While all eyes will be on the Moroccan stadiums for AFCON 2025, another battle will be taking place quietly in the data centers. The host country has not only focused on renovating its sporting infrastructure but has also strengthened its digital security to counter possible cyber-attacks.
Already at KNext Rabat 2025, Kaspersky reported over 20,7 millions de tentatives d’attaques détectées au Maroc au premier semestre de l’année, dont majoritairement des menaces locales, des attaques liées à l’usage d’Internet, des failles logicielles exploitées, du vol d’identifiants, des backdoors à distance, des attaques Remote Desktop Protocol (RDP) et des logiciels espions.
The Direction Générale de la Sécurité des Systèmes d'Information (DGSSI) directs the national cybersecurity policy and ensures coordination in the event of a crisis. Its system is based on Law 0520 on cybersecurity, which regulates governance, the obligations of industry players, and their relations with the national authority. In the event of a DDoS attack, information sharing and response are regulated.
In addition, in July 2024, the DGSSI presented the National Cybersecurity Strategy 2030,focused on four pillars, eleven objectives, and sixty actions to protect critical infrastructures and strengthen the collective response to incidents. This strategy directly supports preparations for AFCON, where continuity of services is essential.
During large-scale events like the AFCON, digital infrastructures are under pressure:
Sudden spikes on news sites and official apps, at kick-off, goals and at the end of the match.
Volumetric attacks on Internet Service Providers to degrade the network in a host city.
Carpet bombing: involves spreading the attack over a large number of addresses in the same network block, making detection difficult: each individual flow may seem harmless, but their sum saturates the network and equipment.
Layer 7 HTTP Flood attacks These aim to overload a web server or application by flooding it with “legitimate” requests. They target the application layer (Layer 7) of the OSI model (the layer that manages web interactions: page loading, forms, APIs, etc.), making detection and mitigation particularly difficult.

against abnormal spikes, thanks to continuous traffic analysis by our intelligent technologies like Azure DDoS Protection. This solution uses Machine Learning to distinguish legitimate traffic from attacks in real time. Your sites and applications remain accessible even at critical moments (kick-off, goals, end of match).

thanks to a Content Delivery Network (CDN) and integrated anti-DDoS mechanisms, we ensure that traffic peaks are absorbed, offering your users a smooth experience.

fraudulent requests are blocked before they reach your servers:

Rate limiting, throttling and automatic challenges (CAPTCHA/JS) to filter out noise without disturbing your legitimate users.

In the event of network disruption, our redundancy and automatic failover mechanisms guarantee continuity of your services.

Define a communication strategy adapted to each potential crisis scenario (ticketing, OT, point-of-sale terminals, etc.).
During major events such as AFCON, cyber threats intensify. It is therefore crucial to guarantee the availability and performance of your digital services in the event of an attack.
TransNumerik's expertise and multi-layered protection system can help you turn these tense times into opportunities for confidence and resilience.
Êtes-vous prêts à faire face à des attaques DDoS Are you ready for DDoS attacks? Book a free infrastructure security assessment.
Sources