DDoS 04-09-2026

How to communicate to customers during a DDoS attack

Michael Smith
DDoS Communications Blog Hero

When your website, application, or network goes down and support tickets begin flooding the inbox, the pressure is immediate. As social media begins to buzz with customer complaints, your operations team confirms the reality: You’re facing a distributed denial of service (DDoS) attack.

While your technical team works urgently to onramp to your DDoS mitigation provider, a second, equally important challenge emerges: protecting your brand’s reputation. How you choose to communicate during these critical hours often has a more significant impact on long-term customer retention than the technical downtime itself. In the absence of information, silence breeds suspicion.

Understanding the nature of DDoS attacks

Before crafting a communication plan, it’s essential to distinguish between a disruption and an intrusion. A DDoS attack is not a data breach. In most cases, customer data isn't stolen—access to the service is simply blocked or degraded.

But the threat landscape is evolving. Recent research from KU Leuven reveals that over 4.3 million internet hosts can be weaponized as proxies. Botnets like Aisuru and Kimwolf have demonstrated multi-terabit attacks using pirate video players.

Despite this trend, mega-attacks (over 100Gbps) and tsunami attacks (over 1Tbps) remain relatively infrequent. Knowing these distinctions helps you avoid alarmist language. If you treat a service disruption like a massive data leak, you cause unnecessary panic; conversely, downplaying a severe attack makes you look incompetent.

Why communication is a business pillar

When a service outage occurs, customers assume the worst. Without information, they fill the void with speculation. Social media platforms become breeding grounds for rumors, and competitors may seize the opportunity to highlight your instability.

Effective customer communication serves three primary purposes:

  1. Building trust: Transparency demonstrates awareness and control. By stating, "We are experiencing a DDoS attack," you clarify that it is a service issue, not a compromise of sensitive funds or data. 
  2. Reducing support overhead: A visible public status update can deflect thousands of redundant inquiries, freeing your support team for critical tasks. 
  3. Meeting regulatory compliance: In industries like finance, or for companies regulated by the SEC, communication during an outage is often a legal requirement.

The decision matrix: When should you communicate?

Not every technical glitch warrants a public press release. Over-communicating minor, quickly resolved issues can lead to communication fatigue among your user base and create the false impression that your infrastructure is unstable. Conversely, under-communicating or delaying the acknowledgment of major issues can severely damage user trust, which is often difficult to regain. 

To maintain this balance, you should initiate your crisis communication plan only when an attack meets specific, predetermined criteria:

  • Service degradation is noticeable:Users are experiencing high latency or timeouts.
  • Duration exceeds a threshold:The issue persists for 10 to 15 minutes without resolution.
  • Support volume spikes: Inbound tickets indicate a widespread problem.
  • Media coverage or attacker claims: If news outlets report on your outage or a threat group claims responsibility, you must manage the narrative.

If an attack is successfully mitigated by your firewall with zero user impact, public communication is unnecessary; an internal report for stakeholders is sufficient.

The initial communication: What to say

Your "holding statement" is your first public acknowledgement. Speed is your greatest ally here—you do not need to have all the answers yet.

Key elements of the first message:

  • Acknowledge the symptom: Describe what users see (e.g., “slow load times”).
  • State the action: Confirm that engineering is investigating.
  • Set expectations: Provide a timeframe for the next update (e.g., “within 30 minutes”).

What to avoid:

  • Blaming the user: Don’t suggest it’s their internet connection if the issue is yours.
  • Over-promising: Avoid saying, “We’ll be back in five minutes,” if that won’t be the case.
  • Revealing vulnerabilities: Don’t share which specific gateway failed or the exact nature of the exploit.

Example template: “We are currently experiencing network instability affecting [Product Name]. Users may experience timeouts or an inability to log in. Our team is actively diagnosing the problem and will begin responding when they have identified the cause. We will provide a further update in 30 minutes.”

The follow-up: Keeping the stream alive

Once the initial statement is out, continuous communication is critical. Silence is often misinterpreted as a sign of failure and erodes customer trust.

  • Frequency: Update every 30 to 60 minutes, even if the status is "mitigation is ongoing and we are continuing to work on a resolution."
  • The balance of disclosure: You can confirm that it’s a DDoS attack to provide clarity, but avoid sharing traffic volume (e.g., "50Gbps") or specific vendor names, as this helps attackers fine-tune their strategy.

Arming your internal team

Your employees are your ambassadors. If a customer calls an account manager who says they don't know what's going on, it creates an impression of chaos. Establish a crisis response team to feed information to:

  • Executives: For strategic guidance and stakeholder management
  • Customer support: Provided with scripts for consistent messaging
  • Sales: To proactively reassure high-value clients
  • PR:To handle media inquiries professionally

Signaling the "all clear" 

DDoS attacks often occur in successive waves. Declaring victory too early can lead to a "flapping" status—aka announcing restoration only for the site to fail again. This damages credibility faster than the initial outage.

Use a phased response model to avoid premature resolution and maintain credibility:

  • The monitoring phase: Instead of "Resolved," move to "Monitoring." Inform users that services are returning but may be intermittent.
  • The resolution phase: Officially mark the incident as resolved only after traffic has remained stable for at least 60 minutes.
  • The post-mortem (RFO): Publish a formal Reason for Outage. Explain the event and the steps being taken to prevent a recurrence.

Where to communicate: The importance of independent infrastructure

Where you communicate is as important as what you say. If your website is under attack, your blog will likely be down too. To maintain a single source of truth, use an off-site communication channel:

  • Social media for immediate, real-time updates
  • Email for direct communication with affected user groups
  • Dedicated status page hosted on a separate, redundant network through a specialized third-party service so your page stays live even if your data center is overwhelmed by a botnet

Preparation is the best defense

A DDoS attack is a stress test for your technical resilience and your team's coordination. By developing a crisis plan in advance, you remove panic from the equation. You won't be scrambling to draft posts while inundated with tickets; instead, you’ll be executing a pre-approved strategy to protect your reputation.

In other words, don’t wait until your dashboard turns red. Draft your templates, conduct training exercises, and establish your independent status page today.

Fight DDoS with UltraDDoS Protect 

By partnering with UltraDDoS Protect, you gain a robust ally in the fight against disruptive DDoS attacks. Our advanced mitigation solutions ensure that your systems are defended in real time, minimizing downtime and service disruptions. While we handle the technical complexities of defending against these threats, your team can focus on maintaining clear and composed communication with your customers. 

Don’t leave your organization vulnerable—contact us today to learn how UltraDDoS Protect can help ensure you’re prepared for the DDoS challenge.

Subscribe to the blog