From DDoS to AI: Key Trends of 2024

DDoS Attacks: Record Growth In 2024, the cybersecurity landscape faced an unprecedented surge in web DDoS attacks. Their number skyrocketed by 550%, flooding websites with millions of requests. For instance, a bank in the Middle East battled a massive attack for six days, with peak traffic reaching 14.7 million requests per second. The hardest-hit regions were Europe, the Middle East, and Africa, which accounted for 78% of all attacks. Ukraine found itself at the epicenter of cyber warfare, suffering 2,052 attacks, mostly from pro-Russian hacker groups. Most Targeted Industries In 2024, government institutions remained the primary target, making up 20.1% of all cyberattacks. The most affected countries included Ukraine, India, Israel, the US, Czech Republic, France, Poland, Spain, and the UK. The business services sector ranked second (9.01%), covering e-commerce and corporate websites. The financial sector (8.86%) also suffered significantly, with online banking and payment services being prime targets. Other industries impacted by cybercriminals: Transportation: 7.01% Media & Internet: 6.96% Manufacturing: 6.9% Education: 6.17% Hospitality: 5.95% Telecommunications: 4.5% Organizations: 5.57% This data highlights that no sector remains unnoticed by cybercriminals, and every business requires robust protection against modern threats. Telegram as a Hacker Hub The popular messenger Telegram has become a major hub for cybercrime. The number of reported attacks originating from the platform has risen by 20%, with bots now offering “DDoS-for-hire” services—users can select a target and pay with cryptocurrency. Even after Pavel Durov’s arrest in August and Telegram’s cooperation with authorities (under U.S. requests), hackers continue their operations. Bots: Emerging Threats “Malicious” bots designed to steal accounts and data have become even more dangerous. Their share of total bot traffic has increased by 35%, reaching 71%. Additionally, so-called “gray” AI bots have emerged, secretly collecting data for AI training. API attacks have also surged by 41%, with “shadow” (undocumented) and “zombie” (outdated) APIs becoming easy targets for cybercriminals. What Can You Do? Cybercrime will continue to evolve and become more sophisticated. Don’t wait for a cyber incident to happen—act now. Contact us for expert consultation and tailored security solutions. This material is based on the Radware “2025 Global Threat Analysis Report.” +38 044 230 5200 Infocom Security Services
The Vo1d botnet – threat to Android TV

Vo1d Botnet Infects 1.59 Million Android TVs Worldwide A malicious program called Vo1d has become a major threat to Android TV devices, infecting over 1.59 million of them across 226 countries at its peak on January 19, 2025. Brazil, South Africa, Indonesia, Argentina, and Thailand have been hit the hardest. In India, the infection rate skyrocketed from less than 1% to 18.17% in just one month, reaching 217,771 devices by February 25, 2025. How Does Vo1d Work? This malware is sneaky and hard to spot: It uses complex encryption (RSA and XXTEA) to hide its actions. It pretends to be the official Google Play Services app so users don’t suspect anything. It automatically starts up every time the TV is turned on. How Does It Spread? Experts aren’t entirely sure, but they suspect two main ways: Through unofficial updates (firmware) that people install themselves. Through issues during the production or shipping of devices, where the malware is already built in. Google says the infected models are usually cheap, off-brand Android TVs that aren’t officially checked by Play Protect. These devices often run on open-source Android code (AOSP). What Does Vo1d Do? Vo1d turns infected TVs into an “army” controlled by hackers. They use it to: Create a network for rerouting internet traffic (proxies). Fake ad views to make money through trickery. Potentially launch bigger attacks or stream illegal content in the future. Experts think the hackers rent out this “army” to other criminals. For example, they might use devices in one country for a specific job, then return them to the larger Vo1d network. Why Is This Dangerous? Vo1d has full control over the infected TVs. This means hackers could: Use them as weapons to attack websites or servers. Turn them into tools for fraud or spreading unauthorized content. How to Stay Safe? To protect yourself from Vo1d: Buy only certified Android TVs from trusted brands with official updates. Avoid downloading apps or updates from unknown websites or forums. Source: The Hacker News Our Security Services
Access Control: Biometrics in Action

In a world where cyber threats are becoming increasingly sophisticated, biometric identification is the key to protecting your business. It not only ensures security but also simplifies access control, making it convenient and efficient. Why are biometric systems gaining popularity, and what benefits can they bring to your business? Let’s find out. Biometric identification, once associated with critical infrastructure or secret facilities, is now actively used in the commercial sector today. From unlocking smartphones to accessing corporate networks — these technologies are becoming part of everyday business life. They not only protect assets and data but also ensure transparency and control over many processes. Why are biometric systems beneficial for your company? Biometric identification systems address several key challenges of modern business. Here are just a few examples: Efficient monitoring of personnel movement. You know exactly who enters specific areas and when, which helps prevent violations and improve discipline. Protection against unauthorized access. Restricting access to critical areas prevents unauthorized actions by staff or outsiders. Protection of personal data and assets. Modern risks require modern solutions. Biometric systems form the foundation for multi-component data and asset protection. Cost efficiency. Preventing problems is always cheaper than dealing with their consequences. Additionally, process automation optimizes the use of time, finances, and human resources. Automation of routine processes. Access control using biometric data (fingerprints, facial recognition, or palm vein scanning) is fast, convenient, and understandable for employees. Effective auditing. Identification data can be used to resolve disputed situations, ensuring transparency and order in business processes. Biometrics in business: reliability and accessibility Digital transformation opens new opportunities for companies, and biometric systems are becoming increasingly popular. The growth of internal and external threats makes their installation not just desirable, but necessary. Modern methods of biometric identification Today, businesses use various technologies for security: Facial recognition — quick and contactless user identification. Fingerprints — a popular method used in smartphones and office systems. Retina scanning — a high-precision solution for high-security facilities. Palm vein scanning — one of the most secure methods, significantly reducing the risk of forgery. Among these technologies, palm vein scanning stands out. This system has several advantages: Hundreds of times more reliable than fingerprint scanning. Contactless, ensuring a high level of hygiene. Easy to use, yet not inferior in efficiency to more complex systems like retina scanning. Why are traditional protection methods no longer sufficient? Many companies in Ukraine still use outdated protection methods like passwords, keys, or access cards. However, these methods have several drawbacks: Passwords can be stolen or guessed. Physical carriers (keys or cards) are easily lost, copied, or transferred to third parties. In contrast, biometric systems like facial recognition or palm vein scanning are much harder to bypass. That’s why more and more conscious businesses are turning to multi-factor authentication, which combines physical means, passwords, and biometric data. How to choose a provider of biometric solutions? The market for biometric technologies in Ukraine is rapidly developing, but not all suppliers offer quality and innovative solutions. When choosing a provider, pay attention to these criteria: Experience and expertise. It’s better to work with companies that have long-term experience in the field. Wide range of solutions. The provider should offer various systems so you can choose the optimal one for your business. Technical support. 24/7 support availability is critically important for the effective operation of the systems. Integration. It’s important that the provider helps integrate the biometric system into your company’s existing infrastructure. Among the market leaders is the Ukrainian-German company Infocom with over 33 years of experience in IT and cybersecurity. We offer modern biometric solutions that will help protect your business and optimize processes. Biometric identification is not just a trend but a necessity if you want to protect your business from modern threats and stay one step ahead. It provides a high level of security, process automation, and efficient resource management. If you want to safeguard your business from contemporary threats, contact professionals who can help you choose and implement the optimal solution. 📞 +38 044 230 5200 👉 Our Security Services
Infocom now available at the «HERITAGE» BC!

Infocom services are now available at the HERITAGE Business Center! Companies and organizations located in the modern HERITAGE business center (25 Zhylianska St.) can now take advantage of our cutting-edge solutions for stable connectivity and cybersecurity. We offer: ✅ Energy-independent GPON internet – guaranteed uninterrupted access even in challenging conditions. ✅ L2/L3 data transmission channels – efficient and secure information exchange between offices and branches. ✅ Corporate networks – high performance and security for the stable operation of your business. ✅ DoS/DDoS protection – ensuring uninterrupted operation of your online resources. ✅ Multi-level network perimeter protection – effective blocking of external threats. ✅ Integrated endpoint protection – centralized security management within a unified corporate system. ✅ Reliable email security – protection against phishing attacks and malware. Thank you for your trust – we look forward to working together! 🤝 📞 +38 044 230 5200 👉 Our Security Services
Real Case: Network Protection

Comprehensive Network and Endpoint Protection: First-Week Results Protecting a corporate network from attacks and ensuring the security of hundreds of workstations—this was the task we accomplished for our client as part of a comprehensive cybersecurity solution. First-week system results: 🚨 12,676 threats detected, including 493 critical🚨 Over 3,000 botnet attacks blocked🚨 259 vulnerable devices identified and secured What we did: ✅ Implemented multi-layered network protection with infoGuard✅ Provided comprehensive protection for nearly 500 workstations with infoEP✅ Established continuous 24/7 threat monitoring and response Cyber threats are evolving, but security is evolving too. If your company needs a reliable cybersecurity solution, infoGuard and infoEP will help safeguard your infrastructure. 📞 +38 044 230 5200 👉 Our Security Services
International Data Protection Day

January 28 — International Data Protection Day 🔐 This day has been celebrated since 2006 at the initiative of the Council of Europe, as on January 28, 1981, Convention 108 — the first international treaty on personal data protection — was signed. Today, we remind you once again: data is a valuable resource, and protecting it should be a priority. How to minimize risks?✅ Use strong passwords and two-factor authentication.✅ Avoid opening suspicious files and links.✅ Protect your network and work devices. Need professional cybersecurity solutions? Contact us! 📞 +38 044 230 5200 👉 Our Security Services
48 Hours Under Attack: Infocom Client is Safe!

For 48 hours, our corporate client was subjected to a powerful DDoS attack of the IP/ICMP Fragmentation type. The maximum traffic volume reached 18 Gbps! This type of attack aims to overload the network by using fragmented packets, which creates additional stress on servers and systems, slowing down or even halting the provision of online services. Despite the attack, all services operated in normal mode without interruptions. The attack was successfully repelled ✅ Want to be just as confident in your protection as our clients?Contact us for a consultation 📞 +38 044 230 5200.
Infocom Now Available at the BC «EURASIA»!

Infocom Services Now Available at the «EURASIA» Business Center! Companies and organizations in the Kyiv-based «EURASIA» Business Center, located at 75 Zhylianska Street, can now take advantage of our full range of IT solutions for stable connectivity and reliable cybersecurity. We offer: High-speed and energy-independent internet via GPON technology, ensuring uninterrupted access even in challenging conditions. L2/L3 data transmission channels for efficient and secure information exchange between offices and branches. Corporate networks that meet the highest standards of security and performance, ensuring smooth operation for your business. Multi-layer perimeter protection that effectively blocks external threats. Integrated protection for office computers with centralized management within a unified corporate security system. Reliable email protection, preventing phishing attacks and malicious software. Protection against DoS/DDoS attacks, ensuring the uninterrupted operation of your resources. Thank you for your trust, and we look forward to working with you!
The Main Cyber Threat of 2024 – Ransomware

Ransomware is becoming an increasingly common threat to businesses, and it’s crucial to understand how it infiltrates your systems. Through phishing emails or hidden downloads — this is how these malicious programs can end up on your employees’ work computers. Once inside, they begin taking control of confidential data or entire systems, initiating file encryption. The encrypted files usually get unique extensions like .aaa, .micro, .xyz, .zzz, .locky, .crypt, .petya, and so on. The next step is the victim receiving instructions detailing the ransomware attack’s conditions. You comply — you regain access to your data. Or you don’t. Overall, it’s better not to take the risk and instead protect yourself from such outcomes. Employees’ knowledge of basic information security rules, preventing anonymous system logins, or the use of shared accounts can significantly reduce the risk. However, the best defense remains professional cybersecurity for corporate networks. We are ready to assist you with this, so feel free to contact us when needed!
Happy New Year and Merry Christmas!

Happy New Year and Merry Christmas! During these festive days, we wish you peace, harmony, and tranquility. May the passing year take away all challenges, and the year ahead bring you good health and inspiration for new achievements. May warmth and love fill your homes, and cherished dreams come true. Sincerely yours,The Infocom Team.