Article Details

Scrape Timestamp (UTC): 2026-02-06 16:42:04.463

Source: https://www.theregister.com/2026/02/06/uk_climbs_up_ddos_hit/

Original Article Text

Click to Toggle View

DDoS deluge: Brit biz battered as botnet blitzes break records. UK leaps to sixth in global flood charts as mega-swarm unleashes 31.4 Tbps Yuletide pummeling. Cloudflare says DDoS crews ended 2025 by pushing traffic floods to new extremes, while Britain made an unwelcome leap of 36 places to become the world's sixth-most targeted location. The Q4 stats confirm it was a lively year for traffic floods, with Cloudflare claiming it had to swat away 47.1 million DDoS attacks, more than double 2024's count. Momentum picked up toward the end of the year, as Q4 volumes jumped 31 percent from the prior quarter and 58 percent over 2024. Aisuru-Kimwolf, a botnet made up largely of malware-infected Android TVs, was behind the largest blast of the quarter, pushing traffic to a record-breaking 31.4 Tbps. The campaign, dubbed "The Night Before Christmas," kicked off on December 19 and targeted Cloudflare customers as well as Cloudflare's own dashboard and infrastructure in parallel. "As the number of attacks increased over the course of 2025, the size of the attacks increased as well, growing by over 700 percent compared to the large attacks seen in late 2024," Cloudflare said.  Scale isn't the only thing shifting, as Cloudflare reports that attackers are ditching long-haul floods in favour of smash-and-dash traffic spikes. Some incidents during the campaign wrapped up in well under two minutes yet still pushed traffic into the billions of packets per second, underscoring how sheer speed has become the real weapon. Cloudflare attributes much of the surge to large botnets built from compromised internet-connected devices, including routers, cameras, and DVRs. The company also says attackers are increasingly abusing cloud-hosted virtual machines to generate large bursts of traffic, allowing them to scale attacks quickly. The geographic shifts are equally notable. While China, Hong Kong, Germany, Brazil, and the United States remained among the most frequently targeted regions, the United Kingdom's sudden rise to number six stands out.  Cloudflare doesn't attribute the UK's climb to any single campaign, though the country is in several well-known DDoS crosshairs. Financial services remain a favourite target, and geopolitical tensions are adding fresh fuel. Pro-Russian hacktivists NoName057(16), for example, have repeatedly claimed responsibility for attacks on UK government and public sector websites. Britain's dense telecoms and cloud infrastructure also make it a high-impact disruption target. Attackers didn't stray far from their favourite punching bags. Telecom providers, IT service firms, and gambling and gaming sites once again absorbed a big slice of the DDoS noise, sectors where outages tend to trigger both lost cash and loud complaints. Most assaults also stuck to the lower plumbing of the internet, with Layer 3 and Layer 4 attacks leading the charge. Cloudflare says the only realistic way to keep up is to let the machines handle it, with autonomous systems detecting and blocking massive, short-lived attacks in real time without human intervention. The logic is fairly simple: when traffic surges to record levels and then vanishes within a couple of minutes, humans will never react quickly enough.

Daily Brief Summary

DDOS // UK Rises as Major Target Amid Record-Breaking DDoS Attacks

Cloudflare reported a significant increase in DDoS attacks in 2025, with the UK becoming the sixth-most targeted country globally, marking a substantial rise in threat exposure.

The fourth quarter witnessed a 31% increase in attack volume from the previous quarter, with a staggering 58% rise compared to 2024, indicating escalating attack severity.

Aisuru-Kimwolf, a botnet leveraging malware-infected Android TVs, executed the largest attack, reaching a record 31.4 Tbps during the "The Night Before Christmas" campaign.

Attackers are shifting tactics towards rapid, high-volume traffic spikes, with incidents generating billions of packets per second in under two minutes, challenging traditional defense mechanisms.

Large botnets and cloud-hosted virtual machines are increasingly used to scale attacks, exploiting compromised internet-connected devices such as routers and cameras.

The UK’s telecom and cloud infrastructure, alongside financial services, remain primary targets, with geopolitical tensions and pro-Russian hacktivists like NoName057(16) contributing to the threat landscape.

Cloudflare emphasizes the necessity of autonomous systems for real-time detection and mitigation, as human response times are inadequate against swift, massive DDoS surges.