Fortify Your Network Security from Emerging Geopolitical Cyberthreats

Sandeep Rath headshot

Written by

Sandeep Rath

Sandeep Rath is a Senior Product Marketing Executive at Akamai. He is a PMMC-certified product marketing leader with a focus on translating unmet customer needs, narrative design, and value-based storytelling. He has nearly two decades of experience in leading global product marketing teams and is based in Toronto, Canada.

Nitin Singla

Written by

Nitin Singla

Nitin Singla is a Product Manager in the Akamai Cloud Security Business Unit. Nitin has 10+ years of experience working in the cybersecurity industry and specializes in attack detection, network monitoring, data visualization, etc. and has launched several successful security products during his tenure. Nitin also has several USPTO granted patents in the networking and security space. In his current role, Nitin works closely with customers to identify their security needs and create powerful and intuitive solutions that solve their real-world problems.

Ankita Kharya

Written by

Ankita Kharya

Ankita Kharya is Director of Product Management for Infrastructure Security portfolio at Akamai. With 17+ years of cybersecurity and product leadership experience, she shapes strategy and execution for products that keep global organizations secure in an always-connected world.

Ryan Gao

Written by

Ryan Gao

Ryan Gao serves as a Strategic Engagement Manager at Akamai, where he uses his technical expertise in a strategic capacity within Global Services. With more than eight years of experience, Ryan has collaborated with financial institutions in the banking, payment card services, brokerage, wealth management, and fintech sectors. He has played a pivotal role in ensuring customer success in service and support, focusing on web performance, cloud computing, and security. Ryan is deeply invested in research and advocacy related to threat intelligence, financial industry metrics, and security operation trends. His leadership in these areas has positioned him as a thought leader, driving forward the understanding and implementation of advanced security measures in the financial industry.

 

Editorial and additional commentary by Piero Vera

 

Share

Executive summary

  • Since the start of the 2026 conflict in the Middle East on February 28, 2026, Akamai has observed a 245% increase in cybercrime targeting critical businesses and institutions in North America, Europe, and parts of Asia-Pacific. 

  • Handala, a hacktivist group that is reported to have links to Iran’s intelligence agencies, has claimed responsibility for a data-wiping attack against Stryker, a global medical technology company headquartered in Kalamazoo, Michigan. 

  • Geopolitically motivated hacktivists are using proxy services in countries like Russia and China as a source for billions of designed-for-abuse connection attempts. 

  • Banking and financial services, ecommerce, and video games alone account for 80% of the destinations for malicious traffic. Banking and financial services and ecommerce together account for more than 50% of the target destinations. 

  • Akamai customers have successfully blocked billions of packets of unwanted and potentially malicious traffic by using the powerful and easy-to-use capabilities of Akamai Prolexic Network Cloud Firewall, which help them enforce a positive security posture at the edge of their networks. 

  • As the volatile situation continues, customers are advised to remain vigilant and adopt a proactive security posture across their entire network surface to avoid potential downtime or performance degradation. 

One of the most defining characteristics of modern geopolitical conflicts and warfare is that it is no longer confined to the physical realm. Often, the most devastating attacks in a conflict today focus on the digital realm. It makes sense: In a digital-first world, cyberattacks can very effectively wreak havoc on businesses, critical public infrastructure, and public confidence.

Geopolitics — The underlying catalyst for cyberthreats

Geopolitical ideology and motivation have often been catalysts for cybercrime, including attempts by nation-state–sponsored threat actors to infiltrate or take down the digital infrastructure of victim organizations and institutions. 

As the world begins 2026, the global geopolitical theater is in the throes of multiple concurrent and significant conflicts around the world. The Russia-Ukraine war has entered its fourth consecutive year. Several cyber espionage campaigns are regularly traced back to threat actors based in China, Iran, Pakistan, and North Korea. 

And over the past few years, there have been sporadic regional conflicts between India and Pakistan, Thailand and Cambodia, and Pakistan and Afghanistan. Each of these conflicts witnessed an increase in cyberattacks. 

The conflict in the Middle East that started on February 28, 2026, has sent rippling effects across travel, hospitality, and energy sectors of the global economy. Even more concerning is the significant increase in cybercrime emanating from nation-state actors and ideologically motivated hacktivists, who might operate from an entirely different part of the planet to orchestrate highly sophisticated attacks. 

On March 11, 2026, Handala, a hacktivist group that is alleged to have links with Iran’s intelligence services, claimed to have orchestrated a massive data-wiping attack on Stryker, a global medical technology company. The attack has reportedly wiped away several terabytes of critical data. There have also been sporadic and unconfirmed media reports that Iran could attack the physical offices, as well as the digital infrastructure, of several U.S.-headquartered technology companies, including Google, Amazon, Microsoft, NVIDIA, and others.

Significantly increased threat activity

Since February 28, 2026, Akamai has observed a staggering 245% increase in malicious traffic targeting businesses and institutions operating in North America, Europe, and parts of Asia. The table summarizes some of the more recurrent forms of threat activities that have increased in volume since the conflict began. 

Threat activity

Observed trend

Automated reconnaissance traffic

Significant increase (+65%)

Credential harvesting attempts

Elevated activity (+45%)

Infrastructure scanning

Widespread probing of exposed services (+52%)

Botnet-driven discovery traffic

Large-scale automated scanning (+70%)

Pre–distributed denial of service (DDoS) reconnaissance

Increased probing before volumetric attacks (+38%)

Types of cyberattacks that have increased in frequency and volume since February 28, 2026

Geographic distribution of the source IPs for malicious traffic

Figure 1 shows the key regions from where malicious traffic was generated by threat actors to saturate or disable the digital infrastructures and applications of customers protected by Prolexic Network Cloud Firewall. 

Figure 1 shows the key regions from where malicious traffic was generated by threat actors to saturate or disable the digital infrastructures and applications of customers protected by Prolexic Network Cloud Firewall. Fig. 1: The different regions and countries of the world that have generated an observed increase in unwanted and potentially malicious traffic since February 28, 2026

Opportunitistic cybercriminals, geopolitically motivated hacktivists, and potential nation-state threat actors are using proxy services as a source for billions of designed-for-abuse connection attempts.

Considering the rapidly evolving nature of the ongoing geopolitical conflicts across the world, it is critical for businesses, particularly in highly regulated industries like financial services, to proactively fortify their cybersecurity defenses and block malicious traffic at the edge of their network to avoid outages and performance degradations.

The verticals most frequently targeted by malicious traffic

Figure 2 shows some of the key industries  that are being persistently targeted by  malicious traffic from threat actors each time there is a sudden spike in geopolitical conflicts. 

Figure 2 shows some of the key industries  that are being persistently targeted by  malicious traffic from threat actors each time there is a sudden spike in geopolitical conflicts. Fig. 2: The industries most frequently targeted by malicious traffic

Banking, financial services, and fintech (including payment processing platforms and infrastructure) are the most targeted verticals. Businesses and institutions in these industries are the backbone of any economy, and any disruption to organizations in these verticals would have an outsized impact. Just imagine the scale of the impact if users in the United States were unable to log in to their banking apps or use their credit cards. 

If you are an organization that does not conduct business in these conflict-impacted regions or you are a critical public services institution (such as a local hospital or utility company) that does not have legitimate users in these regions, one of the most effective defenses is to stop all attempts originating from these countries. Prolexic Network Cloud Firewall allows geo-based traffic restrictions with a single click of a button.

The invisible shield that protects your edge with one click

Prolexic Network Cloud Firewall is a highly nimble and powerful firewall that sits at the edge of your network, outside all other firewalls and protections. It is your first line of defense against a wide range of cybercrime and zero-day vulnerabilities, and a highly critical tool in the overall toolbox available to network security professionals. 

While legacy firewalls operate inside your network or cloud environments, and are often designed to protect a specific part of your network or application from malicious and abusive traffic, Prolexic Network Cloud Firewall enforces security policies and posture at the edge of your network, at a global scale, in real time. 

This offloads a significant amount of policy enforcement away from other security systems and allows your network security teams to keep downstream firewalls and security systems up and running.

The power of edge enforcement

Akamai Network Cloud Firewall customers can simply block — with a single click — entire geographies that they do not serve. This eliminates large portions of unwanted traffic instantly. 

If you are a financial services institution operating in the United States, for example, it may be safe to assume that you do not have a lot of legitimate users in Iran, Russia, or North Korea. With geo-block rules enforced at the edge, you can protect your digital networks and assets from nearly all malicious traffic originating from these regions. One click and you are done.

With great power comes greater simplicity

At Akamai, we believe that “with great power (of Prolexic Network Cloud Firewall) comes even greater (operational) simplicity.” With Prolexic Network Cloud Firewall, malicious traffic never reaches your origin servers, load balancers, critical APIs, or other foundational elements of your infrastructure, thus preventing resource exhaustion and operational noise — all with a single click.

Prolexic Network Cloud Firewall in action 

The following examples illustrate how the volatile geopolitical climate can act as a catalyst for a sudden spike in cybercrime. Occasionally, the crime originates from regions that are not directly or explicitly involved in the conflicts.

A critical payment infrastructure company in Asia-Pacific blocked 11 million packets from Russia

One of the largest and most critical real-time payment processing platforms and infrastructure in the Asia-Pacific region experienced a massive surge in malicious traffic originating from Russia, since the start of the 2026 conflict in the Middle East. 

This regional critical financial infrastructure institution does not have any legitimate users in Russia or Central Asia, and has proactively placed Prolexic Network Cloud Firewall rules that block any and all traffic originating from IPs in the regions where it does not operate. 

The proactive edge security posture management adopted by the institution successfully blocked more than 3 million hits originating from Russia with just a single rule — [deny ip GEO:: RU any] — in a single day. In fact, more than 65% of the total traffic blocked by this customer since deploying Network Cloud Firewall in their defense stack from 2025 took place in March 2026. 

Had this customer not adopted a strict and proactive posture with Prolexic Network Cloud Firewall, and consequently experienced a performance degradation or outright outage, the cascading consequences could have been staggering in scale. 

Moreover, as a critical financial infrastructure services institution, any degradation in performance or unavailability would have triggered an audit into compliance mandates of baseline performance and availability of services. 

Figure 3 shows the malicious and unusual traffic spikes originating from Russia over 90 days in early 2026 and how Prolexic Network Cloud Firewall helped this customer seamlessly block this unwanted packet traffic with a single click.

Figure 3 shows the malicious and unusual traffic spikes originating from Russia over 90 days in early 2026 and how Prolexic Network Cloud Firewall helped this customer seamlessly block this unwanted packet traffic with a single click. Fig. 3: Akamai Prolexic Network Cloud Firewall blocked 11 million packets originating from Russia in 90 days

A payment processing platform in Europe blocked nearly 1 billion hits from Russia

In another instance, a major payment processing platform in Europe experienced a significant spike in malicious traffic from IP sources in Russia over 90 days. Close to one billion packets were denied at the customer’s edge using Prolexic Network Cloud Firewall. 

This customer experienced 978 million hits over 90 days, of which 46 million hits were recorded on the Network Cloud Firewall rule — [deny ip GEO:: RU any] — in a single week (Figure 4).

This customer experienced 978 million hits over 90 days, of which 46 million hits were recorded on the Network Cloud Firewall rule — [deny ip GEO:: RU any] — in a single week (Figure 4). Fig. 4: Akamai Prolexic Network Cloud Firewall blocked massive spikes in packet traffic experienced by a European payments processing platform that was hit with close to one billion malicious packets in 90 days, and more than 2 billion packets to date, from Russian IP sources

The same customer seamlessly blocked 3 million packets originating from Iran in the weeks leading up to the start of the conflict in the region. The customer had proactively placed an additional rule — [deny ip GEO:: IR any] — to block all traffic and packets originating from Iran. 

Unsurprisingly, the number of hits against this Network Cloud Firewall posture precipitously declined since the start of the war in the region and after Iran effectively enforced a near-total internet shut down. 

Figure 5 shows the massive and unusual surge in packet traffic originating from Iran that was successfully blocked by Prolexic Network Cloud Firewall at the edge of the customer’s network.

Figure 5 shows the massive and unusual surge in packet traffic originating from Iran that was successfully blocked by Prolexic Network Cloud Firewall at the edge of the customer’s network. Fig. 5: Akamai Prolexic Network Cloud Firewall blocked a massive and unusual surge in packet traffic originating from Iran experienced by a European payments processing platform

A major U.S. financial services organization blocked 13 million packets from Iran

Similarly, a major U.S. financial services institution experienced an unusual spike in traffic originating from Iran in the weeks leading up to the 2026 conflict. Of the total 13 million hits over 90 days, Prolexic Network Cloud Firewall blocked 10 million packets of traffic from Iran with the [deny ip GEO:: IR any] rule in just a 30-day period. 

Figure 6 shows the repeated traffic spikes during this 30-day period.

Figure 6 shows the repeated traffic spikes during this 30-day period. Fig. 6: Akamai Prolexic Network Cloud Firewall blocked repeated malicious traffic spikes originating from Iran experienced by a U.S. financial services institution

A global real estate management organization blocked 29 million packets from Russia

These recent attacks aren’t limited to the banking and financial services vertical alone. A global real estate and professional services management organization headquartered in the United States experienced 29 million hits from Russia in the same period — between mid-January to March 2026. 

On February 28, the date when the conflict in the Middle East began, the customer blocked more than 5 million malicious packets in a single day with Prolexic Network Cloud Firewall (Figure 7).

On February 28, the date when the conflict in the Middle East began, the customer blocked more than 5 million malicious packets in a single day with Prolexic Network Cloud Firewall (Figure 7). Fig. 7: Akamai Prolexic Network Cloud Firewall blocked 5 million malicious packets originating from Russia in a single day for a real estate management organization

These examples illustrate the value of adopting a proactive security posture by deploying highly effective tools like Prolexic Network Cloud Firewall so that your network and application security teams rarely have to scramble in an emergency to block the malicious traffic impacting your origins.

7 recommendations for customers

  1. Take a proactive approach. If your organization does not conduct business in certain geographies, or if it offers a service for which it is unlikely to have legitimate users outside specific regions of the world (e.g., financial services, public utility companies, or healthcare organizations, among others), we highly recommend denying all traffic from those regions with Prolexic Network Cloud Firewall. 

  2. Ensure that you have effective systems to enforce proper caching, rate limiting, and IP reputation controls for websites and critical business applications. The enforcement must take place at the edge of your network to optimize your security posture and the performance of your network. 

  3. Review critical subnets and IP spaces, and ensure that they have mitigation controls in place.

  4. Deploy Prolexic DDoS security controls in an always-on mitigation posture to reduce the burden on incident responders. 

  5. Closely monitor your web application firewall policies with Akamai App & API Protector and your API behaviors with Akamai API Security to protect your critical web applications. 

  6. Adopt Akamai Guardicore Segmentation to prevent threat actors from exploiting vulnerabilities through lateral scanning and movement. 

  7. Exercise your runbook by validating your emergency plans, contacts, and lockdown policies for critical applications or network assets.

Sandeep Rath headshot

Written by

Sandeep Rath

Sandeep Rath is a Senior Product Marketing Executive at Akamai. He is a PMMC-certified product marketing leader with a focus on translating unmet customer needs, narrative design, and value-based storytelling. He has nearly two decades of experience in leading global product marketing teams and is based in Toronto, Canada.

Nitin Singla

Written by

Nitin Singla

Nitin Singla is a Product Manager in the Akamai Cloud Security Business Unit. Nitin has 10+ years of experience working in the cybersecurity industry and specializes in attack detection, network monitoring, data visualization, etc. and has launched several successful security products during his tenure. Nitin also has several USPTO granted patents in the networking and security space. In his current role, Nitin works closely with customers to identify their security needs and create powerful and intuitive solutions that solve their real-world problems.

Ankita Kharya

Written by

Ankita Kharya

Ankita Kharya is Director of Product Management for Infrastructure Security portfolio at Akamai. With 17+ years of cybersecurity and product leadership experience, she shapes strategy and execution for products that keep global organizations secure in an always-connected world.

Ryan Gao

Written by

Ryan Gao

Ryan Gao serves as a Strategic Engagement Manager at Akamai, where he uses his technical expertise in a strategic capacity within Global Services. With more than eight years of experience, Ryan has collaborated with financial institutions in the banking, payment card services, brokerage, wealth management, and fintech sectors. He has played a pivotal role in ensuring customer success in service and support, focusing on web performance, cloud computing, and security. Ryan is deeply invested in research and advocacy related to threat intelligence, financial industry metrics, and security operation trends. His leadership in these areas has positioned him as a thought leader, driving forward the understanding and implementation of advanced security measures in the financial industry.

Tags

Share

Related Blog Posts

Security
Why AI-Powered Vulnerability Discovery Strengthens Akamai's Security Mission
April 10, 2026
Read about the implications of AI-powered vulnerability discovery — and learn how Akamai can help navigate the resulting new security landscape.
Security
How Microsegmentation Helps Governments Meet CJIS Compliance
April 09, 2026
Microsegmentation offers an effective way for state and local governments to continuously enforce CJIS controls, rather than simply documenting them for audits.
Security
Protecting Publishing: The Real Cost of AI Bots
April 08, 2026
The latest SOTI report reveals how the 300% surge in AI bot activity affects the publishing industry — and how to protect your business.