
Zambia
The DDoS threat landscape is constantly evolving, and to stay ahead of adversaries, ongoing monitoring and analysis are essential to detect how they are modifying their behavior and targets. NETSCOUT monitors the global threat landscape and drills into regional and country-level statistics to ensure that adversaries inform us of near-real-time trends. The country-level analytics featured on this page are automatically generated using our global threat analysis and collection platform, ATLAS, and provide a range of benchmarks for the specified time period, such as the top vectors used in DDoS attacks, top targeted industries, largest attack by bandwidth and throughput, most vectors used in an attack, and total attack frequency.
Max Multivector Attack
Max number of vectors seen in a single attack
12
Attack Vectors Used
1. Bittorrent Amplification
2. DNS Amplification
3. ICMP
4. NTP Amplification
5. STUN Amplification
6. TCP ACK
7. TCP RST
8. TCP SYN
9. TCP SYN/ACK Amplification
10. UDP
Top Attack Vectors
Tk
TCP SYN/ACK Amplification
Number of Attacks
265
Tr
TCP RST
Number of Attacks
39
Dn
DNS Amplification
Number of Attacks
37
Im
ICMP
Number of Attacks
34
Ts
TCP SYN
Number of Attacks
32
Top Four Industries Under Attack
The following table lists the top vertical industries under attack from January 2025 to June 2025 by number of attacks.
Rank | Vertical | Frequency | Max Attack | Max Impact | Average Duration |
---|---|---|---|---|---|
1 |
|
241 | 1.22 Gbps | 0.15 Mpps | 7 Minutes |
2 |
|
16 | 1.15 Gbps | 0.15 Mpps | 7 Minutes |
3 |
|
3 | 0.13 Gbps | 0.02 Mpps | 11 Minutes |
4 |
|
1 | 0.07 Gbps | 0.01 Mpps | 6 Minutes |