How botnet-driven DDoS attacks evolved in 2H 2025
Summary
In the second half of 2025, DDoS attacks (distributed denial-of-service, where attackers flood a target with traffic to shut it down) became more powerful and easier to launch due to three major changes: IoT botnets (networks of hacked internet-connected devices like routers) reached attack capacities of 30 terabits per second, AI and dark-web LLMs (large language models, AI systems trained on text data) made sophisticated attacks accessible to less-skilled attackers through simple conversational prompts, and DDoS-for-hire services became more widely available. Critical infrastructure like DNS servers (systems that translate website names into IP addresses) and government and finance sectors faced sustained pressure from groups coordinating attacks across multiple countries.
Classification
Related Issues
CVE-2022-29200: TensorFlow is an open source platform for machine learning. Prior to versions 2.9.0, 2.8.1, 2.7.2, and 2.6.4, the implem
CVE-2021-29541: TensorFlow is an end-to-end open source platform for machine learning. An attacker can trigger a dereference of a null p
Original source: https://www.csoonline.com/article/4155927/how-botnet-driven-ddos-attacks-evolved-in-2h-2025.html
First tracked: April 8, 2026 at 02:00 PM
Classified by LLM (prompt v3) · confidence: 65%