IoT Botnet DDoS Attacks Quintuple in One Year: Nokia Report

The latest Threat Intelligence Report from Nokia reveals a fivefold increase in IoT botnet DDoS traffic in the past year, putting numerous telecom network services at risk. This rise in attacks, originating from numerous insecure IoT devices, has primarily been driven by the Russia-Ukraine conflict and cybercriminal collectives.
IOT BOTNET DDOS ATTACKS QUINTUPLE IN ONE YEAR NOKIA REPORT

The most recent Threat Intelligence Report from Nokia, published today, reveals that IoT botnet DDoS (Distributed Denial of Service) traffic increased by five times in the last year. These attacks, stemming from a large number of insecure IoT devices, aim to disrupt telecom services for millions of users. The increase coincides with Russia’s invasion of Ukraine and the growth of hacking groups run by cybercriminals for profit.


This significant rise was first observed at the start of the Russia-Ukraine conflict. It has since spread globally due to an increase in the usage of IoT devices by consumers. DDoS attacks driven by botnets have been disrupting telecom networks and other essential infrastructure and services. The number of IoT devices, or bots, involved in these attacks has risen from around 200,000 a year ago to about 1 million devices today, accounting for over 40% of all DDoS traffic.

The most frequently found malware in telecom networks was a type of bot malware that looks for vulnerable devices, a strategy linked with several IoT botnets. With billions of IoT devices worldwide, including smart fridges, medical sensors, and smartwatches, many of these devices lack strong security measures.

The report also found that the number of trojans targeting banking information on mobile devices has doubled to 9%. This increase puts millions of global users at a higher risk of having their personal financial and credit card information stolen. A trojan is a type of harmful software code that’s disguised as safe.

However, the report did share some positive news: malware infections in home networks have fallen from a Covid-era high of 3% to 1.5%, nearing the pre-pandemic level of 1%. This decrease occurred as malware campaigns targeting remote workers started to decline, and more people began returning to offices.

These findings are based on data collected from over 200 million devices worldwide that use Nokia’s NetGuard Endpoint Security product.

The Threat Intelligence Report is the work of experts at Nokia‘s Threat Intelligence Center in Canada, Cyber Security Center in France, Security Operations Center in India, and Deepfield, a Nokia department focusing on network analytics and DDoS security software applications.

Hamdy Farid, Senior Vice President, Business Applications at Nokia, said: “The findings in this report highlight the scale and sophistication of cybercriminal activity today. A single botnet DDoS attack can involve hundreds of thousands of IoT devices, posing a significant threat to networks globally. To reduce these risks, it’s critical for service providers, vendors, and regulators to develop more robust 5G network security measures. This includes telecom-focused threat detection and response, strong security practices, and awareness at all company levels.”

 


Recent Content

Legacy broadband networks are struggling to meet today’s demands. Open architectures — modular, interoperable, and standards-based — are revolutionizing broadband by promoting flexibility, cost-efficiency, and faster innovation. Learn how service providers can leverage open broadband strategies to scale, improve customer experiences, and build resilient, future-proof infrastructures ready for the digital economy.
Batelco by Beyon and Nokia are partnering to launch Bahrain’s first private 5G network at Aluminum Bahrain (Alba). The network will drive smart manufacturing through real-time monitoring, automation, and AI-driven analytics—paving the way for Alba’s digital transformation and advancing Bahrain’s Industry 4.0 strategy.
Airtel has acquired 400 MHz of 26 GHz mmWave spectrum from Adani Data Networks, a move that strengthens its high-speed 5G offerings in urban and enterprise zones. The deal enhances Airtel’s ability to scale fixed wireless access, industrial 5G networks, and high-bandwidth consumer services. With India’s spectrum demand surging, this acquisition underscores the critical role of efficient spectrum use and signals a new phase of telecom consolidation.
ETSI has published its first ISAC report for 6G—ETSI GR ISC 001—highlighting 18 use cases across healthcare, public safety, automation, and mobility. The report dives into deployment scenarios, sensing modalities, and KPIs like fine motion accuracy and sensing latency. It also outlines security, privacy, and sustainability guidelines for real-world ISAC integration into 6G networks.
Confidencial.io will unveil its unified AI data governance platform at RSAC 2025. Designed to secure unstructured data in AI workflows, the system applies object-level Zero Trust encryption and seamless compliance with NIST/ISO frameworks. It protects AI pipelines and agentic systems from sensitive data leakage while supporting safe, large-scale innovation.
The integration of tariffs and the EU AI Act creates a challenging environment for the advancement of AI and automation. Tariffs, by increasing the cost of essential hardware components, and the EU AI Act, by increasing compliance costs, can significantly raise the barrier to entry for new AI and automation ventures. European companies developing these technologies may face a double disadvantage: higher input costs due to tariffs and higher compliance costs due to the AI Act, making them less competitive globally. This combined pressure could discourage investment in AI and automation within the EU, hindering innovation and slowing adoption rates. The resulting slower adoption could limit the availability of crucial real-world data for training and improving AI algorithms, further impacting progress.
Whitepaper
As VoLTE becomes the standard for voice communication, its rapid deployment exposes telecom networks to new security risks, especially in roaming scenarios. SecurityGen’s research uncovers key vulnerabilities like unauthorized access to IMS, SIP protocol threats, and lack of encryption. Learn how to strengthen VoLTE security with proactive measures such as...
Whitepaper
Dive into the comprehensive analysis of GTPu within 5G networks in our whitepaper, offering insights into its operational mechanics, strategic importance, and adaptation to the evolving landscape of cellular technologies....

It seems we can't find what you're looking for.

Download Magazine

With Subscription

Subscribe To Our Newsletter

Scroll to Top