
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Wed, 15 Apr 2026 21:11:39 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Bringing more transparency to post-quantum usage, encrypted messaging, and routing security]]></title>
            <link>https://blog.cloudflare.com/radar-origin-pq-key-transparency-aspa/</link>
            <pubDate>Fri, 27 Feb 2026 06:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare Radar has added new tools for monitoring PQ adoption, KT logs for messaging, and ASPA routing records to track the Internet's migration toward more secure encryption and routing standards.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Cloudflare Radar already offers a wide array of <a href="https://radar.cloudflare.com/security/"><u>security insights</u></a> — from application and network layer attacks, to malicious email messages, to digital certificates and Internet routing.</p><p>And today we’re introducing even more. We are launching several new security-related data sets and tools on Radar: </p><ul><li><p>We are extending our post-quantum (PQ) monitoring beyond the client side to now include origin-facing connections. We have also released a new tool to help you check any website's post-quantum encryption compatibility. </p></li><li><p>A new Key Transparency section on Radar provides a public dashboard showing the real-time verification status of Key Transparency Logs for end-to-end encrypted messaging services like WhatsApp, showing when each log was last signed and verified by Cloudflare's Auditor. The page serves as a transparent interface where anyone can monitor the integrity of public key distribution and access the API to independently validate our Auditor’s proofs. </p></li><li><p>Routing Security insights continue to expand with the addition of global, country, and network-level information about the deployment of ASPA, an emerging standard that can help detect and prevent BGP route leaks. </p></li></ul>
    <div>
      <h2>Measuring origin post-quantum support</h2>
      <a href="#measuring-origin-post-quantum-support">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2gs0x3zMZTxios168jT9xW/179d8959b5e0939835cf6facef797457/1.png" />
          </figure><p>Since <a href="https://x.com/CloudflareRadar/status/1788277817362329983"><u>April 2024</u></a>, we have tracked the aggregate growth of client support for post-quantum encryption on Cloudflare Radar, chronicling its global growth from <a href="https://radar.cloudflare.com/adoption-and-usage?dateStart=2024-01-01&amp;dateEnd=2024-01-31#post-quantum-encryption-adoption"><u>under 3% at the start of 2024</u></a>, to <a href="https://radar.cloudflare.com/adoption-and-usage?dateStart=2026-02-01&amp;dateEnd=2026-02-28#post-quantum-encryption-adoption"><u>over 60% in February 2026</u></a>. And in October 2025, <a href="https://blog.cloudflare.com/pq-2025/#what-you-can-do-today-to-stay-safe-against-quantum-attacks"><u>we added the ability</u></a> for users to <a href="https://radar.cloudflare.com/adoption-and-usage#browser-support"><u>check</u></a> whether their browser supports <a href="https://developers.cloudflare.com/ssl/post-quantum-cryptography/pqc-support/#x25519mlkem768"><code><u>X25519MLKEM768</u></code></a> — a hybrid key exchange algorithm combining classical <a href="https://www.rfc-editor.org/rfc/rfc8410"><code><u>X25519</u></code></a> with <a href="https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.203.pdf"><u>ML-KEM</u></a>, a lattice-based post-quantum scheme standardized by NIST. This provides security against both classical and quantum attacks. </p><p>However, post-quantum encryption support on user-to-Cloudflare connections is only part of the story.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/67cvSmOaISIHjrKKRHKPzg/e0ccf032658904fd6beaa7de7340b561/2.png" />
          </figure><p>For content not in our CDN cache, or for uncacheable content, Cloudflare’s edge servers establish a separate connection with a customer’s origin servers to retrieve it. To accelerate the transition to quantum-resistant security for these origin-facing fetches, we <a href="https://blog.cloudflare.com/post-quantum-to-origins/"><u>previously introduced an API</u></a> allowing customers to opt in to preferring post-quantum connections. Today, we’re making post-quantum compatibility of origin servers visible on Radar.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6KvV2meYLEPbNIQyHP6yji/9477a134c8f5f6a7aaecd6257cd59981/3.png" />
          </figure><p>The new origin post-quantum support graph on Radar illustrates the share of customer origins supporting <code>X25519MLKEM768</code>. This data is derived from <a href="https://blog.cloudflare.com/automatically-secure/"><u>our automated TLS scanner,</u></a> which probes TLS 1.3-compatible origins and aggregates the results daily. It is important to note that our scanner tests for support rather than the origin server's specific preference. While an origin may support a post-quantum key exchange algorithm, its local TLS key exchange preference can ultimately dictate the encryption outcome.</p><p>While the headline graph focuses on post-quantum readiness, the scanner also evaluates support for classical key exchange algorithms. Within the Radar <a href="https://radar.cloudflare.com/explorer?dataSet=post_quantum.origin&amp;groupBy=key_agreement#result"><u>Data Explorer view</u></a>, you can also see the full distribution of these supported TLS key exchange methods.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5PBOoQSCcIAQrYezKp1pJU/d4218aba59deef6c21df53856a93040a/4.png" />
          </figure><p>As shown in the graphs above, approximately 10% of origins could benefit from a post-quantum-preferred key agreement today. This represents a significant jump from less than 1% at the start of 2025 — <a href="https://radar.cloudflare.com/explorer?dataSet=post_quantum.origin&amp;groupBy=key_agreement&amp;dt=2025-01-01_2025-12-31"><u>a 10x increase in just over a year</u></a>. We expect this number to grow steadily as the industry continues its migration. This upward trend likely accelerated in 2025 as many server-side TLS libraries, such as <a href="https://openssl-library.org/post/2025-04-08-openssl-35-final-release/"><u>OpenSSL 3.5.0+</u></a>,<a href="https://www.gnutls.org/"><u> GnuTLS 3.8.9+</u></a>, and <a href="https://go.dev/doc/go1.24#cryptotlspkgcryptotls"><u>Go 1.24+</u></a>, enabled hybrid post-quantum key exchange by default, allowing platforms and services to support post-quantum connections simply by upgrading their cryptographic library dependencies.</p><p>In addition to the Radar and Data Explorer graphs, the <a href="https://developers.cloudflare.com/api/resources/radar/subresources/post_quantum/subresources/origin/"><u>origin readiness data is available through the Radar API</u></a> as well.</p><p>As an additional part of our efforts to help the Internet transition to post-quantum cryptography, we are also launching <a href="https://radar.cloudflare.com/post-quantum#website-support"><u>a tool to test whether a specific hostname supports post-quantum encryption</u></a>. These tests can be run against any publicly accessible website, as long as they allow connections from Cloudflare’s <a href="https://www.cloudflare.com/ips/"><u>egress IP address ranges</u></a>. </p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5dgwK3i7IeLLSUt5xnk4lf/276e25dda3389f6e0ad83a26acd08fec/5.png" />
          </figure><p><sub><i>A screenshot of the tool in Radar to test whether a hostname supports post-quantum encryption.</i></sub></p><p>The tool presents a simple form where users can enter a hostname (such as <a href="https://radar.cloudflare.com/post-quantum?host=cloudflare.com%3A443"><code><u>cloudflare.com</u></code></a> or <a href="https://radar.cloudflare.com/post-quantum?host=www.wikipedia.org%3A443"><code><u>www.wikipedia.org</u></code></a>) and optionally specify a custom port (the default is <a href="https://www.iana.org/assignments/service-names-port-numbers/service-names-port-numbers.xhtml?search=443"><u>443, the standard HTTPS port</u></a>). After clicking "Test", the result displays a tag indicating PQ support status alongside the negotiated TLS key exchange algorithm. If the server prefers PQ secure connections, a green "PQ" tag appears with a message confirming the connection is "post-quantum secure." Otherwise, a red tag indicates the connection is "not post-quantum secure", showing the classical algorithm that was negotiated.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3rfEG4dMlwR4FJkaKXTRWF/8cab135242057ce57f3b0e4a92be4cec/6.png" />
          </figure>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/PXu3kjzwhVkb29kIFREOn/41785c06297e0667ff9e2b261ae9b819/7.png" />
          </figure><p>Under the hood, this tool uses <a href="https://developers.cloudflare.com/containers/"><u>Cloudflare Containers</u></a> — a new capability that allows running container workloads alongside Workers. Since the Workers runtime is not exposed to details of the underlying TLS handshake, Workers cannot initiate TLS scans. Therefore, we created a Go container that leverages the <a href="https://pkg.go.dev/crypto/tls"><code><u>crypto/tls</u></code></a> package's support for post-quantum compatibility checks. The container runs on-demand and performs the actual handshake to determine the negotiated TLS key exchange algorithm, returning results through the <a href="https://developers.cloudflare.com/api/resources/radar/subresources/post_quantum/subresources/tls/methods/support/"><u>Radar API</u></a>.</p><p>With the addition of these origin-facing insights, complementing the existing client-facing insights, we have moved all the post-quantum content to <a href="https://radar.cloudflare.com/post-quantum"><u>its own section on Radar</u></a>. </p>
    <div>
      <h2>Securing E2EE messaging systems with Key Transparency</h2>
      <a href="#securing-e2ee-messaging-systems-with-key-transparency">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/71b8HJK1iT0udJscvkqqI4/778efb329047fca017ff2cf4153330ad/8.png" />
          </figure><p><a href="https://www.cloudflare.com/learning/privacy/what-is-end-to-end-encryption/"><u>End-to-end encrypted (E2EE)</u></a> messaging apps like WhatsApp and Signal have become essential tools for private communication, relied upon by billions of people worldwide. These apps use <a href="https://www.cloudflare.com/learning/ssl/how-does-public-key-encryption-work/"><u>public-key cryptography</u></a> to ensure that only the sender and recipient can read the contents of their messages — not even the messaging service itself. However, there's an often-overlooked vulnerability in this model: users must trust that the messaging app is distributing the correct public keys for each contact.</p><p>If an attacker were able to substitute an incorrect public key in the messaging app's database, they could intercept messages intended for someone else — all without the sender knowing.</p><p>Key Transparency addresses this challenge by creating an auditable, append-only log of public keys — similar in concept to <a href="https://radar.cloudflare.com/certificate-transparency"><u>Certificate Transparency</u></a> for TLS certificates. Messaging apps publish their users' public keys to a transparency log, and independent third parties can verify and vouch that the log has been constructed correctly and consistently over time. In September 2024, Cloudflare <a href="https://blog.cloudflare.com/key-transparency/"><u>announced</u></a> such a Key Transparency auditor for WhatsApp, providing an independent verification layer that helps ensure the integrity of public key distribution for the messaging app's billions of users.</p><p>Today, we're publishing Key Transparency audit data in a new <a href="https://radar.cloudflare.com/key-transparency"><u>Key Transparency section</u></a> on Cloudflare Radar. This section showcases the Key Transparency logs that Cloudflare audits, giving researchers, security professionals, and curious users a window into the health and activity of these critical systems.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1LZ1DUzv0SCgBa0XqDURKP/26ccd8b0741073895cbb52aa7f1d5643/image11.png" />
          </figure><p>The new page launches with two monitored logs: WhatsApp and Facebook Messenger Transport. Each monitored log is displayed as a card containing the following information:</p><ul><li><p><b>Status:</b> Indicates whether the log is online, in initialization, or disabled. An "online" status means the log is actively publishing key updates into epochs that Cloudflare audits. (An epoch represents a set of updates applied to the key directory at a specific time.)</p></li><li><p><b>Last signed epoch:</b> The most recent epoch that has been published by the messaging service's log and acknowledged by Cloudflare. By clicking on the eye icon, users can view the full epoch data in JSON format, including the epoch number, timestamp, cryptographic digest, and signature.</p></li><li><p><b>Last verified epoch:</b> The most recent epoch that Cloudflare has verified. Verification involves checking that the transition of the transparency log data structure from the previous epoch to the current one represents a valid tree transformation — ensuring the log has been constructed correctly. The verification timestamp indicates when Cloudflare completed its audit.</p></li><li><p><b>Root:</b> The current root hash of the <a href="https://github.com/facebook/akd"><u>Auditable Key Directory (AKD)</u></a> tree. This hash cryptographically represents the entire state of the key directory at the current epoch. Like the epoch fields, users can click to view the complete JSON response from the auditor.</p></li></ul><p>The data shown on the page is also available via the Key Transparency Auditor API, with endpoints for <a href="https://developers.cloudflare.com/key-transparency/api/auditor-information/"><u>auditor information</u></a> and <a href="https://developers.cloudflare.com/key-transparency/api/namespaces/"><u>namespaces</u></a>.</p><p>If you would like to perform audit proof verification yourself, you can follow the instructions in our <a href="https://blog.cloudflare.com/key-transparency/"><u>Auditing Key Transparency blog post</u></a>. We hope that these use cases are the first of many that we publish in this Key Transparency section in Radar — if your company or organization is interested in auditing for your public key or related infrastructure, you can <a href="https://www.cloudflare.com/lp/privacy-edge/"><u>reach out to us here</u></a>.</p>
    <div>
      <h2>Tracking RPKI ASPA adoption</h2>
      <a href="#tracking-rpki-aspa-adoption">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2LAbrwY9ziVbe1BzfUyl7K/821a40f86c62dd9b44f7bcaee018dd28/10.png" />
          </figure><p>While the <a href="https://www.cloudflare.com/learning/security/glossary/what-is-bgp/"><u>Border Gateway Protocol (BGP)</u></a> is the backbone of Internet routing, it was designed without built-in mechanisms to verify the validity of the paths it propagates. This inherent trust has long left the global network vulnerable to route leaks and hijacks, where traffic is accidentally or maliciously detoured through unauthorized networks.</p><p>Although <a href="https://en.wikipedia.org/wiki/Resource_Public_Key_Infrastructure"><u>RPKI</u></a> and <a href="https://www.arin.net/resources/manage/rpki/roas/"><u>Route Origin Authorizations (ROAs)</u></a> have successfully hardened the origin of routes, they cannot verify the path traffic takes between networks. This is where <a href="https://datatracker.ietf.org/doc/draft-ietf-sidrops-aspa-verification/"><u>ASPA (Autonomous System Provider Authorization)</u></a><b> </b>comes in. ASPA extends RPKI protection by allowing an <a href="https://www.cloudflare.com/learning/network-layer/what-is-an-autonomous-system/"><u>Autonomous System (AS)</u></a> to cryptographically sign a record listing the networks authorized to propagate its routes upstream. By validating these Customer-to-Provider relationships, ASPA allows systems to detect invalid path announcements with confidence and react accordingly.</p><p>While the specific IETF standard remains <a href="https://datatracker.ietf.org/doc/draft-ietf-sidrops-aspa-verification/"><u>in draft</u></a>, the operational community is moving fast. Support for creating ASPA objects has already landed in the portals of Regional Internet Registries (RIRs) like <a href="https://www.arin.net/announcements/20260120/"><u>ARIN</u></a> and <a href="https://labs.ripe.net/author/tim_bruijnzeels/aspa-in-the-rpki-dashboard-a-new-layer-of-routing-security/"><u>RIPE NCC</u></a>, and validation logic is available in major software routing stacks like <a href="https://www.undeadly.org/cgi?action=article;sid=20231002135058"><u>OpenBGPD</u></a> and <a href="https://bird.network.cz/?get_doc&amp;v=20&amp;f=bird-5.html"><u>BIRD</u></a>.</p><p>To provide better visibility into the adoption of this emerging standard, we have added comprehensive RPKI ASPA support to the <a href="https://radar.cloudflare.com/routing"><u>Routing section</u></a> of Cloudflare Radar. Tracking these records globally allows us to understand how quickly the industry is moving toward better path validation.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6SI6A5vd2bAp3QnBAsJFmZ/24e11445eb0309252d759e88dbf2ba62/11.png" />
          </figure><p>Our new ASPA deployment view allows users to examine the growth of ASPA adoption over time, with the ability to visualize trends across the five <a href="https://en.wikipedia.org/wiki/Regional_Internet_registry"><u>Regional Internet Registries</u></a> (RIRs) based on AS registration. You can view the entire history of ASPA entries, dating back to October 1, 2023, or zoom into specific date ranges to correlate spikes in adoption with industry events, such as the introduction of ASPA features on ARIN and RIPE NCC online dashboards.</p><p>Beyond aggregate trends, we have also introduced a granular, searchable explorer for real-time ASPA content. This table view allows you to inspect the current state of ASPA records, searchable by AS number, AS name, or by filtering for only providers or customer ASNs. This allows network operators to verify that their records are published correctly and to view other networks’ configurations.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/K97G5TC7O1MYwkvFbrdTl/85b27f807401f85d2bbe140f1611a034/12.png" />
          </figure><p>We have also integrated ASPA data directly into the country/region routing pages. Users can now track how different locations are progressing in securing their infrastructure, based on the associated ASPA records from the customer ASNs registered locally.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6mhZyfrHexdo1GDAoKZEd7/44b63675595a01939fa4748210d8c482/13.png" />
          </figure><p>On individual AS pages, we have updated the Connectivity section. Now, when viewing the connections of a network, you may see a visual indicator for "ASPA Verified Provider." This annotation confirms that an ASPA record exists authorizing that specific upstream connection, providing an immediate signal of routing hygiene and trust.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3lVJY4fZWv3KaFdKwLHfAV/aeb2bc27bdccb6a9025345dbaed5b762/14.png" />
          </figure><p>For ASes that have deployed ASPA, we now display a complete list of authorized provider ASNs along with their details. Beyond the current state, Radar also provides a detailed timeline of ASPA activity involving the AS. This history distinguishes between changes initiated by the AS itself ("As customer") and records created by others designating it as a provider ("As provider"), allowing users to immediately identify when specific routing authorizations were established or modified.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ZIlAn2l0sDTLCyEMMcBI9/871b8d7abffe17b3aee060502eaa4c1c/15.png" />
          </figure><p>Visibility is an essential first step toward broader adoption of emerging routing security protocols like ASPA. By surfacing this data, we aim to help operators deploy protections and assist researchers in tracking the Internet's progress toward a more secure routing path. For those who need to integrate this data into their own workflows or perform deeper analysis, we are also exposing these metrics programmatically. Users can now access ASPA content snapshots, historical timeseries, and detailed changes data using the newly introduced endpoints in the<a href="https://developers.cloudflare.com/api/resources/radar/subresources/bgp/subresources/rpki/subresources/aspa/"> <u>Cloudflare Radar API</u></a>.</p>
    <div>
      <h2>As security evolves, so does our data</h2>
      <a href="#as-security-evolves-so-does-our-data">
        
      </a>
    </div>
    <p>Internet security continues to evolve, with new approaches, protocols, and standards being developed to ensure that information, applications, and networks remain secure. The security data and insights available on Cloudflare Radar will continue to evolve as well. The new sections highlighted above serve to expand existing routing security, transparency, and post-quantum insights already available on Cloudflare Radar. </p><p>If you share any of these new charts and graphs on social media, be sure to tag us: <a href="https://x.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky). If you have questions or comments, or suggestions for data that you’d like to see us add to Radar, you can reach out to us on social media, or contact us via <a href="#"><u>email</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5jAzDXss7PvszWkwGC0q2g/df14de40bf268052fac11239952fc1ed/16.png" />
          </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Privacy]]></category>
            <category><![CDATA[Post-Quantum]]></category>
            <category><![CDATA[Routing]]></category>
            <category><![CDATA[Research]]></category>
            <guid isPermaLink="false">1Iy1Qvw9TsOhRwgjUYqFxO</guid>
            <dc:creator>David Belson</dc:creator>
            <dc:creator>Mingwei Zhang</dc:creator>
            <dc:creator>André Jesus</dc:creator>
            <dc:creator>Suleman Ahmad</dc:creator>
            <dc:creator>Sabina Zejnilovic</dc:creator>
            <dc:creator>Thibault Meunier</dc:creator>
            <dc:creator>Mari Galicer</dc:creator>
        </item>
        <item>
            <title><![CDATA[Password reuse is rampant: nearly half of observed user logins are compromised]]></title>
            <link>https://blog.cloudflare.com/password-reuse-rampant-half-user-logins-compromised/</link>
            <pubDate>Mon, 17 Mar 2025 13:00:00 GMT</pubDate>
            <description><![CDATA[ Nearly half of observed login attempts across websites protected by Cloudflare involved leaked credentials. The pervasive issue of password reuse is enabling automated bot attacks on a massive scale. ]]></description>
            <content:encoded><![CDATA[ <p>Accessing private content online, whether it's checking email or streaming your favorite show, almost always starts with a “login” step. Beneath this everyday task lies a widespread human mistake we still have not resolved:<b> password reuse. </b>Many users recycle passwords across multiple services, creating a ripple effect of risk when their credentials are leaked.</p><p>Based on Cloudflare's observed traffic between September - November 2024,<b> 41% of successful logins across websites protected by Cloudflare involve compromised passwords. </b>In this post, we’ll explore the widespread impact of password reuse, focusing on how it affects popular Content Management Systems (CMS), the behavior of bots versus humans in login attempts, and how attackers exploit stolen credentials to take over accounts at scale.</p>
    <div>
      <h3>Scope of the analysis</h3>
      <a href="#scope-of-the-analysis">
        
      </a>
    </div>
    <p>As part of our <a href="https://www.cloudflare.com/application-services/solutions/">Application Security</a> offering, we offer a free feature that checks if a password has been leaked in a known data breach of another service or application on the Internet. When we perform these checks, Cloudflare does not access or store plaintext end user passwords. We have built a privacy-preserving credential checking service that helps protect our users from compromised credentials. <a href="https://blog.cloudflare.com/helping-keep-customers-safe-with-leaked-password-notification/#how-does-cloudflare-check-for-leaked-credentials"><u>Passwords are hashed – i.e., converted into a random string of characters using a cryptographic algorithm – for the purpose of comparing them against a database of leaked credentials.</u></a> This not only warns site owners that their end users’ credentials may be compromised; it also allows site owners to issue a password reset or enable MFA. These protections help prevent attacks that use automated attempts to guess information, like usernames and passwords, to gain access to a system or network. Read more on how our leaked credentials detection scans work <a href="https://developers.cloudflare.com/waf/detections/leaked-credentials/"><u>here</u></a>.</p><p>Our data analysis focuses on traffic from Internet properties on <a href="https://www.cloudflare.com/plans/free/">Cloudflare’s free plan</a>, which includes <a href="https://developers.cloudflare.com/waf/detections/leaked-credentials/"><u>leaked credentials detection</u></a> as a built-in feature. Leaked credentials refer to usernames and passwords exposed in known data breaches or credential dumps — for this analysis, our focus is specifically on leaked passwords. With 30 million Internet properties, <a href="https://w3techs.com/technologies/overview/proxy/all"><u>comprising some 20% of the web</u></a>, behind Cloudflare, this analysis provides significant insights. The data primarily reflects trends observed after the detection system was launched during <a href="https://blog.cloudflare.com/a-safer-internet-with-cloudflare/"><u>Birthday Week</u></a> in September 2024.</p>
    <div>
      <h3>Nearly 41% of logins are at risk</h3>
      <a href="#nearly-41-of-logins-are-at-risk">
        
      </a>
    </div>
    <p>One of the biggest challenges in authentication is distinguishing between legitimate human users and malicious actors. To understand human behavior, we focus on successful login attempts (those returning a <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200"><u>200 OK</u></a> status code), as this provides the clearest indication of user activity and real account risk. Our data reveals that approximately 41% of successful human authentication attempts involve leaked credentials.</p><p>Despite growing awareness about online security, a significant portion of users continue to reuse passwords across multiple accounts. And according to a <a href="https://www.forbes.com/advisor/business/software/american-password-habits/"><u>recent study by Forbes</u></a>, users will, on average, reuse their password across four different accounts. Even after major breaches, many individuals don’t change their compromised passwords, or still use variations of them across different services. For these users, it’s not a matter of “if” attackers will use their compromised passwords, it’s a matter of “when”.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/71DMUKH3ZzY1hr0bsavGj3/16eed591ce9b34fd4aead27746a85acf/image4.png" />
          </figure><p>When we expand to include bot-driven traffic in this analysis, the problem of leaked credentials becomes even more noticeable. Our data reveals that 52% of all detected authentication requests contain leaked passwords found in our database of over 15 billion records, including the <a href="https://haveibeenpwned.com/"><u>Have I Been Pwned</u></a> (HIBP) leaked password dataset.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4yKNn90DQQTS0j9MjpJ3AT/07513fa7c81f3a37a5f30db4798c9955/image1.png" />
          </figure><p>This percentage represents hundreds of millions of daily authentication requests, originating from both bots and humans. While not every attempt succeeds, the sheer volume of leaked credentials in real-world traffic illustrates how common password reuse is. Many of these leaked credentials still grant valid access, amplifying the risk of account takeovers.</p>
    <div>
      <h3>Attackers heavily use leaked password datasets</h3>
      <a href="#attackers-heavily-use-leaked-password-datasets">
        
      </a>
    </div>
    <p>Bots are the driving force behind <a href="https://www.cloudflare.com/learning/bots/what-is-credential-stuffing/"><u>credential-stuffing</u></a> attacks, the data indicates that<b> </b>95% of login attempts involving leaked passwords are coming from bots,<b> </b>indicating that they are part of credential stuffing attacks.</p><p>Equipped with credentials stolen from breaches, bots systematically target websites at scale, testing thousands of login combinations in seconds.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7rjFwHf1vwRE43M2JuNWkI/2147f2dfaa04f06ae4e75d1ad05232d2/image5.png" />
          </figure><p>Data from the Cloudflare network exposes this trend, showing that bot-driven attacks remain alarmingly high over time. Popular platforms like WordPress, Joomla, and Drupal are frequent targets, due to their widespread use and exploitable vulnerabilities, as we will explore in the upcoming section.</p><p>Once bots successfully breach one account, attackers reuse the same credentials across other services to amplify their reach. They even sometimes try to evade detection by using sophisticated evasion tactics, such as spreading login attempts across different source IP addresses or mimicking human behavior, attempting to blend into legitimate traffic.</p><p>The result is a constant, automated threat vector that challenges traditional security measures and exploits the weakest link: password reuse.</p>
    <div>
      <h3>Brute force attacks against WordPress</h3>
      <a href="#brute-force-attacks-against-wordpress">
        
      </a>
    </div>
    <p>Content Management Systems (CMS) are used to build websites, and often rely on simple authentication and login plugins. This is convenient, but also makes them frequent targets of credential stuffing attacks due to their widespread adoption. WordPress is a very popular content management system with a well known user login page format. Because of this, websites built on WordPress often become common targets for attackers.</p><p>Across our network, WordPress accounts for a significant portion of authentication requests. This is unsurprising given its <a href="https://w3techs.com/technologies/details/cm-wordpress"><u>market share</u></a>. However, what stands out is the alarming number of successful logins using leaked passwords, especially by bots.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3fJWsdEZJ9bo5eYbH9A35w/ed6a805386ef406565be08bdff5260b9/image3.png" />
          </figure><p><b>76% of leaked password login attempts for websites built on WordPress are successful.</b>

Of these, 48% of successful logins are bot-driven.<b> </b>This is a shocking figure that indicates nearly half of all successful logins are executed by unauthorized systems designed to exploit stolen credentials. Successful unauthorized access is often the first step in <a href="https://www.cloudflare.com/zero-trust/solutions/account-takeover-prevention/">account takeover (ATO) attacks</a>.</p><p>The remaining 52% of successful logins originate from legitimate, non-bot users. This figure, higher than the average of 41% across all platforms, highlights how pervasive password reuse is among real users, putting their accounts at significant risk.</p><p><b>Only 5% of leaked password login attempts result in access being denied.</b></p><p>This is a low number compared to the successful bot-driven login attempts, and could be tied to a lack of security measures like <a href="https://www.cloudflare.com/learning/bots/what-is-rate-limiting/"><u>rate-limiting</u></a> or <a href="https://www.cloudflare.com/learning/access-management/what-is-multi-factor-authentication/"><u>multi-factor authentication (MFA)</u></a>. If such measures were in place, we would expect the share of denied attempts to be higher. Notably, 90% of these denied requests are bot-driven, reinforcing the idea that while some security measures are blocking automated logins, many still slip through.</p><p>The overwhelming presence of bot traffic in this category points to ongoing automated attempts to brute-force access.</p><p>The <b>remaining 19%</b> of login attempts fall under other outcomes, such as timeouts, incomplete logins, or users who changed their passwords, so they neither count as direct “successes” nor do they register as “denials”.</p>
    <div>
      <h3>Keeping user accounts safe with Cloudflare</h3>
      <a href="#keeping-user-accounts-safe-with-cloudflare">
        
      </a>
    </div>
    <p>If you're a user, start with changing reused or weak passwords and use unique, strong ones for each website or application. Enable <u>multi-factor authentication (MFA)</u> on all of your accounts that support it, and start exploring passkeys as a more secure, phishing-resistant alternative to traditional passwords.</p><p>For website owners, activate <a href="https://developers.cloudflare.com/waf/detections/leaked-credentials/"><u>leaked credentials detection</u></a> to monitor and address these threats in real time and issue password reset flows on leaked credential matches.</p><p>Additionally, enable features like <a href="https://www.cloudflare.com/application-services/products/rate-limiting/"><u>Rate Limiting</u></a> and <a href="https://www.cloudflare.com/application-services/products/bot-management/"><u>Bot Management</u></a> tools to minimize the impact of automated attacks. Audit password reuse patterns, identify leaked credentials within your systems, and enforce robust password hygiene policies to strengthen overall security.</p><p>By adopting these measures, both individuals and organizations can stay ahead of attackers and build stronger defenses.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Authentication]]></category>
            <category><![CDATA[Account Takeover]]></category>
            <category><![CDATA[Password-reuse]]></category>
            <category><![CDATA[Statistics]]></category>
            <category><![CDATA[Bots]]></category>
            <guid isPermaLink="false">NeRK5xA5mn6uOY47obLsr</guid>
            <dc:creator>Radwa Radwan</dc:creator>
            <dc:creator>Sabina Zejnilovic</dc:creator>
        </item>
        <item>
            <title><![CDATA[Network trends and natural language: Cloudflare Radar’s new Data Explorer & AI Assistant]]></title>
            <link>https://blog.cloudflare.com/radar-data-explorer-ai-assistant/</link>
            <pubDate>Fri, 27 Sep 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ The Cloudflare Radar Data Explorer provides a simple Web-based interface to build more complex API queries, including comparisons and filters, and visualize the results. The accompanying AI Assistant translates a user’s natural language statements or questions into the appropriate Radar API calls. ]]></description>
            <content:encoded><![CDATA[ <p><b></b><a href="https://radar.cloudflare.com/"><u>Cloudflare Radar</u></a> showcases global Internet traffic patterns, attack activity, and technology trends and insights. It is powered by data from Cloudflare's global network, as well as aggregated and anonymized data from Cloudflare's <a href="https://1.1.1.1/dns"><u>1.1.1.1 public DNS Resolver</u></a>, and is built on top of a rich, publicly accessible <a href="https://developers.cloudflare.com/radar/"><u>API</u></a>. This API allows users to explore Radar data beyond the default set of visualizations, for example filtering by protocol, comparing metrics across multiple locations or autonomous systems, or examining trends over two different periods of time. However, not every user has the technical know-how to make a raw API query or process the JSON-formatted response.</p><p>Today, we are launching the <a href="https://radar.cloudflare.com/explorer"><u>Cloudflare Radar Data Explorer</u></a>, which provides a simple Web-based interface to enable users to easily build more complex API queries, including comparisons and filters, and visualize the results. And as a complement to the Data Explorer, we are also launching an AI Assistant, which uses <a href="https://developers.cloudflare.com/workers-ai/"><u>Cloudflare Workers AI</u></a> to translate a user’s natural language statements or questions into the appropriate Radar API calls, the results of which are visualized in the Data Explorer. Below, we introduce the AI Assistant and Data Explorer, and also dig into how we used Cloudflare Developer Platform tools to build the AI Assistant.</p>
    <div>
      <h2>Ask the AI Assistant</h2>
      <a href="#ask-the-ai-assistant">
        
      </a>
    </div>
    <p>Sometimes, a user may know what they are looking for, but aren’t quite sure how to build the relevant API query by selecting from the available options and filters. (The sheer number may appear overwhelming.) In those cases, they can simply pose a question to the AI Assistant, like “Has there been an uptick in malicious email over the last week?” The AI Assistant makes a series of Workers AI and Radar API calls to retrieve the relevant data, which is visualized within seconds:</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3HRBy5Bm5aNQ1gUj1MBCj5/e0fcd717765a8f234996b9e98e43389a/image8.png" />
          </figure><p>The AI Assistant pane is found on the right side of the page in desktop browsers, and appears when the user taps the “AI Assistant” button on a mobile browser. To use the AI Assistant, users just need to type their question into the “Ask me something” area at the bottom of the pane and submit it. A few sample queries are also displayed by default to provide examples of how and what to ask, and clicking on one submits it.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/79srygHorwU84nyQg9KLSl/be609d62b0ebf4a708f6f523fed817f1/Screenshot_2024-09-26_at_20.32.43.png" />
          </figure><p>The submitted question is evaluated by the AI Assistant (more <a href="#AIAssistant"><u>below</u></a> on how that happens), and the resulting visualization is displayed in the <b>Results</b> section of the Data Explorer. In addition to the visualization of the results, the appropriate <b>Data</b>, <b>Filter</b>, and <b>Compare</b> options are selected in the <b>Query</b> section above the visualization, allowing the user to further tune or refine the results if necessary. The <i>Keep current filters</i> toggle within the AI Assistant pane allows users to build on the previous question. For example, with that toggle active, a user could ask “Traffic in the United States”, see the resultant graph, and then ask “Compare it with traffic in Mexico” to add Mexico’s data to the graph.</p>
    <div>
      <h2>Building a query directly</h2>
      <a href="#building-a-query-directly">
        
      </a>
    </div>
    <p>For users that prefer a more hands-on approach, a wide variety of Radar datasets are available to explore, including traffic metrics, attacks, Internet quality, email security, and more. Once the user selects a dataset, the <i>Breakdown By:</i> dropdown is automatically populated with relevant options (if any), and <b>Filter</b> options are also dynamically populated. As the user selects additional options, the visualization in the <b>Result</b> section is automatically updated.</p><p>In addition to building the query of interest, Data Explorer also enables the user to compare the results, both against a specific date range and/or another location or <a href="https://www.cloudflare.com/en-gb/learning/network-layer/what-is-an-autonomous-system/"><u>autonomous system (AS)</u></a>. To compare results with the immediately previous period (the last seven days with the seven days before that, for instance), just toggle on the <i>Previous period</i> switch. Otherwise, clicking on the <i>Date Range</i> field brings up a calendar that enables the user to select a starting date — the corresponding date range is intelligently selected, based on the date range selected in the <b>Filter</b> section. To compare results across locations or ASNs, clicking on the “Location or ASN” field brings up a search box in which the user can enter a location (country/region) name, AS name, or AS number, with search results updating as the user types. Note that locations can be compared with other locations or ASes, and ASes can be compared with other ASes or locations. This enables a user, for example, to compare trends for their ISP with trends for their country.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1R9F5Cxe8gkJCUHzLitNH3/87225186868c22f4a3b17a19c1bddd8c/image7.png" />
            
            </figure>
    <div>
      <h2>Visualizing the results</h2>
      <a href="#visualizing-the-results">
        
      </a>
    </div>
    <p>Much of the value of Cloudflare Radar comes from its visualizations – the graphs, maps, and tables that illustrate the underlying data, and Data Explorer does not disappoint here. Depending on the dataset and filters selected, and the volume of data returned, results may be visualized in a time series graph, bar chart, <a href="https://en.wikipedia.org/wiki/Treemapping"><u>treemap</u></a>, or global <a href="https://en.wikipedia.org/wiki/Choropleth_map"><u>choropleth map</u></a>. The visualization type is determined automatically based on the contents of the API response. For example, the presence of countryalpha2 keys in the response means a choropleth map will be used, the presence of timestamps in the response means a line graph (“xychart”) should be shown, and more than 40 items in the response selects a treemap as the visualization type.</p><p>To illustrate the extended visualizations available in Data Explorer, the figure below is an expanded version of one that would normally be found on <a href="https://radar.cloudflare.com/adoption-and-usage/us#http-1-x-vs-http-2-vs-http-3"><u>Radar’s </u><b><u>Adoption &amp; Usage</u></b><u> page</u></a>. The “standard” version of the graph plots the shares of the HTTP versions over the last seven days for the United States, as well as the summary share values. In this <a href="https://radar.cloudflare.com/explorer?dataSet=http&amp;groupBy=http_version&amp;loc=US&amp;filters=botClass%253DLikely_Human%252CdeviceType%253DMobile&amp;dt=7d&amp;timeCompare=1&amp;compareWith=701"><u>extended version of the graph generated in the Data Explorer</u></a>, we compare data for the United States with HTTP version share data for <a href="https://radar.cloudflare.com/as701"><u>AS701 (Verizon)</u></a>, for both the past seven days and the previous seven-day period. In addition to the comparisons plotted on the time series graph, the associated summary values are also compared in an accompanying bar chart. This comprehensive visualization makes comparisons easy.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Euh3n9A79zjXN05GQsTu0/e53fcfc5630beba215babd237875c610/image2.png" />
          </figure><p>For some combinations of datasets/filters/comparisons, time series graphs can get quite busy, with a significant number of lines being plotted. To isolate just a single line on the graph, double-click on the item in the legend. To add/remove additional lines back to/from the graph, single-click on the relevant legend item.</p><p>Similar to other visualizations on Radar, the resulting graphs or maps can be downloaded, copied, or embedded into another website or application. Simply click on the “Share” button above the visualization card to bring up the <b>Share</b> modal dialog. We hope to see these graphs shared in articles, blog posts, and presentations, and to see embedded visualizations with real-time data in your portals and operations centers!</p>
    <div>
      <h2>Still want to use the API? No problem.</h2>
      <a href="#still-want-to-use-the-api-no-problem">
        
      </a>
    </div>
    <p>Although Data Explorer was designed to simplify the process of building, and viewing the results of, more complex API queries, we recognize that some users may still want to retrieve data directly from the API. To enable that, Data Explorer’s <b>API</b> section provides copyable API calls as a direct request URL and a <a href="https://curl.se"><u>cURL</u></a> command. The raw data returned by the query is also available to copy or download as a JSON blob, for those users that want to save it locally, or paste it into another application for additional manipulation or analysis.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1W3Zqrpfdtb0BgTnyV0bhu/e65e49260a67d0460b3e6e5d41fb7ae7/image6.png" />
          </figure><h2>How we built the AI Assistant</h2><p>Knowing all that AI is capable of these days, we thought that creating a system for an <a href="https://www.cloudflare.com/en-gb/learning/ai/what-is-large-language-model/"><u>LLM</u></a> to answer questions didn’t seem like an overly complex task. While there were some challenges, Cloudflare’s developer platform tools thankfully made it fairly straightforward. </p>
    <div>
      <h3>LLM-assisted API querying</h3>
      <a href="#llm-assisted-api-querying">
        
      </a>
    </div>
    <p>The main challenge we encountered in building the API Assistant was the large number of combinations of datasets and parameters that can potentially be visualized in the Data Explorer. There are around 100 <a href="https://developers.cloudflare.com/radar/"><u>API endpoints</u></a> from which the data can be fetched, with most able to take multiple parameters.</p><p>There were a few potential approaches to getting started. One was to take a previously trained LLM and further train it with the API endpoint descriptions in order to have it return the output in the required structured format which would then be used to execute the API query. However, for the first version, we decided against this approach of <a href="https://developers.cloudflare.com/workers-ai/fine-tunes/"><u>fine-tuning</u></a>, as we wanted to quickly test a few different models supported by <a href="https://developers.cloudflare.com/workers-ai/"><u>Workers AI</u></a>, and we wanted the flexibility to easily add or remove parameter combinations, as Data Explorer development was still under way. As such, we decided to start with prompt engineering, where all the endpoint-specific information is placed in the instructions sent to the LLM.</p><p>Putting the full detailed description of the API endpoints supported by the Data Explorer into the system prompt would be possible for an LLM with a larger context window (the number of tokens the model takes as input before generating output). Newer models are getting better with the <a href="https://github.com/gkamradt/LLMTest_NeedleInAHaystack"><u>needle in a haystack problem</u></a>, which refers to the issue whereby LLMs do not retrieve information (the needle) equally well if it is placed in different positions within the long textual input (the haystack). However, <a href="https://cs.stanford.edu/~nfliu/papers/lost-in-the-middle.arxiv2023.pdf"><u>it has been empirically shown</u></a> that the position of information within the large context still matters. Additionally, many of the Radar API endpoints have quite similar descriptions, and putting all the descriptions in a single instruction could be more confusing for the model, and the processing time also increases with larger contexts. Based on this, we adopted the approach of having multiple inference calls to an LLM.</p><p>First, when the user enters a question, a <a href="https://workers.cloudflare.com/"><u>Worker</u></a> sends this question and a short general description of the available datasets to the LLM, asking it to determine the topic of the question. Then, based on the topic returned by the model, a system prompt is generated with the endpoint descriptions, including only those related to the topic. This prompt, along with the original question, is sent to the LLM asking it to select the appropriate endpoint and its specific parameters. At the same time, two parallel inference calls to the model are also made, one with the question and the system prompt related to the description of location parameters, and another with the description of time range parameters. Then, all three model outputs are put together and validated.</p><p>If the final output is a valid dataset and parameter combination, it is sent back to the Data Explorer, which executes the API query and displays the resulting visualization for the user. Different LLMs were tested for this task, and at the end, <a href="https://developers.cloudflare.com/workers-ai/models/openhermes-2.5-mistral-7b-awq/"><u>openhermes-2.5-mistral-7b</u></a>, trained on code datasets, was selected as the best option. To give the model more context, not only is the user’s current question sent to the model, but the previous one and its response are as well, in case the next question asked by the user is related to the previous one. In addition, calls to the model are sent through Cloudflare’s <a href="https://developers.cloudflare.com/ai-gateway/"><u>AI Gateway</u></a>, to allow for caching, rate limiting, and logging.</p><p>After the user is shown the result, they can indicate whether what was shown to them was useful or not by clicking the “thumbs up” or “thumbs down” icons in the response. This rating information is saved with the original question in <a href="https://developers.cloudflare.com/d1/"><u>D1</u></a>, our <a href="https://www.cloudflare.com/developer-platform/products/d1/">serverless SQL database</a>, so the results can be analyzed and applied to future AI Assistant improvements.</p><p>The full end-to-end data flow for the Cloudflare Radar AI Assistant is illustrated in the diagram below.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1EMv28isng00dvxUwmVKWE/958791d319985a3441cbce7234fa1588/image1.png" />
          </figure>
    <div>
      <h3>When the LLM doesn’t know the answer</h3>
      <a href="#when-the-llm-doesnt-know-the-answer">
        
      </a>
    </div>
    <p>In some cases, however, the LLM may not “know” the answer to the question posed by the user. If the model does not generate a valid final response, then the user is shown three alternative questions. The intent here is to guide the user into asking an answerable question — that is, a question that is answerable with data from Radar.</p><p>This is achieved using a previously compiled (static) list of various questions related to different Radar datasets. For each of these questions, their <a href="https://www.cloudflare.com/en-gb/learning/ai/what-are-embeddings/"><u>embedding</u></a> is calculated using an <a href="https://developers.cloudflare.com/workers-ai/models/bge-small-en-v1.5"><u>embeddings model</u></a>, and stored in our <a href="https://developers.cloudflare.com/vectorize/"><u>Vectorize</u></a> <a href="https://www.cloudflare.com/en-gb/learning/ai/what-is-vector-database/"><u>vector database</u></a>. “Embeddings” are  numerical representations of textual data (vectors) capturing their semantic meaning and relationships, with similar text having vectors that are closer. When a user’s question does not generate a valid model response, the embedding of that question is calculated, and its vector is compared against all the stored vectors from the vector database, and the three most similar ones are selected. These three questions, determined to be similar to the user's original question, are then shown to the user.</p><p>There are also cases when the LLM gives answers which do not correspond to what the user asked, as hallucinations <a href="https://arxiv.org/pdf/2401.11817"><u>are currently inevitable</u></a> in LLMs, or when time durations are calculated inaccurately, as LLMs sometimes struggle with mathematical calculations. To help guard against this, AI Assistant responses are first validated against the API schema to confirm that the dataset and the parameter combination is valid. Additionally, Data Explorer dropdown options are automatically populated based on the AI Assistant’s response, and the chart titles are also automatically generated, so the user always knows exactly what data is shown in the visualization, even if it might not answer their actual question. </p>
    <div>
      <h2>Looking ahead</h2>
      <a href="#looking-ahead">
        
      </a>
    </div>
    <p>We’re excited to enable more granular access to the rich datasets that currently power Cloudflare Radar. As we add new datasets in the future, such as DNS metrics, these will be available through Data Explorer and AI Assistant as well.</p><p>As noted above, Radar offers a predefined set of visualizations, and these serve as an excellent starting point for further exploration. We are adding links from each Radar visualization into Data Explorer, enabling users to further analyze the associated data to answer more specific questions. Clicking the “pie chart” icon next to a graph’s description brings up a Data Explorer page with the relevant metrics, options, and filters selected.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3O1sG7QnjASEX81lu6ooBy/d81664234dfc8024121eedba75aaef6d/image5.png" />
          </figure><p>Correlating observations across two different metrics is another capability that we are also working on adding to Data Explorer. For example, if you are investigating an Internet disruption, you will be able to plot traffic trends and announced IP address space for a given country or autonomous system on the same graph to determine if both dropped concurrently.</p><p>But for now, use the Data Explorer and AI Assistant to go beyond what Cloudflare Radar offers, finding answers to your questions about what’s happening on the Internet.  If you share Data Explorer visualizations on social media, be sure to tag us: <a href="https://x.com/CloudflareRadar"><u>@CloudflareRadar</u></a> (X), <a href="https://noc.social/@cloudflareradar"><u>noc.social/@cloudflareradar</u></a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com"><u>radar.cloudflare.com</u></a> (Bluesky). You can also reach out on social media, or contact us via email, with suggestions for future Data Explorer and AI Assistant functionality.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6LCKQEfkvBhOQFugqOGhy2/239db21c6fc18a830b8643171534372f/image4.png" />
          </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Internet Quality]]></category>
            <category><![CDATA[Attacks]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Insights]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">4R2kUv9mZSgnAXmKOKTbLz</guid>
            <dc:creator>David Belson</dc:creator>
            <dc:creator>Sabina Zejnilovic</dc:creator>
        </item>
        <item>
            <title><![CDATA[Application Security report: 2024 update]]></title>
            <link>https://blog.cloudflare.com/application-security-report-2024-update/</link>
            <pubDate>Thu, 11 Jul 2024 17:00:00 GMT</pubDate>
            <description><![CDATA[ Cloudflare’s updated 2024 view on Internet cyber security trends spanning global traffic insights, bot traffic insights, API traffic insights, and client-side risks ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/QISWKhi85GFq3Aqcj9NSX/a983a69c4df14e83712ecc0beb71117a/AD_4nXftYZ9tWp6nRYAEltNHH2LVZZDWKRMZn4Y8oTwdLKuFY-wcPHiULhXzJouGXdjVVDpCeR9T63J_cCxqSzKoq4QsgeXVxQ7MmkL5GS0muw5jhWFRr1fhfpVoH314" />
            
            </figure><p>Over the last twelve months, the Internet security landscape has changed dramatically. Geopolitical uncertainty, coupled with an active 2024 voting season in many countries across the world, has led to a substantial increase in malicious traffic activity across the Internet. In this report, we take a look at Cloudflare’s perspective on Internet application security.</p><p>This report is the fourth edition of our Application Security Report and is an official update to our <a href="/application-security-report-q2-2023">Q2 2023 report</a>. New in this report is a section focused on client-side security within the context of web applications.</p><p>Throughout the report we discuss various insights. From a global standpoint, mitigated traffic across the whole network now averages 7%, and WAF and Bot mitigations are the source of over half of that. While DDoS attacks remain the number one attack vector used against web applications, targeted CVE attacks are also worth keeping an eye on, as we have seen exploits as fast as 22 minutes after a proof of concept was released.</p><p>Focusing on bots, about a third of all traffic we observe is automated, and of that, the vast majority (93%) is not generated by bots in Cloudflare’s verified list and is potentially malicious.</p><p>API traffic is also still growing, now accounting for 60% of all traffic, and maybe more concerning, is that organizations have up to a quarter of their API endpoints not accounted for.</p><p>We also touch on client side security and the proliferation of third-party integrations in web applications. On average, enterprise sites integrate 47 third-party endpoints according to Page Shield data.</p><p>It is also worth mentioning that since the last report, our network, from which we gather the data and insights, is bigger and faster: we are now processing an average of 57 million HTTP requests/second (<b>+23.9%</b> YoY) and 77 million at peak (<b>+22.2%</b> YoY). From a DNS perspective, we are handling 35 million DNS queries per second (<b>+40%</b> YoY). This is the sum of authoritative and resolver requests served by our infrastructure.</p><p>Maybe even more noteworthy, is that, focusing on HTTP requests only, in Q1 2024 Cloudflare blocked an average of 209 billion cyber threats each day (<b>+86.6%</b> YoY). That is a substantial increase in relative terms compared to the same time last year.</p><p>As usual, before we dive in, we need to define our terms.</p>
    <div>
      <h2>Definitions</h2>
      <a href="#definitions">
        
      </a>
    </div>
    <p>Throughout this report, we will refer to the following terms:</p><ul><li><p><b>Mitigated traffic:</b> any eyeball HTTP* request that had a “terminating” action applied to it by the Cloudflare platform. These include the following actions: <code>BLOCK</code>, <a href="https://developers.cloudflare.com/fundamentals/get-started/concepts/cloudflare-challenges/#legacy-captcha-challenge"><code>CHALLENGE</code></a>, <a href="https://developers.cloudflare.com/fundamentals/get-started/concepts/cloudflare-challenges/#js-challenge"><code>JS_CHALLENGE</code></a> and <a href="https://developers.cloudflare.com/fundamentals/get-started/concepts/cloudflare-challenges/#managed-challenge-recommended"><code>MANAGED_CHALLENGE</code></a>. This does not include requests that had the following actions applied: <code>LOG</code>, <code>SKIP</code>, <code>ALLOW</code>. They also accounted for a relatively small percentage of requests. Additionally, we improved our calculation regarding the <code>CHALLENGE</code> type actions to ensure that only unsolved challenges are counted as mitigated. A detailed <a href="https://developers.cloudflare.com/ruleset-engine/rules-language/actions/">description of actions</a> can be found in our developer documentation. This has not changed from last year’s report.</p></li><li><p><b>Bot traffic/automated traffic</b>: any HTTP* request identified by Cloudflare’s <a href="https://www.cloudflare.com/products/bot-management/">Bot Management</a> system as being generated by a bot. This includes requests with a <a href="https://developers.cloudflare.com/bots/concepts/bot-score/">bot score</a> between <a href="https://developers.cloudflare.com/bots/concepts/bot-score/">1 and 29</a> inclusive. This has not changed from last year’s report.</p></li><li><p><b>API traffic</b>: any HTTP* request with a response content type of XML or JSON. Where the response content type is not available, such as for mitigated requests, the equivalent Accept content type (specified by the user agent) is used instead. In this latter case, API traffic won’t be fully accounted for, but it still provides a good representation for the purposes of gaining insights. This has not changed from last year’s report.</p></li></ul><p>Unless otherwise stated, the time frame evaluated in this post is the period from April 1, 2023, through March 31, 2024, inclusive.</p><p>Finally, please note that the data is calculated based only on traffic observed across the Cloudflare network and does not necessarily represent overall HTTP traffic patterns across the Internet.</p><p><sup>*When referring to HTTP traffic we mean both HTTP and HTTPS.</sup></p>
    <div>
      <h2>Global traffic insights</h2>
      <a href="#global-traffic-insights">
        
      </a>
    </div>
    
    <div>
      <h3>Average mitigated daily traffic increases to nearly 7%</h3>
      <a href="#average-mitigated-daily-traffic-increases-to-nearly-7">
        
      </a>
    </div>
    <p>Compared to the prior 12-month period, Cloudflare mitigated a higher percentage of application layer traffic and layer 7 (L7) DDoS attacks between Q2 2023 and Q1 2024, growing from 6% to 6.8%.</p><p><b>Figure 1:</b> Percent of mitigated HTTP traffic increasing over the last 12 months</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5HrbJsLZMv12tBdVLAJEwk/56519fe3c06a1996324ba7a0e710fe5e/unnamed-6.png" />
            
            </figure><p>During large global attack events, we can observe spikes of mitigated traffic approaching 12% of all HTTP traffic. These are much larger spikes than we have ever observed across our entire network.</p>
    <div>
      <h3>WAF and Bot mitigations accounted for 53.9% of all mitigated traffic</h3>
      <a href="#waf-and-bot-mitigations-accounted-for-53-9-of-all-mitigated-traffic">
        
      </a>
    </div>
    <p>As the Cloudflare platform continues to expose additional signals to identify potentially malicious traffic, customers have been actively using these signals in WAF Custom Rules to improve their security posture. Example signals include our <a href="https://developers.cloudflare.com/waf/about/waf-attack-score/">WAF Attack Score</a>, which identifies malicious payloads, and our <a href="https://developers.cloudflare.com/bots/concepts/bot-score/">Bot Score</a>, which identifies automated traffic.</p><p>After WAF and Bot mitigations, HTTP DDoS rules are the second-largest contributor to mitigated traffic. IP reputation, that uses our <a href="https://developers.cloudflare.com/waf/tools/security-level/">IP threat score</a> to block traffic, and access rules, which are simply IP and country blocks, follow in third and fourth place.</p><p><b>Figure 2: Mitigated traffic by Cloudflare product group</b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/l9emHl05MUfrpqsLehyMr/51e8d8d327a5d78d90126de82bebcc38/unnamed--5--3.png" />
            
            </figure>
    <div>
      <h3>CVEs exploited as fast as 22 minutes after proof-of-concept published</h3>
      <a href="#cves-exploited-as-fast-as-22-minutes-after-proof-of-concept-published">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/security/threats/zero-day-exploit/">Zero-day exploits</a> (also called zero-day threats) are increasing, as is the speed of weaponization of disclosed CVEs. In 2023, 97 zero-days were <a href="https://cloud.google.com/blog/topics/threat-intelligence/2023-zero-day-trends">exploited in the wild</a>, and that’s along with a 15% increase of disclosed <a href="https://www.cve.org/About/Overview">CVEs</a> between 2022 and 2023.</p><p>Looking at CVE exploitation attempts against customers, Cloudflare mostly observed scanning activity, followed by command injections, and some exploitation attempts of vulnerabilities that had PoCs available online, including Apache <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50164">CVE-2023-50164</a> and <a href="https://nvd.nist.gov/vuln/detail/cve-2022-33891">CVE-2022-33891</a>, Coldfusion <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-29298">CVE-2023-29298</a> <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-38203">CVE-2023-38203</a> and <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26360">CVE-2023-26360</a>, and MobileIron <a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35082">CVE-2023-35082</a>.</p><p>This trend in CVE exploitation attempt activity indicates that attackers are going for the easiest targets first, and likely having success in some instances given the continued activity around old vulnerabilities.</p><p>As just one example, Cloudflare observed exploitation attempts of <a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27198">CVE-2024-27198</a> (JetBrains TeamCity authentication bypass) at 19:45 UTC on March 4, just 22 minutes after proof-of-concept code was published.</p><p><b>Figure 3:</b> JetBrains TeamCity authentication bypass timeline</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2193b87OL8QLpaE3hxF7RP/06b61f3bdcac2d4ce8364a4b408e35f4/image8-2.png" />
            
            </figure><p>The speed of exploitation of disclosed CVEs is often quicker than the speed at which humans can create WAF rules or create and deploy patches to mitigate attacks. This also applies to our own internal security analyst team that maintains the WAF Managed Ruleset, which has led us to <a href="/detecting-zero-days-before-zero-day">combine the human written signatures with an ML-based approach</a> to achieve the best balance between low false positives and speed of response.</p><p>CVE exploitation campaigns from specific threat actors are clearly visible when we focus on a subset of CVE categories. For example, if we filter on CVEs that result in remote code execution (RCE), we see clear attempts to exploit Apache and Adobe installations towards the end of 2023 and start of 2024 along with a notable campaign targeting Citrix in May of this year.</p><p><b>Figure 4:</b> Worldwide daily number of requests for Code Execution CVEs</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5A2f3Shrcp7rw6zmE9VoNa/90dd0ab1a3e9a80dddfc3c893bebb283/unnamed--1--4.png" />
            
            </figure><p>Similar views become clearly visible when focusing on other CVEs or specific attack categories.</p>
    <div>
      <h3>DDoS attacks remain the most common attack against web applications</h3>
      <a href="#ddos-attacks-remain-the-most-common-attack-against-web-applications">
        
      </a>
    </div>
    <p>DDoS attacks remain the most common attack type against web applications, with DDoS comprising 37.1% of all mitigated application traffic over the time period considered.</p><p><b>Figure 5:</b> Volume of HTTP DDoS attacks over time</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3578XXGADnTHyYT6Kdf6ez/19dc83ad5c2b4989d0542f39fb755fa5/unnamed--6--3.png" />
            
            </figure><p>We saw a large increase in volumetric attacks in February and March 2024. This was partly the result of improved detections deployed by our teams, in addition to increased attack activity. In the first quarter of 2024 alone, Cloudflare’s automated defenses mitigated 4.5 million unique DDoS attacks, an amount equivalent to 32% of all the DDoS attacks Cloudflare mitigated in 2023. Specifically, application layer HTTP DDoS attacks increased by 93% YoY and 51% quarter-over-quarter (QoQ).</p><p>Cloudflare correlates DDoS attack traffic and defines unique attacks by looking at event start and end times along with target destination.</p><p>Motives for launching DDoS attacks range from targeting specific organizations for financial gains (ransom), to testing the capacity of botnets, to targeting institutions and countries for political reasons. As an example, Cloudflare observed a 466% increase in DDoS attacks on Sweden after its acceptance to the NATO alliance on March 7, 2024. This mirrored the DDoS pattern observed during Finland’s NATO acceptance in 2023. The size of DDoS attacks themselves are also increasing.</p><p>In August 2023, Cloudflare mitigated a hyper-volumetric <a href="/zero-day-rapid-reset-http2-record-breaking-ddos-attack">HTTP/2 Rapid Reset</a> DDoS attack that peaked at 201 million requests per second (rps) – three times larger than any previously observed attack. In the attack, threat actors exploited a zero-day vulnerability in the HTTP/2 protocol that had the potential to incapacitate nearly any server or application supporting HTTP/2. This underscores how menacing DDoS vulnerabilities are for unprotected organizations.</p><p>Gaming and gambling became the most targeted sector by DDoS attacks, followed by Internet technology companies and cryptomining.</p><p><b>Figure 6:</b> Largest HTTP DDoS attacks as seen by Cloudflare, by year</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1FYxByBvHz2MQQ8WhKErWk/a7f757447c04820ea5a642838b3e5e10/image1.jpg" />
            
            </figure>
    <div>
      <h2>Bot traffic insights</h2>
      <a href="#bot-traffic-insights">
        
      </a>
    </div>
    <p>Cloudflare has continued to invest heavily in our bot detection systems. In early July, we declared <a href="/declaring-your-aindependence-block-ai-bots-scrapers-and-crawlers-with-a-single-click">AIndependence</a> to help preserve a safe Internet for content creators, offering a brand new “easy button” to <a href="https://www.cloudflare.com/learning/ai/how-to-block-ai-crawlers/">block all AI bots</a>. It’s available for all customers, including those on our free tier.</p><p>Major progress has also been made in other complementary systems such as our Turnstile offering, a user-friendly, privacy-preserving alternative to CAPTCHA.</p><p>All these systems and technologies help us better identify and differentiate human traffic from automated bot traffic.</p>
    <div>
      <h3>On average, bots comprise one-third of all application traffic</h3>
      <a href="#on-average-bots-comprise-one-third-of-all-application-traffic">
        
      </a>
    </div>
    <p>31.2% of all application traffic processed by Cloudflare is bot traffic. This percentage has stayed relatively consistent (hovering at about 30%) over the past three years.</p><p>The term bot traffic may carry a negative connotation, but in reality bot traffic is not necessarily good or bad; it all depends on the purpose of the bots. Some are “good” and perform a needed service, such as customer service chatbots and authorized search engine crawlers. But some bots misuse an online product or service and need to be blocked.</p><p>Different application owners may have different criteria for what they deem a “bad” bot. For example, some organizations may want to <a href="https://www.cloudflare.com/learning/ai/how-to-prevent-web-scraping/">block a content scraping bot</a> that is being deployed by a competitor to undercut on prices, whereas an organization that does not sell products or services may not be as concerned with content scraping. Known, good bots are classified by Cloudflare as “verified bots.”</p>
    <div>
      <h3>93% of bots we identified were unverified bots, and potentially malicious</h3>
      <a href="#93-of-bots-we-identified-were-unverified-bots-and-potentially-malicious">
        
      </a>
    </div>
    <p>Unverified bots are often created for disruptive and harmful purposes, such as hoarding inventory, launching DDoS attacks, or attempting to take over an account via brute force or credential stuffing. Verified bots are those that are known to be safe, such as search engine crawlers, and Cloudflare aims to verify all major legitimate bot operators. <a href="https://radar.cloudflare.com/traffic/verified-bots">A list of all verified bots</a> can be found in our documentation.</p><p>Attackers leveraging bots focus most on industries that could bring them large financial gains. For example, consumer goods websites are often the target of inventory hoarding, price scraping run by competition or automated applications aimed at exploiting some sort of arbitrage (for example, sneaker bots). This type of abuse can have a significant financial impact on the target organization.</p><p><b>Figure 8:</b> Industries with the highest median daily share of bot traffic</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/XIeyHN59gsaqxq0OQvCKV/4e23e2b081263ae09c6ca3de6aac2cdd/unnamed--7--3.png" />
            
            </figure>
    <div>
      <h2>API traffic insights</h2>
      <a href="#api-traffic-insights">
        
      </a>
    </div>
    <p>Consumers and end users expect dynamic web and mobile experiences powered by APIs. For businesses, APIs fuel competitive advantages, greater business intelligence, faster cloud deployments, integration of new AI capabilities, and more.</p><p>However, APIs introduce new risks by providing outside parties additional attack surfaces with which to access applications and databases which also need to be secured. As a consequence, numerous attacks we observe are now targeting API endpoints first rather than the traditional web interfaces.</p><p>The additional security concerns are of course not slowing down adoption of API first applications.</p>
    <div>
      <h3>60% of dynamic (non cacheable) traffic is API-related</h3>
      <a href="#60-of-dynamic-non-cacheable-traffic-is-api-related">
        
      </a>
    </div>
    <p>This is a two percentage point increase compared to last year’s report. Of this 60%, about 4% on average is mitigated by our security systems.</p><p><b>Figure 9</b>: Share of mitigated API traffic</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/YmPWYVWpG250GqjO2noHu/63582e53d5f43cda2068385ea9713976/unnamed--3--3.png" />
            
            </figure><p>A substantial spike is visible around January 11-17 that accounts for almost a 10% increase in traffic share alone for that period. This was due to a specific customer zone receiving attack traffic that was mitigated by a WAF Custom Rule.</p><p>Digging into mitigation sources for API traffic, we see the WAF being the largest contributor, as standard malicious payloads are commonly applicable to both API endpoints and standard web applications.</p><p><b>Figure 10:</b> API mitigated traffic broken down by product group</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/76D0iSJOzvx4ArJYIXIfLI/a4bf06a320cc8e9cc03b7da2ab6f35b3/unnamed--4--3.png" />
            
            </figure>
    <div>
      <h2>A quarter of APIs are “shadow APIs”</h2>
      <a href="#a-quarter-of-apis-are-shadow-apis">
        
      </a>
    </div>
    <p>You cannot protect what you cannot see. And, many organizations lack accurate API inventories, even when they believe they can correctly identify API traffic.</p><p>Using our proprietary machine learning model that scans not just known API calls, but all HTTP requests (identifying API traffic that may be going unaccounted for), we found that organizations had 33% more public-facing API endpoints than they knew about. This number was the median, and it was calculated by comparing the number of API endpoints detected through machine learning based discovery vs. customer-provided session identifiers.</p><p>This suggests that nearly a quarter of APIs are “shadow APIs” and may not be properly inventoried and secured.</p>
    <div>
      <h2>Client-side risks</h2>
      <a href="#client-side-risks">
        
      </a>
    </div>
    <p>Most organizations’ web apps rely on separate programs or pieces of code from third-party providers (usually coded in JavaScript). The use of third-party scripts accelerates modern web app development and allows organizations to ship features to market faster, without having to build all new app features in-house.</p><p>Using Cloudflare's client side security product, <a href="https://developers.cloudflare.com/page-shield/">Page Shield</a>, we can get a view on the popularity of third party libraries used on the Internet and the risk they pose to organizations. This has become very relevant recently due to the <a href="http://polyfill.io">Polyfill.io incident</a> that affected more than one hundred thousand sites.</p>
    <div>
      <h3>Enterprise applications use 47 third-party scripts on average</h3>
      <a href="#enterprise-applications-use-47-third-party-scripts-on-average">
        
      </a>
    </div>
    <p>Cloudflare’s typical enterprise customer uses an average of 47 third-party scripts, and a median of 20 third-party scripts. The average is much higher than the median due to SaaS providers, who often have thousands of subdomains which may all use third-party scripts. Here are some of the top third-party script providers Cloudflare customers commonly use:</p><ul><li><p>Google (Tag Manager, Analytics, Ads, Translate, reCAPTCHA, YouTube)</p></li><li><p>Meta (Facebook Pixel, Instagram)</p></li><li><p>Cloudflare (Web Analytics)</p></li><li><p>jsDelivr</p></li><li><p>New Relic</p></li><li><p>Appcues</p></li><li><p>Microsoft (Clarity, Bing, LinkedIn)</p></li><li><p>jQuery</p></li><li><p>WordPress (Web Analytics, hosted plugins)</p></li><li><p>Pinterest</p></li><li><p>UNPKG</p></li><li><p>TikTok</p></li><li><p>Hotjar</p></li></ul><p>While useful, third-party software dependencies are often loaded directly by the end-user’s browser (i.e. they are loaded client-side) placing organizations and their customers at risk given that organizations have no direct control over third-party security measures. For example, in the retail sector, 18% of all data breaches <a href="https://www.verizon.com/business/resources/reports/dbir/">originate from Magecart style attacks</a>, according to Verizon’s 2024 Data Breach Investigations Report.</p>
    <div>
      <h3>Enterprise applications connect to nearly 50 third-parties on average</h3>
      <a href="#enterprise-applications-connect-to-nearly-50-third-parties-on-average">
        
      </a>
    </div>
    <p>Loading a third-party script into your website poses risks, even more so when that script “calls home” to submit data to perform the intended function. A typical example here is Google Analytics: whenever a user performs an action, the Google Analytics script will submit data back to the Google servers. We identify these as connections.</p><p>On average, each enterprise website connects to 50 separate third-party destinations, with a median of 15. Each of these connections also poses a potential client-side security risk as attackers will often use them to exfiltrate additional data going unnoticed.</p><p>Here are some of the top third-party connections Cloudflare customers commonly use:</p><ul><li><p>Google (Analytics, Ads)</p></li><li><p>Microsoft (Clarity, Bing, LinkedIn)</p></li><li><p>Meta (Facebook Pixel)</p></li><li><p>Hotjar</p></li><li><p>Kaspersky</p></li><li><p>Sentry</p></li><li><p>Criteo</p></li><li><p>tawk.to</p></li><li><p>OneTrust</p></li><li><p>New Relic</p></li><li><p>PayPal</p></li></ul>
    <div>
      <h2>Looking forward</h2>
      <a href="#looking-forward">
        
      </a>
    </div>
    <p>This application security report is also <a href="https://www.cloudflare.com/2024-application-security-trends/">available in PDF format</a> with additional recommendations on how to address many of the concerns raised, along with additional insights.</p><p>We also publish many of our reports with dynamic charts on <a href="https://radar.cloudflare.com/reports">Cloudflare Radar</a>, making it an excellent resource to keep up to date with the state of the Internet.</p> ]]></content:encoded>
            <category><![CDATA[Application Security]]></category>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[Bot Management]]></category>
            <category><![CDATA[API]]></category>
            <guid isPermaLink="false">78VdVl96em2bFvHmZ4jeHj</guid>
            <dc:creator>Michael Tremante</dc:creator>
            <dc:creator>Sabina Zejnilovic</dc:creator>
            <dc:creator>Catherine Newcomb</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Cloudflare’s 2024 API security and management report]]></title>
            <link>https://blog.cloudflare.com/2024-api-security-report/</link>
            <pubDate>Tue, 09 Jan 2024 14:00:03 GMT</pubDate>
            <description><![CDATA[ Today, we’re releasing our 2024 API Security and Management Report. This blog introduces and is a supplement to the API Security and Management Report for 2024 where we detail exactly how we’re protecting our customers, and what it means for the future of API security ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2wnkskFDuLFCKg3bJKxdEA/dde70afb5d2340f7a3939f79686cc670/Artboard-1-1.png" />
            
            </figure><p>You may know Cloudflare as the company powering nearly 20% of the web. But powering and protecting websites and static content is only a fraction of what we do. In fact, well over half of the dynamic traffic on our network consists not of web pages, but of Application Programming Interface (API) traffic — the plumbing that makes technology work. This blog introduces and is a supplement to the <a href="https://www.cloudflare.com/lp/api-security-report/">API Security Report for 2024</a> where we detail exactly how we’re protecting our customers, and what it means for the future of API security. Unlike other industry API reports, our report isn’t based on user surveys — but instead, based on real traffic data.</p><p>If there’s only one thing you take away from our report this year, it’s this: many organizations lack accurate API inventories, <i>even when they believe they can correctly identify API traffic</i>. Cloudflare helps organizations discover all of their public-facing APIs using <a href="/ml-api-discovery-and-schema-learning/">two approaches</a>. First, customers configure our API discovery tool to monitor for identifying tokens present in their known API traffic. We then use a machine learning model that scans not just these known API calls, but <i>all</i> HTTP requests, identifying API traffic that may be going unaccounted for. The difference between these approaches is striking: <b>we found 30.7% more API endpoints through machine learning-based discovery</b> than the self-reported approach, suggesting that nearly a third of APIs are “<a href="https://www.cloudflare.com/learning/security/api/what-is-shadow-api/">Shadow APIs</a>” — and may not be properly inventoried and secured.</p><p>Read on for extras and highlights from our inaugural API security report. In the <a href="https://www.cloudflare.com/2024-api-security-management-report/">full report</a>, you’ll find updated statistics about the threats we see and prevent, along with our predictions for 2024. We predict that a lack of API security focus at organizations will lead to increased complexity and loss of control, and increased access to generative AI will lead to more API risk. We also anticipate an increase in API business logic attacks in 2024. Lastly, all of the above risks will necessitate growing governance around API security.</p>
    <div>
      <h3>Hidden attack surfaces</h3>
      <a href="#hidden-attack-surfaces">
        
      </a>
    </div>
    <p>How are web pages and APIs different? APIs are a quick and easy way for applications to retrieve data in the background, or ask that work be done from other applications. For example, anyone can write a weather app without being a meteorologist: a developer can write the structure of the page or mobile application and ask a weather API for the forecast using the user’s location. Critically, most end users don’t know that the data was provided by the weather API and not the app’s owner.</p><p>While APIs are the critical plumbing of the Internet, they're also ripe for abuse. For example, flaws in API authentication and authorization at Optus <a href="https://www.bleepingcomputer.com/news/security/optus-hacker-apologizes-and-allegedly-deletes-all-stolen-data/">led to a threat actor offering</a> 10 million user records for sale, and government agencies have <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-208a">warned about</a> these exact API attacks. Developers in an organization will often create Internet-facing APIs, used by their own applications to function more efficiently, but it's on the security team to protect these new public interfaces. If the process of documenting APIs and bringing them to the attention of the security team isn't clear, they become Shadow APIs — operating in production but without the organization's knowledge. This is where the <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">security challenge</a> begins to emerge.</p><p>To help customers solve this problem, we shipped <a href="https://developers.cloudflare.com/api-shield/security/api-discovery/">API Discovery</a>. When we <a href="/ml-api-discovery-and-schema-learning/">introduced</a> our latest release, we mentioned how few organizations have accurate API inventories. Security teams sometimes are forced to adopt an “email and ask” approach to build an inventory, and in doing so responses are immediately stale upon the next application release when APIs change. Better is to track API changes by code base changes, keeping up with new releases. However, this still has a drawback of only inventorying actively maintained code. Legacy applications may not see new releases, despite receiving production traffic.</p><p>Cloudflare's approach to API management involves creating a comprehensive, accurate API inventory using a blend of machine learning-based API discovery and network traffic inspection. This is integral to our <a href="https://www.cloudflare.com/application-services/products/api-gateway/">API Gateway</a> product, where customers can manage their Internet-facing endpoints and monitor API health. The API Gateway also allows customers to identify their API traffic using session identifiers (typically a header or cookie), which aids in specifically identifying API traffic for the discovery process.</p><p>As noted earlier, our analysis reveals that even knowledgeable customers often overlook significant portions of their API traffic. By comparing session-based API discovery (using API sessions to pinpoint traffic) with our machine learning-based API discovery (analyzing <i>all</i> incoming traffic), we found that the latter uncovers on average 30.7% more endpoints! Without broad traffic analysis, you may be missing almost a third of your API inventory.</p><p>If you aren’t a Cloudflare customer, you can still get started building an API inventory. APIs are typically cataloged in a standardized format called <a href="https://spec.openapis.org/oas/latest.html">OpenAPI</a>, and many development tools can build OpenAPI formatted schema files. If you have a file with that format, you can start to build an API inventory yourself by collecting these schemas. Here is an example of how you can pull the endpoints out of a schema file, assuming your have an OpenAPI v3 formatted file named <code>my_schema.json</code>:</p>
            <pre><code>import json
import csv
from io import StringIO

# Load the OpenAPI schema from a file
with open("my_schema.json", "r") as file:
    schema = json.load(file)

# Prepare CSV output
output = StringIO()
writer = csv.writer(output)

# Write CSV header
writer.writerow(["Server", "Path", "Method"])

# Extract and write data to CSV
servers = schema.get("servers", [])
for server in servers:
    url = server['url']
    for path, methods in schema['paths'].items():
        for method in methods.keys():
            writer.writerow([url, path, method])

# Get and print CSV string
csv_output = output.getvalue().strip()
print(csv_output)</code></pre>
            <p>Unless you have been generating OpenAPI schemas and tracking API inventory from the beginning of your application’s development process, you’re probably missing some endpoints across your production application API inventory.</p>
    <div>
      <h3>Precise rate limits minimize attack potential</h3>
      <a href="#precise-rate-limits-minimize-attack-potential">
        
      </a>
    </div>
    <p>When it comes to stopping abuse, most practitioners’ thoughts first come to <a href="https://www.cloudflare.com/learning/bots/what-is-rate-limiting/">rate limiting</a>. <b>Implementing limits on your API is a valuable tool to keep abuse in check and prevent accidental overload of the origin.</b> But how do you know if you’ve chosen the correct rate limiting approach? Approaches can vary, but they generally come down to the error code chosen, and the basis for the limit value itself.</p><p>For some APIs, practitioners configure rate limiting errors to respond with an HTTP 403 (forbidden), while others will respond with HTTP 429 (too many requests). Using HTTP 403 sounds innocent enough until you realize that other security tools are also responding with 403 codes. When you’re under attack, it can be hard to decipher which tools are responsible for which errors / blocking.</p><p>Alternatively, if you utilize HTTP 429 for your rate limits, attackers will instantly know that they’ve been rate limited and can “surf” right under the limit without being detected. This can be OK if you’re only limiting requests to ensure your back-end stays alive, but it can tip your cards to attackers. In addition, attackers can “scale out” to more API clients to effectively request above the rate limit.</p><p>There are pros and cons to both approaches, but we find that by far most APIs respond with HTTP 429 out of all the 4xx and 5xx error messages (almost 52%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6cJjGIFScYgWUrc7KizhvE/8cc248c65dde6736cd9f634e988ff73e/Untitled.png" />
            
            </figure><p>What about the logic of the rate limit rule itself, not just the response code? Implementing request limits on IP addresses can be tempting, but <b>we recommend you base the limit on a session ID as a best practice and only fall back to IP address (or IP + JA3 fingerprint) when session IDs aren’t available</b>. Setting rate limits on user sessions instead of IPs will reliably identify your real users and minimize false positives due to shared IP space. Cloudflare’s <a href="https://www.cloudflare.com/application-services/products/rate-limiting/">Advanced Rate Limiting</a> and API Gateway’s <a href="https://developers.cloudflare.com/api-shield/security/volumetric-abuse-detection/">volumetric abuse protection</a> make it easy to enforce these limits by profiling session traffic on each API endpoint and giving one-click solutions to set up the per-endpoint rate limits.</p><p>To find values for your rate limits, Cloudflare API Gateway computes session request statistics for you. We suggest a limit by looking at the distribution of requests per session across <i>all</i> sessions to your API as identified by the customer-configured API session identifier. We then <a href="https://developers.cloudflare.com/api-shield/security/volumetric-abuse-detection/#observe-rate-limits">compute statistical p-levels</a> — which describe the request rates for different cohorts of traffic — for p50, p90, and p99 on this distribution and use the variance of the distribution to come up with a recommended threshold for every single endpoint in your API inventory. The recommendation might not match the p-levels, which is an important distinction and a reason not to use p-levels alone. Along with the recommendation, API Gateway informs users of our confidence in the recommendation. Generally, the more API sessions we’re able to collect, the more confident we’ll be in the recommendation.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5b6UZSSACJxBUGIBkD7lBL/d9bdf32f1648685ec291f5c172e86d5a/Screenshot-2024-01-04-at-12.50.45-1.png" />
            
            </figure><p>Activating a rate limit is as easy as clicking the ‘create rule’ link, and API Gateway will automatically bring your session identifier over to the advanced rate limit rule creation page, ensuring your rules have pinpoint accuracy to defend against attacks and minimize false positives compared to traditional, overly broad limits.</p>
    <div>
      <h3>APIs are also victim to web application attacks</h3>
      <a href="#apis-are-also-victim-to-web-application-attacks">
        
      </a>
    </div>
    <p>APIs aren’t immune from normal OWASP Top 10 style attacks like <a href="https://www.cloudflare.com/learning/security/threats/sql-injection/">SQL injection</a>. The body of API requests can also find its way as a database input just like a web page form input or URL argument. It’s important to ensure that you have a <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">web application firewall (WAF)</a> also protecting your API traffic to defend against these styles of attacks.</p><p>In fact, when we looked at Cloudflare’s WAF managed rules, injection attacks were the second most common threat vector Cloudflare saw carried out on APIs. The most common threat was HTTP Anomaly. Examples of HTTP anomalies include malformed method names, null byte characters in headers, non-standard ports or content length of zero with a POST request. Here are the stats on the other top threats we saw against APIs:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4RAYOdH61ox07Ps1INKxO2/35e3eeed0b2981d15ac65b22e27ce692/Untitled--1---1-.png" />
            
            </figure><p>Absent from the chart is broken authentication and authorization. Broken authentication and authorization occur when an API fails to check whether the entity sending requests for information to an API actually has the permission to request that data or not. It can also happen when attacks try to forge credentials and insert less restricted permissions into their existing (valid) credentials that have more restricted permissions. OWASP categorizes these attacks in a few different ways, but the main categories are Broken Object Level Authorization (BOLA) and Broken Function Level Authorization (BFLA) attacks.</p><p>The root cause of a successful BOLA / BFLA attack lies in an origin API not checking proper ownership of database records against the identity requesting those records. Tracking these specific attacks can be difficult, as the permission structure may be simply absent, inadequate, or improperly implemented. Can you see the chicken-and-egg problem here? It would be easy to stop these attacks if we knew the proper permission structure, but if we or our customers knew the proper permission structure or could guarantee its enforcement, the attacks would be unsuccessful to begin with. Stay tuned for future API Gateway feature launches where we’ll use our knowledge of API traffic norms to automatically suggest security policies that highlight and stop BOLA / BFLA attacks.</p><p>Here are four ways to plug authentication loopholes that may exist for your APIs, even if you don’t have a fine-grained authorization policy available:</p><ol><li><p>First, enforce authentication on each publicly accessible API unless there's a business approved exception. Look to technologies like mTLS and JSON Web Tokens.</p></li><li><p>Limit the speed of API requests to your servers to slow down potential attackers.</p></li><li><p>Block abnormal volumes of sensitive data outflow.</p></li><li><p>Block attackers from skipping legitimate sequences of API requests.</p></li></ol>
    <div>
      <h3>APIs are surprisingly human driven, not machine driven anymore</h3>
      <a href="#apis-are-surprisingly-human-driven-not-machine-driven-anymore">
        
      </a>
    </div>
    <p>If you’ve been around technology since the pre-smartphone days when fewer people were habitually online, it can be tempting to think of APIs as only used for machine-to-machine communication in something like an overnight batch job process. However, the truth couldn’t be more different. As we’ve discussed, many web and mobile applications are powered by APIs, which facilitate everything from authentication to transactions to serving media files. As people use these applications, there is a corresponding increase in API traffic volume.</p><p>We can illustrate this by looking at the API traffic patterns observed during holidays, when people gather around friends and family and spend more time socializing in person and less time online. We’ve annotated the following Worldwide API traffic graph with common holidays and promotions. Notice how traffic peaks around Black Friday and Cyber Monday around the +10% level when people shop online, but then traffic drops off for the festivities of Christmas and New Years days.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7aETzYYdiYbkQws35HSDlK/e6212b57845bb2e2813d513e4de8c5a0/Untitled--2-.png" />
            
            </figure><p>This pattern <a href="/cyber-week-analyzing-internet-traffic-and-e-commerce-trends">closely resembles</a> what we observe in regular HTTP traffic. It’s clear that APIs are no longer just the realm of automated processes but are intricately linked with human behaviors and social trends.</p>
    <div>
      <h3>Recommendations</h3>
      <a href="#recommendations">
        
      </a>
    </div>
    <p>There is no silver bullet for holistic API security. For the best effect, Cloudflare recommends four strategies for increasing API security posture:</p><ol><li><p>Combine API application development, visibility, performance, and security with a unified control plane that can keep an up-to-date API inventory.</p></li><li><p>Use security tools that utilize machine learning technologies to free up human resources and reduce costs.</p></li><li><p>Adopt a positive security model for your APIs (see below for an explanation on positive and negative security models).</p></li><li><p>Measure and improve your organization’s API maturity level over time (also see below for an explanation of an API maturity level).</p></li></ol><p>What do we mean by a ‘positive’ or ‘negative’ security model? In a negative model, security tools look for known signs of attack and take action to stop those attacks. In a positive model, security tools look for known good requests and only let those through, blocking all else. APIs are often so structured that positive security models make sense for the highest levels of security. You can also combine security models, such as using a WAF in a negative model sense, and using API Schema Validation in a positive model sense.</p><p>Here’s a quick way to gauge your organization’s API security maturity level over time: Novice organizations will get started by assembling their first API inventory, no matter how incomplete. More mature organizations will strive for API inventory accuracy and automatic updates. The most mature organizations will actively enforce security checks in a positive security model on their APIs, enforcing API schema, valid authentication, and checking behavior for signs of abuse.</p>
    <div>
      <h3>Predictions</h3>
      <a href="#predictions">
        
      </a>
    </div>
    <p>In closing, our top four predictions for 2024 and beyond:</p><p><b>Increased loss of control and complexity:</b> we surveyed practitioners in the API Security and Management field and 73% responded that security requirements interfere with their productivity and innovation. Coupled with increasingly sprawling applications and inaccurate inventories, API risks and complexity will rise.</p><p><b>Easier access to AI leading to more API risks:</b> the rise in generative AI brings <a href="https://www.cloudflare.com/learning/ai/what-is-ai-security/">potential risks</a>, including AI models’ APIs being vulnerable to attack, but also developers shipping buggy, AI-written code. Forrester predicts that, in 2024, without <a href="https://www.cloudflare.com/ai-security/">proper guardrails</a>, “at least three data breaches will be publicly blamed on insecure AI-generated code – either due to security flaws in the generated code itself or vulnerabilities in AI-suggested dependencies.”</p><p><b>Increase in business logic-based fraud attacks:</b> professional fraudsters run their operations just like a business, and they have costs like any other. We anticipate attackers will run fraud bots efficiently against APIs even more than in previous years.</p><p><b>Growing governance:</b> The first version of <a href="https://www.cloudflare.com/learning/privacy/what-is-pci-dss-compliance/">PCI DSS</a> that directly addresses API security will go into effect in March 2024. Check your industry’s specific requirements with your audit department to be ready for requirements as they come into effect.</p><p>If you’re interested in the full report, you can download the 2024 API Security Report <a href="https://www.cloudflare.com/2024-api-security-management-report/">here</a>, which includes full detail on our recommendations.</p><p><i>Cloudflare API Gateway is our </i><a href="https://www.cloudflare.com/application-services/solutions/api-security/"><i>API security solution</i></a><i>, and it is available for all Enterprise customers. If you aren’t subscribed to API Gateway,</i> <a href="http://dash.cloudflare.com/?to=/:account/:zone/security/api-shield"><i>click here</i></a> <i>to view your initial API Discovery results and start a trial in the Cloudflare dashboard. To learn how to use API Gateway to secure your traffic,</i> <a href="https://developers.cloudflare.com/api-shield/"><i>click here</i></a> <i>to view our development docs and</i> <a href="https://developers.cloudflare.com/api-shield/get-started/"><i>here</i></a> <i>for our getting started guide.</i></p> ]]></content:encoded>
            <category><![CDATA[API Gateway]]></category>
            <category><![CDATA[API Security]]></category>
            <category><![CDATA[API Shield]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">7dEgZBP69KIcuJAqhX5Ety</guid>
            <dc:creator>John Cosgrove</dc:creator>
            <dc:creator>Sabina Zejnilovic</dc:creator>
        </item>
        <item>
            <title><![CDATA[Application Security Report: Q2 2023]]></title>
            <link>https://blog.cloudflare.com/application-security-report-q2-2023/</link>
            <pubDate>Mon, 21 Aug 2023 14:15:46 GMT</pubDate>
            <description><![CDATA[ We are back with a quarterly update of our Application Security report. Read on to learn about new attack trends and insights visible from Cloudflare’s global network ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3QrNN5PqgSYLMfSnYsQRrt/5b85d393b0ff4520e5ea771b684aa058/Application-Security-Trends-report.png" />
            
            </figure><p>Cloudflare has a unique vantage point on the Internet. From this position, we are able to see, explore, and identify trends that would otherwise go unnoticed. In this report we are doing just that and sharing our insights into Internet-wide application security trends.</p><p>This report is the third edition of our Application Security Report. The first one was <a href="/application-security/">published in March 2022</a>, with the second <a href="/application-security-2023/">published earlier this year in March</a>, and this is the first to be published on a  quarterly basis.</p><p>Since the last report, our network is bigger and faster: we are now processing an average of 46 million HTTP requests/second and 63 million at peak. We consistently handle approximately 25 million DNS queries per second. That's around 2.1 trillion DNS queries per day, and 65 trillion queries a month. This is the sum of authoritative and resolver requests served by our infrastructure. Summing up both HTTP and DNS requests, we get to see a lot of malicious traffic. Focusing on HTTP requests only, in Q2 2023 Cloudflare blocked an average of 112 billion cyber threats each day, and this is the data that powers this report.</p><p>But as usual, before we dive in, we need to define our terms.</p>
    <div>
      <h2>Definitions</h2>
      <a href="#definitions">
        
      </a>
    </div>
    <p>Throughout this report, we will refer to the following terms:</p><ul><li><p><b>Mitigated traffic</b>: any eyeball HTTP* request that had a “terminating” action applied to it by the Cloudflare platform. These include the following actions: <code>BLOCK</code>, <a href="https://developers.cloudflare.com/fundamentals/get-started/concepts/cloudflare-challenges/#legacy-captcha-challenge"><code>CHALLENGE</code></a>, <a href="https://developers.cloudflare.com/fundamentals/get-started/concepts/cloudflare-challenges/#js-challenge"><code>JS_CHALLENGE</code></a> and <a href="https://developers.cloudflare.com/fundamentals/get-started/concepts/cloudflare-challenges/#managed-challenge-recommended"><code>MANAGED_CHALLENGE</code></a>. This does not include requests that had the following actions applied: <code>LOG</code>, <code>SKIP</code>, <code>ALLOW</code>. In contrast to last year, we now exclude requests that had <code>CONNECTION_CLOSE</code> and <code>FORCE_CONNECTION_CLOSE</code> actions applied by our DDoS mitigation system, as these technically only slow down connection initiation. They also accounted for a relatively small percentage of requests. Additionally, we improved our calculation regarding the <code>CHALLENGE</code> type actions to ensure that only unsolved challenges are counted as mitigated. A detailed <a href="https://developers.cloudflare.com/ruleset-engine/rules-language/actions/">description of actions</a> can be found in our developer documentation.</p></li><li><p><b>Bot traffic/automated traffic</b>: any HTTP* request identified by Cloudflare’s <a href="https://www.cloudflare.com/products/bot-management/">Bot Management</a> system as being generated by a bot. This includes requests with a <a href="https://developers.cloudflare.com/bots/concepts/bot-score/">bot score</a> between <a href="https://developers.cloudflare.com/bots/concepts/bot-score/">1 and 29</a> inclusive. This has not changed from last year’s report.</p></li><li><p><b>API traffic</b>: any HTTP* request with a response content type of <code>XML</code> or <code>JSON</code>. Where the response content type is not available, such as for mitigated requests, the equivalent <code>Accept</code> content type (specified by the user agent) is used instead. In this latter case, API traffic won’t be fully accounted for, but it still provides a good representation for the purposes of gaining insights.</p></li></ul><p>Unless otherwise stated, the time frame evaluated in this post is the 3 month period from April 2023 through June 2023 inclusive.</p><p>Finally, please note that the data is calculated based only on traffic observed across the Cloudflare network and does not necessarily represent overall HTTP traffic patterns across the Internet.</p><p>* <i>When referring to HTTP traffic we mean both HTTP and HTTPS.</i></p>
    <div>
      <h2>  Global traffic insights</h2>
      <a href="#global-traffic-insights">
        
      </a>
    </div>
    
    <div>
      <h3>Mitigated daily traffic stable at 6%, spikes reach 8%</h3>
      <a href="#mitigated-daily-traffic-stable-at-6-spikes-reach-8">
        
      </a>
    </div>
    <p>Although daily mitigated HTTP requests decreased by 2 percentage points to 6% on average from 2021 to 2022, days with larger than usual malicious activity can be clearly seen across the network. One clear example is shown in the graph below: towards the end of May 2023, a spike reaching nearly 8% can be seen. This is attributable to large DDoS events and other activity that does not follow standard daily or weekly cycles and is a constant reminder that large malicious events can still have a visible impact at a global level, even at Cloudflare scale.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6KbxMm5vOJD0fNB3FUqMFI/60fa8701cd90a9ee34d934f616955bed/image1-22.png" />
            
            </figure><p>75% of mitigated HTTP requests were outright BLOCKed. This is a 6 percentage point decrease compared to the previous report. The majority of other requests are mitigated with the various CHALLENGE type actions, with managed challenges leading with ~20% of this subset.</p>
    <div>
      <h3>Shields up: customer configured rules now biggest contributor to mitigated traffic</h3>
      <a href="#shields-up-customer-configured-rules-now-biggest-contributor-to-mitigated-traffic">
        
      </a>
    </div>
    <p>In our previous report, our automated DDoS mitigation system accounted for, on average, more than 50% of mitigated traffic. Over the past two quarters, due to both increased WAF adoption, but most likely organizations better configuring and locking down their applications from unwanted traffic, we’ve seen a new trend emerge, with WAF mitigated traffic surpassing DDoS mitigation. Most of the increase has been driven by WAF Custom Rule BLOCKs rather than our WAF Managed Rules, indicating that these mitigations are generated by customer configured rules for business logic or related purposes. This can be clearly seen in the chart below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/tTe2Lvb0twlgtTDUvI39y/c1384e2a1c9d86991f7f0f6b42024f7c/image5-8.png" />
            
            </figure><p>Note that our WAF Managed Rules mitigations (yellow line) are negligible compared to overall WAF mitigated traffic also indicating that customers are adopting positive security models by allowing known good traffic as opposed to blocking only known bad traffic. Having said that, WAF Managed Rules mitigations reached as much as 1.5 billion/day during the quarter.</p><p>Our DDoS mitigation is, of course, volumetric and the amount of traffic matching our DDoS layer 7 rules should not be underestimated, especially given that we are observing a number of novel attacks and botnets being spun up across the web. You can read a deep dive on DDoS attack trends in our <a href="/ddos-threat-report-2023-q2/">Q2 DDoS threat report</a>.</p><p>Aggregating the source of mitigated traffic, the WAF now accounts for approximately 57% of all mitigations. Tabular format below with other sources for reference.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6bzDwbhkhvnHM6c2chSYmK/15ef779cb157e65d74a826d5cbf173e5/image6-1.png" />
            
            </figure><table><colgroup><col></col><col></col></colgroup><tbody><tr><td><p><span>Source</span></p></td><td><p><span>Percentage %</span></p></td></tr><tr><td><p><span>WAF</span></p></td><td><p><span>57%</span></p></td></tr><tr><td><p><span>DDoS Mitigation</span></p></td><td><p><span>34%</span></p></td></tr><tr><td><p><span>IP Reputation</span></p></td><td><p><span>6%</span></p></td></tr><tr><td><p><span>Access Rules</span></p></td><td><p><span>2%</span></p></td></tr><tr><td><p><span>Other</span></p></td><td><p><span>1%</span></p></td></tr></tbody></table>
    <div>
      <h3>Application owners are increasingly relying on geo location blocks</h3>
      <a href="#application-owners-are-increasingly-relying-on-geo-location-blocks">
        
      </a>
    </div>
    <p>Given the increase in mitigated traffic from customer defined WAF rules, we thought it would be interesting to dive one level deeper and better understand what customers are blocking and how they are doing it. We can do this by reviewing rule field usage across our WAF Custom Rules to identify common themes. Of course, the data needs to be interpreted correctly, as not all customers have access to all fields as that varies by contract and plan level, but we can still make some inferences based on field “categories”. By reviewing all ~7M WAF Custom Rules deployed across the network and focusing on main groupings only, we get the following field usage distribution:</p><table><colgroup><col></col><col></col></colgroup><tbody><tr><td><p><span>Field</span></p></td><td><p><span> Used in percentage % of rules</span></p></td></tr><tr><td><p><span>Geolocation fields</span></p></td><td><p><span>40%</span></p></td></tr><tr><td><p><span>HTTP URI</span></p></td><td><p><span>31%</span></p></td></tr><tr><td><p><span>IP address</span></p></td><td><p><span>21%</span></p></td></tr><tr><td><p><span>Other HTTP fields (excluding URI)</span></p></td><td><p><span>34%</span></p></td></tr><tr><td><p><span>Bot Management fields</span></p></td><td><p><span>11%</span></p></td></tr><tr><td><p><span>IP reputation score</span></p></td><td><p><span>4%</span></p></td></tr></tbody></table><p>Notably, 40% of all deployed WAF Custom Rules use geolocation-related fields to make decisions on how to treat traffic. This is a common technique used to implement business logic or to exclude geographies from which no traffic is expected and helps reduce <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">attack surface areas</a>. While these are coarse controls which are unlikely to stop a sophisticated attacker, they are still efficient at reducing the attack surface.</p><p>Another notable observation is the usage of Bot Management related fields in 11% of WAF Custom Rules. This number has been steadily increasing over time as more customers adopt machine learning-based classification strategies to protect their applications.</p>
    <div>
      <h3>Old CVEs are still exploited en masse</h3>
      <a href="#old-cves-are-still-exploited-en-masse">
        
      </a>
    </div>
    <p>Contributing ~32% of WAF Managed Rules mitigated traffic overall, HTTP Anomaly is still the most common attack category blocked by the WAF Managed Rules. SQLi moved up to second position, surpassing Directory Traversal with 12.7% and 9.9% respectively.</p><p>If we look at the start of April 2023, we notice the DoS category far exceeding the HTTP Anomaly category. Rules in the DoS category are WAF layer 7 HTTP signatures that are sufficiently specific to match (and block) single requests without looking at cross request behavior and that can be attributed to either specific botnets or payloads that cause denial of service (DoS). Normally, as is the case here, these requests are not part of “distributed” attacks, hence the lack of the first “D” for “distributed” in the category name.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6lfQTGyIuNJv3KSBoOM2Kt/21126000755decaaeb6bb5acd7c7c531/image10.png" />
            
            </figure><p>Tabular format for reference (top 10 categories):</p><table><colgroup><col></col><col></col></colgroup><tbody><tr><td><p><span>Source</span></p></td><td><p><span>Percentage %</span></p></td></tr><tr><td><p><span>HTTP Anomaly</span></p></td><td><p><span>32%</span></p></td></tr><tr><td><p><span>SQLi</span></p></td><td><p><span>13%</span></p></td></tr><tr><td><p><span>Directory Traversal</span></p></td><td><p><span>10%</span></p></td></tr><tr><td><p><span>File Inclusion</span></p></td><td><p><span>9%</span></p></td></tr><tr><td><p><span>DoS</span></p></td><td><p><span>9%</span></p></td></tr><tr><td><p><span>XSS</span></p></td><td><p><span>9%</span></p></td></tr><tr><td><p><span>Software Specific</span></p></td><td><p><span>7%</span></p></td></tr><tr><td><p><span>Broken Authentication</span></p></td><td><p><span>6%</span></p></td></tr><tr><td><p><span>Common Injection</span></p></td><td><p><span>3%</span></p></td></tr><tr><td><p><span>CVE</span></p></td><td><p><span>1%</span></p></td></tr></tbody></table><p>Zooming in, and filtering on the DoS category only, we find that most of the mitigated traffic is attributable to one rule: 100031 / ce02fd… (old WAF and new WAF rule ID respectively). This rule, with a description of “<i>Microsoft IIS - DoS, Anomaly:Header:Range - CVE:CVE-2015-1635</i>” pertains to a <a href="https://nvd.nist.gov/vuln/detail/CVE-2015-1635">CVE dating back to 2015</a> that affected a number of Microsoft Windows components resulting in remote code execution*****. This is a good reminder that old CVEs, even those dating back more than 8 years, are still actively exploited to compromise machines that may be unpatched and still running vulnerable software.</p><p>* <i>Due to rule categorisation, some CVE specific rules are still assigned to a broader category such as DoS in this example. Rules are assigned to a CVE category only when the attack payload does not clearly overlap with another more generic category.</i></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2mSqUk3g9mRcgetHJ4oQOI/d5e6fc2d8ddc72fdb9fc8611ccb48a34/image2-13.png" />
            
            </figure><p>Another interesting observation is the increase in Broken Authentication rule matches starting in June. This increase is also attributable to a single rule deployed across all our customers, including our FREE users: “<i>Wordpress - Broken Access Control, File Inclusion</i>”. This rule is blocking attempts to access wp-config.php - the WordPress default configuration file which is normally found in the web server document root directory, but of course should never be accessed directly via HTTP.</p><p>On a similar note, CISA/CSA recently published a report highlighting the <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a?cf_target_id=DC7FD2F218498816EEC88041CD1F9A74">2022 Top Routinely Exploited Vulnerabilities</a>. We took this opportunity to explore <a href="/unmasking-the-top-exploited-vulnerabilities-of-2022/">how each CVE mentioned in CISA’s report was reflected in Cloudflare’s own data</a>. The CISA/CSA discuss 12 vulnerabilities that malicious cyber actors routinely exploited in 2022. However, based on our analysis, two CVEs mentioned in the CISA report are responsible for the vast majority of attack traffic we have seen in the wild: Log4J and Atlassian Confluence Code Injection. Our data clearly suggests a major difference in exploit volume between the top two and the rest of the list. The following chart compares the attack volume (in logarithmic scale) of the top 6 vulnerabilities of the CISA list according to our logs.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2uwZCjKV69ScnhTPgvZ82e/1c763d1c13f7fe671c56da6f6dd22228/image8.png" />
            
            </figure>
    <div>
      <h2>Bot traffic insights</h2>
      <a href="#bot-traffic-insights">
        
      </a>
    </div>
    <p>Cloudflare’s <a href="https://www.cloudflare.com/products/bot-management/">Bot Management</a> continues to see significant investment as the addition of JavaScript Verified URLs for greater protection against browser-based bots, Detection IDs are now available in Custom Rules for additional configurability, and an improved UI for easier onboarding. For self-serve customers, we’ve added the ability to “Skip” Super Bot Fight Mode rules and support for Wordpress Loopback requests, to better integrate with our customers’ applications and give them the protection they need.</p><p>Our confidence in the Bot Management classification output remains very high. If we plot the bot scores across the analyzed time frame, we find a very clear distribution, with most requests either being classified as definitely bot (score below 30) or definitely human (score greater than 80), with most requests actually scoring less than 2 or greater than 95. This equates, over the same time period, to 33% of traffic being classified as automated (generated by a bot). Over longer time periods we do see the overall bot traffic percentage stable at 29%, and this reflects the data shown on <a href="https://radar.cloudflare.com/traffic?dateStart=2023-04-01&amp;dateEnd=2023-07-01">Cloudflare Radar</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3IWinRPtNWXlGyYBWJ1d63/40fe64370434befa861d7b7a2730c329/image3-7.png" />
            
            </figure>
    <div>
      <h3>On average, more than 10% of non-verified bot traffic is mitigated</h3>
      <a href="#on-average-more-than-10-of-non-verified-bot-traffic-is-mitigated">
        
      </a>
    </div>
    <p>Compared to the last report, non-verified bot HTTP traffic mitigation is currently on a downward trend (down 6 percentage points). However, the Bot Management field usage within WAF Custom Rules is non negligible, standing at 11%. This means that there are more than 700k WAF Custom Rules deployed on Cloudflare that are relying on bot signals to perform some action. The most common field used is cf.client.bot, an alias to cf.bot_management.verified_bot which is powered by our <a href="https://radar.cloudflare.com/traffic/verified-bots">list of verified bots</a> and allows customers to make a distinction between “good” bots and potentially “malicious”  non-verified ones.</p><p>Enterprise customers have access to the more powerful cf.bot_management.score which provides direct access to the score computed on each request, the same score used to generate the bot score distribution graph in the prior section.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2H2kx5ONOEAzChOHlKHSuK/f8d7437d8627985f7ea8123ecaf084ce/image7-1.png" />
            
            </figure><p>The above data is also validated by looking at what Cloudflare service is mitigating unverified bot traffic. Although our DDoS mitigation system is automatically blocking HTTP traffic across all customers, this only accounts for 13% of non-verified bot mitigations. On the other hand, WAF, and mostly customer defined rules, account for 77% of such mitigations, much higher than mitigations across all traffic (57%) discussed at the start of the report. Note that Bot Management is specifically called out but refers to our “default” one-click rules, which are counted separately from the bot fields used in WAF Custom Rules.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2C1qfqHZVrqjJBa1upHkz2/11a16bb6e27542a6f2e3366e9903ac4a/image4-9.png" />
            
            </figure><p>Tabular format for reference:</p><table><colgroup><col></col><col></col></colgroup><tbody><tr><td><p><span>Source</span></p></td><td><p><span>Percentage %</span></p></td></tr><tr><td><p><span>WAF</span></p></td><td><p><span>77%</span></p></td></tr><tr><td><p><span>DDoS Mitigation</span></p></td><td><p><span>13%</span></p></td></tr><tr><td><p><span>IP reputation</span></p></td><td><p><span>5%</span></p></td></tr><tr><td><p><span>Access Rules</span></p></td><td><p><span>3%</span></p></td></tr><tr><td><p><span>Other</span></p></td><td><p><span>1%</span></p></td></tr></tbody></table>
    <div>
      <h2>API traffic insights</h2>
      <a href="#api-traffic-insights">
        
      </a>
    </div>
    
    <div>
      <h3>58% of dynamic (non cacheable) traffic is API related</h3>
      <a href="#58-of-dynamic-non-cacheable-traffic-is-api-related">
        
      </a>
    </div>
    <p>The growth of overall API traffic observed by Cloudflare is not slowing down. Compared to last quarter, we are now seeing 58% of total dynamic traffic be classified as API related. This is a 3 percentage point increase as compared to Q1.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3Gd7TYNHlXEzUr0YaGyXww/6e37e4fb95e4519450523ca1863edbf7/image11.png" />
            
            </figure><p>Our investment in API Gateway is also following a similar growth trend. Over the last quarter we have released several new API security features.</p><p>First, we’ve made API Discovery easier to use with a <a href="https://developers.cloudflare.com/api-shield/security/api-discovery/#inbox-view">new inbox view</a>. API Discovery inventories your APIs to prevent shadow IT and zombie APIs, and now customers can easily filter to show only new endpoints found by API Discovery. Saving endpoints from API Discovery places them into our <a href="https://developers.cloudflare.com/api-shield/management-and-monitoring/">Endpoint Management</a> system.</p><p>Next, we’ve added a brand new API security feature offered only at Cloudflare: the ability to control API access by client behavior. We call it <a href="https://developers.cloudflare.com/api-shield/security/sequence-mitigation/">Sequence Mitigation</a>. Customers can now create positive or negative security models based on the order of API paths accessed by clients. You can now ensure that your application’s users are the only ones accessing your API instead of brute-force attempts that ignore normal application functionality. For example, in a banking application you can now enforce that access to the funds transfer endpoint can only be accessed after a user has also accessed the account balance check endpoint.</p><p>We’re excited to continue releasing <a href="https://www.cloudflare.com/application-services/solutions/api-security/">API security</a> and <a href="https://www.cloudflare.com/application-services/products/api-gateway/">API management</a> features for the remainder of 2023 and beyond.</p>
    <div>
      <h3>65% of global API traffic is generated by browsers</h3>
      <a href="#65-of-global-api-traffic-is-generated-by-browsers">
        
      </a>
    </div>
    <p>The percentage of API traffic generated by browsers has remained very stable over the past quarter. With this statistic, we are referring to HTTP requests that are not serving HTML based content that will be directly rendered by the browser without some preprocessing, such as those more commonly known as AJAX calls which would normally serve JSON based responses.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6EAog7mZWAttnTLNti5zPD/79924a318e5afa6a07c035f0644a0edf/image12.png" />
            
            </figure>
    <div>
      <h3>HTTP Anomalies are the most common attack vector on API endpoints</h3>
      <a href="#http-anomalies-are-the-most-common-attack-vector-on-api-endpoints">
        
      </a>
    </div>
    <p>Just like last quarter, HTTP Anomalies remain the most common mitigated attack vector on API traffic. SQLi injection attacks, however, are non negligible, contributing approximately 11% towards the total mitigated traffic, closely followed by XSS attacks, at around 9%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/14c68gj0NmXbfog0jJuEhV/c3fe3b73684d1142983baa0430e0f4a5/image9.png" />
            
            </figure><p>Tabular format for reference (top 5):</p><table><colgroup><col></col><col></col></colgroup><tbody><tr><td><p><span>Source</span></p></td><td><p><span>Percentage %</span></p></td></tr><tr><td><p><span>HTTP Anomaly</span></p></td><td><p><span>64%</span></p></td></tr><tr><td><p><span>SQLi</span></p></td><td><p><span>11%</span></p></td></tr><tr><td><p><span>XSS</span></p></td><td><p><span>9%</span></p></td></tr><tr><td><p><span>Software Specific</span></p></td><td><p><span>5%</span></p></td></tr><tr><td><p><span>Command Injection</span></p></td><td><p><span>4%</span></p></td></tr></tbody></table>
    <div>
      <h3>Looking forward</h3>
      <a href="#looking-forward">
        
      </a>
    </div>
    <p>As we move our application security report to a quarterly cadence, we plan to deepen some of the insights and to provide additional data from some of our newer products such as Page Shield, allowing us to look beyond HTTP traffic, and explore the state of third party dependencies online.</p><p>Stay tuned and keep an eye on <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> for more frequent application security reports and insights.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[Bots]]></category>
            <category><![CDATA[DDoS]]></category>
            <category><![CDATA[API]]></category>
            <guid isPermaLink="false">6PHfFuJQzKabT5BxIjgB9j</guid>
            <dc:creator>Michael Tremante</dc:creator>
            <dc:creator>David Belson</dc:creator>
            <dc:creator>Sabina Zejnilovic</dc:creator>
        </item>
        <item>
            <title><![CDATA[Unmasking the top exploited vulnerabilities of 2022]]></title>
            <link>https://blog.cloudflare.com/unmasking-the-top-exploited-vulnerabilities-of-2022/</link>
            <pubDate>Fri, 04 Aug 2023 18:29:40 GMT</pubDate>
            <description><![CDATA[ The Cybersecurity and Infrastructure Security Agency (CISA) just released a report highlighting the most commonly exploited vulnerabilities of 2022.  ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5scnKQPaND4raWHnCC5OPg/2dff3f8ebb800ddc6dd78b792b169c83/1a.png" />
            
            </figure><p>The Cybersecurity and Infrastructure Security Agency (CISA) just <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a">released a report highlighting the most commonly exploited vulnerabilities of 2022</a>. With our role as a reverse proxy to a large portion of the Internet, Cloudflare is in a unique position to observe how the Common Vulnerabilities and Exposures (CVEs) mentioned by CISA are being exploited on the Internet.</p><p>We wanted to share a bit of what we’ve learned.</p><p>Based on our analysis, two CVEs mentioned in the CISA report are responsible for the vast majority of attack traffic seen in the wild: Log4J and Atlassian Confluence Code Injection. Although CISA/CSA discuss a larger number of vulnerabilities in the same report, our data clearly suggests a major difference in exploit volume between the top two and the rest of the list.</p>
    <div>
      <h3>The top CVEs for 2022</h3>
      <a href="#the-top-cves-for-2022">
        
      </a>
    </div>
    <p>Looking at the volume of requests detected by WAF Managed Rules that were created for the specific CVEs listed in the CISA report, we rank the vulnerabilities in order of prevalence:</p><table><colgroup><col></col><col></col><col></col></colgroup><tbody><tr><td><p><span>Popularity rank</span></p></td><td><p><span>Description</span></p></td><td><p><span>CVEs</span></p></td></tr><tr><td><p><span>1. Improper Input Validation caused Remote Code execution in Apache Log4j logging library</span></p></td><td><p><span>Log4J</span></p></td><td><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228"><span>CVE-2021-44228</span></a></p></td></tr><tr><td><p><span>2. Atlassian Confluence Server and Data Center Remote Code Execution Vulnerability</span></p></td><td><p><span>Atlassian Confluence Code Injection</span></p></td><td><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26134"><span>CVE-2022-26134</span></a></p></td></tr><tr><td><p><span>3. 3 issues were combined together to achieve Remote Code execution also known as ProxyShell</span></p></td><td><p><span>Microsoft Exchange servers</span></p></td><td><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34473"><span>CVE-2021-34473</span></a><span>, </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31207"><span>CVE-2021-31207</span></a><span>, </span><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34523"><span>CVE-2021-34523</span></a></p></td></tr><tr><td><p><span>4. undisclosed requests may bypass iControl REST authentication and run arbitrary code</span></p></td><td><p><span>BIG-IP F5</span></p></td><td><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1388"><span>CVE-2022-1388</span></a></p></td></tr><tr><td><p><span>5. 2 issues were combined to together to achieve remote Root</span></p></td><td><p><span>VMware</span></p></td><td><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22954"><span>CVE-2022-22954</span></a><span>, </span></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22960"><span>CVE-2022-22960</span></a></p></td></tr><tr><td><p><span>6. Remote Code execution Issue in Confluence Server and Data Center</span></p></td><td><p><span>Atlassian Confluence 0-day</span></p></td><td><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26084"><span>CVE-2021-26084</span></a></p></td></tr></tbody></table><p>Topping the list is Log4J (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228">CVE-2021-44228</a>). This isn’t surprising, as this is likely one of the most high impact exploits we have seen in decades — leading to full remote compromise. The second most exploited vulnerability is the Atlassian Confluence Code Injection (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-26134">CVE-2022-26134</a>).</p><p>In third place we find the combination of three CVEs targeting Microsoft Exchange servers (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34473">CVE-2021-34473</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-31207">CVE-2021-31207</a>, and <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-34523">CVE-2021-34523</a>). In fourth is a BIG-IP F5 exploit (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-1388">CVE-2022-1388</a>) followed by the combination of two VMware vulnerabilities (<a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22954">CVE-2022-22954</a> and <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22960">CVE-2022-22960</a>). Our list ends with another Atlassian Confluence 0-day (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-26084">CVE-2021-26084</a>).</p><p>When comparing the attack volume for these five groups, we immediately notice that one vulnerability stands out. Log4J is more than an order of magnitude more exploited than the runner up (Atlassian Confluence Code Injection); and all the remaining CVEs are even lower. Although the CISA/CSA report groups all these vulnerabilities together, we think that there are really two groups: one dominant CVE (Log4J), and a secondary group of comparable 0-days. Each of the two groups have similar attack volume.</p><p>The chart below, in logarithmic scale, clearly shows the difference in popularity.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ApUqzWZKK24NL0vaQq1fL/34abfb47afb62b96d4991301fb15786f/2a.png" />
            
            </figure>
    <div>
      <h2>CVE-2021-44228: Log4J</h2>
      <a href="#cve-2021-44228-log4j">
        
      </a>
    </div>
    <p>The first on our list is the notorious CVE-2021-44228 — better known as the Log4j vulnerability. This flaw caused significant disturbance in the cyber world in 2021, and continues to be exploited extensively.</p><p>Cloudflare <a href="/cve-2021-44228-log4j-rce-0-day-mitigation/">released new managed rules</a> within hours after the vulnerability was made public. We also released updated detections in the following days (<a href="/protection-against-cve-2021-45046-the-additional-log4j-rce-vulnerability/">blog</a>). Overall, we released rules in three stages:</p><ul><li><p><a href="https://developers.cloudflare.com/waf/change-log/2021-12-10---emergency-release/">Emergency release: December 10, 2021</a></p></li><li><p><a href="https://developers.cloudflare.com/waf/change-log/2021-12-14---emergency-release/">Emergency release: December 14, 2021</a></p></li><li><p><a href="https://developers.cloudflare.com/waf/change-log/2021-12-16---emergency-release/">Emergency release: December 16, 2021</a></p></li></ul><p>The rules we deployed detect the exploit in four categories:</p><ul><li><p>Log4j Headers: Attack pattern in HTTP header</p></li><li><p>Log4j Body: Attack pattern in HTTP Body</p></li><li><p>Log4j URI: Attack Pattern in URI</p></li><li><p>Log4j Body Obfuscation: Obfuscated Attack pattern</p></li></ul><p>We have found that Log4J attacks in HTTP Headers are more common than in HTTP bodies. The graph below shows the persistence of exploit attempts for this vulnerability over time, with clear peaks and growth into July 2023 (time of writing).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5lT86fDAK2DfHk6ec5xJ2K/f5bcf34caee629f5d30f149e683bd691/2b.png" />
            
            </figure><p>Due to the high impact of this vulnerability, to step up and lead the charge for a safer, better Internet, on March 15, 2022 <a href="/waf-for-everyone/">Cloudflare announced</a> that all plans (including Free) would get WAF Managed Rules for high-impact vulnerabilities. These free rules tackle high-impact vulnerabilities such as the Log4J exploit, the Shellshock vulnerability, and various widespread WordPress exploits. Every business or personal website, regardless of size or budget, can protect their digital assets using Cloudflare’s WAF.</p><p>The <a href="https://logging.apache.org/log4j/2.x/security.html">full security advisory for Log4J published by Apache Software Foundation can be found here</a>.</p>
    <div>
      <h3>CVE-2022-26134: Atlassian Confluence Code Injection</h3>
      <a href="#cve-2022-26134-atlassian-confluence-code-injection">
        
      </a>
    </div>
    <p>A code injection vulnerability that afflicted Atlassian Confluence was the second most exploited CVE in 2022. This exploit posed a threat to entire systems, leaving many businesses at the mercy of attackers. This is an indication of how critical knowledge-based systems have become in managing information within organizations. Attackers are targeting these systems as they recognize how  important they are.. In response, the Cloudflare WAF team rolled out two emergency releases to protect its customers:</p><ul><li><p><a href="https://developers.cloudflare.com/waf/change-log/2022-06-04---emergency-release/">Emergency Release: June 4, 2022</a></p></li><li><p><a href="https://developers.cloudflare.com/waf/change-log/2022-06-07---emergency-release/">Emergency Release: June 7, 2022</a></p></li></ul><p>As part of these releases, two rules were made available to all WAF users:</p><ul><li><p>Atlassian Confluence - Code Injection - CVE:CVE-2022-26134</p></li><li><p>Atlassian Confluence - Code Injection - Extended - CVE:CVE-2022-26134</p></li></ul><p>The graph below displays the number of hits received each day, showing a clear peak followed by a gradual decline as systems were patched and secured.</p><p>Both Log4J and Confluence Code Injection show some seasonality, where a higher volume of attacks is carried out between September / November 2022 until March 2023. This likely reflects campaigns that are managed by attackers that are still attempting to exploit this vulnerability (an ongoing campaign is visible towards the end of July 2023).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3BtxJnWq1hLkOXtGGfXNGX/1dfafd372191c169e7ea2dd6bb6be000/2c.png" />
            
            </figure><p><a href="https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html">Security advisory for reference</a>.</p>
    <div>
      <h2>CVE-2021-34473, CVE-2021-31207, and CVE-2021-34523: Microsoft Exchange SSRF and RCE Vulnerabilities</h2>
      <a href="#cve-2021-34473-cve-2021-31207-and-cve-2021-34523-microsoft-exchange-ssrf-and-rce-vulnerabilities">
        
      </a>
    </div>
    <p>Three previously unknown bugs were chained together to achieve a Remote Code Execution (RCE) 0-day attack. Given how widely adopted Microsoft Exchange servers are, these exploits posed serious threats to data security and business operations across all industries, geographies and sectors.</p><p>Cloudflare WAF published a rule for this vulnerability with the <a href="https://developers.cloudflare.com/waf/change-log/2022-10-03---emergency-release/">Emergency Release: March 3, 2022</a> that contained the rule <i>Microsoft Exchange SSRF and RCE vulnerability - CVE:CVE-2022-41040, CVE:CVE-2022-41082.</i></p><p>The trend of these attacks over the past year can be seen in the graph below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5X7Bcw6QYIYEQwnjhtI5rs/f9e385f942398ea84efc379cd5498bdf/2d.png" />
            
            </figure><p>Security advisories for reference: <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34473">CVE-2021-34473</a>, <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31207">CVE-2021-31207</a> and <a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34523">CVE-2021-34523</a>.</p>
    <div>
      <h2>CVE-2022-1388: RCE in BIG-IP F5</h2>
      <a href="#cve-2022-1388-rce-in-big-ip-f5">
        
      </a>
    </div>
    <p>This particular security vulnerability can be exploited where an unauthenticated adversary has network connectivity to the BIG-IP system (the F5 product name of a group of application security and performance solutions). Either via the management interface or self-assigned IP addresses the attacker can execute unrestricted system commands.</p><p>Cloudflare did an emergency release to detect this issue (<a href="https://developers.cloudflare.com/waf/change-log/2022-05-10---emergency-release/">Emergency Release: May 5, 2022</a>) with the rule <i>Command Injection - RCE in BIG-IP - CVE:CVE-2022-1388.</i></p><p>There is a relatively persistent pattern of exploitation without signs of specific campaigns, with the exception of a spike occurring in late June 2023.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5QPTMMYjgy5Mh0noAO0G9B/33039df2c5d0230372656cfcdc6124c0/2e.png" />
            
            </figure><p>a</p><p><a href="https://my.f5.com/manage/s/article/K23605346">F5 security advisory for reference</a>.</p>
    <div>
      <h3>CVE-2022-22954: VMware Workspace ONE Access and Identity Manager Server-side Template Injection Remote Code Execution Vulnerability</h3>
      <a href="#cve-2022-22954-vmware-workspace-one-access-and-identity-manager-server-side-template-injection-remote-code-execution-vulnerability">
        
      </a>
    </div>
    <p>With this vulnerability, an attacker can remotely trigger a server-side template injection that may result in remote code execution. Successful exploitation allows an unauthenticated attacker with network access to the web interface to execute an arbitrary shell command as the VMware user. Later, this issue was combined with CVE-2022-22960 (which was a Local Privilege Escalation Vulnerability (LPE) issue). In combination, these two vulnerabilities allowed remote attackers to execute commands with root privileges.</p><p>Cloudflare WAF published a rule for this vulnerability: <a href="https://developers.cloudflare.com/waf/change-log/2022-04-25/">Release: May 5, 2022</a>. Exploit attempt graph over time shown below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/TmLAw8UQWYk238JNusY1R/c0efa68e02417deff690be2b96e55264/2f.png" />
            
            </figure><p><a href="https://www.vmware.com/security/advisories/VMSA-2022-0011.html">VMware Security advisory</a>.</p>
    <div>
      <h3>CVE-2021-26084: Confluence Server Webwork OGNL injection</h3>
      <a href="#cve-2021-26084-confluence-server-webwork-ognl-injection">
        
      </a>
    </div>
    <p>An OGNL injection vulnerability was found that allows an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. Cloudflare WAF performed an <a href="https://developers.cloudflare.com/waf/change-log/2021-09-01---emergency-release/">emergency release for this vulnerability on September 9, 2022</a>. When compared to the other CVEs discussed in this post, we have not observed a lot of exploits over the past year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/9RU0rpZyzlnfte3FSHuas/642a23740fd2c2e035e1b0944566d8aa/2g.png" />
            
            </figure><p><a href="https://confluence.atlassian.com/doc/confluence-security-advisory-2021-08-25-1077906215.html">Official security advisory</a>.</p>
    <div>
      <h3>Recommendations for enhanced protection</h3>
      <a href="#recommendations-for-enhanced-protection">
        
      </a>
    </div>
    <p>We recommend all server admins to keep their software updated when fixes become available. Cloudflare customers — including those on our free tier — can leverage new rules addressing CVEs and 0-day threats, <a href="https://developers.cloudflare.com/waf/change-log/">updated weekly in the Managed Ruleset</a>. High-risk CVEs may even prompt emergency releases. In addition to this, Enterprise customers have access to the <a href="/waf-ml/">WAF Attack Score</a>: an AI-powered detection feature that supplements traditional signature-based rules, identifying unknown threats and bypass attempts. With the combined strength of rule-based and AI detection, Cloudflare offers <a href="https://www.cloudflare.com/products/zero-trust/threat-defense/">robust defense against known and emerging threats</a>.</p>
    <div>
      <h2>Conclusions</h2>
      <a href="#conclusions">
        
      </a>
    </div>
    <p>Cloudflare’s data is able to augment CISA’s vulnerability report — of note, we see attempts to exploit the top two vulnerabilities that are several orders of magnitude more compared to the remainder of the list. Organizations should focus their software patching efforts based on the list provided. It is, of course, important to note that all software should be patched, and good WAF implementations will ensure additional security and “buy time” for underlying systems to be secured for both existing and future vulnerabilities.</p> ]]></content:encoded>
            <category><![CDATA[WAF]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[CISA]]></category>
            <category><![CDATA[Vulnerabilities]]></category>
            <guid isPermaLink="false">3tRYQMQiHufQpDCK8nmuuP</guid>
            <dc:creator>Himanshu Anand</dc:creator>
            <dc:creator>Sabina Zejnilovic</dc:creator>
            <dc:creator>Daniele Molteni</dc:creator>
        </item>
        <item>
            <title><![CDATA[Measuring the Internet's pulse: trending domains now on Cloudflare Radar]]></title>
            <link>https://blog.cloudflare.com/radar-trending-domains/</link>
            <pubDate>Mon, 24 Jul 2023 13:00:27 GMT</pubDate>
            <description><![CDATA[ Today, we are improving our Domain Rankings page and adding Trending Domains lists ]]></description>
            <content:encoded><![CDATA[ <p></p><p>In 2022, we <a href="/radar-domain-rankings/">launched</a> the Radar Domain Rankings, with top lists of the most popular domains based on how people use the Internet globally. The lists are calculated using a machine learning model that uses aggregated <a href="https://1.1.1.1/">1.1.1.1</a> resolver data that is anonymized in accordance with our <a href="https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/">privacy commitments</a>. While the <a href="https://radar.cloudflare.com/domains">top 100</a> list is updated daily for each location, typically the first results of that list are stable over time, with the big names such as Google, Facebook, Apple, Microsoft and TikTok leading. Additionally, these global big names appear for the majority of locations.</p><p>Today, we are improving our <a href="https://radar.cloudflare.com/domains">Domain Rankings</a> page and adding Trending Domains lists. The new data shows which domains are currently experiencing an increase in popularity. Hence, while with the top popular domains we aim to show domains of broad appeal and of interest to many Internet users, with the trending domains we want to show domains that are generating a surge in interest.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/DGYSP79QBrRnCHw7xsLFz/2a7c068c52febff98427402a0bb854dc/image4-4.png" />
            
            </figure>
    <div>
      <h3>How we generate the Trending Domains</h3>
      <a href="#how-we-generate-the-trending-domains">
        
      </a>
    </div>
    <p>When we started looking at the best way to generate a list of trending domains, we needed to answer the following questions:</p><ul><li><p>What type of popularity changes do we want to capture?</p></li><li><p>What should we use as a baseline to calculate the change?</p></li><li><p>And how do we quantify it?</p></li></ul><p>We soon realized that we needed two lists. One reflecting sudden increased interest related to a particular event or a topic, showing spikes in popularity in domains that jump in the ranking from one day to the next, and another one reflecting steady growth in popularity, showing domains that are increasing their user base over a longer period.</p><p>For this reason, we are launching both the Trending Today and Trending This Week top 10 lists to capture the two different types of popularity increase.</p><p>To select the baseline for calculating the increase in popularity, we analyzed the volatility of the <a href="/radar-domain-rankings/">Radar Domain Ranking</a> list for different top list sizes. The advantage of starting with the Radar Ranking lists is that they <b>already incorporate a good popularity metric that quantifies the estimated relative size of the user population that accesses a domain over some period of time</b>. You can read more about how we define popularity in our “Goodbye, Alexa. Hello, Cloudflare Radar Domain Rankings” <a href="/radar-domain-rankings/">blog</a>.</p><p>As expected, smaller list sizes were more stable, meaning the percentage of domains in the top 100 that changed the ranking from one day to the next was much lower than the percentage of domains that changed in the top 10,000. Hence, to have a dynamic daily list of trending domains, we had to look beyond the top 100 most popular domains.</p><p>However, we did not want to go all the way to the long tail of the list, as we already know that the ranks there are based on “significantly smaller and hence less reliable numbers” (see the paper "<a href="https://arxiv.org/abs/1805.11506">A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists</a>"). Hence, we selected an appropriate list size for each location, based on the distribution of the number of DNS queries per domain. For example, for the Worldwide trending list we analyzed the top 20,000 most popular domains, for Brazil we looked at the top 10,000, Angola 5,000 and for the Faroe Islands top 500.</p>
    <div>
      <h3>Trending Today</h3>
      <a href="#trending-today">
        
      </a>
    </div>
    <p>We then evaluated how much the domains change rank from one day to the next.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5JbwD8sP5PhNY6dLkxPXIA/8374ca5a59f39232ffdb4bc96ba1fcde/image2-13.png" />
            
            </figure><p>We saw that on average, the biggest changes in the top lists, from one day to the next, happen from Fridays to Saturdays and from Sundays to Mondays, and hence on Saturdays and Mondays the lists have the least overlap with the lists of the previous day. We also compared the rank changes from one day to the next corresponding weekday, say from one Monday to the next and saw that on average, rankings on Mondays typically have more overlap with the rankings of the previous Mondays, than with the rankings of Sunday. From this we decided that in order to capture which domains are trending due to the weekend effect, we needed to compare the domain's daily rank to the rank of the previous day(s), and not of the corresponding weekday.</p><p>However, we also did not want to show as trending those domains that highly oscillate in the rankings, jumping up and down from one day to the next, showing up as trending every few days. Hence, we could not simply compare the daily rank with the rank from the day before. Instead, as a compromise between capturing the most recent trends, including the weekend trends, but still filtering out the domains whose ranking oscillates over a short period of time, we decided to compare the domain's daily rank with its best rank of the previous four days.</p><p>Then, to calculate the increase in popularity, we simply calculate the percentage change in the current rank compared to the best rank of the previous four days.</p>
    <div>
      <h3>Trending This Week</h3>
      <a href="#trending-this-week">
        
      </a>
    </div>
    <p>For calculating the domains steadily growing over the week, we used a slightly different approach.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7arHPbJLnmUh0gwrLY3L6v/94e7f5174b5cc362b4d5cee687025138/image3-3.png" />
            
            </figure><p>We want to highlight domains that keep improving their rank day by day and especially those that have been really trending in the most recent days. Therefore, we decided not to directly compare the current rank with the best rank during the previous week. Instead, we looked at the weighted average per day rank improvement and compared it with the best rank of the previous six days, with more recent days being given more weight.</p>
    <div>
      <h3>Example trending domains</h3>
      <a href="#example-trending-domains">
        
      </a>
    </div>
    <p>What do these lists look like at the end? We compiled the lists for the eventful days of June 21 to 24.</p><p>On June 22, nba.com was trending in 28 locations, shown in the table below, the United States, as expected, but also Austria, Australia and Japan, to name a few, reflecting the interest in the events of <a href="https://en.wikipedia.org/wiki/2023_NBA_draft">NBA Draft 2023</a>.</p><p><b>Trending Today</b> data from Friday, June 23, 2023:</p>
<table>
<thead>
  <tr>
    <th><span>Location</span></th>
    <th><span>Trending rank</span></th>
    <th><span>Domain</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Albania</span></td>
    <td><span>5</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Argentina</span></td>
    <td><span>9</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Australia</span></td>
    <td><span>1</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Austria</span></td>
    <td><span>9</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Belgium</span></td>
    <td><span>5</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Canada</span></td>
    <td><span>5</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Chile</span></td>
    <td><span>6</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Colombia</span></td>
    <td><span>3</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Dominican Republic</span></td>
    <td><span>5</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Greece</span></td>
    <td><span>2</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Honduras</span></td>
    <td><span>6</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Hong Kong</span></td>
    <td><span>1</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>India</span></td>
    <td><span>7</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Indonesia</span></td>
    <td><span>4</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Ireland</span></td>
    <td><span>3</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Japan</span></td>
    <td><span>9</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Mexico</span></td>
    <td><span>2</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>New Zealand</span></td>
    <td><span>1</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Norway</span></td>
    <td><span>1</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Philippines</span></td>
    <td><span>1</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Poland</span></td>
    <td><span>9</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Serbia</span></td>
    <td><span>2</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>South Korea</span></td>
    <td><span>3</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Taiwan</span></td>
    <td><span>1</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Thailand</span></td>
    <td><span>1</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Ukraine</span></td>
    <td><span>1</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>United States</span></td>
    <td><span>6</span></td>
    <td><span>nba.com</span></td>
  </tr>
  <tr>
    <td><span>Venezuela</span></td>
    <td><span>4</span></td>
    <td><span>nba.com</span></td>
  </tr>
</tbody>
</table><p>Two domains trending in multiple locations on Saturday, June 24, were: rt.com, a Russian news site in English, and liveuamap.com, a site with interactive map of <a href="https://radar.cloudflare.com/ua">Ukraine</a>. These are probably the effects of the events related to the Wagner group on June 23 and 24. Related to the same events, domain jetphotos.com was trending on the same day in Russia, Norway and Albania.</p><p><b>Trending Today</b> data from Saturday, June 24, 2023:</p>
<table>
<thead>
  <tr>
    <th><span>Location</span></th>
    <th><span>Trending rank</span></th>
    <th><span>Domain</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>Armenia</span></td>
    <td><span>4</span></td>
    <td><span>rt.com</span></td>
  </tr>
  <tr>
    <td><span>Australia</span></td>
    <td><span>5</span></td>
    <td><span>rt.com</span></td>
  </tr>
  <tr>
    <td><span>Belgium</span></td>
    <td><span>2</span></td>
    <td><span>rt.com</span></td>
  </tr>
  <tr>
    <td><span>Bulgaria</span></td>
    <td><span>9</span></td>
    <td><span>rt.com</span></td>
  </tr>
  <tr>
    <td><span>Canada</span></td>
    <td><span>6</span></td>
    <td><span>rt.com</span></td>
  </tr>
  <tr>
    <td><span>Denmark</span></td>
    <td><span>6</span></td>
    <td><span>rt.com</span></td>
  </tr>
  <tr>
    <td><span>Greece</span></td>
    <td><span>6</span></td>
    <td><span>rt.com</span></td>
  </tr>
  <tr>
    <td><span>Italy</span></td>
    <td><span>2</span></td>
    <td><span>rt.com</span></td>
  </tr>
  <tr>
    <td><span>Kazakhstan</span></td>
    <td><span>8</span></td>
    <td><span>rt.com</span></td>
  </tr>
  <tr>
    <td><span>Lebanon</span></td>
    <td><span>4</span></td>
    <td><span>rt.com</span></td>
  </tr>
  <tr>
    <td><span>Netherlands</span></td>
    <td><span>8</span></td>
    <td><span>rt.com</span></td>
  </tr>
  <tr>
    <td><span>Papua New Guinea</span></td>
    <td><span>9</span></td>
    <td><span>rt.com</span></td>
  </tr>
  <tr>
    <td><span>Singapore</span></td>
    <td><span>2</span></td>
    <td><span>rt.com</span></td>
  </tr>
  <tr>
    <td><span>Spain</span></td>
    <td><span>6</span></td>
    <td><span>rt.com</span></td>
  </tr>
  <tr>
    <td><span>Turkey</span></td>
    <td><span>4</span></td>
    <td><span>rt.com</span></td>
  </tr>
  <tr>
    <td><span>United Kingdom</span></td>
    <td><span>5</span></td>
    <td><span>rt.com</span></td>
  </tr>
  <tr>
    <td><span>United States</span></td>
    <td><span>3</span></td>
    <td><span>rt.com</span></td>
  </tr>
  <tr>
    <td><span>Uzbekistan</span></td>
    <td><span>2</span></td>
    <td><span>rt.com</span></td>
  </tr>
</tbody>
</table><p>Other domains trending in various locations on Friday and Saturday were different Gaming and Video Streaming domains such as roblox.com, twitch.tv and callofduty.com, showing an increased interest in gaming activities as the weekend approaches.</p><p>Yet another interesting effect of the weekend was the presence of five weather forecast sites on the top 10 trending sites on Friday, in <a href="https://www.thedubrovniktimes.com/lifestyle/opinion/item/15049-from-guaranteed-sunshine-to-unexpected-showers-dubrovnik-s-changing-summer-weather-raises-questions-and-points-to-global-warming">Croatia</a>, showing preoccupation with the summer weekend plans.</p><p><b>Trending Today in Croatia</b> (data from Friday, June 23, 2023)</p>
<table>
<thead>
  <tr>
    <th><span>Trending rank</span></th>
    <th><span>Domain</span></th>
    <th><span>Category</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>1</span></td>
    <td><span>lightningmaps.org</span></td>
    <td><span>Weather; Education</span></td>
  </tr>
  <tr>
    <td><span>2</span></td>
    <td><span>freemeteo.com.hr</span></td>
    <td><span>Weather</span></td>
  </tr>
  <tr>
    <td><span>3</span></td>
    <td><span>Vrijeme.hr</span><br /><span>(Croatian Meteorological and Hydrological Service)</span></td>
    <td><span>Politics, Advocacy, and Government-Related</span></td>
  </tr>
  <tr>
    <td><span>4</span></td>
    <td><span>arso.gov.si</span></td>
    <td></td>
  </tr>
  <tr>
    <td><span>5</span></td>
    <td><span>rain-alarm.com</span></td>
    <td><span>Weather; News &amp; Media</span></td>
  </tr>
  <tr>
    <td><span>6</span></td>
    <td><span>sorbs.net</span></td>
    <td><span>Information Security</span></td>
  </tr>
  <tr>
    <td><span>7</span></td>
    <td><span>neverin.hr</span></td>
    <td><span>Information Technology</span></td>
  </tr>
  <tr>
    <td><span>8</span></td>
    <td><span>meteo.hr</span><br /><span>(Croatian Meteorological and Hydrological Service)</span></td>
    <td><span>Business</span></td>
  </tr>
  <tr>
    <td><span>9</span></td>
    <td><span>gamespot.com</span></td>
    <td><span>Gaming; Video Streaming</span></td>
  </tr>
  <tr>
    <td><span>10</span></td>
    <td><span>grad.hr</span></td>
    <td><span>Business</span></td>
  </tr>
</tbody>
</table><p>These were all examples of <b>daily trending domains</b>, but what domains have steadily grown in popularity that week?</p><p>In multiple countries we had travel sites trending that week, sites such as booking.com, rentcars.com and amadeus.com, as many people were making their summer vacation plans. Weather forecast, specifically windy.com domain, was also trending the whole week in locations such as the Dominican Republic, Saint Lucia and Reunion, which was not surprising as the hurricane season began.</p><p><b>Trending This Week</b> (Week June 17 -23, 2023)</p>
<table>
<thead>
  <tr>
    <th><span>Dominican Republic</span></th>
    <th><span>Reunion</span></th>
    <th><span>Saint Lucia</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>cecomsa.com</span></td>
    <td><span>atera.com </span></td>
    <td><span>adition.com</span></td>
  </tr>
  <tr>
    <td><span>blur.io</span></td>
    <td><span>sharethis.com</span></td>
    <td><span>windy.com</span></td>
  </tr>
  <tr>
    <td><span>pxfuel.com</span></td>
    <td><span>windy.com</span></td>
    <td><span>bbc.co.uk</span></td>
  </tr>
  <tr>
    <td><span>windy.com</span></td>
    <td><span>baidu.com</span></td>
    <td><span>ampproject.org</span></td>
  </tr>
  <tr>
    <td><span>mihoyo.com</span></td>
    <td><span>inmobi.com</span></td>
    <td><span>aniview.com</span></td>
  </tr>
</tbody>
</table>
    <div>
      <h3>Final words</h3>
      <a href="#final-words">
        
      </a>
    </div>
    <p>Both <b>Trending Today</b> and <b>Trending This Week</b> top 10 lists are now available on Radar starting today and on <a href="https://developers.cloudflare.com/api/operations/radar-get-ranking-top-domains">Radar API</a>. Feel free to explore them and see what is trending on the Internet.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1Le8JQl3OIy2ut6ynfnl4P/c0af2b1c7b13b7af990621f017e1560b/image1-10.png" />
            
            </figure><p>Visit <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> for additional insights around (Internet disruptions, routing issues, Internet traffic trends, attacks, Internet quality, etc.). Follow us on social media at <a href="https://twitter.com/CloudflareRadar">@CloudflareRadar</a> (Twitter), <a href="https://noc.social/@cloudflareradar">https://noc.social/@cloudflareradar</a> (Mastodon), and <a href="https://bsky.app/profile/radar.cloudflare.com">radar.cloudflare.com</a> (Bluesky), or contact us via e-mail.</p><p>Popular domains are domains of broad appeal based on how people use the Internet. Trending domains are domains that are generating a surge in interest.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Domain Rankings]]></category>
            <category><![CDATA[Consumer Services]]></category>
            <guid isPermaLink="false">24xPOTIXpDpcyt6C9L0cy6</guid>
            <dc:creator>Sabina Zejnilovic</dc:creator>
        </item>
        <item>
            <title><![CDATA[The state of application security in 2023]]></title>
            <link>https://blog.cloudflare.com/application-security-2023/</link>
            <pubDate>Tue, 14 Mar 2023 13:00:00 GMT</pubDate>
            <description><![CDATA[ One year ago we published our first Application Security Report. For Security Week 2023, we are providing updated insights and trends around mitigated traffic, bot and API traffic, and account takeover attacks. ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3GRJDQ6QM2YpuKYXI37zWr/08e76c72a478028a390db8d262ca1d36/image13-1.png" />
            
            </figure><p>One year ago we published our <a href="/application-security/">first Application Security Report</a>. For Security Week 2023, we are providing updated insights and trends around mitigated traffic, bot and API traffic, and <a href="https://www.cloudflare.com/zero-trust/solutions/account-takeover-prevention/">account takeover attacks</a>.</p><p>Cloudflare has grown significantly over the last year. In <a href="https://news.netcraft.com/archives/2023/02/28/february-2023-web-server-survey.html">February 2023</a>, Netcraft noted that Cloudflare had become the most commonly used web server vendor within the top million sites at the start of 2023, and continues to grow, reaching a 21.71% market share, up from 19.4% in February 2022.</p><p>This continued growth now equates to Cloudflare handling over 45 million HTTP requests/second on average (up from 32 million last year), with more than 61 million HTTP requests/second at peak. DNS queries handled by the network are also growing and stand at approximately 24.6 million queries/second. All of this traffic flow gives us an unprecedented view into Internet trends.</p><p>Before we dive in, we need to define our terms.</p>
    <div>
      <h2>Definitions</h2>
      <a href="#definitions">
        
      </a>
    </div>
    <p>Throughout this report, we will refer to the following terms:</p><ul><li><p><b>Mitigated traffic</b>: any eyeball HTTP* request that had a “terminating” action applied to it by the Cloudflare platform. These include the following actions: <code>BLOCK</code>, <a href="https://developers.cloudflare.com/fundamentals/get-started/concepts/cloudflare-challenges/#legacy-captcha-challenge"><code>CHALLENGE</code></a>, <a href="https://developers.cloudflare.com/fundamentals/get-started/concepts/cloudflare-challenges/#js-challenge"><code>JS_CHALLENGE</code></a> and <a href="https://developers.cloudflare.com/fundamentals/get-started/concepts/cloudflare-challenges/#managed-challenge-recommended"><code>MANAGED_CHALLENGE</code></a>. This does not include requests that had the following actions applied: <code>LOG</code>, <code>SKIP</code>, <code>ALLOW</code>. In contrast to last year, we now exclude requests that had <code>CONNECTION_CLOSE</code> and <code>FORCE_CONNECTION_CLOSE</code> actions applied by our DDoS mitigation system, as these technically only slow down connection initiation. They also accounted for a relatively small percentage of requests. Additionally, we improved our calculation regarding the <code>CHALLENGE</code> type actions to ensure that only unsolved challenges are counted as mitigated. A detailed <a href="https://developers.cloudflare.com/ruleset-engine/rules-language/actions/">description of actions</a> can be found in our developer documentation.</p></li><li><p><b>Bot traffic/automated traffic</b>: any HTTP* request identified by Cloudflare’s <a href="https://www.cloudflare.com/products/bot-management/">Bot Management</a> system as being generated by a bot. This includes requests with a <a href="https://developers.cloudflare.com/bots/concepts/bot-score/">bot score</a> between <a href="https://developers.cloudflare.com/bots/concepts/bot-score/">1 and 29</a> inclusive. This has not changed from last year’s report.</p></li><li><p><b>API traffic</b>: any HTTP* request with a response content type of <code>XML</code> or <code>JSON</code>. Where the response content type is not available, such as for mitigated requests, the equivalent <code>Accept</code> content type (specified by the user agent) is used instead. In this latter case, API traffic won’t be fully accounted for, but it still provides a good representation for the purposes of gaining insights.</p></li></ul><p>Unless otherwise stated, the time frame evaluated in this post is the 12 month period from March 2022 through February 2023 inclusive.</p><p>Finally, please note that the data is calculated based only on traffic observed across the Cloudflare network and does not necessarily represent overall HTTP traffic patterns across the Internet.</p><p>*When referring to HTTP traffic we mean both HTTP and HTTPS.</p>
    <div>
      <h2>Global traffic insights</h2>
      <a href="#global-traffic-insights">
        
      </a>
    </div>
    
    <div>
      <h3>6% of daily HTTP requests are mitigated on average</h3>
      <a href="#6-of-daily-http-requests-are-mitigated-on-average">
        
      </a>
    </div>
    <p>In looking at all HTTP requests proxied by the Cloudflare network, we find that the share of requests that are mitigated has dropped to 6%, down two percentage points compared to last year. Looking at 2023 to date, we see that mitigated request share has fallen even further, to between 4-5%. Large spikes visible in the chart below, such as those seen in June and October, often correlate with large DDoS attacks mitigated by Cloudflare. It is interesting to note that although the percentage of mitigated traffic has decreased over time, the total mitigated request volume has been relatively stable as shown in the second chart below, indicating an increase in overall clean traffic globally rather than an absolute decrease in malicious traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5eiU8dDdgzilfy1QDkz444/b3e287f663e473138259bac7c2dea4f3/Screenshot-2023-03-06-at-23.00.01.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3ObkNfvMZcTPPxXnDjhgfe/e5a9c47dbdd1ff43a53119f6e0013041/pasted-image-0-7.png" />
            
            </figure><p>81% of mitigated HTTP requests were outright <code>BLOCK</code>ed, with mitigations for the remaining set split across the various <code>CHALLENGE</code> type actions.</p>
    <div>
      <h3>DDoS mitigation accounts for more than 50% of all mitigated traffic</h3>
      <a href="#ddos-mitigation-accounts-for-more-than-50-of-all-mitigated-traffic">
        
      </a>
    </div>
    <p>Cloudflare provides various security features that customers can configure to keep their applications safe. Unsurprisingly, DDoS mitigation is still the largest contributor to mitigated layer 7 (application layer) HTTP requests. Just last month (February 2023), we reported the <a href="/cloudflare-mitigates-record-breaking-71-million-request-per-second-ddos-attack/">largest known mitigated DDoS attack by HTTP requests/second volume</a> (This particular attack is not visible in the graphs above because they are aggregated at a daily level, and the attack only lasted for ~5 minutes).</p><p>Compared to last year, however, mitigation by the Cloudflare WAF has grown significantly, and now accounts for nearly 41% of mitigated requests. This can be partially attributed to <a href="/stop-attacks-before-they-are-known-making-the-cloudflare-waf-smarter/">advances in our WAF technology</a> that enables it to detect and block a larger range of attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3pdhwKY0jThTj1OiHqL4vB/e94c2be1c4750b148718970118673938/out.png" />
            
            </figure><p>Tabular format for reference:</p>
<table>
<thead>
  <tr>
    <th><span>Source</span></th>
    <th><span>Percentage %</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>DDoS Mitigation</span></td>
    <td><span>52%</span></td>
  </tr>
  <tr>
    <td><span>WAF</span></td>
    <td><span>41%</span></td>
  </tr>
  <tr>
    <td><span>IP reputation</span></td>
    <td><span>4%</span></td>
  </tr>
  <tr>
    <td><span>Access Rules</span></td>
    <td><span>2%</span></td>
  </tr>
  <tr>
    <td><span>Other</span></td>
    <td><span>1%</span></td>
  </tr>
</tbody>
</table><p>Please note that in the table above, in contrast to last year, we are now grouping our products to match our marketing materials and the groupings used in the <a href="https://radar.cloudflare.com/year-in-review/2022">2022 Radar Year in Review</a>. This mostly affects our WAF product that comprises the combination of WAF Custom Rules, WAF Rate Limiting Rules, and WAF Managed Rules. In last year’s report, these three features accounted for an aggregate 31% of mitigations.</p><p>To understand the growth in WAF mitigated requests over time, we can look one level deeper where it becomes clear that Cloudflare customers are increasingly relying on WAF Custom Rules (historically referred to as Firewall Rules) to mitigate malicious traffic or implement business logic blocks. Observe how the orange line (<code>firewallrules</code>) in the chart below shows a gradual increase over time while the blue line (<code>l7ddos</code>) clearly trends lower.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ZcNrwcUi33RFZZd8zgg67/ecf460086091b5ba9e081940a6931426/pasted-image-0--1--3.png" />
            
            </figure>
    <div>
      <h3>HTTP Anomaly is the most frequent layer 7 attack vector mitigated by the WAF</h3>
      <a href="#http-anomaly-is-the-most-frequent-layer-7-attack-vector-mitigated-by-the-waf">
        
      </a>
    </div>
    <p>Contributing 30% of WAF Managed Rules mitigated traffic overall in March 2023, HTTP Anomaly’s share has decreased by nearly 25 percentage points as compared to the same time last year. Examples of HTTP anomalies include malformed method names, null byte characters in headers, non-standard ports or content length of zero with a <code>POST</code> request. This can be attributed to botnets matching HTTP anomaly signatures slowly changing their traffic patterns.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/35U8ZjXfZTDdpRQ59xV3w9/3e533f90eb2f42a067edd7b7ad086231/pasted-image-0--2--1.png" />
            
            </figure><p>Removing the HTTP anomaly line from the graph, we can see that in early 2023, the attack vector distribution looks a lot more balanced.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6rluFF9pSRJLaGItGsxfCT/7706f922a43159a25aa44154a3b0a0dc/pasted-image-0--3--1.png" />
            
            </figure><p>Tabular format for reference (top 10 categories):</p>
<table>
<thead>
  <tr>
    <th><span>Source</span></th>
    <th><span>Percentage % (last 12 months)</span></th>
  </tr>
</thead>
<tbody>
  <tr>
    <td><span>HTTP Anomaly</span></td>
    <td><span>30%</span></td>
  </tr>
  <tr>
    <td><span>Directory Traversal</span></td>
    <td><span>16%</span></td>
  </tr>
  <tr>
    <td><span>SQLi</span></td>
    <td><span>14%</span></td>
  </tr>
  <tr>
    <td><span>File Inclusion</span></td>
    <td><span>12%</span></td>
  </tr>
  <tr>
    <td><span>Software Specific</span></td>
    <td><span>10%</span></td>
  </tr>
  <tr>
    <td><span>XSS</span></td>
    <td><span>9%</span></td>
  </tr>
  <tr>
    <td><span>Broken Authentication</span></td>
    <td><span>3%</span></td>
  </tr>
  <tr>
    <td><span>Command Injection</span></td>
    <td><span>3%</span></td>
  </tr>
  <tr>
    <td><span>Common Attack</span></td>
    <td><span>1%</span></td>
  </tr>
  <tr>
    <td><span>CVE </span></td>
    <td><span>1%</span></td>
  </tr>
</tbody>
</table><p>Of particular note is the orange line spike seen towards the end of February 2023 (CVE category). The spike relates to a sudden increase of two of our WAF Managed Rules:</p><ul><li><p>Drupal - Anomaly:Header:X-Forwarded-For (id: <code>d6f6d394cb01400284cfb7971e7aed1e</code>)</p></li><li><p>Drupal - Anomaly:Header:X-Forwarded-Host (id: <code>d9aeff22f1024655937e5b033a61fbc5</code>)</p></li></ul><p>These two rules are also tagged against <a href="https://nvd.nist.gov/vuln/detail/CVE-2018-14774">CVE-2018-14774</a>, indicating that even relatively old and known vulnerabilities are still often targeted in an effort to exploit potentially unpatched software.</p>
    <div>
      <h2>Bot traffic insights</h2>
      <a href="#bot-traffic-insights">
        
      </a>
    </div>
    <p>Cloudflare’s <a href="https://www.cloudflare.com/products/bot-management/">Bot Management</a> solution has seen significant investment over the last twelve months. New features such as configurable heuristics, hardened JavaScript detections, automatic <a href="https://www.cloudflare.com/learning/ai/what-is-machine-learning/">machine learning model</a> updates, and <a href="https://www.cloudflare.com/products/turnstile/">Turnstile</a>, Cloudflare’s free CAPTCHA replacement, make our classification of human vs. bot traffic improve daily.</p><p>Our confidence in the classification output is very high. If we plot the bot scores across the traffic from the last week of February 2023, we find a very clear distribution, with most requests either being classified as definitely bot (less than 30) or definitely human (greater than 80) with most requests actually scoring less than 2 or greater than 95.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/KD5WOxYsgKxjXru5Y92q3/7e214da58227bcb5bea9de2a1b8a5b4e/pasted-image-0--4--1.png" />
            
            </figure>
    <div>
      <h3>30% of HTTP traffic is automated</h3>
      <a href="#30-of-http-traffic-is-automated">
        
      </a>
    </div>
    <p>Over the last week of February 2023, 30% of Cloudflare HTTP traffic was classified as automated, equivalent to about 13 million HTTP requests/second on the Cloudflare network. This is 8 percentage points less than at the same time last year.</p><p>Looking at bot traffic only, we find that only 8% is generated by verified bots, comprising 2% of total traffic. Cloudflare maintains a list of known good (verified) bots to allow customers to easily distinguish between well-behaved bot providers like Google and Facebook and potentially lesser known or unwanted bots. There are currently <a href="https://radar.cloudflare.com/traffic/verified-bots">171 bots in the list</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2NGH6G5AdgzABSAo6ItxhD/40429c8382f4ea3db4327f6bbcfca7ca/pasted-image-0--5-.png" />
            
            </figure>
    <div>
      <h3>16% of non-verified bot HTTP traffic is mitigated</h3>
      <a href="#16-of-non-verified-bot-http-traffic-is-mitigated">
        
      </a>
    </div>
    <p>Non-verified bot traffic often includes vulnerability scanners that are constantly looking for exploits on the web, and as a result, nearly one-sixth of this traffic is mitigated because some customers prefer to restrict the insights such tools can potentially gain.</p><p>Although verified bots like googlebot and bingbot are generally seen as beneficial and most customers want to allow them, we also see a small percentage (1.5%) of verified bot traffic being mitigated. This is because some site administrators don’t want portions of their site to be crawled, and customers often rely on WAF Custom Rules to enforce this business logic.</p><p>The most common action used by customers is to <code>BLOCK</code> these requests (13%), although we do have some customers configuring <code>CHALLENGE</code> actions (3%) to ensure any human false positives can still complete the request if necessary.</p><p>On a similar note, it is also interesting that nearly 80% of all mitigated traffic is classified as a bot, as illustrated in the figure below. Some may note that 20% of mitigated traffic being classified as human is still extremely high, but most mitigations of human traffic are generated by WAF Custom Rules, and are frequently due to customers implementing country-level or other related legal blocks on their applications. This is common, for example, in the context of US-based companies blocking access to European users for GDPR compliance reasons.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4LUr8AfDJrf4U5IfRLFnC6/41af48de35fac34e053f9ef256bc9e1b/Ms7yLEMZH9YTC2GfsGffgbk4rQwzHfpIwPlVe1dy7ZkNxLKe49WZHfope9X9Z-x9BZ0ygFBqay5NV5ipMU42-7uNt5QTYkv8VryoXr5QaJp4-ystQ7I7x6WIa2-c.png" />
            
            </figure>
    <div>
      <h2>API traffic insights</h2>
      <a href="#api-traffic-insights">
        
      </a>
    </div>
    
    <div>
      <h3>55% of dynamic (non cacheable) traffic is API related</h3>
      <a href="#55-of-dynamic-non-cacheable-traffic-is-api-related">
        
      </a>
    </div>
    <p>Just like our Bot Management solution, we are also investing heavily in tools to protect API endpoints. This is because a <b>lot</b> of HTTP traffic is API related. In fact, if you count only HTTP requests that reach the origin and are <b>not</b> cacheable, up to 55% of traffic is API related, as per the definition stated earlier. This is the same methodology used in last year’s report, and the 55% figure remains unchanged year-over-year.</p><p>If we look at cached HTTP requests only (those with a cache status of <code>HIT</code>, <code>UPDATING</code>, <code>REVALIDATED</code> and <code>EXPIRED</code>) we find that, maybe surprisingly, nearly 7% is API related. Modern API endpoint implementations and proxy systems, including our own <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api-gateway/">API Gateway</a>/caching feature set, in fact, allow for very flexible cache logic allowing both <a href="https://developers.cloudflare.com/cache/how-to/create-cache-keys/">caching on custom keys</a> as well as quick cache revalidation (<a href="https://developers.cloudflare.com/cache/about/edge-browser-cache-ttl/#:~:text=Edge%20Cache%20TTL%20(Time%20to,TTL%20depends%20on%20plan%20type.&amp;text=For%20more%20information%20on%20creating%20page%20rules%2C%20see%20Create%20page%20rules.)">as often as every second</a> allowing developers to reduce load on back end endpoints.</p><p>Including cacheable assets and other requests in the total count, such as redirects, the number goes down, but is still 25% of traffic. In the graph below we provide both perspectives on API traffic:</p><ul><li><p>Yellow line: % of API traffic against all HTTP requests. This will include redirects, cached assets and all other HTTP requests in the total count;</p></li><li><p>Blue line: % of API traffic against dynamic traffic returning HTTP 200 OK response code only;</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3sBxmFpYbAGXEFqoJnr2SS/5518e387d93644a48d2a6cefc721d834/pasted-image-0--6-.png" />
            
            </figure>
    <div>
      <h3>65% of global API traffic is generated by browsers</h3>
      <a href="#65-of-global-api-traffic-is-generated-by-browsers">
        
      </a>
    </div>
    <p>A growing number of web applications nowadays are built “API first”. This means that the initial HTML page load only provides the skeleton layout, and most dynamic components and data are loaded via separate API calls (for example, via <a href="https://en.wikipedia.org/wiki/Ajax_(programming)">AJAX</a>). This is the case for Cloudflare’s own dashboard. This growing implementation paradigm is visible when analyzing the bot scores for API traffic. We can see in the figure below that a large amount of API traffic is generated by user-driven browsers classified as “human” by our system, with nearly two-thirds of it clustered at the high end of the “human” range.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/49vmou2pqy4n6RMVyZp0rf/60feafffa33b03318e80a3f210bbed1a/pasted-image-0--7--2.png" />
            
            </figure><p>Calculating mitigated API traffic is challenging, as we don’t forward the request to origin servers, and therefore cannot rely on the response content type. Applying the same calculation that was used last year, a little more than 2% of API traffic is mitigated, down from 10.2% last year.</p>
    <div>
      <h3>HTTP Anomaly surpasses SQLi as most common attack vector on API endpoints</h3>
      <a href="#http-anomaly-surpasses-sqli-as-most-common-attack-vector-on-api-endpoints">
        
      </a>
    </div>
    <p>Compared to last year, HTTP anomalies now surpass SQLi as the most popular attack vector attempted against API endpoints (note the blue line being higher at the start of the graph just when last year's report was published). Attack vectors on API traffic are not consistent throughout the year and show more variation as compared to global HTTP traffic. For example, note the spike in file inclusion attack attempts in early 2023.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4jHOBvqPAy11orLuscByY0/4422fa5b78e4cd1ec2e3a455231bd3a5/pasted-image-0--8-.png" />
            
            </figure>
    <div>
      <h2>Exploring account takeover attacks</h2>
      <a href="#exploring-account-takeover-attacks">
        
      </a>
    </div>
    <p>Since <a href="/account-takeover-protection/">March 2021, Cloudflare has provided a leaked credential check feature as part of its WAF</a>. This allows customers to be notified (via an HTTP request header) whenever an authentication request is detected with a username/password pair that is known to be leaked. This tends to be an extremely effective signal at detecting botnets performing account takeover brute force attacks.</p><p>Customers also use this signal, on valid username/password pair login attempts, to issue two factor authentication, password reset, or in some cases, increased logging in the event the user is not the legitimate owner of the credentials.</p>
    <div>
      <h3>Brute force account takeover attacks are increasing</h3>
      <a href="#brute-force-account-takeover-attacks-are-increasing">
        
      </a>
    </div>
    <p>If we look at the trend of matched requests over the past 12 months, an increase is noticeable starting in the latter half of 2022, indicating growing fraudulent activity against login endpoints. During large brute force attacks we have observed matches against HTTP requests with leaked credentials at a rate higher than 12k per minute.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3uTR3ZU85pPkHG6xtlAicC/707ddc37a95b5a7ec113e7d710bc3b52/pasted-image-0--9-.png" />
            
            </figure><p>Our leaked credential check feature has rules matching authentication requests for the following systems:</p><ul><li><p>Drupal</p></li><li><p>Ghost</p></li><li><p>Joomla</p></li><li><p>Magento</p></li><li><p>Plone</p></li><li><p>WordPress</p></li><li><p>Microsoft Exchange</p></li><li><p>Generic rules matching common authentication endpoint formats</p></li></ul><p>This allows us to compare activity from malicious actors, normally in the form of botnets, attempting to “break into” potentially compromised accounts.</p>
    <div>
      <h3>Microsoft Exchange is attacked more than WordPress</h3>
      <a href="#microsoft-exchange-is-attacked-more-than-wordpress">
        
      </a>
    </div>
    <p>Mostly due to its popularity, you might expect <a href="https://w3techs.com/technologies/details/cm-wordpress">WordPress</a> to be the application most <a href="https://www.cloudflare.com/learning/security/how-to-improve-wordpress-security/">at risk</a> and/or observing most brute force account takeover traffic. However, looking at rule matches from the supported systems listed above, we find that after our generic signatures, the Microsoft Exchange signature is the most frequent match.</p><p>Most applications experiencing brute force attacks tend to be high value assets, and Exchange accounts being the most likely targeted according to our data reflects this trend.</p><p>If we look at leaked credential match traffic by source country, the United States leads by a fair margin. Potentially notable is the absence of China in top contenders given network size. The only exception is Ukraine leading during the first half of 2022 towards the start of the war — the yellow line seen in the figure below.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6XiIU19alI12sLDxm3SDS8/d0bafef4317e397c62b5eafa093d7e54/pasted-image-0--10-.png" />
            
            </figure>
    <div>
      <h2>Looking forward</h2>
      <a href="#looking-forward">
        
      </a>
    </div>
    <p>Given the amount of web traffic carried by Cloudflare, we observe a broad spectrum of attacks. From HTTP anomalies, SQL injection attacks, and <a href="https://www.cloudflare.com/learning/security/threats/cross-site-scripting/">cross-site scripting (XSS)</a> to account takeover attempts and malicious bots, the threat landscape is constantly changing. As such, it is critical that any business operating online is investing in visibility, detection, and mitigation technologies so that they can ensure their applications, and more importantly, their end user’s data, remains safe.</p><p>We hope that you found the findings in this report interesting, and at the very least, gave you an appreciation on the state of <a href="https://www.cloudflare.com/application-services/solutions/">application security</a> on the Internet. There are a lot of bad actors online, and there is no indication that Internet security is getting easier.</p><p>We are already planning an update to this report including additional data and insights across our product portfolio. Keep an eye on <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> for more frequent application security reports and insights.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[API]]></category>
            <category><![CDATA[WAF]]></category>
            <guid isPermaLink="false">aUiJyB7qZCQ2kxHw5bM4B</guid>
            <dc:creator>Michael Tremante</dc:creator>
            <dc:creator>David Belson</dc:creator>
            <dc:creator>Sabina Zejnilovic</dc:creator>
        </item>
        <item>
            <title><![CDATA[Goodbye, Alexa. Hello, Cloudflare Radar Domain Rankings]]></title>
            <link>https://blog.cloudflare.com/radar-domain-rankings/</link>
            <pubDate>Fri, 30 Sep 2022 13:00:00 GMT</pubDate>
            <description><![CDATA[ Today, we are launching a new dataset called Radar Rankings, where we identify the top most popular domains that reflect how people use the Internet globally and per country. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>The Internet is a living organism. Technology changes, shifts in human behavior, social events, intentional disruptions, and other occurrences change the Internet in unpredictable ways, even to the trained eye.</p><p>Cloudflare Radar has long been the place to visit for accessing data and getting unique insights into how people and organizations are using the Internet across the globe, as well as those unpredictable changes to the Internet.</p><p>One of the most popular features on Radar has always been the “Most Popular Domains,” with both global and country-level perspectives. Domain usage signals provide a proxy for user behavior over time and are a good representation of what people are doing on the Internet.</p><p>Today, we’re going one step further and launching a new dataset called Radar Domain Rankings (Beta). Domain Rankings is based on aggregated 1.1.1.1 resolver data that is anonymized in accordance with our <a href="https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/">privacy commitments.</a> The dataset aims to identify the top most popular domains based on how people use the Internet globally, without tracking individuals’ Internet use.</p><p>There are a few reasons why we're doing this now. One is obviously to improve our Radar features with better data and incorporate new learnings. But also, ranking lists are used all over the Internet in all sorts of systems. One of the most used and trusted sources of domain rankings was Alexa, but that service was recently deprecated. We believe we are in a good position to provide a strong alternative.</p><p>Let's see how we built it.</p>
    <div>
      <h3>Differences in domain names</h3>
      <a href="#differences-in-domain-names">
        
      </a>
    </div>
    <p>Before we dig into the data science behind Domain Rankings, it's important to understand what a domain and DNS are. <a href="https://www.cloudflare.com/products/registrar/">Internet domain names</a> are human-readable dot-separated letters, digits and hyphens that correspond to a network resource, like a server or a website. However, your computer and applications don't know what to do with a <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain name</a>; they need IP addresses to send and receive information over the network. <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a> is the system that converts, or resolves, a domain name into an IP address. Think of it as an Internet phonebook for domain names.</p><p><b><i>Note:</i></b><i> This is a simplification. A new standard called Internationalized Domain Names, or IDN, allows using Unicode strings in domain names.</i></p><p>Each dot defines a new hierarchy level, reading right to left. Domains can have multiple levels of depth. The highest level corresponds to country code top-level domains (ccTLDs) like .uk, .fr or .pt, or generic top-level domains (gTLDs) like .com, <a href="https://www.cloudflare.com/application-services/products/registrar/buy-org-domains/">.org</a>, or .net. These are normally assigned to and managed by either country-level entities or administrative organizations operating a registry.</p><p>Then there are the second-level domains like cloudflare.com or google.com. These are normally <a href="https://www.cloudflare.com/learning/dns/how-to-buy-a-domain-name/">purchased</a> and <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name-registrar/">registered</a> by individuals or organizations, which are then free to create and manage as many hostnames and hierarchy levels as they want.</p><p>Unfortunately, however, there are exceptions. For instance, many countries use second-level domain registration. One such example is the United Kingdom, where commercial domains could initially only be registered under the .co.uk hierarchy. Then, later, the policy changed. Google, for example, initially registered google.co.uk but then never changed to google.uk. Both domains are registered, though.</p><p>But that’s not all. Some countries use 3rd level domain registrations. One example is Japan, which offers Regional Domain registration under cities like *.aisai.aichi.jp.</p><p>Projects like the <a href="https://publicsuffix.org/">Public Suffix List</a> are a good starting point for understanding the variations involved, and how they affect validations and assumptions in other systems, such as <a href="https://publicsuffix.org/learn/">cookies</a> in web browsers.</p><p>Domain Rankings takes some of this nuance into account to inform the definition of our current ruleset:</p><ul><li><p>We boil everything down to second-level domains, such as cloudflare.com or google.com.</p></li><li><p>However, if the second level is .edu, .com, .org, .gov, .net, .co or .mil, then we use third-level domains.</p></li><li><p>We don’t distinguish between what we think is a website or an infrastructure system. A domain represents an Internet-available resource.</p></li><li><p>We will also semi-automate, curate and maintain a list of domains that map to popular platforms and services in the future. Example: fb.audio, fb.com, fb.watch, all map to a “facebook” platform.</p></li></ul>
    <div>
      <h3>Defining popularity</h3>
      <a href="#defining-popularity">
        
      </a>
    </div>
    <p>Definitions are important. We established what we consider a domain, but what does domain popularity mean exactly? Our research showed that the volume of traffic generated to a given domain doesn't really work as a proxy for what we perceive as popular. Instead, Domain Rankings looks at the size of the population of users that look up a domain per unit of time. <b>The more people who are interested in a domain, the more popular it is.</b></p><p>Sounds pretty straightforward, right? Well, it’s not. Our databases don’t have cookies, IPs, or other tracking artifacts, and we strip information that leads to identifying an individual from all of our data, by design.</p><p>The good news, however, is that we do a very good job at identifying automated traffic (for instance, you can read about <a href="/cloudflare-bot-management-machine-learning-and-more/">Bot Management</a> and how we use Machine Learning to <a href="/machine-learning-mobile-traffic-bots/">detect bots</a> in HTTP traffic in our blog) and we found we could develop a reasonable proxy for the unique users metric without sacrificing privacy (using other data points that we store for a limited period of time, like the ASN and high-level geolocation information of the request or the Cloudflare data center that served it).</p><p>Domain Rankings’ popularity metric is best described as <b>the estimated relative size of the user population that accesses a domain over some period of time</b>.</p>
    <div>
      <h3>Our approach</h3>
      <a href="#our-approach">
        
      </a>
    </div>
    <p>We <a href="/announcing-1111/">announced</a> 1.1.1.1, our privacy-first consumer DNS resolver in 2018, and over the years it’s grown to become one of the <a href="https://www.dnsperf.com/#!dns-resolvers">top DNS services</a> in the world. 1.1.1.1 is also part of a <a href="https://labs.apnic.net/?p=1127">Research Agreement</a> with APNIC in which we collaborate with them doing <a href="https://blog.apnic.net/2022/09/02/doh-dot-and-plain-old-dns/">public research</a> and DNS data insights.</p><p>The data we collect from it honors our <a href="https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/">privacy commitments</a>, and is aggregated and stripped of any information that could lead to identifying or tracking users. We conducted a privacy examination by a Big Four accounting firm to determine whether the 1.1.1.1 resolver was effectively configured to meet our privacy commitments. You can read more about it in this <a href="/announcing-the-results-of-the-1-1-1-1-public-dns-resolver-privacy-examination/">blog</a>, and the full report is publicly available on our <a href="https://www.cloudflare.com/trust-hub/compliance-resources/">compliance page</a>.</p><p>Even without this personally identifying information, the resulting collection is vast and representative of Internet activity.</p><p>The 1.1.1.1 service is used in many ways. Regular (human) Internet users use it as their DNS resolver, either because they explicitly configured it in their devices, or their ISP did, or because they use <a href="/1111-warp-better-vpn/">WARP</a>, or their <a href="https://developers.cloudflare.com/1.1.1.1/encryption/dns-over-https/encrypted-dns-browsers/">browser uses 1.1.1.1</a> under the hood. However, servers and cloud infrastructure, IoT devices, home routers, and bots also use 1.1.1.1 extensively, which creates a lot of challenges for us when trying to identify human traffic.</p><p>We’ve been using DNS data to calculate the top and trending domains found on both the <a href="https://radar.cloudflare.com/">global</a> and <a href="https://radar.cloudflare.com/us">country</a> pages on Cloudflare Radar. It’s been quite a learning experience trying to improve these lists. We have implemented aggregations, counts, filters, handling exceptions, and tried reducing noise, and yet they’re far from perfect. We felt that there had to be a better way.</p><p>We’ve spent the last six months building a variety of machine learning models to help us predict the rank of a domain.</p><p>Building the model was no easy feat. We experimented with multiple regression types first, to know exactly what the model was doing, and then more complex algorithms to get better performance. We played with different datasets, changed the population groups, variables (features), and combinations of variables, and used synthetic data.</p><p>After evaluation, one of our first conclusions was that building a model that could produce good results for the highest ranked domains and the long tail would be difficult.</p><p>The paper "<a href="https://arxiv.org/pdf/1805.11506.pdf">A Long Way to the Top: Significance, Structure, and Stability of Internet Top Lists</a>" describes this problem well. "The ranking of domains in the long tail should be based on significantly smaller and hence less reliable numbers." Talking to our <a href="https://research.cloudflare.com/">Research Team</a> who submitted the collaboration paper “<a href="https://research.cloudflare.com/publications/Ruth2022/">Toppling Top Lists: Evaluating the Accuracy of Popular Website Lists</a>” to IMC 2022, got us to the same conclusion: the most popular domains (like google.com and facebook.com) have <a href="https://en.wikipedia.org/wiki/Feature_(machine_learning)">feature</a> values disproportionally higher than the lower-ranked domains.</p><p>Therefore, we selected the two models that performed best. One model was trained on the population with the highest feature values, uses more features, and is used to generate the ordered top 100 domain list. A second model was trained on a more general group of domains, uses fewer features, and is used to get the top one million most popular domains, which we then divide into ranking buckets.</p><p>These buckets are ranked, but each bucket’s contents are intentionally unordered. For example, the second bucket of 10,000 most popular domains includes the set of domains that rank from 10,001 to 20,000, but give no further indication of the individual ranking of domains in that bucket. Given the size of some of these buckets and the window of time we use to populate them, they will inherently be exposed to more instability, too. We feel this is a good compromise between the described natural uncertainties of our long tail model and providing a reasonable idea of how close to the top a domain is.</p>
    <div>
      <h3>Results</h3>
      <a href="#results">
        
      </a>
    </div>
    <p>It’s important to mention there is no global view that can establish the perfect rank, and there’s no easy mechanism to confirm if a ranking is, ultimately, good. Data-driven results are always subject to some bias and skewing, related to the context of the organizations and systems that collect them. Sometimes all that can be done is to be transparent about potential sources of bias. The geographical distribution of customers and users, product characteristics, platform features, and behavioral diversity play an essential role in the final result. We are presenting the Cloudflare view, what we see.</p><p>Having said this, Cloudflare sits in a privileged position and handles a significant amount of Internet traffic. We have plenty of signals we can extract from our aggregated data, and believe that makes it possible to generate high quality domain rankings.</p><p>Domain Rankings are available today. You can head up to the <a href="https://radar.cloudflare.com/domains">Domains</a> page and check it out:</p><ul><li><p>Ordered list of the top 100 most popular domains globally and per country, based on our first model. Last 24 hours, updated daily.</p></li><li><p>Unordered global most popular domains datasets divided into buckets of the following sizes: 200, 500, 1,000, 2,000, 5,000, 10,000, 20,000, 50,000, 100,000, 200,000, 500,000, 1,000,000. Last 7 days, updated weekly.</p></li></ul>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/B5SEEhFXhKfdIwe1M5wSU/d0a140a2438a409e16cc6c19f13e779d/image2-70.png" />
            
            </figure>
    <div>
      <h3>Next steps</h3>
      <a href="#next-steps">
        
      </a>
    </div>
    <p>We will keep improving Domain Rankings and monitoring the results. Anyone can access them on <a href="https://radar.cloudflare.com/domains">Cloudflare Radar</a>, read the results, and download the CSV files.</p><p>Feel free to explore our <a href="https://radar.cloudflare.com/domains">Domain Rankings</a> and share feedback with us.</p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[Product News]]></category>
            <category><![CDATA[Domain Rankings]]></category>
            <guid isPermaLink="false">5J0l4tNVI6YQDNfhx6nxQx</guid>
            <dc:creator>Celso Martinho</dc:creator>
            <dc:creator>Sabina Zejnilovic</dc:creator>
        </item>
        <item>
            <title><![CDATA[Application security: Cloudflare’s view]]></title>
            <link>https://blog.cloudflare.com/application-security/</link>
            <pubDate>Mon, 21 Mar 2022 12:59:50 GMT</pubDate>
            <description><![CDATA[ In this post, we share some of the insights we’ve gathered from the 32 million HTTP requests/second that pass through our network ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Developers, bloggers, business owners, and large corporations all rely on Cloudflare to <a href="https://www.cloudflare.com/application-services/solutions/">keep their applications secure, available, and performant</a>.</p><p>To meet these goals, over the last twelve years we have built a smart network capable of protecting many millions of Internet properties. As of March 2022, <a href="https://w3techs.com/technologies/details/cn-cloudflare">W3Techs reports that</a>:</p><blockquote><p><i>“Cloudflare is used by 80.6% of all the websites whose reverse proxy service we know. This is 19.7% of all websites”</i></p></blockquote><p>Netcraft, another provider who crawls the web and monitors adoption puts this figure at more than 20M active sites in their latest <a href="https://news.netcraft.com/archives/2022/02/28/february-2022-web-server-survey.html">Web Server Survey (February 2022)</a>:</p><blockquote><p><i>“Cloudflare continues to make strong gains amongst the million busiest websites, where it saw the only notable increases, with an additional 3,200 sites helping to bring its market share up to 19.4%”</i></p></blockquote><p>The breadth and diversity of the sites we protect, and the billions of browsers and devices that interact with them, gives us unique insight into the ever-changing application security trends on the Internet. In this post, we share some of those insights we’ve gathered from the 32 million HTTP requests/second that pass through our network.</p>
    <div>
      <h2>Definitions</h2>
      <a href="#definitions">
        
      </a>
    </div>
    <p>Before we examine the data, it is useful to define the terminology we use. Throughout this post, we will refer to the following terms:</p><ul><li><p><b>Mitigated Traffic</b>: any eyeball HTTP***** request that had a “terminating” action applied to by the Cloudflare platform. These include actions such as <code>BLOCK</code>, <code>CHALLENGE</code> (such as captchas or JavaScript based challenges). This does not include requests that had the following actions applied: <code>LOG</code>, <code>SKIP</code>, <code>ALLOW</code>.</p></li><li><p><b>Bot Traffic/Automated Traffic</b>: any HTTP request identified by Cloudflare’s <a href="https://www.cloudflare.com/products/bot-management/">Bot Management</a> system as being generated by a bot. This includes requests scored between <a href="https://developers.cloudflare.com/bots/concepts/bot-score/">1 and 29</a>.</p></li><li><p><b>API Traffic</b>: any HTTP request with a response content type of <code>XML</code>, <code>JSON</code>, <code>gRPC</code>, or similar. Where the response content type is not available, such as for mitigated requests, the equivalent <code>Accept</code> content type (specified by the user agent) is used instead. In this latter case API traffic won’t be fully accounted for, but for insight purposes it still provides a good representation.</p></li></ul><p>Unless otherwise stated, the time frame evaluated in this post is the three-month period from December 1, 2021, to March 1, 2022.</p><p>Finally, please note that the data is calculated based only on traffic observed across the Cloudflare network and does not necessarily represent overall HTTP traffic patterns across the Internet.</p><p>*When referring to HTTP traffic we mean both HTTP and HTTPS.</p>
    <div>
      <h2>Global Traffic Insights</h2>
      <a href="#global-traffic-insights">
        
      </a>
    </div>
    <p>The first thing we can look at is traffic mitigated across all HTTP requests proxied by the Cloudflare network. This will give us a good baseline view before drilling into specific traffic types, such as bot and API traffic.</p>
    <div>
      <h3>8% of all Cloudflare HTTP traffic is mitigated</h3>
      <a href="#8-of-all-cloudflare-http-traffic-is-mitigated">
        
      </a>
    </div>
    <p>Cloudflare's proxies ~32 million HTTP requests per second on average, with more than ~44 million HTTP requests per second at peak. Overall, ~2.5 million requests per second are mitigated by our global network and never reach our caches or the origin servers, ensuring our customers’ bandwidth and compute power is only used for clean traffic.</p><p>Site owners using Cloudflare gain access to tools to mitigate unwanted or malicious traffic and allow access to their applications only when a request is deemed clean. This can be done both using fully managed features, such as our <a href="https://www.cloudflare.com/ddos/">DDoS mitigation</a>, <a href="https://www.cloudflare.com/waf/">WAF</a> managed ruleset or schema validation, as well as custom rules that allow users to define their own filters for blocking traffic.</p><p>If we look at the top five Cloudflare features (sources) that mitigated traffic, we get a clear picture of how much each Cloudflare feature is contributing towards helping keep customer sites and applications online and secure:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5GWHpYk7S1KnFnbZZ6vYx2/c391a8d56983ccc3dac9595edad660a7/image7-1.png" />
            
            </figure><table><tr><td><p><b>Source</b></p></td><td><p><b>Percentage %</b></p></td></tr><tr><td><p>Layer 7 DDoS mitigation</p></td><td><p>66.0%</p></td></tr><tr><td><p>Custom WAF Rules</p></td><td><p>19.0%</p></td></tr><tr><td><p>Rate Limiting</p></td><td><p>10.5%</p></td></tr><tr><td><p>IP Threat Reputation</p></td><td><p>2.5%</p></td></tr><tr><td><p>Managed WAF Rules</p></td><td><p>1.5%</p></td></tr></table><p>Looking at each mitigation source individually:</p><ul><li><p><b>Layer 7 DDoS mitigation,</b> perhaps unsurprisingly, is the largest contributor to mitigated HTTP requests by total count (66% overall). Cloudflare’s layer 7 DDoS rules are fully managed and don’t require user configuration: they automatically detect a vast array of HTTP DDoS attacks including those generated by the <a href="/meris-botnet/">Meris botnet</a>, <a href="/cloudflare-blocks-an-almost-2-tbps-multi-vector-ddos-attack/">Mirai botnet</a>, known attack tools, and others. Volumetric DDoS attacks, by definition, create a lot of malicious traffic!</p></li><li><p><b>Custom WAF Rules</b> contribute to more than 19% of mitigated HTTP traffic. These are user-configured rules defined using Cloudflare’s <a href="https://developers.cloudflare.com/ruleset-engine/rules-language/">wirefilter syntax</a>. We explore common rule patterns further down in this post.</p></li><li><p>Our <b>Rate Limiting</b> feature allows customers to define custom thresholds based on application preferences. It is often used as an additional layer of protection for applications against traffic patterns that are too low to be detected as a DDoS attack. Over the time frame analyzed, rate limiting contributed to 10.5% of mitigated HTTP requests.</p></li><li><p><b>IP Threat Reputation</b> is exposed in the Cloudflare dashboard as Security Level. Based on behavior we observe across the network, Cloudflare automatically assigns a threat score to each IP address. When the threat score is above the specified threshold, we challenge the traffic. This accounts for 2.5% of all mitigated HTTP requests.</p></li><li><p>Our <b>Managed WAF Rules</b> are rules that are handcrafted by our internal security analyst team aimed at matching only against valid malicious payloads. They contribute to about 1.5% of all mitigated requests.</p></li></ul>
    <div>
      <h3>HTTP anomalies are the most common attack vector</h3>
      <a href="#http-anomalies-are-the-most-common-attack-vector">
        
      </a>
    </div>
    <p>If we drill into Managed WAF Rules, we get a clear picture of what type of attack vectors malicious users are attempting against the Internet properties we protect.</p><p>The vast majority (over 54%) of HTTP requests blocked by our Managed WAF Rules contain HTTP anomalies, such as malformed method names, null byte characters in headers, non-standard ports or content length of zero with a <code>POST</code> request.</p><p>Common attack types in this category are shown below. These have been grouped when relevant:</p><table><tr><td><p><b>Rule Type</b></p></td><td><p><b>Description</b></p></td></tr><tr><td><p>Missing User Agent</p></td><td><p>These rules will block any request without a <code>User-Agent </code>header. All browsers and legitimate crawlers present this header when connecting to a site. Not having a user agent is a common signal of a malicious request.</p></td></tr><tr><td><p>Not <code>GET</code>, ⁣<code>POST </code>or <code>HEAD </code>Method</p></td><td><p>Most applications only allow standard <code>GET </code>or <code>POST </code>requests (normally used for viewing pages or submitting forms). <code>HEAD </code>requests are also often sent from browsers for security purposes. Customers using our Managed Rules can easily block any other method - which normally results in blocking a large number of vulnerability scanners.</p></td></tr><tr><td><p>Missing Referer</p></td><td><p>When users navigate applications, browsers use the <code>Referer </code>header to indicate where they are coming from. Some applications expect this header to always be present.</p></td></tr><tr><td><p>Non-standard port</p></td><td><p>Customers can configure Cloudflare Managed Rules to block HTTP requests trying to access non-standard ports (such as 80 and 443). This is activity normally seen by vulnerability scanners.</p></td></tr><tr><td><p>Invalid UTF-8 encoding</p></td><td><p>It is common for attackers to attempt to break an application server by sending “special” characters that are not valid in UTF-8 encoding.</p></td></tr></table><p>More commonly known and referenced attack vectors such as <a href="https://www.cloudflare.com/learning/security/threats/cross-site-scripting/">XSS</a> and SQLi only contribute to about 13% of total mitigated requests. More interestingly, attacks aimed at information disclosure are third most popular (10%) and software-specific CVE-based attacks account for about 12% of mitigated requests (more than SQLi alone) highlighting both the importance of needing to patch software quickly, and the likelihood of CVE proof-of-concepts (PoCs) being used to compromise applications, such as with the recent <a href="/tag/log4j/">Log4J</a> vulnerability. The top 10 attack vectors by percentage of mitigated requests are shown below:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4rzfdf3Rf5lAWrWOOQEeMm/07da4fa62caa59facd48934d28503d98/image1-96.png" />
            
            </figure><p>Tabular format for reference:</p><table><tr><td><p><b>Source</b></p></td><td><p><b>Percentage %</b></p></td></tr><tr><td><p>HTTP Anomaly</p></td><td><p>54.5%</p></td></tr><tr><td><p>Vendor Specific CVE</p></td><td><p>11.8%</p></td></tr><tr><td><p>Information Disclosure</p></td><td><p>10.4%</p></td></tr><tr><td><p>SQLi</p></td><td><p>7.0%</p></td></tr><tr><td><p>XSS</p></td><td><p>6.1%</p></td></tr><tr><td><p>File Inclusion</p></td><td><p>3.3%</p></td></tr><tr><td><p>Fake Bots</p></td><td><p>3.0%</p></td></tr><tr><td><p>Command Injection</p></td><td><p>2.7%</p></td></tr><tr><td><p>Open Redirects</p></td><td><p>0.1%</p></td></tr><tr><td><p>Other</p></td><td><p>1.5%</p></td></tr></table>
    <div>
      <h3>Businesses still rely on IP address-based access lists to protect their assets</h3>
      <a href="#businesses-still-rely-on-ip-address-based-access-lists-to-protect-their-assets">
        
      </a>
    </div>
    <p>In the prior section, we noted that 19% of mitigated requests come from Custom WAF Rules. These are rules that Cloudflare customers have implemented using the <a href="https://developers.cloudflare.com/ruleset-engine/rules-language/">wirefilter syntax</a>. At time of writing, Cloudflare customers had a total of ~6.5 million Custom WAF rules deployed.</p><p>It is interesting to look at what rule fields customers are using to identify malicious traffic, as this helps us focus our efforts on what other fully automated mitigations could be implemented to improve the Cloudflare platform.</p><p>The most common field, found in approximately 64% of all custom rules, remains the source IP address or fields easily derived from the IP address, such as the client country location. Note that IP addresses are becoming <a href="/icloud-private-relay/">less useful</a> signals for security policies, but they are often the quickest and simplest type of filter to implement during an attack. Customers are also starting to adopt better <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">approaches</a> such as those offered in our <a href="https://www.cloudflare.com/products/zero-trust/zero-trust-network-access/">Zero Trust portfolio</a> to further reduce reliance on IP address-based fields.</p><p>The top 10 fields are shown below:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3cwHe3Jho6Kmn2abAyrNcz/506c342af633c913aa2337113cb118c5/image2-79.png" />
            
            </figure><p>Tabular format for reference:</p><table><tr><td><p><b>Field name</b></p></td><td><p><b>Used in % of rules</b></p></td></tr><tr><td><p>ip</p></td><td><p>64.9%</p></td></tr><tr><td><p>ip_geoip_country</p></td><td><p>27.3%</p></td></tr><tr><td><p>http_request_uri</p></td><td><p>24.1%</p></td></tr><tr><td><p>http_user_agent</p></td><td><p>21.8%</p></td></tr><tr><td><p>http_request_uri_path</p></td><td><p>17.8%</p></td></tr><tr><td><p>http_referer</p></td><td><p>8.6%</p></td></tr><tr><td><p>cf_client_bot</p></td><td><p>8.3%</p></td></tr><tr><td><p>http_host</p></td><td><p>7.8%</p></td></tr><tr><td><p>ip_geoip_asnum</p></td><td><p>5.8%</p></td></tr><tr><td><p>cf_threat_score</p></td><td><p>4.4%</p></td></tr></table><p>Beyond IP addresses, standard HTTP request fields (<code>URI</code>, <code>User-Agent</code>, <code>Path</code>, <code>Referer</code>) tend to be the most popular. Note, also, that across the entire rule corpus, the average rule combines at least three independent fields.</p>
    <div>
      <h2>Bot Traffic Insights</h2>
      <a href="#bot-traffic-insights">
        
      </a>
    </div>
    <p>Cloudflare has long offered a <a href="https://www.cloudflare.com/products/bot-management/">Bot Management</a> solution to allow customers to gain insights into the automated traffic that might be accessing their application. Using Bot Management classification data, we can perform a deep dive into the world of bots.</p>
    <div>
      <h3>38% of HTTP traffic is automated</h3>
      <a href="#38-of-http-traffic-is-automated">
        
      </a>
    </div>
    <p>Over the time period analyzed, bot traffic accounted for about 38% of all HTTP requests. This traffic includes bot traffic from hundreds of <a href="https://radar.cloudflare.com/verified-bots">Verified Bots tracked by Cloudflare</a>, as well as any request that received a bot score below 30, indicating a high likelihood that it is automated.</p><p>Overall, when bot traffic matches a security configuration, customers allow 41% of bot traffic to pass to their origins, blocking only 6.4% of automated requests. Remember that this includes traffic coming from <a href="/friendly-bots/">Verified Bots</a> like GoogleBot, which ultimately benefits site owners and end users. It’s a reminder that automation in and of itself is not necessarily detrimental to a site.  This is why we segment Verified Bot traffic, and why we give customers a granular bot score, rather than a binary “bot or not bot” indicator. Website operators want the flexibility to be precise with their response to different types of bot traffic, and we can see that they do in fact use this flexibility. Note that our self-serve customers can also decide how to handle bot traffic using our <a href="/super-bot-fight-mode/">Super Bot Fight Mode</a> feature.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/11DcY8IDHUSzyU98QwnMwr/1233c2132a4ec5d0a9a6da9ebdfd2cf7/image6-6.png" />
            
            </figure><p>Tabular data for reference:</p><table><tr><td><p><b>Action on all bot traffic</b></p></td><td><p><b>Percentage %</b></p></td></tr><tr><td><p>allow</p></td><td><p>40.9%</p></td></tr><tr><td><p>log</p></td><td><p>31.9%</p></td></tr><tr><td><p>bypass</p></td><td><p>19.0%</p></td></tr><tr><td><p>block</p></td><td><p>6.4%</p></td></tr><tr><td><p>jschallenge</p></td><td><p>0.5%</p></td></tr></table>
    <div>
      <h3>More than a third of non-verified bot HTTP traffic is mitigated</h3>
      <a href="#more-than-a-third-of-non-verified-bot-http-traffic-is-mitigated">
        
      </a>
    </div>
    <p>31% of all bot traffic observed by Cloudflare is not verified, and comes from thousands of custom-built automated tools like scanners, crawlers, and bots built by hackers. As noted above, automation does not necessarily mean these bots are performing malicious actions. If we look at customer responses to identified bot traffic, we find that 38.5% of HTTP requests from non-verified bots are mitigated. This is obviously a much more defensive configuration compared to overall bot traffic actions shown above:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4bVBq57vLroeKB9eVsZZwx/cc061d55c22e31099796ec5dbbc1ae13/image4-17.png" />
            
            </figure><p>Tabular data for reference:</p><table><tr><td><p><b>Action on non-verified bot traffic</b></p></td><td><p><b>Percentage %</b></p></td></tr><tr><td><p>block</p></td><td><p>34.0%</p></td></tr><tr><td><p>log</p></td><td><p>28.6%</p></td></tr><tr><td><p>allow</p></td><td><p>14.5%</p></td></tr><tr><td><p>bypass</p></td><td><p>13.2%</p></td></tr><tr><td><p>managed_challenge</p></td><td><p>3.7%</p></td></tr></table><p>You’ll notice that almost 30% of customers log traffic rather than take immediate action. We find that many enterprise customers choose to not immediately block bot traffic, so they don’t give a feedback signal to attackers. Rather, they prefer to tag and monitor this traffic, and either drop at a later time or redirect to alternate content. As targeted attack vectors have evolved, responses to those attacks have had to evolve and become more sophisticated as well. Additionally, nearly 3% of non-verified bot traffic is automatically mitigated by our DDoS protection (<code>connection_close</code>). These requests tend to be part of botnets used to attack customer applications.</p>
    <div>
      <h2>API Traffic Insights</h2>
      <a href="#api-traffic-insights">
        
      </a>
    </div>
    <p>Many applications built on the Internet today are not meant to be consumed by humans. Rather, they are intended for computer-to-computer communication. The common way to expose an application for this purpose is to build an <a href="https://www.cloudflare.com/learning/security/api/what-is-an-api/">Application Programming Interface</a> (API) that can be accessed using HTTP.</p><p>Due to the underlying format of the data in transit, API traffic tends to be a lot more structured than standard web applications, causing all sorts of problems from a security standpoint. First, the structured data often causes <a href="https://www.cloudflare.com/learning/ddos/glossary/web-application-firewall-waf/">Web Application Firewalls (WAFs)</a> to generate a large number of false positives. Secondly, due to the nature of APIs, they often go unnoticed, and many companies end up exposing old and unmaintained APIs without knowing, often referred to as “<a href="https://www.cloudflare.com/learning/security/api/what-is-shadow-api/">shadow APIs</a>”.</p><p>Below, we look at some differences in API trends compared to the global traffic insights shown above.</p>
    <div>
      <h3>10% of API traffic is mitigated</h3>
      <a href="#10-of-api-traffic-is-mitigated">
        
      </a>
    </div>
    <p>A good portion of bot traffic is accessing API endpoints, and <a href="/landscape-of-api-traffic/">as discussed previously</a>, API traffic is the fastest growing traffic type on the Cloudflare network, currently accounting for 55% of total requests.</p><p>API endpoints globally receive more malicious requests compared to standard web applications (10% vs 8%) potentially indicating that attackers are focusing more on APIs for their <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/">attack surface</a> as opposed to standard web apps.</p><p>Our DDoS mitigation is still the top source of mitigated events for API endpoints, accounting for just over 63% of the total mitigated requests. More interestingly, Custom WAF rules account for 35% compared to 19% when looking at global traffic. Customers have, to date, been heavily using WAF Custom Rules to lock down and validate traffic to API endpoints, although we expect our <a href="/api-gateway/">API Gateway</a> schema validation feature to soon surpass Custom WAF Rules in terms of mitigated traffic.</p>
    <div>
      <h3>SQLi is the most common attack vector on API endpoints</h3>
      <a href="#sqli-is-the-most-common-attack-vector-on-api-endpoints">
        
      </a>
    </div>
    <p>If we look at our WAF Managed Rules mitigations on API traffic only, we see notable differences compared to global trends. These differences include much more equal distribution across different types of attacks, but more noticeably, SQL injection attacks in the top spot.</p><p>Command Injection attacks are also much more prominent (14.3%), and vectors such as Deserialization make an appearance, contributing to more than 1% of the total mitigated requests.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/21TMW3iQhlB7ACYndt05Bc/5c9af753a8e3770710b0ec2e1a943597/image3-36.png" />
            
            </figure><p>Tabular data for reference:</p><table><tr><td><p><b>Source</b></p></td><td><p><b>Percentage %</b></p></td></tr><tr><td><p>SQLi</p></td><td><p>34.5%</p></td></tr><tr><td><p>HTTP Anomaly</p></td><td><p>18.2%</p></td></tr><tr><td><p>Vendor Specific CVE</p></td><td><p>14.5%</p></td></tr><tr><td><p>Command Injection</p></td><td><p>14.3%</p></td></tr><tr><td><p>XSS</p></td><td><p>7.3%</p></td></tr><tr><td><p>Fake Bots</p></td><td><p>5.8%</p></td></tr><tr><td><p>File Inclusion</p></td><td><p>2.3%</p></td></tr><tr><td><p>Deserialization</p></td><td><p>1.2%</p></td></tr><tr><td><p>Information Disclosure</p></td><td><p>0.6%</p></td></tr><tr><td><p>Other</p></td><td><p>1.3%</p></td></tr></table>
    <div>
      <h2>Looking ahead</h2>
      <a href="#looking-ahead">
        
      </a>
    </div>
    <p>In this post we shared some initial insights around Internet application security trends based on traffic to Cloudflare’s network. Of course, we have only just scratched the surface. Moving forward, we plan to publish quarterly reports with dynamic filters directly on <a href="https://radar.cloudflare.com/">Cloudflare Radar</a> and provide much deeper insights and investigations.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Security]]></category>
            <guid isPermaLink="false">6FcKafpaCrXCzPnuxpkqTS</guid>
            <dc:creator>Michael Tremante</dc:creator>
            <dc:creator>Sabina Zejnilovic</dc:creator>
            <dc:creator>David Belson</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare Radar's 2021 Year In Review]]></title>
            <link>https://blog.cloudflare.com/cloudflare-radar-2021-year-in-review/</link>
            <pubDate>Thu, 23 Dec 2021 15:51:31 GMT</pubDate>
            <description><![CDATA[ In 2021, we continued to live with the effects of the COVID pandemic and Internet traffic was also impacted (differently than in 2020) from it. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>In 2021, we continued to live with the effects of the COVID pandemic and Internet traffic was also impacted by it. Although learning and exercising may have started to get back to something close to normal (depending on the country), the effects of what started almost two years ago on the way people <a href="https://www.pewresearch.org/internet/2021/09/01/the-internet-and-the-pandemic/">work and communicate</a> seems to be here to stay, and the lockdowns or restrictions continue to have an impact on where and how people go online.</p><p>So, Cloudflare Radar's <a href="http://radar.cloudflare.com/year-in-review-2021">2021 Year In Review</a> is out with interactive maps and charts you can use to explore what changed on the Internet throughout this past year. <a href="http://radar.cloudflare.com/year-in-review-2021">Year In Review</a> is part of <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>. We launched <a href="/introducing-cloudflare-radar/">Radar</a> in September 2020 to give anyone access to Internet use and abuse trends.</p><p>This year we’ve added a mobile vs desktop traffic chart, but also the attack distribution that shows the evolution throughout the year — the beginning of July 2021, more than a month after the famous <a href="https://en.wikipedia.org/wiki/Colonial_Pipeline_ransomware_attack">Colonial Pipeline</a> cyberattack, was the time of the year when attacks worldwide peaked.</p><p>There are also interesting pandemic-related trends like the (lack) of Internet activity in Tokyo with the Summer Olympics in town and how Thanksgiving week in the US in late November affected mobile traffic in the United States.</p><p>You can also check our <a href="/popular-domains-year-in-review-2021/">Popular Domains — 2021 Year in Review</a> where TikTok, <a href="https://www.cloudflare.com/ecommerce/">e-commerce</a> and space companies had a big year.</p>
    <div>
      <h3>Internet: growing steadily (with lockdown bumps)</h3>
      <a href="#internet-growing-steadily-with-lockdown-bumps">
        
      </a>
    </div>
    <p>In 2020 by late April we <a href="/recent-trends-in-internet-traffic/">saw</a> that the Internet had seen incredible, sudden growth in traffic because of lockdowns and that was sustained throughout the year as we showed in our <a href="/cloudflare-radar-2020-year-in-review/">2020 Year In Review</a>. 2021 told a slightly different story, depending on the country.</p><p>The big March-April and May Internet traffic peak from 2020 related to the pandemic wasn’t there, in the same way, this year — it was more distributed depending on the local restrictions. In 2021, Internet traffic, globally, continued to grow throughout the year, and it was at the end of the year that was higher (a normal trend, given there’s a growth in categories like <a href="/thanksgivings-biggest-online-shopping-day-was-cyber-monday-but-other-days-were-close-behind/">online shopping</a> and the colder season in the Northern Hemisphere, where most Internet traffic occurs, affects human behaviour).</p><p>The day of the year with the highest growth in traffic worldwide, from our standpoint, was December 2, 2021, with 20% more than the first week of the year — the Y-axis shows the percentage change in Internet traffic using a cohort of top domains from each country. But in May there was also a bump (highlighted in red as a possible pandemic-related occurrence), although not as high as we saw in the March-May period of last year.</p>
    <div>
      <h3>Spikes in Internet traffic — Worldwide 2021</h3>
      <a href="#spikes-in-internet-traffic-worldwide-2021">
        
      </a>
    </div>
    <p>#1 November-December<sup>1</sup> (+23%)</p><p>#2 September (+20%)</p><p>#3 October (+19%)</p><p>#4 August (+16%)</p><p>#5 May (+13%)</p><p><sup>1</sup>Beginning of December</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/GUcPohN92uv80aZupNxsr/6690a957f6038712751090999ec2ca9f/image1-112.png" />
            
            </figure><p>When we focus on specific countries using our <a href="http://radar.cloudflare.com/year-in-review-2021">Year In Review 2021</a> page you can see that new restrictions or lockdowns affected (again) Internet traffic and, in some countries, that is more evident than others.</p><p>In the following table, we show the months with the highest traffic growth (the percentage shown focus on the spikes). From our standpoint the last four months of the year usually have the highest growth in traffic after September, but Canada, the UK, Germany, France, Portugal, South Korea and Brazil seemed to show (in red) an impact of restrictions in their Internet traffic — with higher increases in the first five months of the year.</p>
    <div>
      <h3>Months with the largest traffic growth — 2021</h3>
      <a href="#months-with-the-largest-traffic-growth-2021">
        
      </a>
    </div>
    <table>
	<tbody>
		<tr>
			<td>
			<p><span><span><span><strong><u>United States </u></strong></span></span></span></p>

			<p><span><span><span>#1 November-Dec (+30%)</span></span></span><br />
			<span><span><span>#2 October (+26%)</span></span></span><br />
			<span><span><span>#3 September (+25%)</span></span></span><br />
			<span><span><span>#4 August (+15%)</span></span></span><br />
			<span><span><span>#5 May (+13%)</span></span></span></p>
			</td>
			<td>
			<p><span><span><span><strong><u>Canada</u></strong></span></span></span></p>

			<p><span><span><span>#1 November-Dec (+21%)</span></span></span><br />
			<span><span><span>#2 October (+10%)</span></span></span><br />
			<span><span><span>#3 April (+9%)</span></span></span><br />
			<span><span><span>#4 May (+8%)</span></span></span><br />
			<span><span><span>#5 March (+7%)</span></span></span></p>
			</td>
		</tr>
		<tr>
			<td>
			<p><span><span><span><strong><u>UK</u></strong></span></span></span></p>

			<p><span><span><span>#1 November-Dec (+23%)</span></span></span><br />
			<span><span><span>#2 March (+13%)</span></span></span><br />
			<span><span><span>#3 October (+12%)</span></span></span><br />
			<span><span><span>#4 February (+7%)</span></span></span><br />
			<span><span><span>#5 September (+5%)</span></span></span></p>
			</td>
			<td>
			<p><span><span><span><strong><u>Germany</u></strong></span></span></span></p>

			<p><span><span><span>#1 November-Dec (+25%)</span></span></span><br />
			<span><span><span>#2 October (+15%)</span></span></span><br />
			<span><span><span>#3 May (+7%)</span></span></span><br />
			<span><span><span>#4 February (+6%)</span></span></span><br />
			<span><span><span>#5 September (+5%)</span></span></span></p>
			</td>
		</tr>
		<tr>
			<td>
			<p><span><span><span><strong><u>France</u></strong></span></span></span></p>

			<p><span><span><span>#1 November-Dec (+24%)</span></span></span><br />
			<span><span><span>#2 May (+14%)</span></span></span><br />
			<span><span><span>#3 April (+13%)</span></span></span><br />
			<span><span><span>#4 January (+8%)</span></span></span><br />
			<span><span><span>#5 February (+7%)</span></span></span></p>
			</td>
			<td>
			<p><span><span><span><strong><u>Japan</u></strong></span></span></span></p>

			<p><span><span><span>#1 November-Dec (+32%)</span></span></span><br />
			<span><span><span>#2 October (+28%)</span></span></span><br />
			<span><span><span>#3 September (+28%)</span></span></span><br />
			<span><span><span>#4 August (+24%)</span></span></span><br />
			<span><span><span>#5 July (+18%)</span></span></span></p>
			</td>
		</tr>
		<tr>
			<td>
			<p><span><span><span><strong><u>Australia</u></strong></span></span></span></p>

			<p><span><span><span>#1 November-Dec (+42%)</span></span></span><br />
			<span><span><span>#2 September (+38%)</span></span></span><br />
			<span><span><span>#3 October (+37%)</span></span></span><br />
			<span><span><span>#4 August (+32%)</span></span></span><br />
			<span><span><span>#5 July (+27%)</span></span></span></p>
			</td>
			<td>
			<p><span><span><span><strong><u>Singapore</u></strong></span></span></span></p>

			<p><span><span><span>#1 November-Dec (+62%)</span></span></span><br />
			<span><span><span>#2 October (+58%)</span></span></span><br />
			<span><span><span>#3 September (+58%)</span></span></span><br />
			<span><span><span>#4 August (+41%)</span></span></span><br />
			<span><span><span>#5 July (+31%)</span></span></span></p>
			</td>
		</tr>
		<tr>
			<td>
			<p><span><span><span><strong><u>Portugal</u></strong></span></span></span></p>

			<p><span><span><span>#1</span></span></span><span><span><span> </span></span></span><span><span><span>February (+38%)</span></span></span><br />
			<span><span><span>#2 March (+23%)</span></span></span><br />
			<span><span><span>#3 January (+22%)</span></span></span><br />
			<span><span><span>#4 November-Dec (+18%)</span></span></span><br />
			<span><span><span>#5 April (+17%)</span></span></span></p>
			</td>
			<td>
			<p><span><span><span><strong><u>South Korea</u></strong></span></span></span></p>

			<p><span><span><span>#1 April (+21%)</span></span></span><br />
			<span><span><span>#2 May (+16%)</span></span></span><br />
			<span><span><span>#3 February (+10%)</span></span></span><br />
			<span><span><span>#4 August (+7%)</span></span></span><br />
			<span><span><span>#5 September (+7%)</span></span></span></p>
			</td>
		</tr>
		<tr>
			<td>
			<p><span><span><span><strong><u>Brazil</u></strong></span></span></span></p>

			<p><span><span><span>#1 May (+25%)</span></span></span><br />
			<span><span><span>#2 June (+23%)</span></span></span><br />
			<span><span><span>#3 November-Dec (+22%)</span></span></span><br />
			<span><span><span>#4 April (+21%)</span></span></span><br />
			<span><span><span>#5 July (+21%)</span></span></span></p>
			</td>
			<td>
			<p><span><span><span><strong><u>India</u></strong></span></span></span></p>

			<p><span><span><span>#1 November-Dec (+24%)</span></span></span><br />
			<span><span><span>#2 September (+22%)</span></span></span><br />
			<span><span><span>#3 October (+21%)</span></span></span><br />
			<span><span><span>#4 August (+19%)</span></span></span><br />
			<span><span><span>#5 July (+10%)</span></span></span></p>
			</td>
		</tr>
	</tbody>
</table><p>When we look at those countries' trends we can see that <a href="https://en.wikipedia.org/wiki/COVID-19_pandemic_in_Canada">Canada</a> had lockdowns at the beginning of February that went through March and <a href="https://www.cbc.ca/news/world/coronavirus-covid19-canada-world-may7-2021-1.6017556">May</a>, depending on the area of the country. That is in line with what we’ve seen in <a href="/cloudflare-radar-2020-year-in-review/">2020</a>: when restrictions/lockdowns are up, people tend to use the Internet more to communicate, work, exercise and learn.</p><p>Most of Europe also started 2021 with lockdowns and restrictions that included schools — so online learning was back on. That’s clear in the <a href="https://en.wikipedia.org/wiki/Timeline_of_the_COVID-19_pandemic_in_England_(2021)#January_2021">UK</a>. From January to March showed a high increase in traffic percentage that went down when restrictions were relaxed.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/62inLPBEJszDutJLLVzrD7/5fa19e70077e53e2e36a8147d22dad33/image19-1.png" />
            
            </figure><p><i>The lines here show Internet traffic growth from our standpoint throughout 2020 and 2021 in the UK</i></p><p>The same happens in Portugal, where new measures on January 21, 2021, put the three first months of the year in the top 3 of the year in terms of growth of traffic, and April was #5.</p><p>We can also check the example of France. <a href="https://en.wikipedia.org/wiki/COVID-19_pandemic_in_France#Timeline">Lockdowns</a> were imposed again especially during April and May 2021, and we can see the growth in Internet traffic during those months, slightly more timid than the first lockdown of 2020, but nonetheless evident in the 2021 chart.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7hZbqF7w4PuLLQnGSUpEKc/81c3d57bdd707290b94bb4b25262ab66/image20-8.png" />
            
            </figure><p>Germany had the same situation in May (in <a href="https://www.simmons-simmons.com/en/publications/ckh1rs2cv0vmc0931oa7w6y9h/covid-19-update-on-lockdown-measures-in-germany">April</a> work from home was again the rule and the relaxation of measures for vaccinated people only began in mid-May), but in February the lockdown that started at the end of 2020 (and included schools) was also having an impact on Internet traffic.</p><p>In South Korea there was also an impact of the beginning of the year lockdown seen in spikes through February, April and May 2021.</p><p>Internet traffic growth in the United States had a very different year in 2021 than it had the year before, when the first lockdown had a major effect on Internet growth, but still, May was a month of high growth — it was in mid-May that there were new <a href="https://en.wikipedia.org/wiki/COVID-19_pandemic_in_the_United_States#May_to_August_2021">guidelines</a> from the CDC about masks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/riMEkZp1GPvawEPkMaEOv/4d1a9efb4490271e4f5d32e958186025/image5-38.png" />
            
            </figure>
    <div>
      <h3>Mobile traffic: The Thanksgiving effect</h3>
      <a href="#mobile-traffic-the-thanksgiving-effect">
        
      </a>
    </div>
    <p>Another trend worldwide from 2021 is the mobile traffic percentage evolution. Worldwide, from our standpoint, the more mobile-friendly months of the year — where mobile devices were more prevalent to go online — were July and August (typical vacations months in most of the Northern Hemisphere), but January and November were also very strong.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7d2hfULLj1s3N0AtDX50NI/2762aabb371d25686b8dcfaa6318dc81/image14-2.png" />
            
            </figure><p>On our <a href="https://radar.cloudflare.com/year-in-review-2021/">Year in Review</a> page, you can also see the new mobile vs desktop traffic chart. The evolution of the importance of mobile traffic is different <a href="/where-mobile-traffic-more-and-less-popular/">depending on the country</a>.</p><p>For example, the United States has more desktop traffic throughout the year, but in 2021, during the <a href="/how-the-us-paused-shopping-and-browsing-for-thanksgiving/">Thanksgiving</a> (November 25) week, mobile traffic took the lead for the first and only time in the whole year. We can also see that in July mobile traffic was also high in terms of relevance.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/vnUz2z9zcRNoYzanjcbQV/60362ebf198bba6dce3b37254ffe1a3d/image4-46.png" />
            
            </figure><p>The UK has a similar trend, with June, July and August being the only months of the year when mobile traffic is prevalent compared to desktop.</p><p>If we go to the other side of the planet, to Singapore, there the mobile percentage is usually higher than desktop, and we see a completely different trend than in the US. Mobile traffic was higher in May, and desktop only went above mobile in some days of February, some in March, and especially after the end of October.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2oE5UkSvS2n6aL4uvZMtDF/45ca2a82ee88061c36003c74905de982/image3-59.png" />
            
            </figure>
    <div>
      <h3>Where people accessed the Internet</h3>
      <a href="#where-people-accessed-the-internet">
        
      </a>
    </div>
    <p>We also have, again, available the possibility of selecting a city from the map of our Year in Review to zoom into a city to see the change in Internet use throughout the year. Let’s zoom in on San Francisco.</p><p>The following agglomeration of maps highlights (all available in our <a href="https://radar.cloudflare.com/year-in-review-2021">Year in Review site</a>) the change in Internet use comparing the start of 2020, mid-January to mid-March — you can see that there’s still some increase in traffic, in orange —, to the total lockdown situation of April and May, with more blue areas (decrease in traffic).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4eMzEdJZvzKljZ217ge1vM/67bf0e1a1977e47eb41d6ffce9047cb3/image7-2.jpg" />
            
            </figure><p><i>The red circles shows San Francisco and its surroundings (home of a lot of companies) in a map that compares working hours Internet use on a weekday between two months.</i></p><p>The same trend is seen already in May 2021 in a time when remote work continued to be strong — especially in tech companies (employees <a href="https://www.nytimes.com/2021/01/14/technology/san-francisco-covid-work-moving.html">moved from the Bay Area</a>). Only in June of this year, there was some increase in traffic (more orange areas), especially further away from San Francisco (in residential areas).</p>
    <div>
      <h3>London: From lockdown to a Euro Championship final</h3>
      <a href="#london-from-lockdown-to-a-euro-championship-final">
        
      </a>
    </div>
    <p>London tells us a different story. Looking through the evolution since the start of 2020 we can see that in March (compared to January) we have an increase in traffic (in orange) outside London (where blue is dominant).</p><p>The Internet activity only starts to get heavier in June, in time for the kick-off of the <a href="https://en.wikipedia.org/wiki/UEFA_Euro_2020">2020 UEFA European Championship</a>. The tournament played in several cities in Europe had a lot of restrictions and a number of games were played in London at Wembley Stadium — where Italy won the final by beating England on penalties. But at the time of the final, July, and especially August, blue was already dominant again — so people seemed to leave the London area. Only in September and October did the traffic start to pick up again, but mostly outside the city centre.</p><div></div>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4dXYMFAjBHuhaBiZB6n0jR/bae294775780d8008fa6b22552ceb4ce/image10.jpeg.jpeg" />
            
            </figure>
    <div>
      <h3>The Summer Olympics impact? Tokyo with low activity</h3>
      <a href="#the-summer-olympics-impact-tokyo-with-low-activity">
        
      </a>
    </div>
    <p>After the UEFA European Championship, came the other big event postponed back in 2020, the Tokyo <a href="https://en.wikipedia.org/wiki/2020_Summer_Olympics">Summer Olympics</a>. Our map seems to show the troubled months before the event with the pandemic numbers and the <a href="https://www.npr.org/sections/coronavirus-live-updates/2021/04/23/990133421/japan-declares-3rd-state-of-emergency-3-months-ahead-of-olympics">restrictions rising before the dates</a> of the major event — late July and the first days of August.</p><p>There were athletes, but not fans from around the world and even locals weren't attending — i​t was largely an event held behind <a href="https://en.wikipedia.org/wiki/2020_Summer_Olympics">closed doors</a> with no public spectators permitted due to the declaration of a state of emergency in the Greater Tokyo Area. We can see that in our charts, especially when looking at the increase in activity in March (compared to January) and the decrease in August (compared to June), even with a global event in town (Tokyo is in the red circle).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ubDYUSiWgR3ekZy2QXj5e/5ac3ff7ee7ea229b09904c40e4f1df45/image16.jpg" />
            
            </figure><p>There’s also another interesting trend pandemic-related in Lisbon, Portugal. With the lockdowns put in place since mid-January, the comparison with March shows the centre of the city losing Internet traffic and the residential areas outside Lisbon gaining it (in orange in the animation). But in April the activity decreased even around Lisbon and only started to get heavier in May when restrictions were more a lot more relaxed.</p><div></div>
    <div>
      <h3>Lockdowns bring more traffic to Berlin</h3>
      <a href="#lockdowns-bring-more-traffic-to-berlin">
        
      </a>
    </div>
    <p>A different trend can be seen in Berlin, Germany. Internet activity in the city and its surroundings was very high in March and in April (compared to the previous two months) at a time when lockdowns were in place — nonetheless, <a href="https://radar.cloudflare.com/year-in-review-2020?location=berlin">in 2020</a> the activity decreased in April with the first major lockdown.</p><div></div><p>But in May and June, with the <a href="https://www.reuters.com/world/europe/germany-open-up-covid-19-cases-drop-2021-05-11/">relaxation in restrictions</a>, Internet activity decreased (blue) giving the idea that people left the city or, at least, weren’t using the Internet so much. Only in August did Internet activity begin to pick up again, but decreased once more in the colder months of November and December.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4RGnuzEA6pLWLhyi9lG8qT/b4eb84fc2d6f3ee5f6a7ba19fc70443a/image6-29.png" />
            
            </figure>
    <div>
      <h3>Cyberattacks: Threats that came in July</h3>
      <a href="#cyberattacks-threats-that-came-in-july">
        
      </a>
    </div>
    <p>In terms of worldwide attacks, July and November (the month of Black Friday, when it reached a 78% in increase) were definitely the months with the highest peak of the year. The biggest peak was at the beginning of July 2021, when it reached 82%. That was more than a month after the <a href="https://en.wikipedia.org/wiki/Colonial_Pipeline_ransomware_attack">Colonial Pipeline ransomware cyberattack</a> — May was also the month of an attack on part of <a href="https://www.reuters.com/business/autos-transportation/toshibas-european-business-hit-by-cyberattack-source-2021-05-14/">Toshiba</a> and, in the same week, the <a href="https://apnews.com/article/europe-asia-health-technology-business-2cfbc82beb75dfede32fc225113131b3">Irish health system</a> and of the meat processing company <a href="https://en.wikipedia.org/wiki/JBS_S.A._cyberattack">JBS</a>.</p><p>The week of December 6 (the same when the <a href="/tag/log4j/">Log4j vulnerability</a> was disclosed) also had an increase in attacks — 42% more, and there was also a clear increase (42%) in the beginning of October, around the time of the <a href="/october-2021-facebook-outage/">Facebook outage</a>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4fakmBHxXY4OSaovhp0oLD/2ce3ea183071cfdcae01a90ce79bc45b/image23-3.png" />
            
            </figure><p>In our dedicated <a href="https://radar.cloudflare.com/year-in-review-2021/">page</a> you can check — for the first time this year — the attack distribution in a selection of countries.</p><p>The UK had a very noticeable peak in overall Internet attacks (a growth of 150%) in August and that continued through September. We already saw that the beginning of the year, because of lockdowns, also had an increase in Internet traffic, and we can also see an increase in attacks in January 2021, but also in late November — around the time of the Black Friday week.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/qqnGo1tpA5qsg10dW0UZf/d9533ebd5914d4561b68cbd059141ce5/image8-15.png" />
            
            </figure><p>The United States, on the other hand, saw a growth in threats that was more uniform throughout the year. The biggest spike was between August and September (a time when students, depending on the state, were going <a href="/when-students-go-back-to-school-mobile-usage-goes-down/">back to school</a>), with 65% of growth. July also had a big spike in threats (58%), but also late May (48%) — that was the month of the <a href="https://en.wikipedia.org/wiki/Colonial_Pipeline_ransomware_attack">Colonial Pipeline ransomware cyberattack</a>. Late November also had a spike (29%).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5J98ezsQwOVIhfsfugY3KJ/eb67cadc889597385b641c5e6463594e/image13-3.png" />
            
            </figure><p>Countries like France had their peak in attacks (420% more) in late September and Germany it was in June (425%), but also in October (380%) and in November (350%).</p><p>The same trend can be seen in Singapore, but with an even higher growth. It reached 1,000% more threats in late November and 900% in the same month, around the time of the famous Singles' Day (11.11, on November 11), the main e-commerce event in the region.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5BO7fggM3xKyiWgBBrwL9M/b356db2d760745db37abc70df7d7f675/image6-30.png" />
            
            </figure><p>Also in the region, Australia, for example, also saw a big increase (more than 100%) in attacks in the beginning of September. In Japan, it was more in late May (over 40% of growth in threats).</p>
    <div>
      <h3>What people did online in 2021</h3>
      <a href="#what-people-did-online-in-2021">
        
      </a>
    </div>
    <p>Last year we <a href="/cloudflare-radar-2020-year-in-review/">saw</a> how the e-commerce category jumped in several countries after the first major lockdown — late March.</p><p>In New York, Black Friday, November 26, 2021, was the day of the whole year that e-commerce traffic peaked — it represented 31.9% of traffic, followed by Cyber Monday, November 29, with 26.6% (San Francisco has the same trend). It's also interesting to see that in <a href="https://radar.cloudflare.com/year-in-review-2020?location=nyc">2020</a> the same category peaked Black Friday, November 27, 2020 (24.3%) but April 22, during the first lockdowns, was a close second at 23.1% (this year the category only had ~14% in April).</p><p>Also with no surprise, messaging traffic peaked (20.6%) in the city that never sleeps on the first day of the year, January 1, 2021, to celebrate the New Year.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7IASMp1a7lkYbfkrCmjclf/e08503c9a36c3b5c864eaf315ebe1ff9/image12-5.png" />
            
            </figure>
    <div>
      <h3>London calling (pre-Valentine messages)</h3>
      <a href="#london-calling-pre-valentine-messages">
        
      </a>
    </div>
    <p>But countries, cities and the people who live there have different patterns and in London messaging traffic actually peaks at 21.5% of traffic on Friday, February 12, 2021 (two days before Valentine's Day). While in London, let’s check if Black Friday was also big outside the US. And the answer is: yes! E-commerce traffic peaked at 20.7% of traffic precisely on Black Friday, November 26.</p><p>The pandemic also has an influence in the types of websites people use and in London, travel websites had the biggest percentage in traffic on August 8, with only 1.4% — in Munich it was 1.1% on August 11. On the other hand, in New York and San Francisco, travel websites always had less than 1% of traffic.</p><p>Going back to Europe, Paris, France, saw a different trend. Travel websites had 1.9% of traffic on June 7, 2021, precisely the week that the pandemic restrictions were lifted — <a href="https://edition.cnn.com/travel/article/pandemic-travel-news-france-spain-open-soon/index.html">France opened</a> to international travelers on June 9, 2021. The "City of Light" (and love) had its biggest day of the year for messaging websites (24.4%) on Sunday, January 31 — a time when there were new <a href="https://www.france24.com/en/europe/20210131-new-covid-19-restrictions-only-delaying-the-inevitable-say-french-epidemiologists">restrictions</a> announced to try to avoid a total lockdown.</p>
    <div>
      <h3>The hacker attack: 2021 methods</h3>
      <a href="#the-hacker-attack-2021-methods">
        
      </a>
    </div>
    <p>Our Year in Review site also lets you dig into which attack methods gained the most traction in 2021. It is a given that hackers continued to run their tools to attack websites, overwhelm APIs, and try to <a href="https://www.cloudflare.com/learning/security/what-is-data-exfiltration/">exfiltrate data</a> — recently the <a href="/tag/log4j/">Log4j vulnerability</a> exposed the Internet to new possible exploitation.</p><p>Just to give some examples, in Paris “faking search <a href="https://en.wikipedia.org/wiki/Web_crawler">engine bots</a>” represented 48.3% of the attacks selected for the chart on January 14, 2021, but “<a href="https://www.cloudflare.com/learning/security/threats/sql-injection/">SQL Injection</a>” got to 59% on April 29.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/738LsQwmn1VHenaOQD9Sex/553a750c362bd0b861d6da9a6bbf328b/image21-3.png" />
            
            </figure><p><i>Cyberattacks distribution throughout the year in San Francisco</i></p><p>In London “<a href="https://en.wikipedia.org/wiki/User_agent">User-Agent</a> Anomaly” was also relevant in some parts of the year, but in San Francisco it was mostly “<a href="https://en.wikipedia.org/wiki/Data_breach">information disclosure</a>” that was more prevalent, especially in late November, at a time when online shopping was booming — in December “<a href="https://en.wikipedia.org/wiki/File_inclusion_vulnerability">file inclusion” vulnerability</a> had a bigger percentage.</p>
    <div>
      <h3>Now it's your turn: explore more</h3>
      <a href="#now-its-your-turn-explore-more">
        
      </a>
    </div>
    <p>To explore data for 2021 (but also 2020), you can check out Cloudflare Radar’s <a href="http://radar.cloudflare.com/year-in-review-2021">Year In Review</a> page. To go deep into any specific country with up-to-date data about current trends, start at Cloudflare Radar’s <a href="https://radar.cloudflare.com/">homepage</a>.</p> ]]></content:encoded>
            <category><![CDATA[Year in Review]]></category>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <category><![CDATA[Trends]]></category>
            <guid isPermaLink="false">6yrqBsLdSwxeDTArVMhxYq</guid>
            <dc:creator>João Tomé</dc:creator>
            <dc:creator>Sabina Zejnilovic</dc:creator>
        </item>
        <item>
            <title><![CDATA[When students go back to school mobile usage goes down]]></title>
            <link>https://blog.cloudflare.com/when-students-go-back-to-school-mobile-usage-goes-down/</link>
            <pubDate>Fri, 05 Nov 2021 13:01:17 GMT</pubDate>
            <description><![CDATA[ September is the “get back to school” month for many. Looking at our data there’s a global trend: mobile traffic lost importance (compared with desktop traffic) in September 2021 compared to August. ]]></description>
            <content:encoded><![CDATA[ <p></p><p>For many (especially in the Northern Hemisphere, where about <a href="https://en.wikipedia.org/wiki/Northern_Hemisphere#Demographics">87%</a> of humans live), September is the “get back to school” (or work) month after a summer break and that also reflects changes in the Internet traffic, particularly in mobile usage.</p><p>Looking at our data (you can see many of these insights in <a href="https://radar.cloudflare.com/">Cloudflare Radar</a>) there’s a global trend: mobile traffic lost importance (compared with desktop traffic) in September. The next chart shows there was less percentage of Internet traffic from mobile devices after Monday, September 6, 2021, with a difference of -2% in some days, compared with the previous four weeks (August), and in late September it’s more than -3%.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/vn87lzuVz3GBcQDC6yvN4/f58c73fdeabf1bc843158bb7b74383b1/image5-5.png" />
            
            </figure><p>We can also see that the percentage of desktop traffic increased in September compared to August (we compare here to complete weeks between both months because there are significant differences between weekdays and weekends).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/1N61ecKKRibfcOP3nLZ9fy/9724169fcb8797ce793d643d45f3e44a/image4-4.png" />
            
            </figure><p>A <a href="/where-mobile-traffic-more-and-less-popular/">few of weeks ago</a>, we  saw there are considerable differences between countries regarding the importance of mobile usage. Getting back to work (or office hours) usually means an increase in desktop traffic. In that blog we highlighted the advantages that mobile devices brought to developing countries — many had their first contact with the Internet via a smartphone.</p>
    <div>
      <h3>Different calendars to consider</h3>
      <a href="#different-calendars-to-consider">
        
      </a>
    </div>
    <p>Looking at September 2021, those shifts in Internet trends are more dependent on countries that start their school period at this time of the year and also there are the COVID lockdowns effects (more limited this year) to consider.</p><p>In the Northern Hemisphere, many countries start school in September after a break during the summer.</p>
    <div>
      <h3>Europe: Back to school brings less time to be mobile</h3>
      <a href="#europe-back-to-school-brings-less-time-to-be-mobile">
        
      </a>
    </div>
    <p>Europe is mostly coherent, and it is easier to check for mobile traffic patterns there. Most countries start school in the first 14 days of September, although Finland, Norway, Sweden and Denmark start in late August (like some states in the US, for example).</p><p>There are some countries in Europe where the mobile traffic went down in September more clearly (the overall picture in the continent is similar to the worldwide situation we described). Poland, Malta, Portugal, Italy, Spain registered a drop in specific periods of a few days in September of more than 5% in the mobile traffic percentage of the total Internet traffic.</p><p>Let’s ‘travel’ to <b>Spain</b>, a country where mobile traffic usually represents 45% of Internet traffic (in August this number was higher). Spanish schools officially opened for the new school year on Monday, September 6, and mobile traffic percentage lost more than 5% of its importance in some days of that week, a trend that grew the following week.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3NYNMu5Ubj3WPIroAg0Rp2/5d3d4b55506b071db75789b710d5d5cc/image11-5.png" />
            
            </figure>
    <div>
      <h3>Portugal: A public holiday makes mobile usage go up</h3>
      <a href="#portugal-a-public-holiday-makes-mobile-usage-go-up">
        
      </a>
    </div>
    <p>Portugal shows the same trend as other European countries but as shown in the following chart there was an apparent increase in mobile traffic percentage on October 5, 2021.</p><p>That Tuesday, Cloudflare’s Lisbon office was closed; the same happened across the country because it happens to be a public holiday, <a href="https://en.wikipedia.org/wiki/Public_holidays_in_Portugal">Republic Day</a>. With most people not having to work in the middle of the week, the percentage of mobile traffic has risen (most visible at 19:00 local time).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/222X5G2rnauNRdOgwaA1gw/753d913b061e88ab14237e55bca06895/image8-7.png" />
            
            </figure>
    <div>
      <h3>Downs and ups</h3>
      <a href="#downs-and-ups">
        
      </a>
    </div>
    <p>In <b>Italy,</b> we can see the same pattern, and it was also in the second week of school that mobile traffic percentage went down up to 8%. But by the end of September, it began to normalise to the values of the end of August.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4ZdNjIU72WHR93Vex77cBB/d5ecfb4a04d8ba8dca0ee8ee32cd6615/image2-4.png" />
            
            </figure><p>The trend of mobile traffic going back to having the same level as late August is more clear in the <b>Netherlands</b>.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6oritbYMcf3773c5lnJHd4/a20cf38c97f239eb86a23b859b2577d0/image14-8.png" />
            
            </figure><p>Japan, where the school year starts in April, but there’s a summer break through July and August (this year there were changes related to COVID), also shows the same trend of a decrease in mobile traffic that we saw in the Netherlands after school returned on September 6, 2021.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/9qqcLGX9ITN0TS02YjKBK/5a58770032f685db7144c88398b71af6/image13-5.png" />
            
            </figure>
    <div>
      <h3>US: Start of the school year influenced by COVID</h3>
      <a href="#us-start-of-the-school-year-influenced-by-covid">
        
      </a>
    </div>
    <p>The United States had an atypical start of the school year because of COVID. Many states pushed the return to school from August to September (New York City started on September 13), and there were several schools with online classes because of the pandemic, but there’s also a drop in mobile traffic percentage, especially after Monday, September 6.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/aPb0AZY5R33qNhL3FUgBq/501e02fc4551dd5a7bb5a5bc88c3a302/image7-6.png" />
            
            </figure><p>Further north of the continent, Canada (the school year officially started on September 1) saw mobile traffic lose more of its importance after September 6, a trend that grew by the end of the month.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5ghnWfQ3fnXsznsF9NsluE/099aa429a5fa35ea9d382c85949c9cbf/image12-8.png" />
            
            </figure><p>China saw a decrease in mobile traffic percentage right away in the beginning of September (when the school year started), but mobile recovered in the last week of the month.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/Cthp2ZeruyEr2kh2LXAnn/642cdbab28fca5f2ff54f807a7042935/image3-11.png" />
            
            </figure>
    <div>
      <h3>Russia with different patterns</h3>
      <a href="#russia-with-different-patterns">
        
      </a>
    </div>
    <p>Then there are countries with trends that go the other way around. <b>Russia</b> saw an increase (and not a decrease like in most countries of the Northern Hemisphere) in mobile traffic percentage a few days before the school year. But <a href="https://www.wilsoncenter.org/blog-post/russia-claims-coronavirus-under-control-sends-students-school">news reports</a> show that many schools were closed because of COVID and only started to open by September 20 (the next chart shows precisely a decrease of mobile traffic percentage in that week.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3VwLcnIuTiaMrD9cFJ59bD/645a06364d1a2645e5cb683cffc201cc/image6-6.png" />
            
            </figure><p>The same trend is observed in Cyprus — the only EU country where mobile traffic percentage increases after the first week of school. That could be related with some <a href="https://in-cyprus.philenews.com/covid-pandemic-goes-to-schools-again-two-closures-within-hours/">school closures</a> in the past few weeks COVID related.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/42r4dx9ssCzjB72AUlhmni/a94af36e6de37ad8695de5d827ac2144/image9-5.png" />
            
            </figure>
    <div>
      <h3>Nigeria: COVID impact</h3>
      <a href="#nigeria-covid-impact">
        
      </a>
    </div>
    <p>When we go to Africa, Nigeria is just above the Earth’s equator line and is the most populous country on the continent (population: 206 million), and the school year was officially scheduled to start on September 13. But reports from <a href="https://www.unicef.org/nigeria/press-releases/first-day-school-indefinitely-postponed-least-1-million-nigerian-students">UNICEF</a> show that school reopening was postponed a few weeks because of the pandemic situation in Nigeria.</p><p>This seems to go along the same lines as our data shows: mobile traffic percentage grew on the week of September 13 and only started to come down by the end of September and the beginning of October.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3YtLwYpx0bu9b5f5IG9LGw/ff8b032f1c8abc575c186e871d41d4d5/image10-8.png" />
            
            </figure>
    <div>
      <h3>Conclusion: September, September, the back to school/work centre</h3>
      <a href="#conclusion-september-september-the-back-to-school-work-centre">
        
      </a>
    </div>
    <p>September brings shifts in the Internet traffic trends that seem to have an impact on the way people access the Internet and that goes beyond mobile usage, we can also see that worldwide: the Internet traffic percentage grew significantly — some days more than 10% — in September compared to August (like the graph shows).</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3dYhHPleol6IdmqzF7YPHC/bdb6ef4bc53964219cf17012841252c6/image1-7.png" />
            
            </figure><p>It’s not that surprising when you realise that <a href="https://en.wikipedia.org/wiki/Northern_Hemisphere#Demographics">most people on Earth live in the Northern Hemisphere</a>, where August is a summer and vacation month for many - although countries like India have the rainy monsoon season in August and Mid-September before autumn, for example. So September is not only the month wherein some countries students go back to school, but also when many go back to work.</p> ]]></content:encoded>
            <category><![CDATA[Radar]]></category>
            <category><![CDATA[Internet Traffic]]></category>
            <guid isPermaLink="false">37L5L7BqnVu0qW8tqm32cd</guid>
            <dc:creator>João Tomé</dc:creator>
            <dc:creator>Sabina Zejnilovic</dc:creator>
        </item>
        <item>
            <title><![CDATA[What happened on the Internet during the Facebook outage]]></title>
            <link>https://blog.cloudflare.com/during-the-facebook-outage/</link>
            <pubDate>Fri, 08 Oct 2021 15:16:00 GMT</pubDate>
            <description><![CDATA[ Today, we're going to show you how the Facebook and affiliate sites downtime affected us, and what we can see in our data. ]]></description>
            <content:encoded><![CDATA[ <p>It's been a few days now since Facebook, Instagram, and WhatsApp went AWOL and experienced one of the most extended and rough downtime periods in their existence.</p><p>When that happened, we reported our bird's-eye view of the event and posted the blog <a href="/october-2021-facebook-outage/">Understanding How Facebook Disappeared from the Internet</a> where we tried to explain what we saw and how <a href="https://www.cloudflare.com/learning/dns/what-is-dns/">DNS</a> and BGP, two of the technologies at the center of the outage, played a role in the event.</p><p>In the meantime, more information has surfaced, and Facebook has <a href="https://engineering.fb.com/2021/10/05/networking-traffic/outage-details/">published a blog post</a> giving more details of what happened internally.</p><p>As we said before, these events are a gentle reminder that the Internet is a vast network of networks, and we, as industry players and end-users, are part of it and should work together.</p><p>In the aftermath of an event of this size, we don't waste much time debating how peers handled the situation. We do, however, ask ourselves the more important questions: "How did this affect us?" and "What if this had happened to us?" Asking and answering these questions whenever something like this happens is a great and healthy exercise that helps us improve our own resilience.</p><p>Today, we're going to show you how the Facebook and affiliate sites downtime affected us, and what we can see in our data.</p>
    <div>
      <h3>1.1.1.1</h3>
      <a href="#1-1-1-1">
        
      </a>
    </div>
    <p>1.1.1.1 is a fast and privacy-centric public DNS resolver operated by Cloudflare, used by millions of users, browsers, and devices worldwide. Let's look at our telemetry and see what we find.</p><p>First, the obvious. If we look at the response rate, there was a massive spike in the number of SERVFAIL codes. SERVFAILs can happen for several reasons; we have an excellent blog called <a href="/unwrap-the-servfail/">Unwrap the SERVFAIL</a> that you should read if you're curious.</p><p>In this case, we started serving SERVFAIL responses to all facebook.com and whatsapp.com DNS queries because our resolver couldn't access the upstream Facebook authoritative servers. About 60x times more than the average on a typical day.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7BKM7m3fUz3fCRrVuCN3jh/4cb1ccccd0cbe22f2fed10cf10360084/image16.png" />
            
            </figure><p>If we look at all the queries, not specific to Facebook or WhatsApp domains, and we split them by IPv4 and IPv6 clients, we can see that our load increased too.</p><p>As explained before, this is due to a snowball effect associated with applications and users retrying after the errors and generating even more traffic. In this case, 1.1.1.1 had to handle more than the expected rate for A and AAAA queries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7a67lujBcgIkqVusTr4R1t/6f5bd1971964e4b3721d6096b50bc8d7/image3-12.png" />
            
            </figure><p>Here's another fun one.</p><p>DNS vs. DoT and DoH. Typically, DNS queries and responses are <a href="https://datatracker.ietf.org/doc/html/rfc1035#section-4.2">sent in plaintext over UDP</a> (or TCP sometimes), and that's been the case for decades now. Naturally, this poses security and privacy risks to end-users as it allows in-transit attacks or traffic snooping.</p><p>With DNS over TLS (DoT) and DNS over HTTPS, clients can talk DNS using well-known, well-supported encryption and authentication protocols.</p><p>Our learning center has a good article on "<a href="https://www.cloudflare.com/learning/dns/dns-over-tls/">DNS over TLS vs. DNS over HTTPS</a>" that you can read. Browsers like Chrome, Firefox, and Edge have supported DoH for some time now, WAP uses DoH too, and you can even configure your operating system to use the new protocols.</p><p>When Facebook went offline, we saw the number of DoT+DoH SERVFAILs responses grow by over x300 vs. the average rate.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/TNHkfPvSSHUxljyh89S5a/4de08b52d1a9cd23862d56a90943677b/image14.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2pdogcCvQMRd10yEPUV0hu/c2ce7f4eeabd871727af41e2fc574524/image11-1.png" />
            
            </figure>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6GJdW0PO7zIHBlnkKTyGa2/59fd778bee5c0a837877535399455210/image4-13.png" />
            
            </figure><p>So, we got hammered with lots of requests and errors, causing traffic spikes to our 1.1.1.1 resolver and causing an unexpected load in the edge network and systems. How did we perform during this stressful period?</p><p>Quite well. 1.1.1.1 kept its cool and continued serving the vast majority of requests around the <a href="https://www.dnsperf.com/#!dns-resolvers">famous 10ms mark</a>. An insignificant fraction of p95 and p99 percentiles saw increased response times, probably due to timeouts trying to reach Facebook’s nameservers.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/ZzJKGMnii2ghnbRxI8UoT/8c282529bb5efc0f834728c14047b463/image6-11.png" />
            
            </figure><p>Another interesting perspective is the distribution of the ratio between SERVFAIL and good DNS answers, by country. In theory, the higher this ratio is, the more the country uses Facebook. Here's the map with the countries that suffered the most:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3XJYvy2Ore7FARCv4oBbiD/d1700bca70c1c85c2fe01d3e49019fdb/image18.png" />
            
            </figure><p>Here’s the top twelve country list, ordered by those that apparently use Facebook, WhatsApp and Instagram the most:</p><table><tr><td><p><b>Country</b></p></td><td><p><b>SERVFAIL/Good Answers ratio</b></p></td></tr><tr><td><p>Turkey</p></td><td><p>7.34</p></td></tr><tr><td><p>Grenada</p></td><td><p>4.84</p></td></tr><tr><td><p>Congo</p></td><td><p>4.44</p></td></tr><tr><td><p>Lesotho</p></td><td><p>3.94</p></td></tr><tr><td><p>Nicaragua</p></td><td><p>3.57</p></td></tr><tr><td><p>South Sudan</p></td><td><p>3.47</p></td></tr><tr><td><p>Syrian Arab Republic</p></td><td><p>3.41</p></td></tr><tr><td><p>Serbia</p></td><td><p>3.25</p></td></tr><tr><td><p>Turkmenistan</p></td><td><p>3.23</p></td></tr><tr><td><p>United Arab Emirates</p></td><td><p>3.17</p></td></tr><tr><td><p>Togo</p></td><td><p>3.14</p></td></tr><tr><td><p>French Guiana</p></td><td><p>3.00</p></td></tr></table>
    <div>
      <h3>Impact on other sites</h3>
      <a href="#impact-on-other-sites">
        
      </a>
    </div>
    <p>When Facebook, Instagram, and WhatsApp aren't around, the world turns to other places to look for information on what's going on, other forms of entertainment or other applications to communicate with their friends and family. Our data shows us those shifts. While Facebook was going down, other services and platforms were going up.</p><p>To get an idea of the changing traffic patterns we look at DNS queries as an indicator of increased traffic to specific sites or types of site.</p><p>Here are a few examples.</p><p>Other social media platforms saw a slight increase in use, compared to normal.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7uFhqEr4MIl6HxpBI9GG1M/a995ce00e0ff2b2b96d9aa9fb3341fa6/image17.png" />
            
            </figure><p>Traffic to messaging platforms like Telegram, Signal, Discord and Slack got a little push too.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/16AyoRRD7YSUSd3MuHNNGO/c587c9a318702877248025d86f921c79/image9-6.png" />
            
            </figure><p>Nothing like a little gaming time when Instagram is down, we guess, when looking at traffic to sites like Steam, Xbox, Minecraft and others.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/2v3JZdLK2rSbGPlhgicDJn/e8f2bb509432c9b5fa2837588bd1f927/image8-10.png" />
            
            </figure><p>And yes, people want to know what’s going on and fall back on news sites like CNN, New York Times, The Guardian, Wall Street Journal, Washington Post, Huffington Post, BBC, and others:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4JR6ipTzivZfWYOS5rmnlX/c9b363c7babfaa94b096ebd657780b5a/image5-12.png" />
            
            </figure>
    <div>
      <h3>Attacks</h3>
      <a href="#attacks">
        
      </a>
    </div>
    <p>One could speculate that the Internet was under attack from malicious hackers. Our Firewall doesn't agree; nothing out of the ordinary stands out.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/6lBrIk5Tx5b64G2SGtfFXZ/b899bd50829087a48ef38b31b97cfd7a/image13.png" />
            
            </figure>
    <div>
      <h3>Network Error Logs</h3>
      <a href="#network-error-logs">
        
      </a>
    </div>
    <p><a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Network_Error_Logging">Network Error Logging</a>, NEL for short, is an experimental technology supported in Chrome. A website can issue a Report-To header and ask the browser to send reports about network problems, like bad requests or <a href="https://www.cloudflare.com/learning/dns/common-dns-issues/">DNS issues</a>, to a specific endpoint.</p><p>Cloudflare uses NEL data to quickly help triage end-user connectivity issues when end-users reach our network. You can learn more about this feature in our <a href="https://support.cloudflare.com/hc/en-us/articles/360050691831-Understanding-Network-Error-Logging">help center</a>.</p><p>If Facebook is down and their DNS isn't responding, Chrome will start reporting NEL events every time one of the pages in our zones fails to load Facebook comments, posts, ads, or authentication buttons. This chart shows it clearly.<b>​​</b></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/56Sp2huqEtyGiEOmzBrsiU/6ce9a0f9affe20691bf8588d9f4d6a8f/image7-8.png" />
            
            </figure>
    <div>
      <h3>WARP</h3>
      <a href="#warp">
        
      </a>
    </div>
    <p>Cloudflare announced <a href="https://1.1.1.1/">WARP</a> in 2019, and called it "<a href="/1111-warp-better-vpn/">A VPN for People Who Don't Know What V.P.N. Stands For</a>" and offered it for free to its customers. Today WARP is used by millions of people worldwide to securely and privately access the Internet on their desktop and mobile devices. Here's what we saw during the outage by looking at traffic volume between WARP and Facebook’s network:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4UIMVg1PpKr27RRkKagcdp/979d1e3ef2dda3107f4db2799bb2f3f6/WARP-graph-Facebook-outage-Oct-2021.png" />
            
            </figure><p>You can see how the steep drop on Facebook ASN traffic coincides with the start of the incident and how it compares to the same period the day before.</p>
    <div>
      <h3>Our own traffic</h3>
      <a href="#our-own-traffic">
        
      </a>
    </div>
    <p>People tend to think of Facebook as a place to visit. We log in, and we access Facebook, we post. It turns out that Facebook likes to visit us too, quite a lot. Like Google and other platforms, Facebook uses an army of crawlers to constantly check websites for data and updates. Those robots gather information about websites content, such as its titles, descriptions, thumbnail images, and metadata. You can learn more about this on the "<a href="https://developers.facebook.com/docs/sharing/webmasters/crawler/">The Facebook Crawler</a>" page and the <a href="https://ogp.me/">Open Graph</a> website.</p><p>Here's what we see when traffic is coming from the Facebook ASN, supposedly from crawlers, to our CDN sites:</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5bWgF42TihmULktktsg6TX/669f1a605301c7be4f8983d45c42ffd3/image10-3.png" />
            
            </figure><p>The robots went silent.</p><p>What about the traffic coming to our CDN sites from Facebook <a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/User-Agent">User-Agents</a>? The gap is indisputable.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/WCcPk5XJu2bmFxhfNjJq3/825ee59fe0ac3b20f14fe249e18f701d/image1-16.png" />
            
            </figure><p>We see about 30% of a typical request rate hitting us. But it's not zero; why is that?</p><p>We'll let you know a little secret. Never trust User-Agent information; it's broken. User-Agent spoofing is everywhere. Browsers, apps, and other clients deliberately change the User-Agent string when they fetch pages from the Internet to hide, obtain access to certain features, or bypass paywalls (because pay-walled sites want sites like Facebook to index their content, so that then they get more traffic from links).</p><p>Fortunately, there are newer, and privacy-centric standards emerging like <a href="https://developer.mozilla.org/en-US/docs/Web/API/User-Agent_Client_Hints_API">User-Agent Client Hints</a>.</p>
    <div>
      <h3>Core Web Vitals</h3>
      <a href="#core-web-vitals">
        
      </a>
    </div>
    <p>Core Web Vitals are the subset of <a href="https://web.dev/vitals/">Web Vitals</a>, an initiative by Google to provide a unified interface to measure real-world quality signals when a user visits a web page. Such signals include Largest Contentful Paint (LCP), First Input Delay (FID), and Cumulative Layout Shift (CLS).</p><p>We <a href="/web-analytics-vitals-explorer/">use Core Web Vitals</a> with our privacy-centric Web Analytics product and collect anonymized data on how end-users experience the websites that enable this feature.</p><p>One of the metrics we can calculate using these signals is the page load time. Our theory is that if a page includes scripts coming from external sites (for example, Facebook "like" buttons, comments, ads), and they are unreachable, its total load time gets affected.</p><p>We used a list of about 400 domains that we know embed Facebook scripts in their pages and looked at the data.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/HZbQOhcV4ki3H7NVMD6Yq/117d2298e9d0e06521083d5176a34f77/image12.png" />
            
            </figure><p>Now let's look at the Largest Contentful Paint. <a href="https://web.dev/lcp/">LCP</a> marks the point in the page load timeline when the page's main content has likely loaded. The faster the LCP is, the better the end-user experience.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/QJiUkTvEWln7dpvLkVKiV/eb6595b2c781e5ccc68c03b4bd233e3b/image15.png" />
            
            </figure><p>Again, the page load experience got visibly degraded.</p><p>The outcome seems clear. The sites that use Facebook scripts in their pages took 1.5x more time to load their pages during the outage, with some of them taking more than 2x the usual time. Facebook's outage dragged the performance of some other sites down.</p>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>When Facebook, Instagram, and WhatsApp went down, the Web felt it. Some websites got slower or lost traffic, other services and platforms got unexpected load, and people lost the ability to communicate or do business normally.</p> ]]></content:encoded>
            <category><![CDATA[Outage]]></category>
            <category><![CDATA[BGP]]></category>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[Trends]]></category>
            <category><![CDATA[Facebook]]></category>
            <guid isPermaLink="false">4sF0eFLy72giKT8ZsHadhg</guid>
            <dc:creator>Celso Martinho</dc:creator>
            <dc:creator>Sabina Zejnilovic</dc:creator>
        </item>
    </channel>
</rss>