Rising Threats: Unveiling the Alarming Rise of HTTP DDoS Attacks Exploiting HTTP/2

In a recent unprecedented event, cybersecurity analysts at Cloudflare observed a staggering DDoS attack, reaching an astonishing rate of 201 million HTTP requests per second. This alarming incident highlights the extreme destructiveness of Distributed Denial of Service (DDoS) attacks and the urgent need for robust countermeasures. Not only can these assaults cripple websites and networks, but they also pose a severe threat to the overall security of online systems. This article aims to delve into the surge of HTTP DDoS attacks, with a particular focus on the exploitation of HTTP/2 for enhanced performance and the associated cyber implications.

Understanding DDoS attacks

DDoS attacks have long been recognized as highly disruptive and pose a grave concern in the realm of cybersecurity. These malicious incursions operate by flooding target systems and overwhelming their resources, rendering them inaccessible to legitimate users. As a result, websites and networks experience debilitating downtime, leading to significant economic losses, reputational damage, and potential data breaches. The scale and intensity of these attacks have escalated in recent years, prompting organizations to heighten their cybersecurity defenses.

Cloudflare’s insights on DDoS trends

Cloudflare, a prominent cybersecurity company, stands on the front line of combating these cybersecurity threats daily. Shielding against an immense volume of cyber threats, Cloudflare provides invaluable insights into the emerging trends in DDoS attacks. With a staggering prevention count of 140 billion cyber threats per day, their observations offer a unique window into the evolving landscape of cyber threats, including the ever-growing menace of DDoS attacks.

Recent rise in DDoS attacks

In recent times, there has been a distinct surge in DDoS attacks targeting Israeli media sites, Israeli government websites, and Palestinian websites. Among the various forms of DDoS attacks, HTTP DDoS attacks have emerged as a prominent threat. This breed of attack focuses on targeting web properties, mobile apps, and e-commerce sites, exploiting the utilization of the HTTP/2 protocol. The inherent advantage of HTTP/2 enables better performance, consequently aiding botnets in launching more effective and amplified attacks.

Exploiting HTTP/2 for Enhanced Performance

HTTP DDoS attacks excel in exploiting the HTTP/2 protocol, which was designed to enhance efficiency and performance in handling web traffic. Unfortunately, cybercriminals have leveraged the improved features of HTTP/2 to their advantage. By capitalizing on its better performance capabilities, attackers can orchestrate more devastating assaults. This exploit is further facilitated through the use of botnets, networks of compromised devices under the control of attackers, acting in unison to launch synchronized attacks.

Exploitation of the CVE-2023-44487 HTTP/2 Rapid Reset Vulnerability

From late August 2023, Cloudflare, among other companies, faced a relentless DDoS campaign that exploited a significant vulnerability in the HTTP/2 protocol. This campaign exploited the CVE-2023-44487 HTTP/2 Rapid Reset vulnerability, exposing a weakness in the protocol that attackers capitalized on. The exploitation of this vulnerability intensified the impact and potency of the DDoS attacks, exacerbating the already alarming situation.

Power of Cloud-Based Botnets using HTTP/2

One of the most concerning developments in the realm of DDoS attacks has been the emergence of cloud-based botnets utilizing the HTTP/2 protocol. Unlike traditional botnets, these cloud-based networks wield significantly more power per node, enabling them to carry out hyper-volumetric DDoS attacks. As a result, the potential for devastation amplifies considerably, affecting a larger number of systems, and exponentially increasing the severity of the attacks.

Impact of the attack campaign

The relentless DDoS attack campaign witnessed a staggering 65% quarter-on-quarter increase in HTTP DDoS attacks, totaling a massive 8.9 trillion requests mitigated by Cloudflare. This startling increase highlights the scale and severity of the threat posed by HTTP DDoS attacks and necessitates immediate attention and robust mitigation strategies.

Increase in L3/4 attacks

In addition to the surge in HTTP-based DDoS attacks, there has been a 14% uptick in L3/4 attacks. These attacks predominantly thrive on large volumetric assaults that aim to overload the network bandwidth and infrastructure. The most notorious incident involved the launch of a variant of the infamous Mirai botnet, which reached a staggering 2.6 Tbps in attack traffic, setting a new benchmark in the annals of cybercrime.

The alarming rise in DDoS attacks, particularly those leveraging the HTTP/2 protocol, poses a significant challenge to the security of the internet and its users. The exploitation of this relatively new protocol highlights the ongoing cyber arms race between attackers and defenders. It is imperative for organizations to remain vigilant, continuously refine their defense strategies, and adopt cutting-edge measures to combat these threats. The collaboration between cybersecurity companies like Cloudflare and other stakeholders is crucial to preserving the stability and integrity of online systems in the face of mounting cyber challenges. Only through collective efforts and proactive cybersecurity practices can we hope to mitigate the risks posed by DDoS attacks and safeguard the interconnected world we rely on.

Explore more

How AI Agents Work: Types, Uses, Vendors, and Future

From Scripted Bots to Autonomous Coworkers: Why AI Agents Matter Now Everyday workflows are quietly shifting from predictable point-and-click forms into fluid conversations with software that listens, reasons, and takes action across tools without being micromanaged at every step. The momentum behind this change did not arise overnight; organizations spent years automating tasks inside rigid templates only to find that

AI Coding Agents – Review

A Surge Meets Old Lessons Executives promised dazzling efficiency and cost savings by letting AI write most of the code while humans merely supervise, but the past months told a sharper story about speed without discipline turning routine mistakes into outages, leaks, and public postmortems that no board wants to read. Enthusiasm did not vanish; it matured. The technology accelerated

Open Loop Transit Payments – Review

A Fare Without Friction Millions of riders today expect to tap a bank card or phone at a gate, glide through in under half a second, and trust that the system will sort out the best fare later without standing in line for a special card. That expectation sits at the heart of Mastercard’s enhanced open-loop transit solution, which replaces

OVHcloud Unveils 3-AZ Berlin Region for Sovereign EU Cloud

A Launch That Raised The Stakes Under the TV tower’s gaze, a new cloud region stitched across Berlin quietly went live with three availability zones spaced by dozens of kilometers, each with its own power, cooling, and networking, and it recalibrated how European institutions plan for resilience and control. The design read like a utility blueprint rather than a tech

Can the Energy Transition Keep Pace With the AI Boom?

Introduction Power bills are rising even as cleaner energy gains ground because AI’s electricity hunger is rewriting the grid’s playbook and compressing timelines once thought generous. The collision of surging digital demand, sharpened corporate strategy, and evolving policy has turned the energy transition from a marathon into a series of sprints. Data centers, crypto mines, and electrifying freight now press