The 8 Most Devastating DDoS Attacks of 2022 and What We Can Learn from Them

The threat landscape continued to evolve in 2022 as DDoS attacks became part of cyberwarfare between nations. But what are they and how can you become an unwitting part of their attack?
We may receive compensation from the products and services mentioned in this story, but the opinions are the author's own. Compensation may impact where offers appear. We have not included all available products or offers. Learn more about how we make money and our editorial policies.

Cyber attacks, especially DDoS attacks, can disrupt services and leave us frustrated. Have you ever visited a website only to see it was down? It could very well be the victim of a DDoS attack aimed at crashing the servers.

We normally think of cybercrime as a ransomware attack trying to steal our personal data for the dark web. Instead, everything from video games to supply chains to essential government systems have been victims of a DDoS attack, but what are they? And how often do they occur?

In this article
What is a DDoS attack?
DDoS statistics
Biggest DDoS attacks in 2022
DDoS FAQ
Bottom line

What is a DDoS attack?

A distributed denial-of-service (DDoS) attack happens when an attacker bombards a server with fraudulent requests in an attempt to overwhelm and disable that server.

Think of the server as a castle, the cybersecurity software as the gate around the castle, and the DDoS attack as an army attacking the castle. The larger and stronger the army, and the longer they’re able to attack the gates, the more likely they are to break through them and destroy the castle.

DDoS attacks are almost impossible to prevent and difficult to defend against. The reason for their ferocity is in the sheer size of them. A request-per-second, or data packet, indicates a single request to the server. So when you see an attack such as the one on GitHub in 2018, with 120 million data packets per second, it might be difficult to comprehend.

When you type in a website address, that is a single data packet. Now think of 120 million bots every single second trying to access the website. The bot army creates too much information for the server to process, and the website goes down. Luckily, GitHub was able to survive the attack.

It's incredibly important to practice online safety to avoid phishing emails and other social engineering attacks. Hacker group Lapsus$ used social engineering to steal data from companies and government entities, including NVIDIA, Samsung, Okta, and the Brazilian Ministry of Health.

DDoS statistics

Kaspersky reported in Q3 of 2022, DDoS attacks rose by 47.87% from Q3 of 2021. Information is not yet available for Q4. We don’t, however, need to see the evidence of DDoS attacks in Q4 to know they will have risen even more. It’s a trend that doesn’t seem to be stopping or slowing down.

According to a study done by the Ponemon Institute and IBM, the cost of a data breach in the U.S. in 2022 was, on average, $9.44 million. An average attack now takes about 277 days to identify and contain. This can cripple or even destroy a business that relies mostly on the internet to function.

Arts & Entertainment sites used to bear the brunt of DDoS attacks, but Russia’s attack on Ukraine changed that landscape. Media outlets are now the prime targets of Hacktivist groups. Hacktivist groups continue to target financial institutions, corporate environments, the health care industry, and other gatekeepers of sensitive data.

The use of a virtual private network (VPN) and good cybersecurity practices can help fight against DDoS attacks. Although most of these attacks are focused at large-scale governments and businesses, you can be hacked and used as part of a botnet army. Using the best cybersecurity software available will help protect your devices from being used for nefarious purposes. Additionally, be wary of social engineering scams, such as phishing attacks that allow cybercriminals to deposit malware onto your device.

Biggest DDoS attacks in 2022

It may be difficult to pinpoint the full scope of DDoS attacks. The stigma around being the victim of a cyber attack is still strong. Customer data such as Social Security numbers and credit card information can’t be recouped even after a thorough incident response. Businesses often see a dip in stock prices, new customer acquisition, or customer retention after disclosing a data leak.

Government service providers tend to be more transparent. With guides from the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) setting the standards for government agencies and their computer systems, it’s evident the best minds are at work protecting sensitive information from hackers.

That said, here are some of the more notable attacks of 2022:

Cloudflare Clients

Without disclosing who, the company Cloudflare listed cybersecurity threats, security incidents, and cyber incidents it mitigated for its clients. One in April 2022 and another in June 2022. The April attack recorded around 15.3 million requests per second, one of the largest ever reported. By June, however, the client was defending against a 26 million request-per-second attack.

Google Cloud Armor Customer

A Google Cloud Armor customer suffered a DDoS attack in June 2022. Cloud Armor notified the customer in the earliest parts of the attack, and it was able to defend against the 46 million request-per-second assault by the time it ramped up to its full power. This particular DDoS attack utilized more than 5,000 IP addresses in 132 countries.

Activision Blizzard

In September 2022, gamers noticed an inability to play streaming games, such as “World of Warcraft,” “Call of Duty,” and “Overwatch.” Activision Blizzard used social media to let customers know they were under a DDoS attack and that servers were down. The outage lasted three-and-a-half hours from when Activision Blizzard first tweeted about a server issue until the servers were back up and gamers were able to access the games again.

Estonia

After removing Soviet-era memorials, many public and private sector agencies suffered multiple DDoS attacks. In August 2022, Russian hacking group Killnet claimed responsibility for the attacks launched at more than 200 Estonian institutions. The Russian government openly admonished Estonia for the removal of the memorials.

Albanian Government

In July 2022, the Albanian government shut down most of its websites in an attempt to stop a full-blown DDoS attack. A few months earlier, the government had moved most public sector services online. Microsoft was part of the team that helped shut down websites in an effort to prevent a full overload of the government’s servers by the attackers. The attacks were suspected to have been a state-sponsored effort launched by Iranian threat actors.

Ukraine

Unsurprisingly, the Ukraine has been under a constant barrage of attacks leading up to and since the Russian invasion in February 2022. The U.S. state department along with allies and partners openly condemned the Russian invasion, both physically and digitally. As the war continues on the ground, so does the attack against Ukrainian cyber systems in both the government and private sectors.

Russia

In response to the war in Ukraine, Russia has seen an unprecedented number of DDoS attacks on its government and private sectors. The ISP’s experts identified more than 21 million attacks aimed at around 600 Russian organizations. Moscow was the area hit the hardest with large attacks lodged at banks and other vital institutions. The Ukrainian IT army claimed responsibility for one attack that disrupted the distribution of alcohol in Russia.

The United States

In the second quarter of 2022 (April-June), Kaspersky noted that the U.S. incurred 43.25% of all DDoS attacks launched worldwide. This was more than any other country. The pro-Russian group Killnet, also claiming responsibility for the attacks in Estonia, were able to successfully attack the U.S. Federal Tax Payment system site, and caused it to shut down for several hours.

DDoS FAQ


+

What is the most famous DDoS attack?

The most famous DDoS attack was on GitHub in 2018. The attacker sent 120 million data packets per second to try to overwhelm and crash the servers using a memcache approach rather than a botnet. GitHub was able to survive.


+

Do DDoS attacks still happen?

Yes, DDoS attacks still happen, in fact, they’re on the rise. DDoS attacks in 2022 not only increased but also lasted longer. In 2021, the average attack lasted 30 minutes. By the same time in 2022, DDoS attack length rose to an average of 50 hours.


+

Are cyberattacks on the rise?

Yes, cyberattacks are on the rise. Since the onset of the COVID-19 pandemic in March 2020, cyber attacks have risen 600% with an estimated cost of $8 trillion dollars in damages by the end of 2023.

Bottom line

The year 2022 saw a significant increase in the frequency and severity of DDoS attacks. The top eight attacks listed here were particularly noteworthy for their scale and impact. From major financial institutions in Russia to government websites worldwide, no industry was immune to the disruption caused by the security breaches.

As the world becomes increasingly reliant on technology, the threat of DDoS attacks will continue to grow. Their use as political weapons became prevalent in 2022 with the Russian attack on Ukraine, and there’s no sign they’ll slow down. Although it seems like a problem that doesn’t affect you, even your computer can be used as a soldier in these online armies. Staying safe online will help you avoid being an unwilling attacker. By staying vigilant and proactive, we can help ensure a safer and more secure online experience for everyone.

4.9
Limited-time offer: Up to 67% off
Learn More
On NordVPN's website

NordVPN
  • High-quality VPN offering safety and speed
  • Loads of servers for multiple connection options
  • Works with popular streaming services, including Netflix
  • Too many confusing plans

Author Details
Mary lives in Los Angeles and has been a cybersecurity writer for over five years. With a B.S. in Liberal Arts from Clarion University and an M.F.A. in Creative Writing from Point Park University in Pittsburgh, her career in online security began in sales and content creation for a private cybersecurity firm.