AFCON 2025 : THE INVISIBLE MATCH PLAYED OUT ON MOROCCO'S SERVERS

How the country is preparing to counter DDoS attacks during matches

While all eyes will be on the Moroccan stadiums for AFCON 2025, another battle will be taking place quietly in the data centers. The host country has not only focused on renovating its sporting infrastructure but has also strengthened its digital security to counter possible cyber-attacks.

Already at KNext Rabat 2025, Kaspersky reported over 20,7 millions de tentatives d’attaques détectées au Maroc au premier semestre de l’année, dont majoritairement des menaces locales, des attaques liées à l’usage d’Internet, des failles logicielles exploitées, du vol d’identifiants, des backdoors à distance, des attaques Remote Desktop Protocol (RDP) et des logiciels espions. 

DGSSI: THE OPERATIONAL BRAIN OF MOROCCAN DIGITAL RESILIENCE

The Direction Générale de la Sécurité des Systèmes d'Information (DGSSI) directs the national cybersecurity policy and ensures coordination in the event of a crisis. Its system is based on Law 0520 on cybersecurity, which regulates governance, the obligations of industry players, and their relations with the national authority. In the event of a DDoS attack, information sharing and response are regulated.

In addition, in July 2024, the DGSSI presented the National Cybersecurity Strategy 2030,focused on four pillars, eleven objectives, and sixty actions to protect critical infrastructures and strengthen the collective response to incidents. This strategy directly supports preparations for AFCON, where continuity of services is essential.

can

DDoS ATTACKS FREQUENT AT EVENTS SUCH AS THE CANNAS

During large-scale events like the AFCON, digital infrastructures are under pressure:  

Sudden spikes on news sites and official apps, at kick-off, goals and at the end of the match.

Volumetric attacks on Internet Service Providers to degrade the network in a host city.

Carpet bombing: involves spreading the attack over a large number of addresses in the same network block, making detection difficult: each individual flow may seem harmless, but their sum saturates the network and equipment.

Layer 7 HTTP Flood attacks These aim to overload a web server or application by flooding it with “legitimate” requests. They target the application layer (Layer 7) of the OSI model (the layer that manages web interactions: page loading, forms, APIs, etc.), making detection and mitigation particularly difficult.

HOW TRANSNUMERIK RESPONDS TO THIS TYPE OF ATTACK

Real-time protection

against abnormal spikes, thanks to continuous traffic analysis by our intelligent technologies like Azure DDoS Protection. This solution uses Machine Learning to distinguish legitimate traffic from attacks in real time. Your sites and applications remain accessible even at critical moments (kick-off, goals, end of match).

Automatic mitigation:

thanks to a Content Delivery Network (CDN) and integrated anti-DDoS mechanisms, we ensure that traffic peaks are absorbed, offering your users a smooth experience.

Application firewalls

fraudulent requests are blocked before they reach your servers:

  • Protection against HTTP Flood attacks  
  • Bot filtering  
  • Dynamic, intelligent rules  

Traffic control:

Rate limiting, throttling and automatic challenges (CAPTCHA/JS) to filter out noise without disturbing your legitimate users.

Resilient architecture:

In the event of network disruption, our redundancy and automatic failover mechanisms guarantee continuity of your services.

A 24/7 SOC ready to respond

Define a communication strategy adapted to each potential crisis scenario (ticketing, OT, point-of-sale terminals, etc.).

During major events such as AFCON, cyber threats intensify. It is therefore crucial to guarantee the availability and performance of your digital services in the event of an attack.

TransNumerik's expertise and multi-layered protection system can help you turn these tense times into opportunities for confidence and resilience.

Êtes-vous prêts à faire face à des attaques DDoS Are you ready for DDoS attacks? Book a free infrastructure security assessment. 

Sources  

  • DGSSI  
  • Kaspersky 
  • Cloudflare 
Name