AISURU/Kimwolf Botnet Unleashes Historic 31.4 Tbps DDoS Attack

Published:

spot_img

Ravie LakshmananFeb 05, 2026Botnet / Network Security

Record-Breaking DDoS Attack at 31.4 Tbps

The recent distributed denial-of-service (DDoS) attack, attributed to the AISURU/Kimwolf botnet, has made headlines with its unprecedented peak of 31.4 terabits per second (Tbps). This aggressive assault lasted a mere 35 seconds but left an indelible mark on the cybersecurity landscape. Cloudflare, the web infrastructure company that successfully detected and mitigated this attack, reports that it is part of a troubling trend involving hyper-volumetric DDoS attacks, particularly prevalent in late 2025.

Growing Threats from AISURU/Kimwolf

In addition to its record-setting attack, AISURU/Kimwolf was linked to another significant operation known as “The Night Before Christmas,” which began on December 19, 2025. Throughout this campaign, attacks averaged an alarming 3 billion packets per second (Bpps), 4 Tbps in data volume, and 54 requests per second (Mrps). The peak rates during this barrage climbed to astonishing figures: 9 Bpps, 24 Tbps, and 205 Mrps.

Dramatic Increase in DDoS Attacks in 2025

Cloudflare’s data reveals a staggering 121% increase in DDoS attacks in 2025, averaging 5,376 attacks mitigated every hour during the year. The total number of DDoS incidents surged to an astounding 47.1 million, more than doubling from previous years. Notably, Cloudflare mitigated 34.4 million network-layer DDoS attacks in 2025, a significant rise from 11.4 million in 2024. By the fourth quarter, network-layer DDoS attacks constituted 78% of all attacks recorded.

The final quarter of 2025 also saw a 40% increase in hyper-volumetric attacks, showcasing a stark rise from 1,304 in the previous quarter to 1,824 incidents. Year-over-year, these attacks grew by over 700% when compared to late 2024, marking a sharp increase in both frequency and intensity.

The Role of Compromised Devices in DDoS Campaigns

A significant factor behind the AISURU/Kimwolf botnet is the compromise of over 2 million Android devices, primarily derived from off-brand televisions. These devices are often hijacked via residential proxy networks, such as IPIDEA. Recently, Google took action against this network, disrupting its operations and initiating legal proceedings to shut down numerous domains tied to controlling and commoditizing these compromised devices.

The collaboration between Google and Cloudflare has also targeted IPIDEA’s domain resolution, effectively hampering the botnet’s ability to command infected devices and control proxy traffic. IPIDEA has reportedly utilized at least 600 trojanized Android apps embedded with different proxy software development kits (SDKs). Additionally, over 3,000 trojanized Windows binaries posing as updates have also been identified as part of this ecosystem.

What’s concerning is that IPIDEA has been marketing various VPN and proxy applications that covertly convert users’ devices into exit nodes without their explicit consent. The operators manage multiple proxy businesses that, despite appearing legitimate, are ultimately connected to a centralized infrastructure under IPIDEA’s control.

In its latest report, Cloudflare highlighted several critical trends observed during the last quarter of 2025:

– The telecommunications sector emerged as the most commonly targeted industry, closely followed by IT services, gaming, and software development.
– Countries such as China, Germany, and the United States were frequently attacked, with Bangladesh overtaking Indonesia as the largest source of DDoS incidents.
– Other notable sources of DDoS attacks included Ecuador, Argentina, and Ukraine, indicating a diverse geographic footprint of these malicious activities.

Cloudflare emphasized the increasing sophistication and scale of DDoS attacks, presenting a significant challenge to organizations trying to keep pace. As organizations reevaluate their cybersecurity strategies, those relying on traditional defenses like on-premise mitigation appliances may need to rethink their approach in light of these evolving threats.

spot_img

Related articles

Recent articles

AI Tool Uncovers 1.5 Million Exposed API Keys Due to Database Flaw

Understanding the Moltbook Security Breach: A Case Study on AI and Database Configuration In the rapidly evolving landscape of technology, the blending of artificial intelligence...

Rajasthan High Court Raises Concerns Over India’s ‘Scam Ecosystem’

Jaipur: India’s Cybercrime Crisis The Rajasthan High Court has recently drawn attention to a critical issue: India's mounting cybercrime crisis. Describing the current environment as...

Substack Reveals User Data Breach After Four-Month Delay

Substack Security Breach: What You Need to Know Overview of the Incident In a recent setback for the popular newsletter platform Substack, a significant security breach...

Man Boasts Online About Infant Rape; Police Expose His Disturbing Password

Disturbing Case of Online Child Abuse Linked to Care Home Worker Introduction In a shocking case that has disturbed many, a care home worker from Perth,...