Submit Feedback

Please rate your satisfaction with Digiato.

Very Satisfied
Not Satisfied At All
How can we improve your experience?

Your feedback has been successfully submitted.

Thank you for helping us improve and grow Digiato.

DDoS Attacks
Report

Iran Faced Over 2,300 Daily DDoS Attacks in Spring 2025, Report Shows

Spring 2025 saw a surge in DDoS attacks targeting public services, with over half originating from infected devices.

Elyas
Written by Elyas | 19 August 2025 | 09:36

Iran's Infrastructure Communications Company has released an analytical report on DDoS attack trends during spring 2025. The report, covering the period from March 21 to June 20, reveals an average of 2,313 daily DDoS attacks targeting the nation’s infrastructure. Each attack lasted an average of three minutes and thirteen seconds. Comparatively, the daily average in February 2025 was 1,130 attacks. The longest recorded attack during this period lasted two days, sixteen hours, and fifteen minutes.

The report defines DDoS attacks as cyberattacks where attackers flood critical infrastructure and services with fake traffic, causing service disruptions or complete outages.

Public service portals were identified as the primary targets of these attacks. According to the Infrastructure Communications Company, over 89 percent of the attacks aimed to deny public access to essential services but were successfully mitigated. Online public service portals ranked highest among targets, followed by government websites, online businesses, and fixed and mobile internet service providers. A total of 215,154 attacks were countered during spring 2025.

The report highlights that 56 percent of all attacks originated from infected devices, up from 47 percent in winter 2024. Many infections occurred through software like VPNs.

A shift in attack origins was also noted. Over 82.6 percent of attacks came from ten countries; Hungary (23.81 percent), Germany (23.7 percent), and Spain (14.56 percent) led the list this time instead of Russia. The report clarifies that these figures do not necessarily imply direct involvement by these nations; many attacks were carried out using compromised devices connected to networks without their owners’ knowledge.

Write Your Comments and Feedback