-targeting-ukraine/</link>
            <pubDate>Thu, 30 May 2024 13:00:38 GMT</pubDate>
            <description><![CDATA[ In April and May 2024, Cloudforce One employed proactive defense measures to successfully prevent Russia-aligned threat actor FlyingYeti from launching their latest phishing campaign targeting Ukraine ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Cloudforce One is publishing the results of our investigation and real-time effort to detect, deny, degrade, disrupt, and delay threat activity by the Russia-aligned threat actor FlyingYeti during their latest phishing campaign targeting Ukraine. At the onset of Russia’s invasion of Ukraine on February 24, 2022, Ukraine introduced a moratorium on evictions and termination of utility services for unpaid debt. The moratorium ended in January 2024, resulting in significant debt liability and increased financial stress for Ukrainian citizens. The FlyingYeti campaign capitalized on anxiety over the potential loss of access to housing and utilities by enticing targets to open malicious files via debt-themed lures. If opened, the files would result in infection with the PowerShell malware known as <a href="https://cert.gov.ua/article/6277849?ref=news.risky.biz">COOKBOX</a>, allowing FlyingYeti to support follow-on objectives, such as installation of additional payloads and control over the victim’s system.</p><p>Since April 26, 2024, Cloudforce One has taken measures to prevent FlyingYeti from launching their phishing campaign – a campaign involving the use of Cloudflare Workers and GitHub, as well as exploitation of the WinRAR vulnerability <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38831">CVE-2023-38831</a>. Our countermeasures included internal actions, such as detections and code takedowns, as well as external collaboration with third parties to remove the actor’s cloud-hosted malware. Our effectiveness against this actor prolonged their operational timeline from days to weeks. For example, in a single instance, FlyingYeti spent almost eight hours debugging their code as a result of our mitigations. By employing proactive defense measures, we successfully stopped this determined threat actor from achieving their objectives.</p>
    <div>
      <h3>Executive Summary</h3>
      <a href="#executive-summary">
        
      </a>
    </div>
    <ul><li><p>On April 18, 2024, Cloudforce One detected the Russia-aligned threat actor FlyingYeti preparing to launch a phishing espionage campaign targeting individuals in Ukraine.</p></li><li><p>We discovered the actor used similar tactics, techniques, and procedures (TTPs) as those detailed in <a href="https://cert.gov.ua/article/6278620">Ukranian CERT's article on UAC-0149</a>, a threat group that has primarily <a href="https://cert.gov.ua/article/6277849?ref=news.risky.biz">targeted Ukrainian defense entities with COOKBOX malware since at least the fall of 2023</a>.</p></li><li><p>From mid-April to mid-May, we observed FlyingYeti conduct reconnaissance activity, create lure content for use in their phishing campaign, and develop various iterations of their malware. We assessed that the threat actor intended to launch their campaign in early May, likely following Orthodox Easter.</p></li><li><p>After several weeks of monitoring actor reconnaissance and weaponization activity (<a href="https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html">Cyber Kill Chain Stages 1 and 2</a>), we successfully disrupted FlyingYeti’s operation moments after the final COOKBOX payload was built.</p></li><li><p>The payload included an exploit for the WinRAR vulnerability CVE-2023-38831, which FlyingYeti will likely continue to use in their phishing campaigns to infect targets with malware.</p></li><li><p>We offer steps users can take to defend themselves against FlyingYeti phishing operations, and also provide recommendations, detections, and indicators of compromise.</p></li></ul>
    <div>
      <h2>Who is FlyingYeti?</h2>
      <a href="#who-is-flyingyeti">
        
      </a>
    </div>
    <p>FlyingYeti is the <a href="https://www.merriam-webster.com/dictionary/cryptonym">cryptonym</a> given by <a href="/introducing-cloudforce-one-threat-operations-and-threat-research">Cloudforce One</a> to the threat group behind this phishing campaign, which overlaps with UAC-0149 activity tracked by <a href="https://cert.gov.ua/">CERT-UA</a> in <a href="https://cert.gov.ua/article/6277849?ref=news.risky.biz">February</a> and <a href="https://cert.gov.ua/article/6278620">April</a> 2024. The threat actor uses dynamic DNS (<a href="https://www.cloudflare.com/learning/dns/glossary/dynamic-dns/">DDNS</a>) for their infrastructure and leverages cloud-based platforms for hosting malicious content and for malware command and control (C2). Our investigation of FlyingYeti TTPs suggests this is likely a Russia-aligned threat group. The actor appears to primarily focus on targeting Ukrainian military entities. Additionally, we observed Russian-language comments in FlyingYeti’s code, and the actor’s operational hours falling within the UTC+3 time zone.</p>
    <div>
      <h2>Campaign background</h2>
      <a href="#campaign-background">
        
      </a>
    </div>
    <p>In the days leading up to the start of the campaign, Cloudforce One observed FlyingYeti conducting reconnaissance on payment processes for Ukrainian communal housing and utility services:</p><ul><li><p>April 22, 2024 – research into changes made in 2016 that introduced the use of QR codes in payment notices</p></li><li><p>April 22, 2024 – research on current developments concerning housing and utility debt in Ukraine</p></li><li><p>April 25, 2024 – research on the legal basis for restructuring housing debt in Ukraine as well as debt involving utilities, such as gas and electricity</p></li></ul><p>Cloudforce One judges that the observed reconnaissance is likely due to the Ukrainian government’s payment moratorium introduced at the start of the full-fledged invasion in February 2022. Under this moratorium, outstanding debt would not lead to evictions or termination of provision of utility services. However, on January 9, 2024, the <a href="https://en.interfax.com.ua/news/economic/959388.html">government lifted this ban</a>, resulting in increased pressure on Ukrainian citizens with outstanding debt. FlyingYeti sought to capitalize on that pressure, leveraging debt restructuring and payment-related lures in an attempt to increase their chances of successfully targeting Ukrainian individuals.</p>
    <div>
      <h2>Analysis of the Komunalka-themed phishing site</h2>
      <a href="#analysis-of-the-komunalka-themed-phishing-site">
        
      </a>
    </div>
    <p>The disrupted phishing campaign would have directed FlyingYeti targets to an actor-controlled GitHub page at hxxps[:]//komunalka[.]github[.]io, which is a spoofed version of the Kyiv Komunalka communal housing site <a href="https://www.komunalka.ua">https://www.komunalka.ua</a>. Komunalka functions as a payment processor for residents in the Kyiv region and allows for payment of utilities, such as gas, electricity, telephone, and Internet. Additionally, users can pay other fees and fines, and even donate to Ukraine’s defense forces.</p><p>Based on past FlyingYeti operations, targets may be directed to the actor’s Github page via a link in a phishing email or an encrypted Signal message. If a target accesses the spoofed Komunalka platform at hxxps[:]//komunalka[.]github[.]io, the page displays a large green button with a prompt to download the document “Рахунок.docx” (“Invoice.docx”), as shown in Figure 1. This button masquerades as a link to an overdue payment invoice but actually results in the download of the malicious archive “Заборгованість по ЖКП.rar” (“Debt for housing and utility services.rar”).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/22Rnm7YOnwnJocG98RMFDa/def10039081f7e9c6df15980a8b855ac/image4-5.png" />
            
            </figure><p>Figure 1: Prompt to download malicious archive “Заборгованість по ЖКП.rar”</p><p>A series of steps must take place for the download to successfully occur:</p><ul><li><p>The target clicks the green button on the actor’s GitHub page hxxps[:]//komunalka.github[.]io</p></li><li><p>The target’s device sends an HTTP POST request to the Cloudflare Worker worker-polished-union-f396[.]vqu89698[.]workers[.]dev with the HTTP request body set to “user=Iahhdr”</p></li><li><p>The Cloudflare Worker processes the request and evaluates the HTTP request body</p></li><li><p>If the request conditions are met, the Worker fetches the RAR file from hxxps[:]//raw[.]githubusercontent[.]com/kudoc8989/project/main/Заборгованість по ЖКП.rar, which is then downloaded on the target’s device</p></li></ul><p>Cloudforce One identified the infrastructure responsible for facilitating the download of the malicious RAR file and remediated the actor-associated Worker, preventing FlyingYeti from delivering its malicious tooling. In an effort to circumvent Cloudforce One's mitigation measures, FlyingYeti later changed their malware delivery method. Instead of the Workers domain fetching the malicious RAR file, it was loaded directly from GitHub.</p>
    <div>
      <h2>Analysis of the malicious RAR file</h2>
      <a href="#analysis-of-the-malicious-rar-file">
        
      </a>
    </div>
    <p>During remediation, Cloudforce One recovered the RAR file “Заборгованість по ЖКП.rar” and performed analysis of the malicious payload. The downloaded RAR archive contains multiple files, including a file with a name that contains the unicode character “U+201F”. This character appears as whitespace on Windows devices and can be used to “hide” file extensions by adding excessive whitespace between the filename and the file extension. As highlighted in blue in Figure 2, this cleverly named file within the RAR archive appears to be a PDF document but is actually a malicious CMD file (“Рахунок на оплату.pdf[unicode character U+201F].cmd”).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/55Vjmg9VLEnAFv3RZQoZ2l/866016a2489f2a6c780c9f3971dd28ca/image2-11.png" />
            
            </figure><p>Figure 2: Files contained in the malicious RAR archive “Заборгованість по ЖКП.rar” (“Housing Debt.rar”)</p><p>FlyingYeti included a benign PDF in the archive with the same name as the CMD file but without the unicode character, “Рахунок на оплату.pdf” (“Invoice for payment.pdf”). Additionally, the directory name for the archive once decompressed also contained the name “Рахунок на оплату.pdf”. This overlap in names of the benign PDF and the directory allows the actor to exploit the WinRAR vulnerability <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38831">CVE-2023-38831</a>. More specifically, when an archive includes a benign file with the same name as the directory, the entire contents of the directory are opened by the WinRAR application, resulting in the execution of the malicious CMD. In other words, when the target believes they are opening the benign PDF “Рахунок на оплату.pdf”, the malicious CMD file is executed.</p><p>The CMD file contains the FlyingYeti PowerShell malware known as <a href="https://cert.gov.ua/article/6277849?ref=news.risky.biz">COOKBOX</a>. The malware is designed to persist on a host, serving as a foothold in the infected device. Once installed, this variant of COOKBOX will make requests to the DDNS domain postdock[.]serveftp[.]com for C2, awaiting PowerShell <a href="https://learn.microsoft.com/en-us/powershell/scripting/powershell-commands?view=powershell-7.4">cmdlets</a> that the malware will subsequently run.</p><p>Alongside COOKBOX, several decoy documents are opened, which contain hidden tracking links using the <a href="https://canarytokens.com/generate">Canary Tokens</a> service. The first document, shown in Figure 3 below, poses as an agreement under which debt for housing and utility services will be restructured.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/20vFV9kNTMmwxFXvpQoJTc/12542fb7a7d2108d49607f2a23fc7575/image5-10.png" />
            
            </figure><p>Figure 3: Decoy document Реструктуризація боргу за житлово комунальні послуги.docx</p><p>The second document (Figure 4) is a user agreement outlining the terms and conditions for the usage of the payment platform komunalka[.]ua.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1VHSTwqfrXWXvoryg8lOcE/68eb096bc82f18c7edcb4c88c1ed6d2c/image3-6.png" />
            
            </figure><p>Figure 4: Decoy document Угода користувача.docx <i>(User Agreement.docx)</i></p><p>The use of relevant decoy documents as part of the phishing and delivery activity are likely an effort by FlyingYeti operators to increase the appearance of legitimacy of their activities.</p><p>The phishing theme we identified in this campaign is likely one of many themes leveraged by this actor in a larger operation to target Ukrainian entities, in particular their defense forces. In fact, the threat activity we detailed in this blog uses many of the same techniques outlined in a <a href="https://cert.gov.ua/article/6278620">recent FlyingYeti campaign</a> disclosed by CERT-UA in mid-April 2024, where the actor leveraged United Nations-themed lures involving Peace Support Operations to target Ukraine’s military. Due to Cloudforce One’s defensive actions covered in the next section, this latest FlyingYeti campaign was prevented as of the time of publication.</p>
    <div>
      <h2>Mitigating FlyingYeti activity</h2>
      <a href="#mitigating-flyingyeti-activity">
        
      </a>
    </div>
    <p>Cloudforce One mitigated FlyingYeti’s campaign through a series of actions. Each action was taken to increase the actor’s cost of continuing their operations. When assessing which action to take and why, we carefully weighed the pros and cons in order to provide an effective active defense strategy against this actor. Our general goal was to increase the amount of time the threat actor spent trying to develop and weaponize their campaign.</p><p>We were able to successfully extend the timeline of the threat actor’s operations from hours to weeks. At each interdiction point, we assessed the impact of our mitigation to ensure the actor would spend more time attempting to launch their campaign. Our mitigation measures disrupted the actor’s activity, in one instance resulting in eight additional hours spent on debugging code.</p><p>Due to our proactive defense efforts, FlyingYeti operators adapted their tactics multiple times in their attempts to launch the campaign. The actor originally intended to have the Cloudflare Worker fetch the malicious RAR file from GitHub. After Cloudforce One interdiction of the Worker, the actor attempted to create additional Workers via a new account. In response, we disabled all Workers, leading the actor to load the RAR file directly from GitHub. Cloudforce One notified GitHub, resulting in the takedown of the RAR file, the GitHub project, and suspension of the account used to host the RAR file. In return, FlyingYeti began testing the option to host the RAR file on the file sharing sites <a href="https://pixeldrain.com/">pixeldrain</a> and <a href="https://www.filemail.com/">Filemail</a>, where we observed the actor alternating the link on the Komunalka phishing site between the following:</p><ul><li><p>hxxps://pixeldrain[.]com/api/file/ZAJxwFFX?download=one</p></li><li><p>hxxps://1014.filemail[.]com/api/file/get?filekey=e_8S1HEnM5Rzhy_jpN6nL-GF4UAP533VrXzgXjxH1GzbVQZvmpFzrFA&amp;pk_vid=a3d82455433c8ad11715865826cf18f6</p></li></ul><p>We notified GitHub of the actor’s evolving tactics, and in response GitHub removed the Komunalka phishing site. After analyzing the files hosted on pixeldrain and Filemail, we determined the actor uploaded dummy payloads, likely to monitor access to their phishing infrastructure (FileMail logs IP addresses, and both file hosting sites provide view and download counts). At the time of publication, we did not observe FlyingYeti upload the malicious RAR file to either file hosting site, nor did we identify the use of alternative phishing or malware delivery methods.</p><p>A timeline of FlyingYeti’s activity and our corresponding mitigations can be found below.</p>
    <div>
      <h3>Event timeline</h3>
      <a href="#event-timeline">
        
      </a>
    </div>
    
<div><table><colgroup>
<col></col>
<col></col>
</colgroup>
<thead>
  <tr>
    <th><span>Date</span></th>
    <th><span>Event Description</span></th>
  </tr></thead>
<tbody>
  <tr>
    <td><span>2024-04-18 12:18</span></td>
    <td><span>Threat Actor (TA) creates a Worker to handle requests from a phishing site</span></td>
  </tr>
  <tr>
    <td><span>2024-04-18 14:16</span></td>
    <td><span>TA creates phishing site komunalka[.]github[.]io on GitHub</span></td>
  </tr>
  <tr>
    <td><span>2024-04-25 12:25</span></td>
    <td><span>TA creates a GitHub repo to host a RAR file</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 07:46</span></td>
    <td><span>TA updates the first Worker to handle requests from users visiting komunalka[.]github[.]io</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 08:24</span></td>
    <td><span>TA uploads a benign test RAR to the GitHub repo</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 13:38</span></td>
    <td><span>Cloudforce One identifies a Worker receiving requests from users visiting komunalka[.]github[.]io, observes its use as a phishing page</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 13:46</span></td>
    <td><span>Cloudforce One identifies that the Worker fetches a RAR file from GitHub (the malicious RAR payload is not yet hosted on the site)</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 19:22</span></td>
    <td><span>Cloudforce One creates a detection to identify the Worker that fetches the RAR</span></td>
  </tr>
  <tr>
    <td><span>2024-04-26 21:13</span></td>
    <td><span>Cloudforce One deploys real-time monitoring of the RAR file on GitHub</span></td>
  </tr>
  <tr>
    <td><span>2024-05-02 06:35</span></td>
    <td><span>TA deploys a weaponized RAR (CVE-2023-38831) to GitHub with their COOKBOX malware packaged in the archive</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 10:03</span></td>
    <td><span>TA attempts to update the Worker with link to weaponized RAR, the Worker is immediately blocked</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 10:38</span></td>
    <td><span>TA creates a new Worker, the Worker is immediately blocked</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 11:04</span></td>
    <td><span>TA creates a new account (#2) on Cloudflare</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 11:06</span></td>
    <td><span>TA creates a new Worker on account #2 (blocked)</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 11:50</span></td>
    <td><span>TA creates a new Worker on account #2 (blocked)</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 12:22</span></td>
    <td><span>TA creates a new modified Worker on account #2</span></td>
  </tr>
  <tr>
    <td><span>2024-05-06 16:05</span></td>
    <td><span>Cloudforce One disables the running Worker on account #2</span></td>
  </tr>
  <tr>
    <td><span>2024-05-07 22:16</span></td>
    <td><span>TA notices the Worker is blocked, ceases all operations</span></td>
  </tr>
  <tr>
    <td><span>2024-05-07 22:18</span></td>
    <td><span>TA deletes original Worker first created to fetch the RAR file from the GitHub phishing page</span></td>
  </tr>
  <tr>
    <td><span>2024-05-09 19:28</span></td>
    <td><span>Cloudforce One adds phishing page komunalka[.]github[.]io to real-time monitoring</span></td>
  </tr>
  <tr>
    <td><span>2024-05-13 07:36</span></td>
    <td><span>TA updates the github.io phishing site to point directly to the GitHub RAR link</span></td>
  </tr>
  <tr>
    <td><span>2024-05-13 17:47</span></td>
    <td><span>Cloudforce One adds COOKBOX C2 postdock[.]serveftp[.]com to real-time monitoring for DNS resolution</span></td>
  </tr>
  <tr>
    <td><span>2024-05-14 00:04</span></td>
    <td><span>Cloudforce One notifies GitHub to take down the RAR file</span></td>
  </tr>
  <tr>
    <td><span>2024-05-15 09:00</span></td>
    <td><span>GitHub user, project, and link for RAR are no longer accessible</span></td>
  </tr>
  <tr>
    <td><span>2024-05-21 08:23</span></td>
    <td><span>TA updates Komunalka phishing site on github.io to link to pixeldrain URL for dummy payload (pixeldrain only tracks view and download counts)</span></td>
  </tr>
  <tr>
    <td><span>2024-05-21 08:25</span></td>
    <td><span>TA updates Komunalka phishing site to link to FileMail URL for dummy payload (FileMail tracks not only view and download counts, but also IP addresses)</span></td>
  </tr>
  <tr>
    <td><span>2024-05-21 12:21</span></td>
    <td><span>Cloudforce One downloads PixelDrain document to evaluate payload</span></td>
  </tr>
  <tr>
    <td><span>2024-05-21 12:47</span></td>
    <td><span>Cloudforce One downloads FileMail document to evaluate payload</span></td>
  </tr>
  <tr>
    <td><span>2024-05-29 23:59</span></td>
    <td><span>GitHub takes down Komunalka phishing site</span></td>
  </tr>
  <tr>
    <td><span>2024-05-30 13:00</span></td>
    <td><span>Cloudforce One publishes the results of this investigation</span></td>
  </tr>
</tbody></table></div>
    <div>
      <h2>Coordinating our FlyingYeti response</h2>
      <a href="#coordinating-our-flyingyeti-response">
        
      </a>
    </div>
    <p>Cloudforce One leveraged industry relationships to provide advanced warning and to mitigate the actor’s activity. To further protect the intended targets from this phishing threat, Cloudforce One notified and collaborated closely with GitHub’s Threat Intelligence and Trust and Safety Teams. We also notified CERT-UA and Cloudflare industry partners such as CrowdStrike, Mandiant/Google Threat Intelligence, and Microsoft Threat Intelligence.</p>
    <div>
      <h3>Hunting FlyingYeti operations</h3>
      <a href="#hunting-flyingyeti-operations">
        
      </a>
    </div>
    <p>There are several ways to hunt FlyingYeti in your environment. These include using PowerShell to hunt for WinRAR files, deploying Microsoft Sentinel analytics rules, and running Splunk scripts as detailed below. Note that these detections may identify activity related to this threat, but may also trigger unrelated threat activity.</p>
    <div>
      <h3>PowerShell hunting</h3>
      <a href="#powershell-hunting">
        
      </a>
    </div>
    <p>Consider running a PowerShell script such as <a href="https://github.com/IR-HuntGuardians/CVE-2023-38831-HUNT/blob/main/hunt-script.ps1">this one</a> in your environment to identify exploitation of CVE-2023-38831. This script will interrogate WinRAR files for evidence of the exploit.</p>
            <pre><code>CVE-2023-38831
Description:winrar exploit detection 
open suspios (.tar / .zip / .rar) and run this script to check it 

function winrar-exploit-detect(){
$targetExtensions = @(".cmd" , ".ps1" , ".bat")
$tempDir = [System.Environment]::GetEnvironmentVariable("TEMP")
$dirsToCheck = Get-ChildItem -Path $tempDir -Directory -Filter "Rar*"
foreach ($dir in $dirsToCheck) {
    $files = Get-ChildItem -Path $dir.FullName -File
    foreach ($file in $files) {
        $fileName = $file.Name
        $fileExtension = [System.IO.Path]::GetExtension($fileName)
        if ($targetExtensions -contains $fileExtension) {
            $fileWithoutExtension = [System.IO.Path]::GetFileNameWithoutExtension($fileName); $filename.TrimEnd() -replace '\.$'
            $cmdFileName = "$fileWithoutExtension"
            $secondFile = Join-Path -Path $dir.FullName -ChildPath $cmdFileName
            
            if (Test-Path $secondFile -PathType Leaf) {
                Write-Host "[!] Suspicious pair detected "
                Write-Host "[*]  Original File:$($secondFile)" -ForegroundColor Green 
                Write-Host "[*] Suspicious File:$($file.FullName)" -ForegroundColor Red

                # Read and display the content of the command file
                $cmdFileContent = Get-Content -Path $($file.FullName)
                Write-Host "[+] Command File Content:$cmdFileContent"
            }
        }
    }
}
}
winrar-exploit-detect</code></pre>
            
    <div>
      <h3></h3>
      <a href="#">
        
      </a>
    </div>
    <p>Microsoft Sentinel</p><p>In Microsoft Sentinel, consider deploying the rule provided below, which identifies WinRAR execution via cmd.exe. Results generated by this rule may be indicative of attack activity on the endpoint and should be analyzed.</p>
            <pre><code>DeviceProcessEvents
| where InitiatingProcessParentFileName has @"winrar.exe"
| where InitiatingProcessFileName has @"cmd.exe"
| project Timestamp, DeviceName, FileName, FolderPath, ProcessCommandLine, AccountName
| sort by Timestamp desc</code></pre>
            
    <div>
      <h3></h3>
      <a href="#">
        
      </a>
    </div>
    <p>Splunk</p><p>Consider using <a href="https://research.splunk.com/endpoint/d2f36034-37fa-4bd4-8801-26807c15540f/">this script</a> in your Splunk environment to look for WinRAR CVE-2023-38831 execution on your Microsoft endpoints. Results generated by this script may be indicative of attack activity on the endpoint and should be analyzed.</p>
            <pre><code>| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where Processes.parent_process_name=winrar.exe `windows_shells` OR Processes.process_name IN ("certutil.exe","mshta.exe","bitsadmin.exe") by Processes.dest Processes.user Processes.parent_process_name Processes.parent_process Processes.process_name Processes.process Processes.process_id Processes.parent_process_id 
| `drop_dm_object_name(Processes)` 
| `security_content_ctime(firstTime)` 
| `security_content_ctime(lastTime)` 
| `winrar_spawning_shell_application_filter`</code></pre>
            
    <div>
      <h2>Cloudflare product detections</h2>
      <a href="#cloudflare-product-detections">
        
      </a>
    </div>
    
    <div>
      <h3>Cloudflare Email Security</h3>
      <a href="#cloudflare-email-security">
        
      </a>
    </div>
    <p>Cloudflare Email Security (CES) customers can identify FlyingYeti threat activity with the following detections.</p><ul><li><p>CVE-2023-38831</p></li><li><p>FLYINGYETI.COOKBOX</p></li><li><p>FLYINGYETI.COOKBOX.Launcher</p></li><li><p>FLYINGYETI.Rar</p></li></ul>
    <div>
      <h2>Recommendations</h2>
      <a href="#recommendations">
        
      </a>
    </div>
    <p>Cloudflare recommends taking the following steps to mitigate this type of activity:</p><ul><li><p>Implement Zero Trust architecture foundations:    </p></li><li><p>Deploy Cloud Email Security to ensure that email services are protected against phishing, BEC and other threats</p></li><li><p>Leverage browser isolation to separate messaging applications like LinkedIn, email, and Signal from your main network</p></li><li><p>Scan, monitor and/or enforce controls on specific or sensitive data moving through your network environment with data loss prevention policies</p></li><li><p>Ensure your systems have the latest WinRAR and Microsoft security updates installed</p></li><li><p>Consider preventing WinRAR files from entering your environment, both at your Cloud Email Security solution and your Internet Traffic Gateway</p></li><li><p>Run an Endpoint Detection and Response (EDR) tool such as CrowdStrike or Microsoft Defender for Endpoint to get visibility into binary execution on hosts</p></li><li><p>Search your environment for the FlyingYeti indicators of compromise (IOCs) shown below to identify potential actor activity within your network.</p></li></ul><p>If you’re looking to uncover additional Threat Intelligence insights for your organization or need bespoke Threat Intelligence information for an incident, consider engaging with Cloudforce One by contacting your Customer Success manager or filling out <a href="https://www.cloudflare.com/zero-trust/lp/cloudforce-one-threat-intel-subscription/">this form</a>.</p>
    <div>
      <h2>Indicators of Compromise</h2>
      <a href="#indicators-of-compromise">
        
      </a>
    </div>
    
<div><table><colgroup>
<col></col>
<col></col>
</colgroup>
<thead>
  <tr>
    <th><span>Domain / URL</span></th>
    <th><span>Description</span></th>
  </tr></thead>
<tbody>
  <tr>
    <td><span>komunalka[.]github[.]io</span></td>
    <td><span>Phishing page</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//github[.]com/komunalka/komunalka[.]github[.]io</span></td>
    <td><span>Phishing page</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//worker-polished-union-f396[.]vqu89698[.]workers[.]dev</span></td>
    <td><span>Worker that fetches malicious RAR file</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//raw[.]githubusercontent[.]com/kudoc8989/project/main/Заборгованість по ЖКП.rar</span></td>
    <td><span>Delivery of malicious RAR file</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//1014[.]filemail[.]com/api/file/get?filekey=e_8S1HEnM5Rzhy_jpN6nL-GF4UAP533VrXzgXjxH1GzbVQZvmpFzrFA&amp;pk_vid=a3d82455433c8ad11715865826cf18f6</span></td>
    <td><span>Dummy payload</span></td>
  </tr>
  <tr>
    <td><span>hxxps[:]//pixeldrain[.]com/api/file/ZAJxwFFX?download=</span></td>
    <td><span>Dummy payload</span></td>
  </tr>
  <tr>
    <td><span>hxxp[:]//canarytokens[.]com/stuff/tags/ni1cknk2yq3xfcw2al3efs37m/payments.js</span></td>
    <td><span>Tracking link</span></td>
  </tr>
  <tr>
    <td><span>hxxp[:]//canarytokens[.]com/stuff/terms/images/k22r2dnjrvjsme8680ojf5ccs/index.html</span></td>
    <td><span>Tracking link</span></td>
  </tr>
  <tr>
    <td><span>postdock[.]serveftp[.]com</span></td>
    <td><span>COOKBOX C2</span></td>
  </tr>
</tbody></table></div> ]]></content:encoded>
            <category><![CDATA[Cloud Email Security]]></category>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[Cloudforce One]]></category>
            <category><![CDATA[CVE]]></category>
            <category><![CDATA[Exploit]]></category>
            <category><![CDATA[GitHub]]></category>
            <category><![CDATA[Intrusion Detection]]></category>
            <category><![CDATA[Malware]]></category>
            <category><![CDATA[Microsoft]]></category>
            <category><![CDATA[Phishing]]></category>
            <category><![CDATA[Remote Browser Isolation]]></category>
            <category><![CDATA[Russia]]></category>
            <category><![CDATA[Serverless]]></category>
            <category><![CDATA[Threat Data]]></category>
            <category><![CDATA[Threat Intelligence]]></category>
            <category><![CDATA[Threat Operations]]></category>
            <category><![CDATA[Ukraine]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <guid isPermaLink="false">5JO10nXN3tLVG2C1EttkiH</guid>
            <dc:creator>Cloudforce One</dc:creator>
        </item>
        <item>
            <title><![CDATA[One year of war in Ukraine: Internet trends, attacks, and resilience]]></title>
            <link>https://blog.cloudflare.com/one-year-of-war-in-ukraine/</link>
            <pubDate>Thu, 23 Feb 2023 15:58:55 GMT</pubDate>
            <description><![CDATA[ This blog post reports on Internet insights during an historical war in Europe that has been seen and shared online, and discusses how Ukraine's Internet remained resilient in spite of dozens of disruptions in three different stages of the conflict. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/UCjd3HXts42QBVpS9nceR/fae3df21bfb2e275f33e8d1f953a2e4b/image13-2.png" />
            
            </figure><p>The Internet has become a significant factor in geopolitical conflicts, such as the ongoing war in Ukraine. Tomorrow marks one year since the Russian invasion of that country. This post reports on Internet insights and discusses how Ukraine's Internet remained resilient in spite of dozens of disruptions in three different stages of the conflict.</p><p>Key takeaways:</p><ul><li><p>Internet traffic shifts in Ukraine are clearly visible from east to west as Ukrainians fled the war, with country-wide traffic dropping as much as 33% after February 24, 2022.</p></li><li><p>Air strikes on energy infrastructure starting in October led to widespread Internet disruptions that continue in 2023.</p></li><li><p>Application-layer cyber attacks in Ukraine rose 1,300% in early March 2022 compared to pre-war levels.</p></li><li><p>Government administration, financial services, and the media saw the most attacks targeting Ukraine.</p></li><li><p>Traffic from a number of networks in Kherson was re-routed through Russia between June and October, subjecting traffic to Russia’s restrictions and limitations, including content filtering. Even after traffic ceased to reroute through Russia, those Ukrainian networks saw major outages through at least the end of the year, while two networks remain offline.</p></li><li><p>Through efforts on the ground to repair damaged fiber optics and restore electrical power, Ukraine’s networks have remained resilient from both an infrastructure and routing perspective. This is partly due to Ukraine’s widespread connectivity to networks outside the country and large number of IXPs.</p></li><li><p>Starlink traffic in Ukraine grew over 500% between mid-March and mid-May, and continued to grow from mid-May through mid-November, increasing nearly 300% over that six-month period. For the full period from mid-March (two weeks after it was made available) to mid-December, it was over a 1,600% increase, dropping a bit after that.</p></li></ul>
    <div>
      <h2>Internet changes and disruptions</h2>
      <a href="#internet-changes-and-disruptions">
        
      </a>
    </div>
    
    <div>
      <h3>An Internet shock after February 24, 2022</h3>
      <a href="#an-internet-shock-after-february-24-2022">
        
      </a>
    </div>
    <p>In Ukraine, human Internet traffic dropped as much as 33% in the weeks following February 24. The following chart shows Cloudflare’s perspective on daily traffic (by number of requests).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ABCdu3AGNa1CG3ZmZChic/a55952c4bb6d3782475326bd3bfdfa4e/pasted-image-0.png" />
            
            </figure><p>Internet traffic levels recovered over the next few months, including strong growth seen in September and October, when many Ukrainian refugees <a href="https://en.wikipedia.org/wiki/2022%E2%80%932023_Ukrainian_refugee_crisis">returned</a> to the country. That said, there were also country-wide outages, mostly after October, that are discussed below.</p><p>14% of total traffic <i>from</i> Ukraine (including traffic from Crimea and other occupied regions) was mitigated as potential attacks, while 10% of total traffic <i>to</i> Ukraine was mitigated as potential attacks in the last 12 months.</p><p>Before February 24, 2022, typical weekday Internet traffic in Ukraine initially peaked after lunch, around 15:00 local time, dropped between 17:00 and 18:00 (consistent with people leaving work), and reached the biggest peak of the day at around 21:00 (possibly after dinner for mobile and streaming use).</p><p>After the invasion started, we observed less variation during the day in a clear change in the usual pattern given the reported disruption and “<a href="https://www.france24.com/en/europe/20220226-exodus-from-ukraine-a-night-spent-with-civilians-fleeing-war-russia-s-invasion">exodus</a>” from the country​. During the first few days after the invasion began, peak traffic occurred around 19:00, at a time when nights for many in cities such as Kyiv were spent in improvised underground <a href="https://www.newyorker.com/magazine/2022/03/14/inside-kyivs-metro-a-citywide-bomb-shelter">bunkers</a>. By late March, the 21:00 peak had returned, but the early evening drop in traffic did not return until May.</p><p>When looking at Ukraine Internet requests by type of traffic in the chart below (from February 10, 2022, through February 2023), we observe that while traffic from both mobile and desktop devices dropped after the invasion, request volume from mobile devices has remained higher over the past year. Pre-war, mobile devices accounted for around 53% of traffic, and grew to around 60% during the first weeks of the invasion. By late April, it had returned to typical pre-war levels, falling back to around 54% of traffic. There’s also a noticeable December drop/outage that we’ll go over below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4jLPx0Ah8ulYoq3oDMICNV/5af0f58479c61e6e13fb8af2781e75de/pasted-image-0--1-.png" />
            
            </figure>
    <div>
      <h3>Millions moving from east to west in Ukraine</h3>
      <a href="#millions-moving-from-east-to-west-in-ukraine">
        
      </a>
    </div>
    <p>The invasion brought attacks and failing infrastructure across a number of cities, but the target in the early days wasn’t the country’s energy infrastructure, as it was in October 2022. In the first weeks of the war, <a href="/internet-traffic-patterns-in-ukraine-since-february-21-2022/">Internet traffic changes</a> were largely driven by people evacuating conflict zones with their families. Over <a href="https://en.wikipedia.org/wiki/2022%E2%80%932023_Ukrainian_refugee_crisis">eight million</a> Ukrainians left the country in the first three months, and many more relocated internally to safer cities, although many returned during the summer of 2022. The Internet played a critical role during this refugee crisis, supporting communications and access to real-time information that could save lives, as well as apps providing services, among others.</p><p>There was also an increase in traffic in the western part of Ukraine, in areas such as Lviv (further away from the conflict areas), and a decrease in the east, in areas like Kharkiv, where the Russian military was arriving and attacks were a constant threat. The figure below provides a view of how Internet traffic across Ukraine changed in the week after the war began (a darker pink means a drop in traffic — as much as 60% — while a darker green indicates an increase in Internet traffic — as much as 50%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/37b5qs3jPnFkxC1zypMlj0/a6a9222ab47aeb61a7c24bd646889744/Untitled-1.png" />
            
            </figure><p>Source: <a href="https://datawrapper.dwcdn.net/dsUSJ/2/">https://datawrapper.dwcdn.net/dsUSJ/2/</a></p><p>The biggest drops in Internet traffic observed in Ukraine in the first days of the war were in Kharkiv Oblast in the east, and Chernihiv in the north, both with a 60% decrease, followed by Kyiv Oblast, with traffic 40% lower on March 2, 2022, as compared with February 23.</p><p>In western Ukraine, traffic surged. The regions with the highest observed traffic growth included Rivne (50%), Volyn (30%), Lviv (28%), Chernivtsi (25%), and Zakarpattia (15%).</p><p>At the city level, analysis of Internet traffic in Ukraine gives us some insight into usage of the Internet and availability of Internet access in those first weeks, with noticeable outages in places where direct conflict was going on or that was already occupied by Russian soldiers.</p><p>North of Kyiv, the city of <b>Chernihiv</b> had a significant drop in traffic the first week of the war and residual traffic by mid-March, with traffic picking up only after the Russians retreated in early April.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6p1togn43sDxBn4oDo5SXq/e3c9f42bf552804c5550ec30fe35491f/che-2023-02-16-at-14.04.32.png" />
            
            </figure><p>In the capital city of <b>Kyiv</b>, there is a clear disruption in Internet traffic right after the war started, possibly caused by people leaving, attacks and use of underground shelters.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3lyu7CCFeLrinelkuTicOY/d0504dbced7b6eaececf706c6dd1efc7/Untitled--1-.png" />
            
            </figure><p>Near Kyiv, we observed a clear outage in early March in <b>Bucha</b>. After April 1, when the Russians withdrew, Internet traffic started to come back a few weeks later.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Svc57sobrQ5ttZeJ9CNZI/8af1c557f3095c26563e14e78b0be670/Untitled.jpg" />
            
            </figure><p>In <b>Irpin</b>, just outside Kyiv, close to the Hostomel airport and Bucha, a similar outage pattern to Bucha was observed. Traffic only began to come back more clearly in late May.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2eLEO72oSRcx81QBtrIAi4/0438697c6670c6b37fd2e203ce635d5d/Untitled--2-.png" />
            
            </figure><p>In the east, in the city of <b>Kharkiv</b>, traffic dropped 50% on March 3, with a similar scenario seen not far away in Sumy. The disruption was related to people leaving and also by power outages affecting some networks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Fvemnakzm0LocyqwcYxvh/6be0624732fd90822b474de8852a4d11/Untitled--3-.png" />
            
            </figure><p>Other cities in the south of Ukraine, like Berdyansk, had outages. This graph shows Enerhodar, the small city where Europe’s largest nuclear plant, <a href="https://en.wikipedia.org/wiki/Zaporizhzhia_Nuclear_Power_Plant">Zaporizhzhya NPP</a>, is located, with residual traffic compared to before.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/gVxSD0CpZL5YjQvvrevqD/b210e6d1b506d10ced5a791770f53fdc/Untitled--4-.png" />
            
            </figure><p>In the cities located in the south of Ukraine, there were clear Internet disruptions. The Russians laid <a href="https://en.wikipedia.org/wiki/Siege_of_Mariupol">siege</a> to Mariupol on February 24. Energy infrastructure strikes and shutdowns had an impact on local networks and Internet traffic, which fell to minimal levels by March 1. Estimates indicate that <a href="https://web.archive.org/web/20220418203018/https://www.cnbc.com/2022/04/17/russia-ukraine-live-updates.html">95%</a> of the buildings in the city were destroyed, and by mid-May, the city was fully under Russian control. While there was some increase in traffic by the end of April, it reached only ~22% of what it was before the war’s start.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1azuAR2NyRI6vKtS1PSmhV/b75a7ce4aa811b00d0742db85771cf44/Untitled--5-.png" />
            
            </figure><p>When looking at Ukrainian Internet Service Providers (ISPs) or the autonomous systems (<a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/">ASNs</a>) they use, we observed more localized disruptions in certain regions during the first months of the war, but recovery was almost always swift. <a href="https://radar.cloudflare.com/as6849">AS6849 (Ukrtel)</a> experienced problems with very short-term outages in mid-March. <a href="https://radar.cloudflare.com/as13188">AS13188 (Triolan)</a>, which services Kyiv, Chernihiv, and Kharkiv, was another provider experiencing problems (they <a href="https://t.me/triolan_me/630">reported</a> a cyberattack on March 9), as could be observed in the next chart:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4M7YLMNNgXMj6skpszjDoM/2618445d3e47a46d84d36d4c0da47c35/Untitled--6-.png" />
            
            </figure><p>We did not observe a clear national outage in Ukraine’s main ISP, <a href="https://radar.cloudflare.com/as15895">AS15895 (Kyivstar)</a> until the October-November attacks on energy infrastructure, which also shows some early resilience of Ukrainian networks.</p>
    <div>
      <h3>Ukraine’s counteroffensive and its Internet impact</h3>
      <a href="#ukraines-counteroffensive-and-its-internet-impact">
        
      </a>
    </div>
    <p>As Russian troops retreated from the northern front in Ukraine, they shifted their efforts to gain ground in the east (<a href="https://en.wikipedia.org/wiki/Battle_of_Donbas_(2022%E2%80%93present)">Battle of Donbas</a>) and south (occupation of the <a href="https://en.wikipedia.org/wiki/Russian_occupation_of_Kherson_Oblast">Kherson region</a>) after late April. This resulted in Internet disruptions and traffic <a href="/tracking-shifts-in-internet-connectivity-in-kherson-ukraine/">shifts</a>, which are discussed in more detail in a section below. However, Internet traffic in the Kherson region was intermittent and included outages after May, given the battle for Internet control. News reports in <a href="https://www.bloomberg.com/news/articles/2022-06-21/ukrainian-telecom-workers-damage-own-equipment-to-thwart-russia">June</a> revealed that ISP workers damaged their own equipment to thwart Russia’s efforts to control the Ukrainian Internet.</p><p>Before the September Ukrainian counteroffensive, another example of the war’s impact on a city’s Internet traffic occurred during the summer, when Russian troops seized Lysychansk in eastern Ukraine in early <a href="https://www.cnn.com/2022/07/03/europe/russia-ukraine-luhansk-lysychansk-intl/index.html">July</a> after what became known as the <a href="https://en.wikipedia.org/wiki/Battle_of_Lysychansk">Battle of Lysychansk</a>. Internet traffic in Lysychansk clearly decreased after the war started. That slide continues during the intense <a href="https://en.wikipedia.org/wiki/Battle_of_Lysychansk">fighting</a> that took place after April, which led to most of the city’s population <a href="https://news.yahoo.com/12-000-lysychansk-residents-remain-194356536.html?fr=sycsrp_catchall">leaving</a>. By May, traffic was almost residual (with a mid-May few days short term increase).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/v4LYcK9VisjSWM6uCIxAE/da8abe9b409341f1a205132dcc2274ac/Lysychansk.png" />
            
            </figure><p>In early September the Ukrainian <a href="https://en.wikipedia.org/wiki/2022_Kharkiv_counteroffensive">counteroffensive</a> took off in the east, although the media initially <a href="https://www.euronews.com/2022/08/29/ukraine-launches-counter-offensive-to-retake-kherson-say-authorities">reported</a> a south offensive in <a href="https://en.wikipedia.org/wiki/2022_Kherson_counteroffensive">Kherson Oblast</a> that was a “<a href="https://mwi.usma.edu/the-kherson-ruse-ukraine-and-the-art-of-military-deception/">deception</a>” move. The Kherson offensive only came to fruition in late October and early November. Ukraine was able to retake in September over 500 settlements and 12,000 square kilometers of territory in the Kharkiv region. At that time, there were Internet outages in several of those settlements.</p><p>In response to the successful Ukrainian counteroffensive, Russian airstrikes caused power outages and Internet disruptions in the region. That was the case in <a href="https://twitter.com/CloudflareRadar/status/1569055256889147394">Kharkiv</a> on September 11, 12, and 13. The figure below shows a 12-hour near-complete outage on September 11, followed by two other periods of drop in traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ZIh3YgijKEymynJlGr65L/ec882fb345d6b302d42c016879e55073/pasted-image-0.jpg" />
            
            </figure>
    <div>
      <h3>When nuclear inspectors arrive, so do Internet outages</h3>
      <a href="#when-nuclear-inspectors-arrive-so-do-internet-outages">
        
      </a>
    </div>
    <p>In the Zaporizhzhia region, there were also outages. On September 1, 2022, the day the International Atomic Energy Agency (IAEA) inspectors <a href="https://www.cnn.com/2022/09/01/europe/ukraine-zaporizhzhia-iaea-inspectors-intl/index.html">arrived</a> at the Russian-controlled Zaporizhzhia nuclear power plant in Enerhodar, there were Internet outages in two local ASNs that service the area: <a href="https://radar.cloudflare.com/as199560">AS199560 (Engrup)</a> and <a href="https://radar.cloudflare.com/as197002">AS197002 (OOO Tenor**)**</a>. Those outages lasted until September 10, as shown in the charts below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/a2PY7w4O0wV09zksdZq0H/70519057b1f99ec3dca06e34570dce83/image5-4.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4GNWaVX6QswPk6FtvInWH1/327e360db570825fd09c0bf976071247/image2-10.png" />
            
            </figure><p>More broadly, the city of Enerhodar, where the nuclear power plant is located, experienced a four-day outage after September 6.</p>
    <div>
      <h3>Mid-September traffic drop in Crimea</h3>
      <a href="#mid-september-traffic-drop-in-crimea">
        
      </a>
    </div>
    <p>In mid-September, following Ukraine’s counteroffensive, there were questions as to when Crimea might be targeted by Ukrainian forces, with <a href="https://twitter.com/KyivIndependent/status/1569659989417152515?s=20">news reports</a> indicating that there was an evacuation of the Russian population from Crimea around September 13. We saw a clear drop in traffic on that Tuesday, compared with the previous day, as seen in the map of Crimea below (red is decrease in traffic, green is increase).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Gx1e3kabp7xVFBubow5UH/8ab8e9192813d9aa7d7e8f393f457f1c/Untitled--8-.png" />
            
            </figure>
    <div>
      <h3>October brings energy infrastructure attacks and country-wide disruptions</h3>
      <a href="#october-brings-energy-infrastructure-attacks-and-country-wide-disruptions">
        
      </a>
    </div>
    <p>As we have seen, the Russian air strikes targeting critical energy infrastructure began in September as a retaliation to Ukraine's counteroffensive. The following month, the <a href="https://en.wikipedia.org/wiki/Crimean_Bridge_explosion">Crimean Bridge explosion</a> on Saturday, October 8 (when a truck-borne bomb destroyed part of the bridge) led to more air strikes that affected networks and Internet traffic across Ukraine.</p><p>On Monday, October 10, Ukraine woke up to air strikes on energy infrastructure and experienced severe electricity and Internet outages. At 07:35 UTC, traffic in the country was 35% below its usual level compared with the previous week and only fully recovered more than 24 hours later. The impact was particularly significant in regions like Kharkiv, where traffic was down by around 80%, and Lviv, where it dropped by about 60%. The graph below shows how new air strikes in Lviv Oblast the following day affected Internet traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/78CSYl5UmR3bKYRQSBt6sT/71aab720e59da8a1ea270824b9992280/pasted-image-0--3-.png" />
            
            </figure><p>There were clear disruptions in Internet connectivity in several regions on October 17, but also on <a href="https://twitter.com/CloudflareRadar/status/1583102832810790920">October 20</a>, when the destruction of several power stations in Kyiv resulted in a 25% drop in Internet traffic from Kyiv City as compared to the two previous weeks. It lasted 12 hours, and was followed the next day by a shorter partial outage as seen in the graph below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4msXK7eZ34Sq8NEGd3nrpx/587a8665bac394c2841cfa9b936f589f/pasted-image-0--4-.png" />
            
            </figure><p>In late October, <a href="https://www.politico.eu/article/russia-strike-several-energy-power-station-ukraine-cause-outage-zelenskyy/">according</a> to Ukrainian officials, 30% of Ukraine’s power stations were destroyed. Self-imposed power limitations because of this destruction resulted in drops in Internet traffic observed in places like Kyiv and the surrounding region.</p><p>The start of a multi-week Internet disruption in Kherson Oblast can be seen in the graph below, showing ~70% lower traffic than in previous weeks. The disruption began on Saturday, October 22, when Ukrainians were gaining ground in the Kherson region.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7d7wtQDtI7LpxPE4JOIEHF/f4d936fd54e9618327571741ff202292/pasted-image-0--5-.png" />
            
            </figure><p>Traffic began to return after Ukrainian forces <a href="https://en.wikipedia.org/wiki/2022_Kherson_counteroffensive">took Kherson city</a> on November 11, 2022. The graph below shows a week-over-week comparison for Kherson Oblast for the weeks of November 7, November 28, and December 19 for better visualization in the chart while showing the evolution through a seven-week period.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6LArjk5J5TffAU8hp6ZlLs/2497fb84c3ce20059cc20982e26c027d/pasted-image-0--6-.png" />
            
            </figure>
    <div>
      <h3>Ongoing strikes and Internet disruptions</h3>
      <a href="#ongoing-strikes-and-internet-disruptions">
        
      </a>
    </div>
    <p>Throughout the rest of the year and into 2023, Ukraine has continued to face intermittent Internet disruptions. On <a href="https://twitter.com/CloudflareRadar/status/1595419978282733573">November 23</a>, 2022, the country experienced widespread power outages after Russian strikes, causing a nearly 50% decrease in Internet traffic in Ukraine. This disruption lasted for almost a day and a half, further emphasizing the ongoing impact of the conflict on Ukraine's infrastructure.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2Ks6M4QSM7KTPunVEeQ2q0/829abdfdb63a83597daa610ac9a79d55/pasted-image-0--5--1.png" />
            
            </figure><p>Although there was a recovery after that late November outage, only a few days later traffic seemed closer to normal levels. Below is a chart of the week-over-week evolution of Internet traffic in Ukraine at both a national and local level during that time:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6jN9YdDDfG3baEorEPwSTv/f68d2932423e95c6e85d0c95ea52f62b/pasted-image-0--1-.jpg" />
            
            </figure><p>In Kyiv Oblast:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/10OgvUg5wAa34rKguZnHRO/ffefa55621e15d870a6a84b5b1cbca74/pasted-image-0--7-.png" />
            
            </figure><p>In the Odessa region:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/KqzCQ9DmqpeUBsujAC8OA/b6815935ccaf43020aaac9b56481603b/pasted-image-0--8-.png" />
            
            </figure><p>And Kharkiv (where a <a href="https://twitter.com/CloudflareRadar/status/1603750187058561024">December 16</a> outage is also clear — in the green line):</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/o51CEp2CODgryKNnp1GxX/3a150ec28a35243545468a8663609885/M-2axCRAh672FEYZnaQYK7QR5xcNVGYUKmQBa3jSQaC6p08PlhumoaevZzzrcH3z3hhvirRz5jfPUSSFaqov2FT9eOOK3cEsdyluH_9l9OvfFsCriHKo8p6Yfuw.jpeg" />
            
            </figure><p>On <a href="https://twitter.com/CloudflareRadar/status/1603750187058561024">December 16</a>, there was another country-level Internet disruption caused by air strikes targeting energy infrastructure. Traffic at a national level dropped as much as 13% compared with the previous week, but Ukrainian networks were even more affected. <a href="https://radar.cloudflare.com/as13188">AS13188 (Triolan)</a> had a 70% drop in traffic, and <a href="https://radar.cloudflare.com/as15895">AS15895 (Kyivstar)</a> a 40% drop, both shown in the figures below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/U6UWXE81VqYFBi1km2vDM/09a42cae737db1d5943c7f6c8d4895b9/pasted-image-0--7--1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4DBFwEmyxfvmtoTR4cOyQ5/64502c88837e79b65925c10f78553e18/pasted-image-0--8--1.png" />
            
            </figure><p>In January 2023, air strikes caused additional Internet disruptions. One such recent event was in <a href="https://twitter.com/CloudflareRadar/status/1618602213965692930">Odessa</a>, where traffic dropped as low as 54% compared with the previous week during an 18-hour disruption.</p>
    <div>
      <h2>A cyber war with global impact</h2>
      <a href="#a-cyber-war-with-global-impact">
        
      </a>
    </div>
    
    <div>
      <h3>“Shields Up” on cyber attacks</h3>
      <a href="#shields-up-on-cyber-attacks">
        
      </a>
    </div>
    <p>The <a href="https://www.usatoday.com/story/tech/2022/02/28/russia-cyber-attack-ukraine-invasion-protect-yourself/6976490001/">US government</a> and the <a href="https://edition.cnn.com/2022/02/24/tech/russia-ukraine-us-sanctions-cyberattacks/index.html">FBI</a> issued warnings in March to all citizens, businesses, and organizations in the country, as well as allies and partners, to be aware of the need to “enhance cybersecurity.” The US Cybersecurity and Infrastructure Security Agency (CISA) launched the <a href="https://www.cisa.gov/shields-up">Shields Up</a> initiative, noting that “Russia’s invasion of Ukraine could impact organizations both within and beyond the region.” The <a href="/shields-up-free-cloudflare-services-to-improve-your-cyber-readiness/#:~:text=National%20Cyber%20Security%20Center">UK</a> and <a href="https://www.meti.go.jp/press/2021/02/20220221003/20220221003.html">Japan</a>, among others, also issued warnings.</p><p>Below, we discuss Web Application Firewall (WAF) mitigations and DDoS attacks. A <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> helps protect web applications by filtering and monitoring <a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/">HTTP</a> traffic between a web application and the Internet. A WAF is a protocol <a href="https://www.cloudflare.com/learning/ddos/what-is-layer-7/">layer 7</a> defense (in the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>), and is not designed to defend against all types of attacks. <a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service (DDoS)</a> attacks are cyber attacks that aim to take down Internet properties and make them unavailable for users.</p>
    <div>
      <h3>Cyber attacks rose 1,300% in Ukraine by early March</h3>
      <a href="#cyber-attacks-rose-1-300-in-ukraine-by-early-march">
        
      </a>
    </div>
    <p>The charts below are based on normalized data, and show threats mitigated by our <a href="https://www.cloudflare.com/waf/">WAF</a>.</p><p>Mitigated application-layer threats blocked by our WAF skyrocketed after the war started on February 24. Mitigated requests were 105% higher on Monday, February 28 than in the previous (pre-war) Monday, and peaked on March 8, reaching 1,300% higher than pre-war levels.</p><p>Between February 2022 and February 2023, an average of 10% of all traffic to Ukraine was mitigations of potential attacks.</p><p>The graph below shows the daily percentage of application layer traffic to Ukraine that Cloudflare mitigated as potential attacks. In early March, 30% of all traffic was mitigated. This fell in April, and remained low for several months, but it picked up in early September around the time of the Ukrainian counteroffensive in east and south Ukraine. The peak was reached on October 29 when DDoS attack traffic constituted 39% of total traffic to Cloudflare’s Ukrainian customer websites.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/69JPlC7rPSRlJAgzyg7Z40/92fa0f0569d4e3a5bbdfb7cb2879245a/pasted-image-0--9-.png" />
            
            </figure><p>This trend is more evident when looking at all traffic to sites on the “.ua” <a href="https://www.cloudflare.com/learning/dns/top-level-domain/">top-level domain</a> (from Cloudflare’s perspective). The chart below shows that DDoS attack traffic accounted for over 80% of all traffic by early March 2022. The first clear spikes occurred on February 16 and 19, with around 25% of traffic mitigated. There was no moment of rest after the war started, except towards the end of November and December, but the attacks resumed just before Christmas. An average of 13% of all traffic to “.ua”, between February 2022 and February 2023 was mitigations of potential attacks. The following graph provides a comprehensive view of DDoS application layer attacks on “.ua” sites:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ThkcumHJByzthF3agS1Wu/a8a8012f605f88bf25723065562fe128/pasted-image-0--10-.png" />
            
            </figure><p>Moving on to types of mitigations of product groups that were used (related to “.ua” sites), as seen in the next chart, around 57% were done by the ruleset which automatically detects and mitigates HTTP DDoS attacks (DDoS Mitigation), 31% were being mitigated by firewall rules put in place (WAF), and 10% were blocking requests based on our IP threat reputation database (IP Reputation).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3tGh3tD8phTB1LWdWK2G1G/f4b3853c70f5561aeef83064abbaa93c/pasted-image-0--11-.png" />
            
            </figure><p>It’s important to note that <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> rules in the graph above are also associated with custom firewall rules created by customers to provide a more tailored protection. “DDoS Mitigation” (application layer DDoS protection) and “Access Rules” (rate limiting) are specifically used for DDoS protection.</p><p>In contrast to the first graph shown in this section, which looked at mitigated attack traffic targeting Ukraine, we can also look at mitigated attack traffic originating in Ukraine. The graph below also shows that the share of mitigated traffic from Ukraine also increased considerably after the invasion started.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2el6N8mlMwLmLhWXo2sVPe/a9df5e23e05b51ffab26277b0534880c/pasted-image-0--12-.png" />
            
            </figure>
    <div>
      <h3>Top attacked industries: from government to news media</h3>
      <a href="#top-attacked-industries-from-government-to-news-media">
        
      </a>
    </div>
    <p>The industries sectors that had a higher share of <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">WAF</a> mitigations were government administration, financial services, and the media, representing almost half of all WAF mitigations targeting Ukraine during 2022.</p><p>Looking at DDoS attacks, there was a surge in attacks on media and publishing companies during 2022 in Ukraine. Entities targeting Ukrainian companies appeared to be focused on information-related websites. The top five most attacked industries in the Ukraine in the first two quarters of 2022 were all in broadcasting, Internet, online media, and publishing, accounting for almost 80% of all DDoS attacks targeting Ukraine.</p><p>In a more focused look at the type of websites Cloudflare has protected throughout the war, the next two graphs provide a view of mitigated application layer attacks by the type of “.ua” sites we helped to protect. In the first days of the war, mitigation spikes were observed at a news service, a TV channel, a government website, and a bank.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/knjDKJhZz4ROjGD7UuNg0/44c8b7c7e34488cea19013d9a7968136/Untitled--9-.png" />
            
            </figure><p>In July, spikes in mitigations we observed across other types of “.ua” websites, including food delivery, e-commerce, auto parts, news, and government.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6LOBeDItrjkmhbyz4y4xxk/1249fbbf5f7062c5e55365b7253f6e99/Untitled--10-.png" />
            
            </figure><p>More recently, in February 2023, the spikes in mitigations were somewhat similar to what we saw one year ago, including electronics, e-commerce, IT, and education websites.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4nYWrM52S26I2Zr4Vt0VRi/d15ed366bea3c6750d85b3a2d07979ea/pasted-image-0--13-.png" />
            
            </figure>
    <div>
      <h3>12.6% of network-layer traffic was DDoS activity in Q1 2022</h3>
      <a href="#12-6-of-network-layer-traffic-was-ddos-activity-in-q1-2022">
        
      </a>
    </div>
    <p>Network-layer (layer 3 and 4) traffic is harder to attribute to a specific domain or target because IP addresses are shared across different customers. Looking at network-level DDoS traffic hitting our Kyiv data center, we saw peaks of DDoS traffic higher than before the war in early March, but they were much higher in June and August.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5HpbYWRhmqbUud7AJI0Rby/f8df3ae1e1d722dd535f99e231f94825/Untitled--11-.png" />
            
            </figure><p>In our Q1 2022 <a href="https://radar.cloudflare.com/reports/ddos-2022-q1">DDoS report</a>, we also noted that <a href="https://radar.cloudflare.com/reports/ddos-2022-q1">12.6% of Ukraine’s traffic was DDoS activity</a>, compared with 1% in the previous quarter, a 1,160% quarter-over-quarter increase.</p><p>Several of our quarterly <a href="/tag/ddos/">DDoS reports</a> from 2022 include attack trends related to the war in Ukraine, with quarter over quarter <a href="https://radar.cloudflare.com/reports?q=DDoS">interactive</a> comparisons.</p>
    <div>
      <h2>Network re-routing in Kherson</h2>
      <a href="#network-re-routing-in-kherson">
        
      </a>
    </div>
    <p>On February 24, 2022, Russian forces <a href="https://en.wikipedia.org/wiki/Southern_Ukraine_campaign">invaded</a> Ukraine's Kherson Oblast region. The city of Kherson was captured on March 2, as the first major city and only regional capital to be captured by Russian forces during the initial invasion. The <a href="https://en.wikipedia.org/wiki/Russian_occupation_of_Kherson_Oblast">Russian occupation of Kherson Oblast</a> continued until Ukrainian forces <a href="https://en.wikipedia.org/wiki/Liberation_of_Kherson">resumed control</a> on November 11, after launching a counteroffensive at the end of August.</p><p>On May 4, 2022, we published <a href="/tracking-shifts-in-internet-connectivity-in-kherson-ukraine/"><i>Tracking shifts in Internet connectivity in Kherson, Ukraine</i></a>, a blog post that explored a re-routing event that impacted <a href="https://radar.cloudflare.com/as47598">AS47598 (Khersontelecom)</a>, a telecommunications provider in Kherson Oblast. Below, we summarize this event, and explore similar activity across other providers in Kherson that has taken place since then.</p><p>On May 1, 2022, we observed a shift in routing for the <a href="https://bgpview.io/prefix/91.206.110.0/23">IPv4 prefix</a> announced by Ukrainian network <a href="https://radar.cloudflare.com/as47598">AS47598 (Khersontelecom)</a>. During April, it reached the Internet through several other Ukrainian network providers, including <a href="https://radar.cloudflare.com/as12883">AS12883 (Vega Telecom)</a> and <a href="https://radar.cloudflare.com/as3326">AS3326 (Datagroup)</a>. However, after the shift, its routing path now showed a Russian network, <a href="https://radar.cloudflare.com/as201776">AS201776 (Miranda-Media)</a>, as the sole upstream provider. With traffic from KhersonTelecom passing through a Russian network, it was subject to the restrictions and limitations imposed on any traffic transiting Russian networks, including content filtering.</p><p>The flow of traffic from Khersontelecom before and after May 1, with rerouting through Russian network provider Miranda-Media, is illustrated in the chart below. This particular re-routing event was short-lived, as a routing update for AS47598 on May 4 saw it return to reaching the Internet through other Ukrainian providers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4OIpRjlvTbltFtWxLX0cIt/479c9f70efa3936b50e97e9c7b7f364b/pasted-image-0--14-.png" />
            
            </figure><p>As a basis for our analysis, we started with a list of 15 Autonomous System Numbers (ASNs) belonging to networks in Kherson Oblast. Using that list, we analyzed routing information collected by route-views2 over the past year, from February 1, 2022, to February 15, 2023. route-views2 is a BGP route collector run by the <a href="https://www.routeviews.org/routeviews/">University of Oregon Route Views Project</a>. Note that with respect to the discussions of ASNs in this and the following section, we are treating them equally, and have not specifically factored estimated user population into these analyses.</p><p>The figure below illustrates the result of this analysis, showing that re-routing of Kherson network providers (listed along the y-axis) through Russian upstream networks was fairly widespread, and for some networks, has continued into 2023. During the analysis time frame, there were three primary Russian networks that appeared as upstream providers: <a href="https://radar.cloudflare.com/as201776">AS201776 (Miranda-Media)</a>, <a href="https://radar.cloudflare.com/as52091">AS52091 (Level-MSK Ltd.)</a>, and <a href="https://radar.cloudflare.com/as8492">AS8492 (OBIT Ltd.)</a>.</p><p>Within the graph, black bars indicate periods when the ASN effectively disappeared from the Internet; white segments indicate the ASN was dependent on other Ukraine networks as immediate upstreams; and red indicates the presence of Russian networks in the set of upstream providers. The intensity of the red shading corresponds to the percentage of announced prefixes for which a Russian network provider is present in the routing path as observed from networks outside Ukraine. Bright red shading, equivalent to “1” in the legend, indicates the presence of a Russian provider in all routing paths for announced prefixes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7k9m2YU1xgahnheA5nXR9V/a91fc75c3645029d740d5553aab596ac/Untitled--12-.png" />
            
            </figure><p>In the blog post linked above, we referenced an outage that began on April 30. This is clearly visible in the figure as a black bar that runs for several days across all the listed ASNs. In this instance, AS47598 (KhersonTelecom) recovered a day later, but was sending traffic through AS201776 (Miranda-Media), a Russian provider, as discussed above.</p><p>Another Ukrainian network, <a href="https://radar.cloudflare.com/as49168">AS49168 (Brok-X)</a>, recovered from the outage on May 2, and was also sending traffic through Miranda-Media. By May 4, most of the other Kherson networks recovered from the outage, and both AS47598 and AS49168 returned to using Ukrainian networks as immediate upstream providers. Routing remained “normal” until May 30. Then, a more widespread shift to routing traffic through Russian providers began, although it appears that this shift was preceded by a brief outage for a few networks. For the most part, this re-routing lasted through the summer and into October. Some networks saw a brief outage on October 17, but most stopped routing directly through Russia by October 22.</p><p>However, this shift away from Russia was followed by periods of extended outages. KhersonTelecom suffered such an outage, and has remained offline since October, except for the first week of November when all of its traffic routed through Russia. Many other networks rejoined the Internet in early December, relying mostly on other Ukrainian providers for Internet connectivity. However, since early December, <a href="https://radar.cloudflare.com/as204485">AS204485 (PE Berislav Cable Television)</a>, <a href="https://radar.cloudflare.com/as56359">AS56359 (CHP Melnikov Roman Sergeevich)</a>, and <a href="https://radar.cloudflare.com/as49465">AS49465 (Teleradiocompany RubinTelecom Ltd.)</a> have continued to use Miranda-Media as an upstream provider, in addition to experiencing several brief outages. In addition, over the last several months, <a href="https://radar.cloudflare.com/as25082">AS25082 (Viner Telecom)</a> has used both a Ukrainian network and Miranda-Media as upstream providers.</p>
    <div>
      <h2>Internet resilience in Ukraine</h2>
      <a href="#internet-resilience-in-ukraine">
        
      </a>
    </div>
    <p>In the context of the Internet, “<a href="https://csrc.nist.gov/glossary/term/network_resilience">resilience</a>” refers to the ability of a network to operate continuously in a manner that is highly resistant to disruption. This includes the ability of a network to: (1) operate in a degraded mode if damaged, (2) rapidly recover if failure does occur, and (3) scale to meet rapid or unpredictable demands. Throughout the Russia-Ukraine conflict, media coverage (<a href="https://www.vice.com/en/article/qjbapv/diy-volunteers-are-repairing-ukraines-destroyed-internet-infrastructure">VICE</a>, <a href="https://www.bloomberg.com/news/features/2022-11-17/ukraine-stays-online-during-war-thanks-to-repair-crews#xj4y7vzkg">Bloomberg</a>, <a href="https://www.washingtonpost.com/technology/2022/03/29/ukraine-internet-faq/">Washington Post</a>) has highlighted the work done in Ukraine to repair damaged fiber-optic cables and mobile network infrastructure to keep the country online. This work has been critically important to maintaining the resilience of Ukrainian Internet infrastructure.</p><p>According to <a href="https://www.peeringdb.com/advanced_search?country__in=UA&amp;reftag=ix">PeeringDB</a>, as of February 2023, there are 25 Internet Exchange Points (IXPs) in Ukraine and 50 interconnection facilities. (An IXP may span multiple physical facilities.) Within this set of IXPs, Autonomous Systems (ASes) belonging to international providers are currently present in over half of them. The number of facilities, IXPs, and international ASes present in Ukraine points to a resilient interconnection fabric, with multiple locations for both domestic and international providers to exchange traffic.</p><p>To better understand these international interconnections, we first analyze the connectivity of ASes in Ukraine, and we classify the links to domestic networks (links where both ASes are registered in Ukraine) and international networks (links between ASes in Ukraine and ASes outside Ukraine). To determine which ASes are domestic in Ukraine, we can use information from the extended delegation reports from the <a href="https://ftp.ripe.net/pub/stats/ripencc/2023/">Réseaux IP Européens Network Coordination Centre (RIPE NCC)</a>, the <a href="https://www.nro.net/about/rirs/">Regional Internet Registry</a> that covers Ukraine. We also parsed collected BGP data to extract the AS-level links between Ukrainian ASes and ASes registered in a different country, and we consider these the international connectivity of the domestic ASes.</p><p>A <a href="https://www.economist.com/science-and-technology/2022/03/26/the-degrading-treatment-of-ukraines-internet">March 2022 article in The Economist</a> noted that <i>“For one thing, Ukraine boasts an unusually large number of internet-service providers—by one reckoning the country has the world’s fourth-least-concentrated Internet market. This means the network has few choke points, so is hard to disable.”</i> As of the writing of this blog post, there are 2,190 ASes registered in Ukraine (UA ASes), and 1,574 of those ASes appear in the BGP routing table as active. These counts support the article’s characterization, and below we discuss several additional observations that reinforce Ukraine’s Internet resilience.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7qohQNRwMLbdA96Gb9uhXv/534c703a02c0076b1ad2c263fc06299b/Untitled--13-.png" />
            
            </figure><p>The figure above is a cumulative distribution function showing the fraction of domestic Ukrainian ASes that have direct connections to international networks. In February 2023, approximately 50% had more than one (100) international link, while approximately 10% had more than 10, and approximately 2% had 100 or more. Although these numbers have dropped slightly over the last year, they underscore the lack of centralized choke points in the Ukrainian Internet.</p><p>For the networks with international connectivity, we can also look at the distribution of “next-hop” countries – countries with which those international networks are associated. (Note that some networks may have a global footprint, and for these, the associated country is the one recorded in their autonomous system registration.) Comparing the choropleth maps below illustrates how this set of countries, and their fraction of international paths, have changed between February 2022 and February 2023. The data underlying these maps shows that international connectivity from Ukraine is distributed across 18 countries — unsurprisingly, mostly in Europe.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/68XPvDkbwMtRjqfJ7dpeJd/9f5ab638412429518c1324e0234937a3/UA-2022-fraction-of-next-hop-ases-by-country.png" />
            
            </figure><p>In February 2022, these countries/locations accounted for 77% of Ukraine’s next-hop international paths. The top four all had 7.8% each. However, in February 2023, the top 10 next-hop countries/locations dropped slightly to 76% of international paths. While just a slight change from the previous year, the set of countries/locations and many of their respective fractions saw considerable change.</p>
<table>
<thead>
  <tr>
    <th></th>
    <th><span>February 2022</span></th>
    <th><span>February 2023</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>1</span></td>
    <td><span>Germany </span></td>
    <td><span>7.85%</span></td>
    <td><span>Russia</span></td>
    <td><span>11.62%</span></td>
  </tr>
  <tr>
    <td><span>2</span></td>
    <td><span>Netherlands</span></td>
    <td><span>7.85%</span></td>
    <td><span>Germany</span></td>
    <td><span>11.43%</span></td>
  </tr>
  <tr>
    <td><span>3</span></td>
    <td><span>United Kingdom</span></td>
    <td><span>7.83%</span></td>
    <td><span>Hong Kong</span></td>
    <td><span>8.38%</span></td>
  </tr>
  <tr>
    <td><span>4</span></td>
    <td><span>Hong Kong</span></td>
    <td><span>7.81%</span></td>
    <td><span>Poland</span></td>
    <td><span>7.93%</span></td>
  </tr>
  <tr>
    <td><span>5</span></td>
    <td><span>Sweden</span></td>
    <td><span>7.77%</span></td>
    <td><span>Italy</span></td>
    <td><span>7.75%</span></td>
  </tr>
  <tr>
    <td><span>6</span></td>
    <td><span>Romania</span></td>
    <td><span>7.72%</span></td>
    <td><span>Turkey</span></td>
    <td><span>6.86%</span></td>
  </tr>
  <tr>
    <td><span>7</span></td>
    <td><span>Russia</span></td>
    <td><span>7.67%</span></td>
    <td><span>Bulgaria</span></td>
    <td><span>6.20%</span></td>
  </tr>
  <tr>
    <td><span>8</span></td>
    <td><span>Italy</span></td>
    <td><span>7.64%</span></td>
    <td><span>Netherlands</span></td>
    <td><span>5.31%</span></td>
  </tr>
  <tr>
    <td><span>9</span></td>
    <td><span>Poland</span></td>
    <td><span>7.60%</span></td>
    <td><span>United Kingdom</span></td>
    <td><span>5.30%</span></td>
  </tr>
  <tr>
    <td><span>10</span></td>
    <td><span>Hungary</span></td>
    <td><span>7.54%</span></td>
    <td><span>Sweden</span></td>
    <td><span>5.26%</span></td>
  </tr>
</tbody>
</table><p>Russia’s share grew by 50% year to 11.6%, giving it the biggest share of next-hop ASes. Germany also grew to account for more than 11% of paths.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/39NvtNpj2gb0VliIbWRyRn/5aa6b346861a9d8cc7130ee9775f37e9/UA-2023-fraction-of-next-hop-ases-by-country.png" />
            
            </figure>
    <div>
      <h2>Satellite Internet connectivity</h2>
      <a href="#satellite-internet-connectivity">
        
      </a>
    </div>
    <p>Cloudflare observed a rapid growth in Starlink’s ASN (<a href="https://radar.cloudflare.com/traffic/as14593?range=28d">AS14593</a>) traffic to Ukraine during 2022 and into 2023. Between mid-March and mid-May, Starlink’s traffic in the country grew over 530%, and continued to grow from mid-May up until mid-November, increasing nearly 300% over that six-month period — from mid-March to mid-December the growth percentage was over 1600%. After that, traffic stabilized and even dropped a bit during January 2023.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3vp8xcUtGUjTDl0GS4VuhI/4e0255f21f3bacd0958562824ed6f91f/pasted-image-0--15-.png" />
            
            </figure><p>Our data shows that between November and December 2022, Starlink represented between 0.22% and 0.3% of traffic from Ukraine, but that number is now lower than 0.2%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1T5N07PtSUf2QsK3ABhp1d/4a16dece341a99ff251dc81f94e527dc/pasted-image-0--16-.png" />
            
            </figure>
    <div>
      <h2>Conclusion</h2>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>One year in, the war in Ukraine has taken an unimaginable humanitarian toll. The Internet in Ukraine has also become a battleground, suffering attacks, re-routing, and disruptions. But it has proven to be exceptionally resilient, recovering time and time again from each setback.</p><p>We know that the need for a secure and reliable Internet there is more critical than ever. At Cloudflare, we’re committed to continue providing tools that <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">protect Internet services from cyber attack</a>, improve security for those operating in the region, and share information about Internet connectivity and routing inside Ukraine.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Ukraine]]></category>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[Project Galileo]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Russia]]></category>
            <guid isPermaLink="false">2It5mL3YJxtMK5OFZW4FRf</guid>
            <dc:creator>João Tomé</dc:creator>
            <dc:creator>David Belson</dc:creator>
            <dc:creator>Kristin Berdan</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS attack trends for 2022 Q2]]></title>
            <link>https://blog.cloudflare.com/ddos-attack-trends-for-2022-q2/</link>
            <pubDate>Wed, 06 Jul 2022 12:55:42 GMT</pubDate>
            <description><![CDATA[ Welcome to our 2022 Q2 DDoS report. This report includes insights and trends about the DDoS threat landscape — as observed across the global Cloudflare network ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4PwTj2tCMoggQJjwZmRV1N/584391a0244ab593eed0d7843af68b62/image22-2.png" />
            
            </figure><p>Welcome to our 2022 Q2 DDoS report. This report includes insights and trends about the DDoS threat landscape — as observed across the global Cloudflare network. An interactive version of this report is also available on <a href="https://radar.cloudflare.com/notebooks/ddos-2022-q2">Radar</a>.</p><p>In Q2, we’ve seen some of the largest attacks the world has ever seen including a <a href="/26m-rps-ddos/">26 million request per second HTTPS DDoS attacks</a> that Cloudflare automatically detected and mitigated. Furthermore, attacks against Ukraine and Russia continue, whilst a new <a href="https://www.cloudflare.com/learning/ddos/ransom-ddos-attack/">Ransom DDoS attack</a> campaign emerged.</p>
    <div>
      <h2>The Highlights</h2>
      <a href="#the-highlights">
        
      </a>
    </div>
    
    <div>
      <h3>Ukrainian and Russian Internet</h3>
      <a href="#ukrainian-and-russian-internet">
        
      </a>
    </div>
    <ul><li><p>The war on the ground is accompanied by attacks targeting the spread of information.</p></li><li><p>Broadcast Media companies in the Ukraine were the most targeted in Q2 by DDoS attacks. In fact, all the top five most attacked industries are all in online/Internet media, publishing, and broadcasting.</p></li><li><p>In Russia on the other hand, Online Media drops as the most attacked industry to the third place. Making their way to the top, Banking, Financial Services and Insurance (BFSI) companies in Russia were the most targeted in Q2; almost 45% of all application-layer DDoS attacks targeted the BFSI sector. Cryptocurrency companies in Russia were the second most attacked.</p></li></ul><p>Read more about <a href="/what-cloudflare-is-doing-to-keep-the-open-internet-flowing-into-russia-and-keep-attacks-from-getting-out/">what Cloudflare is doing to keep the Open Internet flowing into Russia and keep attacks from getting out</a>.</p>
    <div>
      <h3>Ransom DDoS attacks</h3>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>We’ve seen a new wave of Ransom DDoS attacks by entities claiming to be the Fancy Lazarus.</p></li><li><p>In June 2022, ransom attacks peaked to the highest of the year so far: one out of every five survey respondents who experienced a DDoS attack reported being subject to a Ransom DDoS attack or other threats.</p></li><li><p>Overall in Q2, the percent of Ransom DDoS attacks increased by 11% QoQ.</p></li></ul>
    <div>
      <h3>Application-layer DDoS attacks</h3>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>In 2022 Q2, application-layer DDoS attacks increased by 72% YoY.</p></li><li><p>Organizations in the US were the most targeted, followed by Cyprus, Hong Kong, and China. Attacks on organizations in Cyprus increased by 166% QoQ.</p></li><li><p>The Aviation &amp; Aerospace industry was the most targeted in Q2, followed by the Internet industry, Banking, Financial Services and Insurance, and Gaming / Gambling in fourth place.</p></li></ul>
    <div>
      <h3>Network-layer DDoS attacks</h3>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>In 2022 Q2, network-layer DDoS attacks increased by 109% YoY. Attacks of 100 Gbps and larger increased by 8% QoQ, and attacks lasting more than 3 hours increased by 12% QoQ.</p></li><li><p>The top attacked industries were Telecommunications, Gaming / Gambling and the Information Technology and Services industry.</p></li><li><p>Organizations in the US were the most targeted, followed by China, Singapore, and Germany.</p></li></ul><p>This report is based on DDoS attacks that were automatically detected and mitigated by Cloudflare’s DDoS Protection systems. To learn more about how it works, check out <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">this deep-dive blog post</a>.</p><p><b>A note on how we measure DDoS attacks observed over our network</b></p><p>To analyze attack trends, we calculate the “DDoS activity” rate, which is either the percentage of attack traffic out of the total traffic (attack + clean) observed over our global network, or in a specific location, or in a specific category (e.g., industry or billing country). Measuring the percentages allows us to normalize data points and avoid biases reflected in absolute numbers towards, for example, a Cloudflare data center that receives more total traffic and likely, also more attacks.</p>
    <div>
      <h2>Ransom Attacks</h2>
      <a href="#ransom-attacks">
        
      </a>
    </div>
    <p>Our systems constantly analyze traffic and automatically apply mitigation when DDoS attacks are detected. Each DDoS’d customer is prompted with an automated survey to help us better understand the nature of the attack and the success of the mitigation.</p><p>For over two years now, Cloudflare has been surveying attacked customers — one question on the survey being if they received a threat or a ransom note demanding payment in exchange to stop the DDoS attack.</p><p>The number of respondents reporting threats or ransom notes in Q2 increased by 11% QoQ and YoY. During this quarter, we’ve been mitigating Ransom DDoS attacks that have been launched by entities claiming to be the Advanced Persistent Threat (APT) group “Fancy Lazarus”. The campaign has been focusing on financial institutions and cryptocurrency companies.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3LekSaUnzoF3WKmsKWhnHu/81c93d5ab9c4cf77e5c39dab99f86729/image15-1.png" />
            
            </figure><p><b>The percentage of respondents reported being targeted by a ransom DDoS attack or that have received threats in advance of the attack.</b></p><p>Drilling down into Q2, we can see that in June one out of every five respondents reported receiving a ransom DDoS attack or threat — the highest month in 2022, and the highest since December 2021.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2eTKJ7CS0gEfyXbA3EUnJd/f4c1063607dca66844d4505e8fc8cb5e/image6-1.png" />
            
            </figure>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, specifically HTTP DDoS attacks, are attacks that usually aim to disrupt a web server by making it unable to process legitimate user requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests and — in some cases — crash, resulting in degraded performance or an outage for legitimate users.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2obOKJucCHHwfzjfSp15GA/4428ac204839e8c690f6e95c2262844b/image3-2.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by month</h3>
      <a href="#application-layer-ddos-attacks-by-month">
        
      </a>
    </div>
    <p><b>In Q2, application-layer DDoS attacks increased by 72% YoY.</b></p><p>Overall, in Q2, the volume of application-layer DDoS attacks increased by 72% YoY, but decreased 5% QoQ. May was the busiest month in the quarter. Almost 41% of all application-layer DDoS attacks took place in May, whereas the least number of attacks took place in June (28%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4qwd7buXAUhojmsIB3rOpU/852c9dfcd973cfe85c845ebee1da80ec/image20-1.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by industry</h3>
      <a href="#application-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p><b>Attacks on the Aviation and Aerospace industry increased by 493% QoQ.</b></p><p>In Q2, Aviation and Aerospace was the most targeted industry by application-layer DDoS attacks. After it, was the Internet industry, Banking, Financial Institutions and Insurance (BFSI) industry, and in fourth place the Gaming / Gambling industry.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6PKfB1M18FZ4GwzL59sqlM/4056f449d4c6f24de7abaae3f10386c3/image9-2.png" />
            
            </figure>
    <div>
      <h3>Ukraine and Russia cyberspace</h3>
      <a href="#ukraine-and-russia-cyberspace">
        
      </a>
    </div>
    <p><b>Media and publishing companies are the most targeted in Ukraine.</b></p><p>As the war in Ukraine continues on the ground, in the air and on the water, so does it continue in cyberspace. Entities targeting Ukrainian companies appear to be trying to silence information. The top five most attacked industries in the Ukraine are all in broadcasting, Internet, online media, and publishing — that’s almost 80% of all DDoS Attacks targeting Ukraine.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4hYnRS2MRBsydLh7HZ260z/5f66de712a1c4bf81a56bd51e7454aae/image1-2.png" />
            
            </figure><p>On the other side of the war, the Russian Banks, Financial Institutions and Insurance (BFSI) companies came under the most attacks. Almost 45% of all DDoS attacks targeted the BFSI sector. The second most targeted was the Cryptocurrency industry, followed by Online media.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2SuLnGNWkX83CMCh4Knqnj/13a11650cd2ec01eacd1cfc83527100a/image10.png" />
            
            </figure><p>In both sides of the war, we can see that the attacks are highly distributed, indicating the use of globally distributed botnets.</p>
    <div>
      <h3>Application-layer DDoS attacks by source country</h3>
      <a href="#application-layer-ddos-attacks-by-source-country">
        
      </a>
    </div>
    <p><b>In Q2, attacks from China shrank by 78%, and attacks from the US shrank by 43%.</b></p><p>To understand the origin of the HTTP attacks, we look at the geolocation of the source IP address belonging to the client that generated the attack HTTP requests. Unlike network-layer attacks, source IP addresses cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> in HTTP attacks. A high percentage of DDoS activity in a given country doesn’t mean that that specific country is launching the attacks but rather indicates the presence of botnets operating from within the country's borders.</p><p>For the second quarter in a row, the United States tops the charts as the main source of HTTP DDoS attacks. Following the US is China in second place, and India and Germany in the third and fourth. Even though the US remained in the first place, attacks originating from the US shrank by 48% QoQ while attacks from other regions grew; attacks from India grew by 87%, from Germany by 33%, and attacks from Brazil grew by 67%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2vk1N76Ouhfo9PnAmbGtrV/f8d860feae2044d2dcb515b1c8003072/image16-1.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by target country</h3>
      <a href="#application-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>In order to identify which countries are targeted by the most HTTP DDoS attacks, we bucket the DDoS attacks by our customers' billing countries and represent it as a percentage out of all DDoS attacks.</p><p>HTTP DDoS attacks on US-based countries increased by 67% QoQ pushing the US back to the first place as the main target of application-layer DDoS attacks. Attacks on Chinese companies plunged by 80% QoQ dropping it from the first place to the fourth. Attacks on Cyprus increase by 167% making it the second most attacked country in Q2. Following Cyprus is Hong Kong, China, and the Netherlands.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5FYRI0hCsXZZ4TVkyNNod2/c1d84b0c119f51d9adb18a96b4795b1e/image8-1.png" />
            
            </figure>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application-layer attacks target the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service that end users are trying to access (HTTP/S in our case), <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer attacks</a> aim to overwhelm network infrastructure (such as in-line routers and servers) and the Internet link itself.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/G9kSKRT459XrlobrASHLn/8f20afceb5d535d67c712185ea20948e/image23-1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by month</h3>
      <a href="#network-layer-ddos-attacks-by-month">
        
      </a>
    </div>
    <p><b>In Q2, network-layer DDoS attacks increased by 109% YoY, and volumetric attacks of 100 Gbps and larger increased by 8% QoQ.</b></p><p>In Q2, the total amount of network-layer DDoS attacks increased by 109% YoY and 15% QoQ. June was the busiest month of the quarter with almost 36% of the attacks occurring in June.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/63wvQwZOAcqCfuGWLIC4d7/7667284bf69186e8be1da375083ceceb/image12.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by industry</h3>
      <a href="#network-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p><b>In Q2, attacks on Telecommunication companies grew by 66% QoQ.</b></p><p>For the second consecutive quarter, the Telecommunications industry was the most targeted by network-layer DDoS attacks. Even more so, attacks on Telecommunication companies grew by 66% QoQ. The Gaming industry came in second place, followed by Information Technology and Services companies.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1AqUyyBbet85BZ804EmvXa/7afedf5fa21fe7782a7445e04f877fca/image2-2.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by target country</h3>
      <a href="#network-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p><b>Attacks on US networks grew by 95% QoQ.</b></p><p>In Q2, the US remains the most attacked country. After the US came China, Singapore and Germany.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/48CEVlhmbUEAVjFtztOrAa/bca783442c0a7570ed38ae94a19c2101/image17-1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by ingress country</h3>
      <a href="#network-layer-ddos-attacks-by-ingress-country">
        
      </a>
    </div>
    <p><b>In Q2, almost a third of the traffic Cloudflare observed in Palestine and a fourth in Azerbaijan was part of a network-layer DDoS attack.</b></p><p>When trying to understand where network-layer DDoS attacks originate, we cannot use the same method as we use for the application-layer attack analysis. To launch an application-layer DDoS attack, <a href="https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/">successful handshakes</a> must occur between the client and the server in order to establish an HTTP/S connection. For a successful handshake to occur, the attacks cannot spoof their source IP address. While the attacker may use botnets, proxies, and other methods to obfuscate their identity, the attacking client's source IP location does sufficiently represent the attack source of application-layer DDoS attacks.</p><p>On the other hand, to launch network-layer DDoS attacks, in most cases, no handshake is needed. Attackers can spoof the source IP address in order to obfuscate the attack source and introduce randomness into the attack properties, which can make it harder for simple DDoS protection systems to block the attack. So if we were to derive the source country based on a spoofed source IP, we would get a ‘spoofed country’.</p><p>For this reason, when analyzing network-layer DDoS attack sources, we bucket the traffic by the Cloudflare data center locations where the traffic was ingested, and not by the (potentially) spoofed source IP to get an understanding of where the attacks originate from. We are able to achieve geographical accuracy in our report because we have data centers in <a href="http://www.cloudflare.com/network">over 270 cities</a> around the world. However, even this method is not 100% accurate, as traffic may be back hauled and routed via various Internet Service Providers and countries for reasons that vary from cost reduction to congestion and failure management.</p><p>Palestine jumps from the second to the first place as the Cloudflare location with the highest percentage of network-layer DDoS attacks. Following Palestine is Azerbaijan, South Korea, and Angola.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7eLWg6GnqkwtT8se0EXZU2/c980e216deae547593d69bf478feb855/image21-1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/g7HPkqNU8zeuSzWnBmZdH/7d7efc3c21c4360765249627ab06cd52/image7-1.png" />
            
            </figure><p>To view all regions and countries, check out the <a href="https://radar.cloudflare.com/notebooks/ddos-2022-q2#network-layer-ddos-attacks-by-ingress-country">interactive map</a>.</p>
    <div>
      <h3>Attack vectors</h3>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p><b>In Q2, DNS attacks increased making it the second most frequent attack vector.</b></p><p>An attack vector is a term used to describe the method that the attacker uses to launch their DDoS attack, i.e., the IP protocol, packet attributes such as TCP flags, flooding method, and other criteria.</p><p>In Q2, 53% of all network-layer attacks were <a href="https://www.cloudflare.com/learning/ddos/syn-flood-ddos-attack/">SYN floods</a>. SYN floods remain the most popular attack vector. They abuse the initial connection request of the stateful <a href="https://www.cloudflare.com/learning/ddos/glossary/tcp-ip/">TCP</a> handshake. During this initial connection request, servers don’t have any context about the TCP connection as it is new and without the proper protection may find it hard to mitigate a flood of initial connection requests. This makes it easier for the attacker to consume an unprotected server’s resources.</p><p>After the SYN floods are attacks targeting DNS infrastructure, RST floods again abusing TCP connection flow, and generic attacks over UDP.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3AKhwoAGSHqlrQLHjecZAZ/fb6f4f110b1f2da4a62f3354ed396aa0/image13-1.png" />
            
            </figure>
    <div>
      <h3>Emerging threats</h3>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p><b>In Q2, the top emerging threats included attacks over CHARGEN, Ubiquiti and Memcached.</b></p><p>Identifying the top attack vectors helps organizations understand the threat landscape. In turn, this may help them improve their security posture to protect against those threats. Similarly, learning about new emerging threats that may not yet account for a significant portion of attacks, can help mitigate them before they become a significant force.</p><p>In Q2, the top emerging threats were amplification attacks abusing the Character Generator Protocol (CHARGEN), amplification attacks reflecting traffic off of exposed Ubiquiti devices, and the notorious Memcached attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/60X75WXzKulAjLCdpDS55b/5cc5c20179acc847f8f96e991e032264/image5-2.png" />
            
            </figure>
    <div>
      <h3>Abusing the CHARGEN protocol to launch amplification attacks</h3>
      <a href="#abusing-the-chargen-protocol-to-launch-amplification-attacks">
        
      </a>
    </div>
    <p><b>In Q2, attacks abusing the CHARGEN protocol increased by 378% QoQ.</b></p><p>Initially defined in <a href="https://datatracker.ietf.org/doc/html/rfc864">RFC 864</a> (1983), the Character Generator (CHARGEN) protocol is a service of the <a href="https://en.wikipedia.org/wiki/Internet_protocol_suite">Internet Protocol Suite</a> that does exactly what it says it does - it generates characters arbitrarily, and it doesn’t stop sending them to the client until the client closes the connection. Its original intent was for testing and debugging. However, it’s rarely used because it can so easily be abused to generate amplification/reflection attacks.</p><p>An attacker can spoof the source IP of their victim and fool supporting servers around the world to direct a stream of arbitrary characters “back” to the victim’s servers. This type of attack is amplification/reflection. Given enough simultaneous CHARGEN streams, the victim’s servers, if unprotected, would be flooded and unable to cope with legitimate traffic — resulting in a denial of service event.</p>
    <div>
      <h3>Amplification attacks exploiting the Ubiquiti Discovery Protocol</h3>
      <a href="#amplification-attacks-exploiting-the-ubiquiti-discovery-protocol">
        
      </a>
    </div>
    <p><b>In Q2, attacks over Ubiquity increased by 327% QoQ.</b></p><p><a href="https://www.ui.com/">Ubiquiti</a> is a US-based company that provides networking and Internet of Things (IoT) devices for consumers and businesses. Ubiquiti devices can be discovered on a network using the <a href="https://help.ui.com/hc/en-us/articles/204976244-EdgeRouter-Ubiquiti-Device-Discovery">Ubiquiti Discovery protocol</a> over UDP/TCP port 10001.</p><p>Similarly to the CHARGEN attack vector, here too, attackers can spoof the source IP to be the victim’s IP address and spray IP addresses that have port 10001 open. Those would then respond to the victim and essentially flood it if the volume is sufficient.</p>
    <div>
      <h3>Memcached DDoS attacks</h3>
      <a href="#memcached-ddos-attacks">
        
      </a>
    </div>
    <p><b>In Q2, Memcached DDoS attacks increased by 287% QoQ.</b></p><p><a href="https://www.cloudflare.com/learning/ddos/memcached-ddos-attack/">Memcached</a> is a database caching system for speeding up websites and networks. Similarly to CHARGEN and Ubiquiti, Memcached servers that support UDP can be abused to launch amplification/reflection DDoS attacks. In this case, the attacker would request content from the caching system and spoof the victim's IP address as the source IP in the UDP packets. The victim will be flooded with the Memcache responses which can be amplified by a factor of up to 51,200x.</p>
    <div>
      <h2>Network-layer DDoS attacks by attack rate</h2>
      <a href="#network-layer-ddos-attacks-by-attack-rate">
        
      </a>
    </div>
    <p><b>Volumetric attacks of over 100 Gbps increase by 8% QoQ.</b></p><p>There are different ways of measuring the size of an L3/4 DDoS attack. One is the volume of traffic it delivers, measured as the bit rate (specifically, terabits per second or gigabits per second). Another is the number of packets it delivers, measured as the packet rate (specifically, millions of packets per second).</p><p>Attacks with high bit rates attempt to cause a denial-of-service event by clogging the Internet link, while attacks with high packet rates attempt to overwhelm the servers, routers, or other in-line hardware appliances. These devices dedicate a certain amount of memory and computation power to process each packet. Therefore, by bombarding it with many packets, the appliance can be left with no further processing resources. In such a case, packets are “dropped,” i.e., the appliance is unable to process them. For users, this results in service disruptions and denial of service.</p>
    <div>
      <h3>Distribution by packet rate</h3>
      <a href="#distribution-by-packet-rate">
        
      </a>
    </div>
    <p>The majority of network-layer DDoS attacks remain below 50,000 packets per second. While 50 kpps is on the lower side of the spectrum at Cloudflare scale, it can still easily take down unprotected Internet properties and congest even a standard Gigabit Ethernet connection.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5edVFCX1vigbfc2CfCDz6g/a2284f3bcb556fbae9d9ff3cdecdd265/image4-1.png" />
            
            </figure><p>When we look at the changes in the attack sizes, we can see that packet-intensive attacks above 50 kpps decreased in Q2, resulting in an increase of 4% in small attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/152vteTszixrwCKNzrszuw/b7a271ee46ad011fa917c228781086b1/image11-1.png" />
            
            </figure>
    <div>
      <h3>Distribution by bitrate</h3>
      <a href="#distribution-by-bitrate">
        
      </a>
    </div>
    <p>In Q2, most of the network-layer DDoS attacks remain below 500 Mbps. This too is a tiny drop in the water at <a href="https://www.cloudflare.com/network/">Cloudflare scale</a>, but can very quickly shut down unprotected Internet properties with less capacity or at the very least cause congestion for even a standard Gigabit Ethernet connection.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1lUj3pmi7Ch0uSG5ZCuURH/a83742d4796e39b27d1f9e8b84efba97/image18-1.png" />
            
            </figure><p>Interestingly enough, large attacks between 500 Mbps and 100 Gbps decreased by 20-40% QoQ, but volumetric attacks above 100 Gbps increased by 8%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2aCjsSBcyiqdAXY6ZDamo9/e50f145f845f57b7b72657bd4a010fa1/image24-1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by duration</h3>
      <a href="#network-layer-ddos-attacks-by-duration">
        
      </a>
    </div>
    <p><b>In Q2, attacks lasting over three hours increased by 9%.</b></p><p>We measure the duration of an attack by recording the difference between when it is first detected by our systems as an attack and the last packet we see with that attack signature towards that specific target.</p><p>In Q2, 52% of network-layer DDoS attacks lasted less than 10 minutes. Another 40% lasted 10-20 minutes. The remaining 8% include attacks ranging from 20 minutes to over three hours.</p><p>One important thing to keep in mind is that even if an attack lasts only a few minutes, if it is successful, the repercussions could last well beyond the initial attack duration. IT personnel responding to a successful attack may spend hours and even days restoring their services.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3emu9oLw9gcXbz5AZWAZtM/1014ae5d075f95cd7871755745a8d11c/image19-2.png" />
            
            </figure><p>While most of the attacks are indeed short, we can see an increase of over 15% in attacks ranging between 20-60 minutes, and a 12% increase of attacks lasting more than three hours.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4hSf9t1KjaWIMXy4roHCla/060fbfb13ec4ca106e7b0eb302d9b2bc/image14-1.png" />
            
            </figure><p>Short attacks can easily go undetected, especially burst attacks that, within seconds, bombard a target with a significant number of packets, bytes, or requests. In this case, DDoS protection services that rely on manual mitigation by security analysis have no chance in mitigating the attack in time. They can only learn from it in their post-attack analysis, then deploy a new rule that filters the attack fingerprint and hope to catch it next time. Similarly, using an “on-demand” service, where the security team will redirect traffic to a DDoS provider during the attack, is also inefficient because the attack will already be over before the traffic routes to the on-demand DDoS provider.</p><p>It’s recommended that companies use <a href="https://www.cloudflare.com/ddos/">automated, always-on DDoS protection services</a> that analyze traffic and apply real-time fingerprinting fast enough to block short-lived attacks.</p>
    <div>
      <h2>Summary</h2>
      <a href="#summary">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet. A better Internet is one that is more secure, faster, and reliable for everyone — even in the face of DDoS attacks. As part of our mission, since 2017, we’ve been providing <a href="/unmetered-mitigation/">unmetered and unlimited DDoS protection</a> for free to all of our customers. Over the years, it has become increasingly easier for attackers to launch DDoS attacks. But as easy as it has become, we want to make sure that it is even easier — and free — for organizations of all sizes to protect themselves against DDoS attacks of all types.</p><p>Not using Cloudflare yet? <a href="https://dash.cloudflare.com/sign-up">Start now</a> with our Free and <a href="https://www.cloudflare.com/plans/pro/">Pro plans</a> to protect your websites, or <a href="https://www.cloudflare.com/magic-transit/">contact us</a> for comprehensive DDoS protection for your entire network using Magic Transit.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <category><![CDATA[Ukraine]]></category>
            <category><![CDATA[Russia]]></category>
            <guid isPermaLink="false">i4xr8wP9XJwugHF1dG7F8</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[DDoS Attack Trends for 2022 Q1]]></title>
            <link>https://blog.cloudflare.com/ddos-attack-trends-for-2022-q1/</link>
            <pubDate>Tue, 12 Apr 2022 13:12:59 GMT</pubDate>
            <description><![CDATA[ Welcome to our first DDoS report of 2022, and the ninth in total so far. This report includes new data points and insights both in the application-layer and network-layer sections — as observed across the global Cloudflare network between January and March 2022 ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Welcome to our first DDoS report of 2022, and the ninth in <a href="/tag/ddos-reports/">total</a> so far. This report includes new data points and insights both in the application-layer and network-layer sections — as observed across the global Cloudflare network between January and March 2022.</p><p>The first quarter of 2022 saw a massive spike in application-layer DDoS attacks, but a decrease in the total number of network-layer DDoS attacks. Despite the decrease, we’ve seen volumetric DDoS attacks surge by up to 645% QoQ, and we mitigated a new zero-day reflection attack with an amplification factor of 220 billion percent.</p><p>In the Russian and Ukrainian cyberspace, the most targeted industries were Online Media and Broadcast Media. In our Azerbaijan and Palestinian Cloudflare data centers, we’ve seen enormous spikes in DDoS activity — indicating the presence of botnets operating from within.</p>
    <div>
      <h2>The Highlights</h2>
      <a href="#the-highlights">
        
      </a>
    </div>
    
    <div>
      <h3>The Russian and Ukrainian cyberspace</h3>
      <a href="#the-russian-and-ukrainian-cyberspace">
        
      </a>
    </div>
    <ul><li><p>Russian Online Media companies were the most targeted industries within Russia in Q1. The next most targeted was the Internet industry, then Cryptocurrency, and then Retail. While many attacks that targeted Russian Cryptocurrency companies originated in Ukraine or the US, another major source of attacks was from within Russia itself.</p></li><li><p>The majority of HTTP DDoS attacks that targeted Russian companies originated from Germany, the US, Singapore, Finland, India, the Netherlands, and Ukraine. It’s important to note that being able to identify where cyber attack traffic originates is not the same as being able to attribute where the attacker is located.</p></li><li><p>Attacks on Ukraine targeted Broadcast Media and Publishing websites and seem to have been more distributed, originating from more countries — which may indicate the use of global botnets. Still, most of the attack traffic originated from the US, Russia, Germany, China, the UK, and Thailand.</p></li></ul><p>Read more about <a href="/what-cloudflare-is-doing-to-keep-the-open-internet-flowing-into-russia-and-keep-attacks-from-getting-out/">what Cloudflare is doing to keep the Open Internet flowing into Russia and keep attacks from getting out</a>.</p>
    <div>
      <h3>Ransom DDoS attacks</h3>
      <a href="#ransom-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>In January 2022, over 17% of under-attack respondents reported being targeted by ransom DDoS attacks or receiving a threat in advance.</p></li><li><p>That figure drastically dropped to 6% in February, and then to 3% in March.</p></li><li><p>When compared to previous quarters, we can see that in total, in Q1, only 10% of respondents reported a ransom DDoS attack; a 28% decrease YoY and 52% decrease QoQ.</p></li></ul>
    <div>
      <h3>Application-layer DDoS attacks</h3>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>2022 Q1 was the busiest quarter in the past 12 months for application-layer attacks. HTTP-layer DDoS attacks increased by 164% YoY and 135% QoQ.</p></li><li><p>Diving deeper into the quarter, in March 2022 there were more HTTP DDoS attacks than in all of Q4 combined (and Q3, and Q1).</p></li><li><p>After four consecutive quarters in a row with China as the top source of HTTP DDoS attacks, the US stepped into the lead this quarter. HTTP DDoS attacks originating from the US increased by a staggering 6,777% QoQ and 2,225% YoY.</p></li></ul>
    <div>
      <h3>Network-layer DDoS attacks</h3>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <ul><li><p>Network-layer attacks in Q1 increased by 71% YoY but decreased 58% QoQ.</p></li><li><p>The Telecommunications industry was the most targeted by network-layer DDoS attacks, followed by Gaming and Gambling companies, and the Information Technology and Services industry.</p></li><li><p>Volumetric attacks increased in Q1. Attacks above 10 Mpps (million packets per second) grew by over 300% QoQ, and attacks over 100 Gbps grew by 645% QoQ.</p></li></ul><p>This report is based on DDoS attacks that were automatically detected and mitigated by <a href="https://www.cloudflare.com/ddos/">Cloudflare’s DDoS Protection systems</a>. To learn more about how it works, check out <a href="/deep-dive-cloudflare-autonomous-edge-ddos-protection/">this deep-dive blog post</a>.</p><p><b>A note on how we measure DDoS attacks observed over our network</b>To analyze attack trends, we calculate the “DDoS activity” rate, which is either the percentage of attack traffic out of the total traffic (attack + clean) observed over our global network, or in a specific location, or in a specific category (e.g., industry or billing country). Measuring the percentages allows us to normalize data points and avoid biases reflected in absolute numbers towards, for example, a Cloudflare data center that receives more total traffic and likely, also more attacks.</p><p>To view an interactive version of this report view it on <a href="https://radar.cloudflare.com/notebooks/ddos-2022-q1/">Cloudflare Radar</a>.</p>
    <div>
      <h2>Ransom Attacks</h2>
      <a href="#ransom-attacks">
        
      </a>
    </div>
    <p>Our systems constantly analyze traffic and automatically apply mitigation when DDoS attacks are detected. Each DDoS’d customer is prompted with an automated survey to help us better understand the nature of the attack and the success of the mitigation.</p><p>For over two years now, Cloudflare has been surveying attacked customers — one question on the survey being if they received a threat or a ransom note demanding payment in exchange to stop the DDoS attack. In the last quarter, 2021 Q4, we observed a record-breaking level of reported ransom DDoS attacks (one out of every five customers). This quarter, we’ve witnessed a drop in ransom DDoS attacks with only one out of 10 respondents reporting a ransom DDoS attack; a 28% decrease YoY and 52% decrease QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5UeSXC4RnHStQU21LcdFyu/dffdcd7b7d167b4da2d40034b48d6886/unnamed.png" />
            
            </figure><p>When we break it down by month, we can see that January 2022 saw the largest number of respondents reporting receiving a ransom letter in Q1. Almost one out of every five customers (17%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1VoQDMsbVqmsgWOVsZsVEd/879958b830e5e8047874591105f73603/unnamed--1-.png" />
            
            </figure>
    <div>
      <h2>Application-layer DDoS attacks</h2>
      <a href="#application-layer-ddos-attacks">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/application-layer-ddos-attack/">Application-layer DDoS attacks</a>, specifically HTTP DDoS attacks, are attacks that usually aim to disrupt a web server by making it unable to process legitimate user requests. If a server is bombarded with more requests than it can process, the server will drop legitimate requests and — in some cases — crash, resulting in degraded performance or an outage for legitimate users.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Nk5a1cd1TpBCMSBUshW5p/14f88e849feca723c3d59e4932f779db/unnamed1.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by month</h3>
      <a href="#application-layer-ddos-attacks-by-month">
        
      </a>
    </div>
    <p><b>In Q1, application-layer DDoS attacks soared by 164% YoY and 135% QoQ - the busiest quarter within the past year.</b></p><p>Application-layer DDoS attacks increased to new heights in the first quarter of 2022. In March alone, there were more HTTP DDoS attacks than in all of 2021 Q4 combined (and Q3, and Q1).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4pgSaMnY4YtuqRpgnED5aW/f7052e3619d760fcfcc913fc1f212143/image22-1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5WcHhOZ9taZfDfnBYhJie9/366c28db62edaec91a3375be935ac7d0/image23-1.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by industry</h3>
      <a href="#application-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p><b>Consumer Electronics was the most targeted industry in Q1.</b></p><p>Globally, the Consumer Electronics industry was the most attacked with an increase of 5,086% QoQ. Second was the Online Media industry with a 2,131% increase in attacks QoQ. Third were Computer Software companies, with an increase of 76% QoQ and 1,472 YoY.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6Io8GidjMPtjAwO3IoJ5QM/4637de38a6b7e782eccd5a9ad89f7b46/image9-5.png" />
            
            </figure><p>However, if we focus only on Ukraine and Russia, we can see that Broadcast Media, Online Media companies, and Internet companies were the most targeted. Read more about <a href="/what-cloudflare-is-doing-to-keep-the-open-internet-flowing-into-russia-and-keep-attacks-from-getting-out/">what Cloudflare is doing to keep the Open Internet flowing into Russia and keep attacks from getting out</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3KxUaIFTe76sBVFWOr4gXg/37664c82befd30709059d7eba9d7b181/image14-1.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3OdQpFtzCfTo3kWylObvpC/e35a3cfa51e3518057011624993cb29d/image3-6.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by source country</h3>
      <a href="#application-layer-ddos-attacks-by-source-country">
        
      </a>
    </div>
    <p>To understand the origin of the HTTP attacks, we look at the geolocation of the source IP address belonging to the client that generated the attack HTTP requests. Unlike network-layer attacks, source IP addresses cannot be <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoofed</a> in HTTP attacks. A high percentage of DDoS activity in a given country usually indicates the presence of botnets operating from within the country's borders.</p><p>After four consecutive quarters in a row with China as the top source of HTTP DDoS attacks, the US stepped into the lead this quarter. HTTP DDoS attacks originating from the US increased by a staggering 6,777% QoQ and 2,225% YoY. Following China in second place are India, Germany, Brazil, and Ukraine.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3s0SD9E8DoiJriR6chDTIt/0067c86db96706cfd906029d839e034c/unnamed--2-.png" />
            
            </figure>
    <div>
      <h3>Application-layer DDoS attacks by target country</h3>
      <a href="#application-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>In order to identify which countries are targeted by the most HTTP DDoS attacks, we bucket the DDoS attacks by our customers' billing countries and represent it as a percentage out of all DDoS attacks.</p><p>The US drops to second place, after being first for three consecutive quarters. Organizations in China were targeted the most by HTTP DDoS attacks, followed by the US, Russia, and Cyprus.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4CunftrRkj2XkF5Osf3aKS/762f851d62e01c8ec00c9e76e2229f97/image7-4.png" />
            
            </figure>
    <div>
      <h2>Network-layer DDoS attacks</h2>
      <a href="#network-layer-ddos-attacks">
        
      </a>
    </div>
    <p>While application-layer attacks target the application (Layer 7 of the <a href="https://www.cloudflare.com/learning/ddos/glossary/open-systems-interconnection-model-osi/">OSI model</a>) running the service that end users are trying to access (HTTP/S in our case), <a href="https://www.cloudflare.com/learning/ddos/layer-3-ddos-attacks/">network-layer attacks</a> aim to overwhelm network infrastructure (such as in-line routers and servers) and the Internet link itself.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/30aPmdSMAbPwwyujWllA2X/351c3c9b05c09616ecdb47dd556c3f1f/unnamed--1--1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by month</h3>
      <a href="#network-layer-ddos-attacks-by-month">
        
      </a>
    </div>
    <p><b>While HTTP DDoS attacks soared in Q1, network-layer DDoS attacks actually decreased by 58% QoQ, but still increased by 71% YoY.</b></p><p>Diving deeper into Q1, we can see that the amount of network-layer DDoS attacks remained mostly consistent throughout the quarter with about a third of attacks occurring every month.</p><p>![Graph of the yearly distribution of network-layer DDoS attacks by month in the past 12 months]](<a href="/content/images/2022/04/image28.png_WIDE">http://staging.blog.mrk.cfdata.org/content/images/2022/04/image28.png_WIDE</a>)</p><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7aI8iiTHyjVCpvTv5UjDtU/9bc5f0cd32fe0d25333cf6d1355c64b2/image23-3.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7GyfQMcPOegM2kbtwRR794/1f38b461cce0f9583ac89a0471041da3/unnamed--3-.png" />
            
            </figure>
    <div>
      <h2>Cloudflare mitigates zero-day amplification DDoS attack</h2>
      <a href="#cloudflare-mitigates-zero-day-amplification-ddos-attack">
        
      </a>
    </div>
    <p>Amongst these network-layer DDoS attacks are also zero-day DDoS attacks that Cloudflare automatically detected and mitigated.</p><p>In the beginning of March, Cloudflare researchers helped investigate and expose a zero-day vulnerability in Mitel business phone systems that amongst other possible exploitations, also enables attackers to launch an amplification DDoS attack. This type of attack reflects traffic off vulnerable Mitel servers to victims, amplifying the amount of traffic sent in the process by <b>an amplification factor of 220 billion percent</b> in this specific case. You can read more about it in our recent <a href="/cve-2022-26143-amplification-attack/">blog post</a>.</p><p>We observed several of these attacks across our network. One of them targeted a North American cloud provider using the Cloudflare Magic Transit service. The attack originated from 100 source IPs mainly from the US, UK, Canada, Netherlands, Australia, and approximately 20 other countries. It peaked above 50 Mpps (~22 Gbps) and was automatically detected and mitigated by Cloudflare systems.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7LxY8T04AQZBMT0LGM6lzT/7c8b9be1a413998572d9400717f56cc4/image1-9.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by industry</h3>
      <a href="#network-layer-ddos-attacks-by-industry">
        
      </a>
    </div>
    <p>Many network-layer DDoS attacks target Cloudflare’s IP ranges directly. These IP ranges serve our <a href="https://www.cloudflare.com/cdn/">WAF/CDN customers</a>, <a href="https://www.cloudflare.com/dns/">Cloudflare authoritative DNS</a>, <a href="https://www.cloudflare.com/learning/dns/what-is-1.1.1.1/">Cloudflare public DNS resolver 1.1.1.1</a>,  <a href="https://www.cloudflare.com/products/zero-trust/zero-trust-network-access/">Cloudflare Zero Trust</a> products, and our corporate offices, to name a few. Additionally, we also allocate dedicated IP addresses to customers via our <a href="https://www.cloudflare.com/products/cloudflare-spectrum/">Spectrum</a> product and advertise the IP prefixes of other companies via our <a href="https://www.cloudflare.com/magic-transit/">Magic Transit</a>, <a href="https://www.cloudflare.com/magic-wan/">Magic WAN</a>, and <a href="https://www.cloudflare.com/magic-firewall/">Magic Firewall</a> Products for L3/4 DDoS protection.</p><p>In this report, for the first time, we've begun classifying network-layer DDoS attacks according to the industries of our customers using the Spectrum and Magic products. This classification allows us to understand which industries are targeted the most by network-layer DDoS attacks.</p><p>When we look at Q1 statistics, we can see that in terms of attack packets and attack bytes launched towards Cloudflare customers, the Telecommunications industry was targeted the most.  More than 8% of all attack bytes and 10% of all attack packets that Cloudflare mitigated targeted Telecommunications companies.</p><p>Following not too far behind, in second and third place were the Gaming / Gambling and Information Technology and Services industries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2bxF8tqebY5nrdxlmuAsZl/3da1fe00d18114b891aacb91e3969d0d/image20-1.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/aznwW5V47dkzudjNlMvGy/7c30c79064d92257b489de4283eb6e5d/image5-7.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by target country</h3>
      <a href="#network-layer-ddos-attacks-by-target-country">
        
      </a>
    </div>
    <p>Similarly to the classification by our customers’ industry, we can also bucket attacks by our customers’ billing country as we do for application-layer DDoS attacks, to identify the top attacked countries.</p><p>Looking at Q1 numbers, we can see that the US was targeted by the highest percentage of DDoS attacks traffic — over 10% of all attack packets and almost 8% of all attack bytes. Following the US is China, Canada, and Singapore.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7Gcrg06kwyMWELD73zMmWt/efc1553da6d4b8c237f5b9365eb8317d/image19-1.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4eqgGdsJNhmcn09tW5ZMOi/5f13ebd0ce40dd826b649a4fd4e363c6/image15-2.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by ingress country</h3>
      <a href="#network-layer-ddos-attacks-by-ingress-country">
        
      </a>
    </div>
    <p>When trying to understand where network-layer DDoS attacks originate, we cannot use the same method as we use for the application-layer attack analysis. To launch an application-layer DDoS attack, <a href="https://www.cloudflare.com/learning/ssl/what-happens-in-a-tls-handshake/">successful handshakes</a> must occur between the client and the server in order to establish an HTTP/S connection. For a successful handshake to occur, the attacker cannot <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoof</a> their source IP address. While the attacker may use botnets, proxies, and other methods to obfuscate their identity, the attacking client's source IP location does sufficiently represent the attack source of application-layer DDoS attacks.</p><p>On the other hand, to launch network-layer DDoS attacks, in most cases, no handshake is needed. Attackers can <a href="https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/">spoof</a> the source IP address in order to obfuscate the attack source and introduce randomness into the attack properties, which can make it harder for simple DDoS protection systems to block the attack. So if we were to derive the source country based on a spoofed source IP, we would get a ‘spoofed country’.</p><p>For this reason, when analyzing network-layer DDoS attack sources, we bucket the traffic by the Cloudflare edge data center locations where the traffic was ingested, and not by the (potentially) spoofed source IP to get an understanding of where the attacks originate from. We are able to achieve geographical accuracy in our report because we have data centers in <a href="/mid-2022-new-cities/">over 270 cities</a> around the world. However, even this method is not 100% accurate, as traffic may be back hauled and routed via various Internet Service Providers and countries for reasons that vary from cost reduction to congestion and failure management.</p><p>In Q1, the percentage of attacks detected in Cloudflare’s data centers in Azerbaijan increased by 16,624% QoQ and 96,900% YoY, making it the country with the highest percentage of network-layer DDoS activity (48.5%).</p><p>Following our Azerbaijanian data center is our Palestinian data center where a staggering 41.9% of all traffic was DDoS traffic. This represents a 10,120% increase QoQ and 46,456% YoY.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4DnN5j4chxISRXppNIV6a1/f0c98f9454ee54b19e686410209ae9ad/image2-8.png" />
            
            </figure><p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/h4otwpiEvjRN9OFzyHgqp/2f0c9cf45c20a3d1a7aad667433675f1/image12-1.png" />
            
            </figure><p>To view all regions and countries, check out the <a href="https://radar.cloudflare.com/notebooks/ddos-2022-q1/">interactive map</a>.</p>
    <div>
      <h3>Attack vectors</h3>
      <a href="#attack-vectors">
        
      </a>
    </div>
    <p><b>SYN Floods remain the most popular DDoS attack vector, while use of generic UDP floods drops significantly in Q1.</b></p><p>An attack vector is a term used to describe the method that the attacker uses to launch their DDoS attack, i.e., the IP protocol, packet attributes such as TCP flags, flooding method, and other criteria.</p><p>In Q1, SYN floods accounted for 57% of all network-layer DDoS attacks, representing a 69% increase QoQ and a 13% increase YoY. In second place, attacks over SSDP surged by over 1,100% QoQ. Following were RST floods and attacks over UDP. Last quarter, generic UDP floods took the second place, but this time, generic UDP DDoS attacks plummeted by 87% QoQ from 32% to a mere 3.9%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3nIMdTOj9gYnulv2zn4qBf/265dc7b5b1f3d819ec027564d499630e/image11-1.png" />
            
            </figure>
    <div>
      <h2>Emerging threats</h2>
      <a href="#emerging-threats">
        
      </a>
    </div>
    <p>Identifying the top attack vectors helps organizations understand the threat landscape. In turn, this may help them improve their security posture to protect against those threats. Similarly, learning about new emerging threats that may not yet account for a significant portion of attacks, can help mitigate them before they become a significant force.</p><p>When we look at new emerging attack vectors in Q1, we can see increases in DDoS attacks reflecting off of Lantronix services (+971% QoQ) and SSDP reflection attacks (+724% QoQ). Additionally, SYN-ACK attacks increased by 437% and attacks by Mirai botnets by 321% QoQ.</p>
    <div>
      <h3>Attacker reflecting traffic off of Lantronix Discovery Service</h3>
      <a href="#attacker-reflecting-traffic-off-of-lantronix-discovery-service">
        
      </a>
    </div>
    <p>Lantronix is a US-based software and hardware company that provides solutions for Internet of Things (IoT) management amongst their vast offering. One of the tools that they provide to manage their IoT components is the Lantronix Discovery Protocol. It is a command-line tool that helps to search and find Lantronix devices. The discovery tool is UDP-based, meaning that no handshake is required. The source IP can be spoofed. So an attacker can use the tool to search for publicly exposed Lantronix devices using a 4 byte request, which will then in turn respond with a 30 byte response from port 30718. By spoofing the source IP of the victim, all Lantronix devices will target their responses to the victim — resulting in a reflection/amplification attack.</p>
    <div>
      <h3>Simple Service Discovery Protocol used for reflection DDoS attacks</h3>
      <a href="#simple-service-discovery-protocol-used-for-reflection-ddos-attacks">
        
      </a>
    </div>
    <p>The Simple Service Discovery Protocol (SSDP) protocol works similarly to the Lantronix Discovery protocol, but for Universal Plug and Play (UPnP) devices such as network-connected printers. By abusing the SSDP protocol, attackers can generate a reflection-based DDoS attack overwhelming the target’s infrastructure and taking their Internet properties offline. Read more about <a href="https://www.cloudflare.com/learning/ddos/ssdp-ddos-attack/">SSDP-based DDoS attacks</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6vdleq21CxFyxVpMsuseIT/51eed46af450728ced3f01fe3b3da68a/image21.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by attack rate</h3>
      <a href="#network-layer-ddos-attacks-by-attack-rate">
        
      </a>
    </div>
    <p><b>In Q1, we observed a massive uptick in volumetric DDoS attacks — both from the packet rate and bitrate perspective. Attacks over 10 Mpps grew by over 300% QoQ, and attacks over 100 Gbps grew by 645% QoQ.</b></p><p>There are different ways of measuring the size of an L3/4 DDoS attack. One is the volume of traffic it delivers, measured as the bit rate (specifically, terabits per second or gigabits per second). Another is the number of packets it delivers, measured as the packet rate (specifically, millions of packets per second).</p><p>Attacks with high bit rates attempt to cause a denial-of-service event by clogging the Internet link, while attacks with high packet rates attempt to overwhelm the servers, routers, or other in-line hardware appliances. These devices dedicate a certain amount of memory and computation power to process each packet. Therefore, by bombarding it with many packets, the appliance can be left with no further processing resources. In such a case, packets are “dropped,” i.e., the appliance is unable to process them. For users, this results in service disruptions and denial of service.</p>
    <div>
      <h3>Distribution by packet rate</h3>
      <a href="#distribution-by-packet-rate">
        
      </a>
    </div>
    <p>The majority of network-layer DDoS attacks remain below 50,000 packets per second. While 50 kpps is on the lower side of the spectrum at Cloudflare scale, it can still easily take down unprotected Internet properties and congest even a standard Gigabit Ethernet connection.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/29AAghjmcak4dGQvIXvYh8/c6202035c934087213e7ac65d3aed349/image4-5.png" />
            
            </figure><p>When we look at the changes in the attack sizes, we can see that attacks of over 10 Mpps grew by over 300% QoQ. Similarly, attacks of 1-10 Mpps grew by almost 40% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6trkK6tXjwa2wmVpnnr9Ik/5e6aaa9ec3f1d678daddffd4ff3a57e0/image8-3.png" />
            
            </figure>
    <div>
      <h3>Distribution by bitrate</h3>
      <a href="#distribution-by-bitrate">
        
      </a>
    </div>
    <p>In Q1, most of the network-layer DDoS attacks remain below 500 Mbps. This too is a tiny drop in the water at <a href="https://www.cloudflare.com/network/">Cloudflare scale</a>, but can very quickly shut down unprotected Internet properties with less capacity or at the very least congest, even a standard Gigabit Ethernet connection.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5RNEoynAmbXZQU7VaZGFU7/58138c225812ae7dcc4a81c619f3985e/image6-4.png" />
            
            </figure><p><i>Graph of the distribution of network-layer DDoS attacks by bit rate in 2022 Q1</i></p><p>Similarly to the trends observed in the packet-per-second realm, here we can also see large increases. The amount of DDoS attacks that peaked over 100 Gbps increased by 645% QoQ; attacks peaking between 10 Gbps to 100 Gbps increased by 407%; attacks peaking between 1 Gbps to 10 Gbps increased by 88%; and even attacks peaking between 500 Mbps to 1 Gbps increased by almost 20% QoQ.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2uUqHLuTg4lD8DbJmXXLFS/6dcad7d8c2769a8269de62751cd22488/image13-1.png" />
            
            </figure>
    <div>
      <h3>Network-layer DDoS attacks by duration</h3>
      <a href="#network-layer-ddos-attacks-by-duration">
        
      </a>
    </div>
    <p><b>Most attacks remain under one hour in duration, reiterating the need for automated always-on DDoS mitigation solutions.</b></p><p>We measure the duration of an attack by recording the difference between when it is first detected by our systems as an attack and the last packet we see with that attack signature towards that specific target.</p><p>In previous reports, we provided a breakdown of ‘attacks under an hour’, and larger time ranges. However, in most cases over 90 percent of attacks last less than an hour. So starting from this report, we broke down the short attacks and grouped them by shorter time ranges to provide better granularity.</p><p>One important thing to keep in mind is that even if an attack lasts only a few minutes, if it is successful, the repercussions could last well beyond the initial attack duration. IT personnel responding to a successful attack may spend hours and even days restoring their services.</p><p>In the first quarter of 2022, more than half of the attacks lasted 10-20 minutes, approximately 40% ended within 10 minutes, another ~5% lasted 20-40 minutes, and the remaining lasted longer than 40 minutes.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4AAxMcs15Aguf4sdMfjYQ6/d5dcfa6bb8b62b7ab8eeaff3f8100de8/image27.png" />
            
            </figure><p>Short attacks can easily go undetected, especially burst attacks that, within seconds, bombard a target with a significant number of packets, bytes, or requests. In this case, DDoS protection services that rely on manual mitigation by security analysis have no chance in mitigating the attack in time. They can only learn from it in their post-attack analysis, then deploy a new rule that filters the attack fingerprint and hope to catch it next time. Similarly, using an “on-demand” service, where the security team will redirect traffic to a DDoS provider during the attack, is also inefficient because the attack will already be over before the traffic routes to the on-demand DDoS provider.</p><p>It’s recommended that companies use automated, always-on DDoS protection services that analyze traffic and apply real-time fingerprinting fast enough to block short-lived attacks.</p>
    <div>
      <h2>Summary</h2>
      <a href="#summary">
        
      </a>
    </div>
    <p>Cloudflare’s mission is to help build a better Internet. A better Internet is one that is more secure, faster, and reliable for everyone — even in the face of DDoS attacks. As part of our mission, since 2017, we’ve been providing <a href="/unmetered-mitigation/">unmetered and unlimited DDoS protection</a> for free to all of our customers. Over the years, it has become increasingly easier for attackers to launch DDoS attacks. But as easy as it has become, we want to make sure that it is even easier — and free — for organizations of all sizes to protect themselves against DDoS attacks of all types.</p><p>Not using Cloudflare yet? <a href="https://dash.cloudflare.com/sign-up">Start now</a> with our Free and <a href="https://www.cloudflare.com/plans/pro/">Pro plans</a> to protect your websites, or <a href="https://www.cloudflare.com/magic-transit/">contact us</a> for comprehensive DDoS protection for your entire network using Magic Transit.</p> ]]></content:encoded>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[DDoS Reports]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Ukraine]]></category>
            <category><![CDATA[Russia]]></category>
            <category><![CDATA[Mitel]]></category>
            <category><![CDATA[Speed & Reliability]]></category>
            <category><![CDATA[Ransom Attacks]]></category>
            <guid isPermaLink="false">6u6Ais7xHBvpPuuxFf9yes</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
        </item>
        <item>
            <title><![CDATA[What Cloudflare is doing to keep the Open Internet flowing into Russia and keep attacks from getting out]]></title>
            <link>https://blog.cloudflare.com/what-cloudflare-is-doing-to-keep-the-open-internet-flowing-into-russia-and-keep-attacks-from-getting-out/</link>
            <pubDate>Sun, 03 Apr 2022 01:28:36 GMT</pubDate>
            <description><![CDATA[ Following Russia’s unjustified and tragic invasion of Ukraine in late February, the world has watched closely as Russian troops attempted to advance across Ukraine, only to be resisted and repelled by the Ukrainian people ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Following Russia’s unjustified and tragic invasion of Ukraine in late February, the world has watched closely as Russian troops attempted to advance across Ukraine, only to be resisted and repelled by the Ukrainian people. Similarly, we’ve seen a <a href="/internet-traffic-patterns-in-ukraine-since-february-21-2022/">significant amount</a> of cyber attack activity in the region. We continue to work to protect an increasing number of Ukrainian government, media, financial, and nonprofit websites, and we <a href="https://www.heise.de/hintergrund/Running-the-ua-top-level-domain-in-times-of-war-6611777.html">protected the Ukrainian top level domain</a> (.ua) to help keep Ukraine’s presence on the Internet operational.</p><p>At the same time, we’ve closely watched significant and unprecedented activity on the Internet in Russia. The Russian government has taken steps to tighten its control over both the technical components and the content of the Russian Internet. For their part, the people in Russia are doing something very different. They have been adopting tools to maintain access to the global Internet, and they have been seeking out non-Russian media sources. This blog post outlines what we’ve observed.</p>
    <div>
      <h3>The Russian Government asserts control over the Internet</h3>
      <a href="#the-russian-government-asserts-control-over-the-internet">
        
      </a>
    </div>
    <p>Over the last five years, the Russian government has taken steps to tighten its control of a sovereign Internet within Russia’s borders, including laws requiring Russian ISPs to install equipment allowing the government to monitor and block Internet activity, and requiring the establishment of an exclusively Russian DNS (outside ICANN).  And it created mechanisms for the Russian government to control how Russia was connected to the global Internet, so they could pull the plug if they wanted.</p><p>Since the Russian invasion of Ukraine, the Russian government has made a series of announcements related to implementation of its sovereign Internet laws. Russian government agencies were instructed to switch to Russian DNS servers, move public resources to Russian hosting services, and take a number of other steps designed to reduce reliance on non-Russian providers. Although some took these initiatives as <a href="https://www.vice.com/en/article/88gevb/russia-is-preparing-to-cut-itself-off-from-the-global-internet">an announcement</a> that Russia intended to disconnect from the global Internet, so far Russia does not appear to have leveraged the tools it has to disconnect itself entirely from the global Internet.  We continue to see connections processing successfully in Russia through non-Russia infrastructure.</p><p>In the meantime, authorities in Russia have implemented a series of targeted blocking actions against websites and operators that they find objectionable. Initially, officials targeted popular social media sites like Facebook, Instagram, and Twitter, as well as Russian language outlets based outside the country.</p><p>We can see the effect of some of those blocks on traffic from Russian users to different news websites in Russia and Ukraine before and after blocks were implemented.  </p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/L3AyeQAadXwnRnmF4CQZ4/d0b9b8b79c6529384e73f5dc570f96bc/image9-1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1OZmnMZGwqHUwitHYv0IcJ/f880e8c9a4060c1acbf57d4a65cb2f8d/image3-2.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4MnPUvJDQq4a21Gk7GnN9X/fedc0bb29d75c0e62d7b2c59498ace80/image1-3.png" />
            
            </figure><p>In each case, these news sites saw exponential growth in their traffic in the days around the February 24th invasion of Ukraine.  But that increase was met within a matter of days by actions to block traffic to those sites. The blocks had varying degrees of success over the first few weeks, though each of them seem to have been eventually successful in denying access to those sources of news through traditional Internet channels.  </p><p>But that is only half the story.  As the Russian government took steps to control traditional channels for Internet access, there were shifts in the ways many Russians used the Internet.</p>
    <div>
      <h3>Russian citizens turning to tools to gain access to the open Internet</h3>
      <a href="#russian-citizens-turning-to-tools-to-gain-access-to-the-open-internet">
        
      </a>
    </div>
    <p>Russians have been adopting applications and tools that allow them to engage with the Internet privately and avoid some of the mechanisms that the Russian government is using to control and monitor access to the Internet. Whereas the most popular applications in the Apple App Store in most of the world in March continue to relate to social media and games, the leaderboard in Russia looked very different:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6PPLqjcchFGDvhzj8hsNt0/987c5ce751f0c23e8d79f044b8fd4541/image2-2.png" />
            
            </figure><p>All of the top apps in Russia in March were for private and secure Internet access or encrypted messaging apps, including the most downloaded app – Cloudflare’s own WARP / 1.1.1.1 (a privacy-based recursive DNS resolver). This list of popular apps is a stunning contrast with every other country in the world.</p><p>Because of the significant and important popularity of WARP (1.1.1.1), we’ve had some detailed insight into exactly how this has played out. If we look back to the beginning of February we see that Cloudflare’s WARP tool was little used in Russia. Its use took off from the first weekend of the war, and peaked two weeks ago. Later, after this virtual migration to such secure tools became apparent, we saw attempts to block access to the tools used to access the Internet securely.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4t9Sfa6JkRCIQqzf1LLmLa/fd6bc76f7f500cdf6e898902441a71c3/image10.png" />
            
            </figure><p>While levels have receded from their peak, a large number of Russians continue to use Cloudflare WARP in Russia at massively higher levels than pre-war.</p><p>In addition to the ways Russians are using the Internet increasingly relying on private and encrypted communications, we’ve also seen a shift in what they are trying to access. Here’s a chart of DNS requests from Russian users for a well known US newspaper. Recent DNS traffic for the site has quintupled compared to pre-war levels, indicating Russians are trying to access that news source.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2YTT5mE3ZZAsRhZ7OtTgeg/6148dcedb9620c4e1306ce4752f9cef2/image8.png" />
            
            </figure><p>And here’s DNS traffic for a large French news source. Again, DNS lookups have grown enormously as Russians try to access it.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4tf5We66VeiiZZfK2WP8wR/62df69d607cb8841d2ea1a5b0a1cd167/image5-1.png" />
            
            </figure><p>And here’s a British newspaper.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/22M1VPQEkIBbexTn0aUvGK/eae1604898841956d4781078ee9b199f/image4-1.png" />
            
            </figure><p>The picture is clear from these three charts. Russians want access to non-Russian news sources and based on the popularity of private Internet access tools and VPNs, they are willing to work to get it.</p>
    <div>
      <h3>A front line against cyberattack</h3>
      <a href="#a-front-line-against-cyberattack">
        
      </a>
    </div>
    <p>In addition to the services we’ve been able to provide average citizens in Russia, our servers at the edge of the Internet in-country have also permitted us to detect and block attacks originating there. When attacks are mitigated inside Russia, they never travel outside Russian borders. That’s always been part of the proposition of Cloudflare’s distributed network – to identify and block cyber attacks (especially DDoS attacks) locally, and before they can ever get off the ground.</p><p>Here’s what DDoS activity originating inside Russia and blocked there by Cloudflare has looked like since the beginning of February. Normal DDoS activity originating from Russian networks and blocked by Cloudflare’s servers there is relatively low throughout February but then grows massively in the middle of March.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4Vlvd4C3ZfwroCzqAc6MIp/f7844f24b507e0e49c7ff2f3357f8690/image7.png" />
            
            </figure><p>To be clear, being able to identify where cyber attack traffic originates is not the same as being able to attribute where the attacker is located. Attributing cyber attacks is difficult, and now is a time to be particularly careful with attribution. It is relatively common for cyber attackers to launch attacks from remote locations around the world. This often happens when they are able to hijack devices in other countries through things like IoT (Internet of Things) corruptions.</p><p>But even with such subterfuge, we’ve still seen a significant increase in the number of blocked attacks that are hitting our servers inside Russia.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2RqUtXpSJgEraVpwUN73Y7/d2db3f821adceb2553f335e0a1c9b36e/image6-1.png" />
            
            </figure><p>A few weeks ago, as the invasion of Ukraine was in its early stages, I noted that “<a href="/steps-taken-around-cloudflares-services-in-ukraine-belarus-and-russia/">Russia needs more Internet, not less</a>.” At a time of unprecedented economic sanctions by the United States and Europe, there have been calls for all foreign companies to go further and exit Russia completely, including calls for Internet providers to disconnect Russia. To be clear, Cloudflare has minimal sales and commercial activity in Russia – we’ve never had a corporate entity, an office, or employees there – and we’ve taken steps to ensure that we’re not paying taxes or fees to the Russian government. But given the significant impact of our services on the availability and security of the Internet, we believe removing our services from Russia altogether would do more harm than good.</p><p>While we deeply appreciate the motivation of the calls for companies to exit Russia, this withdrawal by Internet companies can have the unintended effect of advancing and entrenching the interests of the Russian government to control the Internet in Russia. Efforts to have Russia cut off from the global Internet through <a href="https://www.icann.org/en/system/files/correspondence/marby-to-fedorov-02mar22-en.pdf">ICANN</a> and <a href="https://www.ripe.net/publications/news/announcements/ripe-ncc-response-to-request-from-ukrainian-government">RIPE</a> will only cut off the Russian people from information about the war in Ukraine that the Russian government doesn’t want them to access.  After a number of U.S.-based certificate authorities stopped issuing SSL certificates for Russian websites, Russia <a href="https://www.bleepingcomputer.com/news/security/russia-creates-its-own-tls-certificate-authority-to-bypass-sanctions/">responded</a> in early March by encouraging Russian citizens to download a Russian Root Certificate Authority instead. As observed by <a href="https://www.eff.org/deeplinks/2022/03/you-should-not-trust-russias-new-trusted-root-ca">EFF</a>, “the Russian state’s stopgap measure to keep its services running also enables spying on Russians, now and in the future.”</p><p>This is why there has been near universal agreement by experts that it is imperative the Russian Internet stay as open as possible for the Russian people. Dozens of civil society groups have <a href="https://www.accessnow.org/letter-us-government-internet-access-russia-belarus-ukraine/">urged</a> governments to work to counteract authoritarian actions “and ensure that sanctions and other steps meant to repudiate the Russian government’s illegal actions do not backfire, by reinforcing Putin’s efforts to assert information control.” Russian digital rights activists have <a href="https://roskomsvoboda.org/post/24-february-24-march-2022/">pleaded with</a> service providers to offer Russians free VPN access, so they are not left isolated from global news sources.  Even the U.S. State Department has <a href="https://www.washingtonpost.com/technology/2022/03/16/apple-google-cloudflare-russia/">made clear</a>, “It is critical to maintain the flow of information to the people of Russia to the fullest extent possible.”</p><p>Supporting our mission to help build a better Internet, it’s been a busy six weeks for our team monitoring these developments and working around the clock to make sure Ukrainian web properties are defended and that ordinary Russians can access the global Internet. We remain in awe of the brave Ukrainians standing up in defense of their homeland, and continue to hope that peace will prevail.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/y2JtB5XQIA6nRzvTn7mj7/01e4a697fff09b8211ecc20dd6b40ed7/image1-8.png" />
            
            </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Ukraine]]></category>
            <category><![CDATA[Russia]]></category>
            <category><![CDATA[Freedom of Speech]]></category>
            <category><![CDATA[Policy & Legal]]></category>
            <guid isPermaLink="false">22RL3iYsnMld5ewbY0p3Vx</guid>
            <dc:creator>Matthew Prince</dc:creator>
        </item>
        <item>
            <title><![CDATA[Steps we've taken around Cloudflare's services in Ukraine, Belarus, and Russia]]></title>
            <link>https://blog.cloudflare.com/steps-taken-around-cloudflares-services-in-ukraine-belarus-and-russia/</link>
            <pubDate>Mon, 07 Mar 2022 05:03:59 GMT</pubDate>
            <description><![CDATA[ At Cloudflare, we watched in horror as Russian invaded Ukraine. As of war looked more likely, we monitored the situation, with the goal of keeping our employees, our customers, and our network safe. ]]></description>
            <content:encoded><![CDATA[ <p>At Cloudflare, we've watched in horror the Russian invasion of Ukraine. As the possibility of war looked more likely, we began to carefully monitor the situation on the ground, with the goal of keeping our employees, our customers, and our network safe.</p>
    <div>
      <h3>Helping protect Ukraine against cyberattacks</h3>
      <a href="#helping-protect-ukraine-against-cyberattacks">
        
      </a>
    </div>
    <p>Attacks against the Internet in Ukraine <a href="/internet-traffic-patterns-in-ukraine-since-february-21-2022/">began</a> even before the start of the invasion. Those attacks—and the steady stream of DDoS attacks we’ve seen in the days since—prompted us to extend our services to Ukrainian government and telecom organizations at no cost in order to ensure they can continue to operate and deliver critical information to their citizens as well as to the rest of the world about what is happening to them.</p><p>Going beyond that, under <a href="https://www.cloudflare.com/galileo/">Project Galileo</a>, we are expediting onboarding of any Ukrainian entities for our full suite of protections. We are currently assisting more than sixty organizations in Ukraine and the region—with about 25% of those organizations coming aboard during the current crisis. Many of the new organizations are groups coming together to assist refugees, share vital information, or members of the Ukrainian diaspora in nearby countries looking to organize and help. Any Ukrainian organizations that are facing attack can apply for free protection under Project Galileo by visiting <a href="https://www.cloudflare.com/galileo">www.cloudflare.com/galileo</a>, and we will expedite their review and approval.</p>
    <div>
      <h3>Securing our customers’ data during the conflict</h3>
      <a href="#securing-our-customers-data-during-the-conflict">
        
      </a>
    </div>
    <p>In order to preserve the integrity of customer data, we moved customer encryption key material out of our data centers in Ukraine, Russia, and Belarus. Our services continued to operate in the regions using our Keyless SSL technology, which allows encryption sessions to be terminated in a secure data center away from where there may be a risk of compromise.</p><p>If any of our facilities or servers in Ukraine, Belarus, or Russia lose power or connectivity to the Internet, we have configured them to brick themselves. All data on disk is encrypted with keys that are not stored on site. Bricked machines will not be able to be booted unless a secure, machine-specific key that is not stored on site is entered.</p>
    <div>
      <h3>Monitoring Internet availability in Ukraine</h3>
      <a href="#monitoring-internet-availability-in-ukraine">
        
      </a>
    </div>
    <p>Our team continues to monitor Internet patterns across Ukraine. While usage across the country has declined over the last 10 days, we are thankful that in most locations the Internet is still accessible.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/656Iuyuwp8AZFFVokbz8vl/8400217c1e1a18728df470b137dc7145/image1-2.png" />
            
            </figure><p>We are taking steps to ensure that, as long as there is connectivity out of the country, our services will continue to operate.</p>
    <div>
      <h3>Staying ahead of the threat globally</h3>
      <a href="#staying-ahead-of-the-threat-globally">
        
      </a>
    </div>
    <p>Cyber threats to Ukrainian customers and telecoms is only part of the broader story of potential cyberattacks. Governments around the world have emphasized that organizations must be prepared to respond to disruptive cyber activity. The US Cybersecurity and Infrastructure Security Agency (CISA), for example, <a href="https://www.cisa.gov/shields-up">has recommended</a> that all organizations—large and small—go “Shields Up” to protect themselves from attack. The UK’s National Cyber Security Centre has <a href="https://www.ncsc.gov.uk/news/organisations-urged-to-bolster-defences">encouraged</a> organizations to improve their <a href="https://www.cloudflare.com/learning/security/what-is-cyber-resilience/">cyber resilience</a>.</p><p>This is where careful monitoring of the attacks in Ukraine is so important. It doesn’t just help our customers in Ukraine — it helps us learn and improve our products so that we can protect all of our customers globally. When wiper malware was identified in Ukraine, for example, we adapted our <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust</a> products to make sure our customers were protected.</p><p>We’ve long believed that everyone should have access to <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">cybersecurity tools</a> to protect themselves, regardless of their size or resources. But during this time of heightened threat, access to <a href="https://www.cloudflare.com/learning/security/what-is-cyber-security/">cybersecurity services</a> is particularly critical. We have a number of free services available to protect you online — and <a href="/shields-up-free-cloudflare-services-to-improve-your-cyber-readiness/">we encourage you to take advantage of them</a>.</p>
    <div>
      <h3>Providing services in Russia</h3>
      <a href="#providing-services-in-russia">
        
      </a>
    </div>
    <p>Since the invasion, providing any services in Russia is understandably fraught. Governments have been united in imposing a stream of new sanctions and there have even been some calls to disconnect Russia from the global Internet. As discussed by <a href="https://www.internetsociety.org/blog/2022/03/why-the-world-must-resist-calls-to-undermine-the-internet/">ICANN</a>, the <a href="https://www.icann.org/en/system/files/correspondence/marby-to-fedorov-02mar22-en.pdf">Internet Society</a>, the <a href="https://www.eff.org/deeplinks/2022/03/wartime-bad-time-mess-internet">Electronic Frontier Foundation</a>, and <a href="https://www.techdirt.com/2022/03/02/very-very-bad-ideas-ukraine-asks-icann-to-disconnect-russia-from-the-internet/">Techdirt</a>, among others, the consequences of such a shutdown would be profound.</p><p>The scope of new sanctions issued in the last few weeks have been unprecedented in their reach, frequency, and the number of different governments involved. Governments have issued sweeping new sanctions designed to impose severe costs against those who supported the invasion of Ukraine, including government entities and officials in Russia and Belarus. Sanctions have been imposed against Russia’s top financial institutions, including Russia’s two largest banks, fundamentally altering the ability of Russians to access capital. The entire break away territories of Donetsk and Luhansk, including all of the residents of those regions, are subject to comprehensive sanctions. We’ve seen sanctions on state-owned enterprises, elite Russian families, and the leaders of intelligence-directed disinformation outlets.</p><p>These sanctions are intended to make sure that those who supported the invasion are held to account. And Cloudflare has taken action to comply. Over the past several years, Cloudflare has developed a robust and comprehensive sanctions compliance program that allows us to track and take immediate steps to comply with new sanctions regulations as they are implemented. In addition to an internal compliance team and outside counsel, we employ third party tools to flag potential matches or partial ownership by sanctioned parties, and we review reports from third-parties about potential connections. We have also worked with government experts inside and outside the United States to identify when there is a connection between a sanctioned entity and a Cloudflare account.</p><p>Over the past week, our team has ensured that we are complying with these new sanctions as they are announced. We have closed off paid access to our network and systems in the new comprehensively-sanctioned regions. And we have terminated any customers we have identified as tied to sanctions, including those related to Russian financial institutions, Russian influence campaigns, and the Russian-affiliated Donetsk and Luhansk governments. We’ve never had any offices or employees located in Russia, and we have taken steps to prevent the company from making any payments for things like taxes or fees to the Russian government. We expect additional sanctions are likely to come from governments as they determine additional steps are appropriate, and we will continue to move quickly to comply with those requirements as they are announced.</p><p>Beyond this, we have received several calls to terminate all of Cloudflare's services inside Russia. We have carefully considered these requests and discussed them with government and civil society experts. Our conclusion, in consultation with those experts, is that Russia needs more Internet access, not less.</p><p>As the conflict has continued, we’ve seen a dramatic increase in requests from Russian networks to worldwide media, reflecting a desire by ordinary Russian citizens to see world news beyond that provided within Russia.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4MSNhXX3NDNjHSfJlBr0TT/4215bc0f344fe3ba2523ca59e4a309ed/image2-2.png" />
            
            </figure><p>We’ve also seen an increase in Russian blocking and throttling efforts, combined with Russian efforts to control the content of the media operating inside Russia with a new <a href="https://www.theverge.com/2022/3/4/22961472/russia-fake-news-law-military-ukraine-invasion-casualties-jail-time">“fake news” law.</a></p><p>The Russian government itself, over the last several years, has threatened repeatedly to block certain Cloudflare <a href="https://www.bleepingcomputer.com/news/legal/russian-internet-watchdog-announces-ban-of-six-more-vpn-products/">services</a> and customers. Indiscriminately terminating service would do little to harm the Russian government, but would both limit access to information outside the country, and make significantly more vulnerable those who have used us to shield themselves as they have criticized the government.</p><p>In fact, we believe the Russian government would celebrate us shutting down Cloudflare's services in Russia. We absolutely appreciate the spirit of many Ukrainians making requests across the tech sector for companies to terminate services in Russia. However, when what Cloudflare is fundamentally providing is a more open, private, and secure Internet, we believe that shutting down Cloudflare's services entirely in Russia would be a mistake.</p><p>Our thoughts are with the people of Ukraine and the entire team at Cloudflare prays for a peaceful resolution as soon as possible.</p> ]]></content:encoded>
            <category><![CDATA[Ukraine]]></category>
            <category><![CDATA[Russia]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">3OsCwQ7RuA5Fq6cNP5D4Qn</guid>
            <dc:creator>Matthew Prince</dc:creator>
        </item>
        <item>
            <title><![CDATA[Join Cloudflare & Yandex at our Moscow meetup! Присоединяйтесь к митапу в Москве!]]></title>
            <link>https://blog.cloudflare.com/moscow-developers-join-cloudflare-yandex-at-our-meetup/</link>
            <pubDate>Sat, 18 May 2019 00:01:00 GMT</pubDate>
            <description><![CDATA[ Are you based in Moscow? Cloudflare is partnering with Yandex to produce a meetup this month in Yandex's Moscow headquarters.  We would love to invite you to join us to learn about the newest in the Internet industry.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Photo by <a href="https://unsplash.com/@serge_k?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Serge Kutuzov</a> / <a href="https://unsplash.com/?utm_source=ghost&amp;utm_medium=referral&amp;utm_campaign=api-credit">Unsplash</a></p><p>Are you based in Moscow? Cloudflare is partnering with <a href="https://yandex.com/">Yandex</a> to produce a meetup this month in <a href="https://goo.gl/maps/jp1No6Lf5Zw7qTVW8">Yandex's Moscow headquarters</a>.  We would love to invite you to join us to learn about the newest in the Internet industry. You'll join Cloudflare's users, stakeholders from the tech community, and Engineers and Product Managers from both Cloudflare and Yandex.</p>
    <div>
      <h3>Cloudflare Moscow Meetup</h3>
      <a href="#cloudflare-moscow-meetup">
        
      </a>
    </div>
    <p><b>Tuesday, May 30, 2019</b>: 18:00 - 22:00</p><p><b>Location</b>: Yandex - <a href="https://goo.gl/maps/jp1No6Lf5Zw7qTVW8">Ulitsa L'va Tolstogo, 16, Moskva, Russia, 119021</a></p><p>Talks will include "Performance and scalability at Cloudflare”, "Security at Yandex Cloud", and "Edge computing".</p><p>Speakers will include Evgeny Sidorov - Deputy Head of Services Security Team at Yandex, Ivan Babrou, Performance Engineer at Cloudflare, Alex Cruz Farmer, Product Manager for Firewall at Cloudflare, and Olga Skobeleva, Solutions Engineer at Cloudflare.</p><p><b><b>Agenda:</b></b></p><p><i>18:00 - 19:00</i> - Registration and welcome cocktail</p><p><i>19:00 - 19:10</i> - Cloudflare overview</p><p><i>19:10 - 19:40</i> - Performance and scalability at Cloudflare</p><p><i>19:40 - 20:10</i> - Security at Yandex Cloud</p><p><i>20:10 - 20:40</i> - Cloudflare security solutions and industry security trends</p><p><i>20:40 - 21:10</i> - Edge computing</p><p>Q&amp;A</p><p>The talks will be followed by food, drinks, and networking.</p><p><a href="https://www.eventbrite.co.uk/e/cloudflare-moscow-meetup-registration-59714496667">View Event Details &amp; Register Here »</a></p><p>We'll hope to meet you soon.</p><p><b><b>Разработчики, присоединяйтесь к Cloudflare и Яндексу на нашей предстоящей встрече в Москве!</b></b></p><p>Cloudflare сотрудничает с Яндексом, чтобы организовать мероприятие в этом месяце в штаб-квартире Яндекса. Мы приглашаем вас присоединиться к встрече посвященной новейшим достижениям в интернет-индустрии. На мероприятии соберутся клиенты Cloudflare, профессионалы из технического сообщества, инженеры из Cloudflare и Яндекса.</p><p><b>Вторник, 30 мая</b>: 18:00 - 22:00</p><p>Место встречи: Яндекс, улица Льва Толстого, 16, Москва, Россия, 119021</p><p>Доклады будут включать себя такие темы как «Решения безопасности Cloudflare и тренды в области безопасности», «Безопасность в Yandex Cloud», “Производительность и масштабируемость в Cloudflare и «Edge computing» от докладчиков из Cloudflare и Яндекса.</p><p>Среди докладчиков будут Евгений Сидоров, Заместитель руководителя группы безопасности сервисов в Яндексе, Иван Бобров, Инженер по производительности в Cloudflare, Алекс Круз Фармер, Менеджер продукта Firewall в Cloudflare, и Ольга Скобелева, Инженер по внедрению в Cloudflare.</p><p><b><b>Программа</b></b><b>:</b></p><p>18:00 - 19:00 - Регистрация, напитки и общение</p><p>19:00 - 19:10 - Обзор Cloudflare</p><p>19:10 - 19:40 - Производительность и масштабируемость в Cloudflare</p><p>19:40 - 20:10 - Безопасность в Яндекс.Облаке</p><p>20:10 - 20:40 - Решения безопасности Cloudflare и тренды в области безопасности</p><p>20:40 - 21:10 - Примеры Serverless-решений по безопасности</p><p>Q&amp;A</p><p>Вслед за презентациям последует общение, еда и напитки.</p><p><a href="https://www.eventbrite.co.uk/e/cloudflare-moscow-meetup-registration-59714496667">Посмотреть детали события и зарегистрироваться можно здесь »</a></p><p>Ждем встречи с вами!</p> ]]></content:encoded>
            <category><![CDATA[Developers]]></category>
            <category><![CDATA[Russia]]></category>
            <category><![CDATA[Cloudflare Meetups]]></category>
            <category><![CDATA[MeetUp]]></category>
            <category><![CDATA[Events]]></category>
            <category><![CDATA[Partners]]></category>
            <category><![CDATA[Cloudflare Workers]]></category>
            <category><![CDATA[Developer Platform]]></category>
            <guid isPermaLink="false">4edcMOYniE7UwgJjOTR2tH</guid>
            <dc:creator>Andrew Fitch</dc:creator>
            <dc:creator>Albina Sultangulova</dc:creator>
        </item>
        <item>
            <title><![CDATA[Ten new data centers: Cloudflare expands global network to 165 cities]]></title>
            <link>https://blog.cloudflare.com/ten-new-data-centers/</link>
            <pubDate>Thu, 20 Dec 2018 16:13:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare is excited to announce the addition of ten new data centers across the United States, Bahrain, Russia, Vietnam, Pakistan and France (Reunion).   ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Cloudflare is excited to announce the addition of ten new data centers across the United States, Bahrain, Russia, Vietnam, Pakistan and France (Réunion). We're delighted to help improve the performance and security of over 12 million domains across these diverse countries that collectively represent about half a billion Internet users.</p><p>Our global network now spans 165 cities, with <a href="/tag/march-of-cloudflare/">46 new cities</a> added just this year, and several dozen additional locations being actively worked on.</p>
    <div>
      <h3>United States of America</h3>
      <a href="#united-states-of-america">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5wnKguGqzNUNeAbmaoZ1Kj/355c42cb03326a8f50669808b74e8aab/Charlotte---Columbus.png" />
            
            </figure><p>Our expansion begins in the United States, where Cloudflare's 36th and 37th data centers in the nation serve <b>Charlotte</b> (North Carolina) and <b>Columbus</b> (Ohio) respectively. They are promising markets for interconnection, and join our existing deployments in Ashburn, Atlanta, Boston, Chicago, Dallas, Denver, Detroit, Houston, Indianapolis, Jacksonville, Kansas City, Las Vegas, Los Angeles, McAllen, Memphis, Miami, Minneapolis, Montgomery, Nashville, Newark, Norfolk, Omaha, Philadelphia, Portland, Richmond, Sacramento, Salt Lake City, San Diego, San Jose, Seattle, St. Louis, Tallahassee, and Tampa.</p>
    <div>
      <h3>Bahrain</h3>
      <a href="#bahrain">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5NeYXoKoCPOCmWZPk5IgrS/c30ab4520479b4ccc8872ae4cbe1e36c/Manama.png" />
            
            </figure><p>Cloudflare's <b>Manama</b> (Bahrain) data center, our 158th globally, further expands our <a href="https://www.cloudflare.com/network/">Middle East</a> coverage. A growing hub for cloud computing, including public sector adoption (with the Kingdom's "Cloud First" policy), Bahrain is attracting <a href="https://startupbahrain.com/about/">talent</a> and investment in innovative companies.</p>
    <div>
      <h3>Russia</h3>
      <a href="#russia">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3HAn8shGKNAQdXajgDg0Xv/8797f4072083bf8bf89b502c4341f4fa/St.-Petersburg.png" />
            
            </figure><p>Cloudflare's new <b>St. Petersburg</b> deployment serves as a point of redundancy to our existing <a href="/moscow/">Moscow</a> facility, while also expanding our surface area to withstand DDoS attacks and reducing latency for local Internet users. (Hint: If you live in Novosibirsk or other parts of Russia, stay tuned for upcoming Cloudflare deployments near you).</p>
    <div>
      <h3>Vietnam</h3>
      <a href="#vietnam">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/18UylfgT5boq2PjOb0r1dF/362b4625eb827c098344e49c4e5a2963/Hanoi-Ho---Chi-Minh-City.png" />
            
            </figure><p><b>Hànội and Hồ Chí Minh City,</b> the two most populated cities in Vietnam with an estimated population of 8 million and 9 million respectively, now host Cloudflare's 160th and 161st data center.</p><p>On November 19, 1997, the Internet officially became available in Vietnam. Since then, several telecommunication companies - including VNPT, FPT, Viettel, CMC, VDC, and NetNam - have played a critical role in integrating the use of Internet into the government systems, business environment, school facilities, and many other organizations. With our new data centers in place, we are delighted to help provide a faster and safer Internet experience.  </p>
    <div>
      <h3>Pakistan</h3>
      <a href="#pakistan">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/dGRKOOCwYSyCI6xr6jjea/fd94bf68fb3b06fd91c5bdd38c37a212/Islamabad---Karachi---Lahore.png" />
            
            </figure><p>The world's sixth most populous country, Pakistan is a land of delicious food, breathtaking natural beauty, poetry and, of course cricket. Its natural beauty is exemplified by being the home of 5 out of 14 mountains which are at least 8,000m high, including K2, the second highest peak in the world. Pakistan's rich history includes the 5,000 year old lost civilization of <a href="https://www.youtube.com/watch?v=QUng-iHhSzU">Mohenjo-daro</a>, with incredible design from complex architecture on a grid-layout to advanced water and sewage systems.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/15pB2d3jaIKdkAyaXU1LpT/6762cfb8ffbdc00bd41bf435e8f88632/image-28.png" />
            
            </figure><p><a href="https://en.wikipedia.org/wiki/File:Nanga_Parbat_The_Killer_Mountain.jpg">Nanga Parbat</a> - Creative Commons Attribution-Share Alike 3.0 Unported</p><p>Today, Cloudflare is unveiling three new data centers housed in Pakistan, one in each of the most populous cities - <b>Karachi</b> and <b>Lahore</b> - alongside an additional data center in the capital city, <b>Islamabad</b>. We are already seeing latency per request decrease by over 3x and as much as 150ms, and expect this to further improve as we tune routing for all our customers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5NCC5ia9vYhfgwsZJAU02S/6447ee8bfdb1dae08db24da1f5bb2cf4/Pakistan_Latency.png" />
            
            </figure><p>Latency from PTCL to Cloudflare customers reduces by over 3x across Pakistan. Courtesy: Cedexis</p>
    <div>
      <h3>Réunion (France)</h3>
      <a href="#reunion-france">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/KZfCBUf3ysFggupCSVzNx/f7189508c4cda08337fee267aef17541/-Sainte-Marie-Re-union.png" />
            
            </figure><p>8,000 miles away, the final stop in today's expansion is <b>Sainte-Marie</b> in the Réunion island, the overseas department France off the coast of Magadascar (which can also expect some Cloudflare servers very soon!)</p>
    <div>
      <h3>Expansion ahead!</h3>
      <a href="#expansion-ahead">
        
      </a>
    </div>
    <p>Even beyond these, we are working on at least six new cities in each of Africa, Asia, Europe, North America, and South America. Guess 20 upcoming locations to receive Cloudflare swag.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Network]]></category>
            <category><![CDATA[Data Center]]></category>
            <category><![CDATA[Middle East]]></category>
            <category><![CDATA[North America]]></category>
            <category><![CDATA[USA]]></category>
            <category><![CDATA[Russia]]></category>
            <guid isPermaLink="false">2FknYP8WrpWDPr7i7DyeCX</guid>
            <dc:creator>Nitin Rao</dc:creator>
            <dc:creator>Junade Ali</dc:creator>
            <dc:creator>Tuyen Dinh</dc:creator>
        </item>
        <item>
            <title><![CDATA[Moscow, Russia: CloudFlare’s 83rd data center]]></title>
            <link>https://blog.cloudflare.com/moscow/</link>
            <pubDate>Thu, 16 Jun 2016 19:26:13 GMT</pubDate>
            <description><![CDATA[ Здравствуйте! ))) CloudFlare is excited to announce the newest addition to our network in the largest country in the world (by footprint), increasing both our data center and city count to 83.  ]]></description>
            <content:encoded><![CDATA[ 
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/55YbPSadR63PupwCg5VSYh/cc6a5f1dddf85c773bc0d894abc0da34/5718228424_62caa47b99_o--1-.jpg" />
            
            </figure><p>Здравствуйте! ))) CloudFlare is excited to announce the newest addition to our <a href="https://www.cloudflare.com/network-map/">network</a> in the largest country in the world (by footprint), increasing both our data center and city count to 83. Moscow is not only the capital and largest city in Russia, it is also home to several Internet exchanges which CloudFlare now participates at: the <a href="http://www.msk-ix.ru/eng/traffic.html">Moscow Internet Exchange (MSK-IX)</a>, <a href="http://www.dataix.ru/">Data IX</a> and <a href="http://global-ix.ru/en">Global IX</a> (Eurasia Peering coming soon). This raises the number of exchanges that CloudFlare is a participant of to <a href="https://as13335.peeringdb.com/">over 120</a>, making us one of the top interconnected networks globally.</p><p>Здравствуйте! ))) Мы рады объявить о новом пополнении в нашей <a href="https://www.cloudflare.com/network-map">сети</a> в самой большой (по площади) стране мира, увеличивая как количество наших датацетров, так и количество городов до 83. Москва является не только столицей и самым крупным городом России, но также и домом для нескольких точек обмена интернет-трафиком. CloudFlare в настоящее время принимает участие в следующих точках обмена: <a href="http://www.msk-ix.ru/eng/traffic.html">Moscow Internet Exchange (MSK-IX)</a>, <a href="http://www.dataix.ru/">Data IX</a> и <a href="http://global-ix.ru/en">Global IX</a> (Eurasia Peering на подходе). Это увеличивает количество точек обмена интернет-трафиком, в которых участвует CloudFlare <a href="https://as13335.peeringdb.com">до 120</a>, тем самым продвигая нас на одну из лидирующих позиций наиболее взаимосвязаных сетей в мире.</p>
    <div>
      <h3>Improving performance in a transcontinental way</h3>
      <a href="#improving-performance-in-a-transcontinental-way">
        
      </a>
    </div>
    
    <div>
      <h3>Повышение производительности в трансконтинентальных масштабах</h3>
      <a href="#povyshieniie-proizvoditielnosti-v-transkontinientalnykh-masshtabakh">
        
      </a>
    </div>
    <p>Spanning halfway around the northern hemisphere across Europe and Asia (and sharing borders with 15 countries in the process), Russia’s geographical breadth means that an Internet request traveling from one end of the country to another (east&lt;&gt;west) would require over 120ms. Previously, delivery of nearly four million Internet applications on CloudFlare to over 100 million Internet users in Russia occurred mostly from our <a href="/stockholm-sweden-cloudflares-21st-data-center/">Stockholm</a> and <a href="/frankfurt-data-center-makes-11/">Frankfurt</a> data centers. By now localizing that delivery, we are helping shave latency down by over 20ms for a majority of Russian users.</p><p>Так как Россия занимает практически половину Северного полушария и граничит с 15 странами мира, интернет запрос из одного конца страны в другой (с востока на запад) занимает более 120ms. В недалеком прошлом обслуживание почти четырех миллионов интернет-приложений и более 100 миллионов пользователей через сеть CloudFlare производилось в основном нашими датацетрами в <a href="/stockholm-sweden-cloudflares-21st-data-center/">Стокгольме</a> и <a href="/frankfurt-data-center-makes-11/">Франкфурте</a>.Теперь, локализовав этот трафик, мы помогаем уменьшить задержку более чем на 20ms.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7aevpw4d8mxs0QBibDEt3P/9ce49198eae4cbd240f842be55aa7ad2/DME_Latency.png" />
            
            </figure><p><i>Latency in milliseconds decreases for end user (Moscow) to CloudFlare. Source: Cedexis</i><i>Уменьшение задержки в миллисекундах от конечного пользователя (Москва) до CloudFlare. Источник: Cedexis</i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/02ZHZaHhSBMOcXM21c8tF/d4d03c0a9a2e616b62afde06b4d87755/DME_Availability.png" />
            
            </figure><p><i>Availability (%) increases for end user (Moscow) to CloudFlare. Source: Cedexis</i><i>Увеличение доступности (%) от конечного пользователя (Москва) до CloudFlare. Источник: Cedexis</i></p>
    <div>
      <h3>More great things to come</h3>
      <a href="#more-great-things-to-come">
        
      </a>
    </div>
    
    <div>
      <h3>Дальше больше</h3>
      <a href="#dalshie-bolshie">
        
      </a>
    </div>
    
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/38a7wzyldaJhlnVOr5ft90/ac79bec03e2593fddd342c99bc3d414f/NES_Tetris_Box_Front.jpg" />
            
            </figure><p>Moscow is the birthplace of Tetris (a classic, no?), a game in which the endgame is to optimize the arrangement of tiles to clear as many lines as possible. If you transform tiles into data centers, transit providers and peering exchanges, then what CloudFlare strives to do is continually build out our global network to optimize the experience of Internet users around the world. Come <a href="https://www.cloudflare.com/join-our-team/">join us</a> in our mission!</p><p>Москва является родиной Тетриса (классика, не правда ли?), игры, цель которой оптимизировать позицию фигурок так, чтобы очистить как можно больше горизонтальных линий. Если преобразовать фигурки в датацентры, поставщиков транзитов и точки обмена трафиком, то к чему стремится CloudFlare, так это постоянно увеличивать и оптимизировать нашу глобальную сеть для предоставления наилучшего сервиса интернет-пользователям. <a href="https://www.cloudflare.com/join-our-team/">Присоединяйтесь к нам</a> в нашей миссии!</p><p><i>Photo sources: Alexey Kljatov (Flickr); Cedexis; The Tetris Company</i><i>Источники Фото: Алексей Kljatov (Flickr); Cedexis; The Tetris Company</i></p><p><b>The CloudFlare network today (Сеть CloudFlare сегодня)</b>:</p><p><a href="https://www.cloudflare.com/network-map"></a></p><p><i>－ The CloudFlare Team</i><i>－ Команда CloudFlare</i></p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Network]]></category>
            <category><![CDATA[Data Center]]></category>
            <category><![CDATA[Russia]]></category>
            <guid isPermaLink="false">7jNpsw6Y2uCOP8IXlpQuuz</guid>
            <dc:creator>Xiaolin Gong</dc:creator>
        </item>
    </channel>
</rss>