UAE Banking Sector Coordinated DDoS Campaign

2024 · Banking sector

By Karim El Labban · ZERO|TOLERANCE

In 2024, a coordinated distributed denial-of-service (DDoS) campaign targeted multiple major UAE banks including Abu Dhabi Commercial Bank (ADCB), First Abu Dhabi Bank (FAB), Mashreq Bank, and RAKBANK. The attacks, which caused significant disruptions to online banking services, mobile applications, and payment processing, were attributed to hacktivist groups and raised critical questions about operational resilience, service availability as a data protection obligation, and the potential for data exposure during incident response.

## Key Facts

  • .**What:** Coordinated DDoS attacks hit multiple major UAE banks simultaneously.
  • .**Who:** ADCB, FAB, Mashreq, RAKBANK, and their customers.
  • .**Data Exposed:** Service disruption; potential data exposure during weakened defenses.
  • .**Outcome:** CBUAE operational resilience scrutiny; systemic risk concerns raised.

## What Was Exposed

  • .Online banking portals rendered inaccessible for extended periods, denying customers access to accounts
  • .Mobile banking applications experiencing intermittent failures and transaction timeouts
  • .Payment processing systems degraded, affecting point-of-sale and e-commerce transactions
  • .Customer authentication systems strained, potentially forcing fallback to less secure mechanisms
  • .Internal IT operations diverted to DDoS mitigation, reducing monitoring of other security controls
  • .Customer support systems overwhelmed, creating potential for social engineering exploitation
  • .Potential exposure of infrastructure details through error messages and system responses during degradation

While DDoS attacks do not directly exfiltrate data, framing them exclusively as availability events underestimates their security implications. Coordinated DDoS campaigns against financial institutions serve multiple purposes beyond service disruption.

They can function as smokescreens for simultaneous data exfiltration attempts, they stress security infrastructure to reveal configuration weaknesses, and they create chaotic incident response environments where normal security monitoring is degraded.

The coordinated nature of this campaign, targeting multiple banks simultaneously, is particularly significant. This is not the work of opportunistic attackers but indicates planning, resource allocation, and strategic targeting.

Multiple hacktivist groups have claimed responsibility for DDoS campaigns against Gulf financial institutions, often citing geopolitical motivations. Regardless of motivation, the technical impact on banking infrastructure and customer service delivery is the same.

During DDoS mitigation, banks often implement emergency measures that can inadvertently weaken security controls.

Traffic filtering rules may be loosened to allow legitimate traffic through, backup systems may be brought online without full security hardening, and staff may bypass normal access procedures to expedite recovery.

Each of these responses creates windows of vulnerability that sophisticated threat actors can exploit.

Furthermore, the customer impact extends beyond mere inconvenience. In a banking context, service unavailability can prevent customers from making time-sensitive payments, accessing funds during emergencies, or monitoring their accounts for unauthorized transactions.

For businesses relying on these banks for payroll, supplier payments, and cash flow management, extended disruptions can cause cascading financial harm.

## Attack Attribution and Methodology

The DDoS attacks against UAE banks in 2024 were attributed to multiple hacktivist groups, several of which have previously conducted campaigns against Gulf state infrastructure.

These groups typically leverage botnets composed of compromised IoT devices, rented DDoS-for-hire services, and volunteer participants who contribute bandwidth to attacks through downloadable tools.

The combination of these resources can generate traffic volumes in the hundreds of gigabits per second, overwhelming even well-provisioned banking infrastructure.

The attacks employed multiple DDoS vectors simultaneously, including volumetric floods designed to saturate network bandwidth, protocol attacks targeting load balancers and firewalls, and application-layer attacks that overwhelm specific web application endpoints.

This multi-vector approach is characteristic of sophisticated DDoS campaigns and is significantly more difficult to mitigate than single-vector attacks because each vector requires different defensive techniques.

The targeting of ADCB, FAB, Mashreq, and RAKBANK, which collectively serve a significant portion of the UAE's banking customers, was deliberate.

Attacking multiple major banks simultaneously maximizes public visibility, overwhelms sector-level incident response capabilities, and creates a narrative of systemic vulnerability that amplifies the reputational impact beyond what any single-bank attack would achieve.

The geopolitical context of these attacks is relevant but should not overshadow the technical lessons. Regardless of whether the attackers are motivated by political, ideological, or financial objectives, the technical impact on banking services is the same.

Defensive strategies must address the technical threat without depending on intelligence about attacker motivation, which may be uncertain or deceptive.

## DDoS as a Precursor to Data Breaches

Security researchers have documented a growing pattern of DDoS attacks being used as a distraction or precursor to more targeted intrusion attempts.

While the DDoS flood consumes the attention and resources of security and network operations teams, a separate attack team may be conducting reconnaissance, exploiting vulnerabilities, or exfiltrating data from systems whose monitoring has been degraded by the DDoS response.

In the banking context, this dual-purpose attack model is especially dangerous.

If a DDoS attack against a bank's public-facing systems occupies the entire security operations team, concurrent attempts to exploit internal systems, compromise employee credentials, or access customer databases may go undetected.

Post-incident forensic analysis of DDoS events at financial institutions should therefore always include a thorough review of all system access logs, authentication events, and data movement during the attack period, not just network traffic analysis.

The UAE banking sector should assume that DDoS campaigns may be accompanied by concurrent intrusion attempts until forensic evidence definitively rules this out. This assumption should inform both real-time response procedures and post-incident investigation priorities.

## Regulatory Analysis

DDoS attacks against UAE banks trigger regulatory analysis under both data protection and banking supervision frameworks, with the concept of "availability" serving as the bridge between these domains.

**UAE Federal Decree-Law No. 45/2021 (PDPL) - Article 26 (Data Security):** The PDPL's requirement for "appropriate technical and organizational measures" to protect personal data encompasses not only confidentiality and integrity but also availability.

The inability of customers to access their financial data, view transactions, or manage their accounts represents a failure in data availability that falls within the scope of Article 26. While the PDPL's drafting does not explicitly enumerate availability as a protected property, international data protection standards and the PDPL's alignment with global frameworks support this interpretation.

Additionally, if emergency measures taken during DDoS mitigation result in weakened security controls that lead to data exposure, the causal chain connects the DDoS event to a data protection violation under Article 26. Banks must demonstrate that their DDoS response procedures maintain data protection standards even under attack conditions.

**CBUAE Operational Resilience Requirements:** The Central Bank of the UAE has established comprehensive operational resilience requirements for banks operating in the country. These include specific expectations for:

Business Continuity Management: Banks must maintain and regularly test business continuity plans that account for cyber attacks including DDoS events.

The ability to maintain critical banking services during a sustained DDoS campaign is a direct test of these plans' effectiveness.

Incident Response and Reporting: CBUAE requires banks to report significant cyber incidents through established channels.

A coordinated DDoS campaign affecting multiple banks simultaneously would trigger enhanced reporting requirements and potentially coordinated response measures through the UAE Banking Sector CERT.

Technology Risk Management: Banks' technology risk management frameworks must address DDoS resilience as a component of overall cyber risk.

This includes investment in DDoS mitigation infrastructure, capacity planning for sustained attacks, and regular testing of defenses against realistic attack scenarios.

Consumer Protection Standards: CBUAE's consumer protection framework requires banks to provide reliable access to banking services.

Extended service disruptions caused by DDoS attacks can trigger consumer protection investigations, particularly if customers suffer financial losses due to inability to access services.

The coordinated nature of the attacks, hitting multiple banks simultaneously, also raises systemic risk considerations. The CBUAE has a mandate to ensure the stability of the UAE's financial system.

When an attack pattern suggests the capability to disrupt the banking sector broadly, it escalates from an individual bank issue to a systemic concern requiring coordinated regulatory response.

## What Should Have Been Done

The UAE banking sector's experience with coordinated DDoS attacks provides a roadmap for improved resilience.

**Multi-Layered DDoS Mitigation Architecture:** Banks should implement defense-in-depth against DDoS at multiple network layers.

This includes upstream filtering through agreements with internet service providers and content delivery networks, on-premise DDoS mitigation appliances for volumetric and application-layer attacks, cloud-based scrubbing services that can absorb large-volume attacks, and geographic traffic distribution across multiple data centers.

The key principle is that no single mitigation layer should be a single point of failure.

**DDoS-Resilient Application Architecture:** Online banking and mobile applications should be architected for resilience under attack conditions.

This includes auto-scaling capabilities that can increase capacity in response to traffic surges, graceful degradation modes that maintain critical functions while non-essential features are temporarily disabled, and client-side caching that allows customers to view recent account information even when real-time connections are impaired.

**Security Monitoring During DDoS Events:** One of the most critical gaps exposed by DDoS campaigns is the reduction in security monitoring that occurs when incident response teams are focused on availability restoration.

Banks must maintain separate security monitoring capabilities that continue to function independently during DDoS mitigation.

This includes dedicated security operations center (SOC) resources that are not diverted to DDoS response, automated alerting for suspicious data access patterns that might indicate concurrent exploitation attempts, and pre-defined procedures that explicitly prohibit the weakening of authentication or access controls during DDoS events.

**Sector-Wide Coordination:** The coordinated nature of the attacks demands a coordinated defense.

UAE banks should participate in threat intelligence sharing frameworks, conduct joint tabletop exercises simulating sector-wide DDoS campaigns, and establish mutual aid agreements for incident response resources.

The UAE Banking Sector CERT should serve as the coordination hub for these activities, with real-time threat intelligence sharing during active attacks.

**Customer Communication Protocols:** Banks must have pre-established communication plans for DDoS events that inform customers about service disruptions, provide alternative service channels, warn against social engineering attempts that exploit the confusion of service outages, and set realistic expectations for service restoration timelines.

Transparent communication during incidents builds customer trust and reduces the likelihood that customers will fall victim to opportunistic fraud.

**Incident Separation of Duties:** To address the risk of DDoS attacks serving as a smokescreen for concurrent intrusion attempts, banks should implement formal separation of duties during DDoS incidents.

The DDoS response team should focus exclusively on traffic mitigation and service restoration, while a separate security monitoring team, with independent tools and communication channels, maintains surveillance of internal systems, authentication events, and data access patterns.

This separation ensures that security monitoring is not degraded even when network operations are under maximum stress.

**Regular DDoS Simulation Exercises:** Banks should conduct quarterly DDoS simulation exercises that test both technical defenses and organizational response procedures.

These exercises should simulate realistic multi-vector attacks at volumes comparable to real-world campaigns, include concurrent simulated intrusion attempts to test the separation of duties principle, involve customer-facing teams to test communication protocols, and be conducted across multiple banks simultaneously to test sector-wide coordination.

The results of these exercises should be reported to the CBUAE and used to inform ongoing improvements to sector resilience.

## Economic Impact and Financial System Stability

The economic impact of coordinated DDoS attacks against the UAE banking sector extends beyond the directly targeted institutions.

The UAE's position as a regional financial hub means that banking disruptions affect international trade settlement, foreign exchange operations, and cross-border payment flows that depend on UAE banking infrastructure.

Businesses across the GCC region that use UAE banks for international transactions experienced cascading disruptions during the attack period.

The reputational dimension is equally significant. The UAE has invested heavily in positioning itself as a stable, technologically advanced financial center.

Successful DDoS campaigns that visibly disrupt major banks undermine this positioning and may influence decisions by international businesses and financial institutions considering establishing operations in the UAE. The long-term economic cost of reputational damage from perceived cybersecurity weakness can far exceed the direct costs of the attacks themselves.

Coordinated DDoS attacks against the UAE banking sector are not merely availability incidents but stress tests of the entire financial infrastructure's resilience.

When major banks cannot serve their customers simultaneously, the implications extend from individual account access to systemic financial stability. Under the UAE's regulatory framework, availability is a security obligation, and failure to maintain it carries consequences.

## Recommendations for Banking Customers

While DDoS attacks primarily affect service availability rather than data confidentiality,

banking customers should take protective measures during and after service disruption events.

**During Service Disruptions:**

Customers should avoid clicking on links in emails or text messages claiming to offer

alternative access to banking services during outages. Threat actors routinely exploit

service disruptions to launch phishing campaigns that impersonate the affected banks,

directing customers to credential-harvesting sites disguised as emergency banking portals.

All banking access during disruption periods should be through verified, bookmarked URLs

or official mobile applications.

**Post-Incident Monitoring:**

After banking services are restored, customers should carefully review all recent

transactions for any unauthorized activity that may have occurred during the disruption

period. The confusion and reduced monitoring that accompany DDoS incidents can create

windows during which fraudulent transactions may escape normal detection. Any

discrepancies should be reported to the bank immediately.

**Alternative Access Channels:**

Customers should maintain awareness of their bank's alternative service channels,

including branch locations, telephone banking numbers, and ATM capabilities that may

remain functional during online service disruptions. Having offline access to recent

account statements and key account numbers ensures that customers can continue to manage

their finances even when digital channels are unavailable.

**Fraud Alerts:**

Customers should consider enabling maximum transaction alert settings on all accounts,

including alerts for all transaction amounts rather than only large transactions. During

and after DDoS events, the probability of opportunistic fraud increases, and real-time

alerts provide the fastest mechanism for detecting unauthorized account activity.

RELATED ANALYSIS

Cisco Systems: ShinyHunters Claim 3M Salesforce Records, 300+ GitHub Repos, and AWS Data in Triple-Vector Extortion
Mar 31, 2026 · 3M+ records claimed · 300+ repos · April 3 deadline
Oracle's Dual Breach: 6M Cloud SSO Records Stolen, 80 Hospitals Compromised - and a Denial That Collapsed Under Evidence
Mar 21, 2025 · 6M records · 140K tenants · 80 hospitals
TriZetto/Cognizant: 3.4M Patient Records Stolen in 11-Month Healthcare Supply Chain Breach
Feb 6, 2026 · 3.4M patients · 11-month dwell · ~24 lawsuits
Infinite Campus: ShinyHunters Breach K-12 Platform Serving 11M Students via 10-Minute Vishing Attack
Mar 18, 2026 · 11M students · 3,200+ districts · 46 states
Crunchyroll: 6.8M Users Exposed After Infostealer Malware Compromises TELUS Support Agent's Okta Credentials
Mar 12, 2026 · 6.8M users · 100GB stolen · $5M ransom
MORE DATA BREACHES →