DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps DDoS Attacks

Published:

spot_img

DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps DDoS Attacks

In a significant law enforcement operation, the U.S. Department of Justice (DoJ) has successfully dismantled the command-and-control (C2) infrastructure of several Internet of Things (IoT) botnets, including AISURU, Kimwolf, JackSkid, and Mossad. This operation, which involved collaboration with authorities from Canada and Germany, has disrupted the activities of botnets responsible for launching record-breaking distributed denial-of-service (DDoS) attacks.

A Coordinated International Effort

The operation saw the involvement of numerous private sector firms, including Akamai, Amazon Web Services, Cloudflare, DigitalOcean, Google, Lumen, Nokia, Okta, Oracle, PayPal, SpyCloud, Synthient, Team Cymru, Unit 221B, and QiAnXin XLab. These organizations played a crucial role in the investigation and disruption of the botnets.

According to the DoJ, the four botnets targeted victims globally, executing DDoS attacks that reached unprecedented levels. Some of these attacks measured approximately 30 Terabits per second, marking them as record-breaking incidents in the realm of cyber threats.

The Scale of the Threat

Cloudflare reported that the AISURU/Kimwolf botnet was linked to a massive 31.4 Tbps DDoS attack in November 2025, which lasted only 35 seconds. Towards the end of the previous year, this botnet was also responsible for a series of hyper-volumetric DDoS attacks, averaging 3 billion packets per second (Bpps), 4 Tbps, and 54 million requests per second (Mrps).

The scale of these attacks is staggering. The combined attack traffic from AISURU and Kimwolf was described as equivalent to the combined populations of the U.K., Germany, and Spain all simultaneously attempting to access a website.

Identifying the Operators

Independent security journalist Brian Krebs traced the administration of the Kimwolf botnet to Jacob Butler, a 23-year-old from Ottawa, Canada. Butler claimed he has not used the Dort persona since 2021 and alleged that someone is impersonating him after compromising his old account. Krebs also reported that another prime suspect is a 15-year-old residing in Germany. As of now, no arrests have been made.

First documented by XLab in December 2025, Kimwolf has conscripted over 2 million Android devices, primarily off-brand smart TVs and set-top boxes, into its network. This botnet operates as an Android-focused variant of AISURU, which has been active since at least August 2024.

The Impact of Botnets

The four botnets are estimated to have infected no less than 3 million devices worldwide, including digital video recorders, web cameras, and Wi-Fi routers. Hundreds of thousands of these compromised devices are located in the United States.

The DoJ highlighted that the Kimwolf and JackSkid botnets targeted devices traditionally protected by firewalls. The infected devices were exploited by the botnet operators, who utilized a “cybercrime as a service” model to sell access to these devices to other cybercriminals.

Court documents allege that the four Mirai botnet variants have issued hundreds of thousands of DDoS attack commands:

  • AISURU: Over 200,000 commands
  • Kimwolf: Over 25,000 commands
  • JackSkid: Over 90,000 commands
  • Mossad: Over 1,000 commands

Evolving Tactics in Cybercrime

Tom Scholl, VP/Distinguished Engineer at AWS, noted that Kimwolf represents a fundamental shift in how botnets operate and scale. Unlike traditional botnets that scan the open internet for vulnerable devices, Kimwolf exploited residential proxy networks to infiltrate home networks through compromised devices, including streaming TV boxes and other IoT devices.

This tactic allowed the botnet to access local networks typically shielded from external threats by home routers. Lumen Black Lotus Labs reported that it has null-routed nearly 1,000 of the C2 servers used by AISURU and Kimwolf.

Data from Lumen indicated that JackSkid averaged over 150,000 daily victims in early March 2026, peaking at 250,000 on March 8. Mossad also averaged over 100,000 daily victims during this timeframe.

The Broader Implications

The vulnerabilities exploited by these botnets have led to a surge in similar cybercriminal activities. Black Lotus Labs confirmed that the same vulnerabilities affecting proxy providers like IPIDEA have been exploited by JackSkid and Mossad, allowing them to leverage residential proxy networks for their own purposes.

Akamai reported that these hyper-volumetric botnets generated attacks exceeding 30 Tbps, 14 billion packets per second, and 300 million requests per second. Such attacks can severely disrupt core internet infrastructure, degrade services for Internet Service Providers (ISPs) and their customers, and overwhelm high-capacity cloud-based mitigation services.

The DoJ’s operation underscores the ongoing battle against cybercrime, particularly as IoT devices continue to proliferate and become increasingly vulnerable to exploitation. The collaboration between law enforcement and private sector firms is crucial in addressing these threats and safeguarding digital infrastructure.

For further details, refer to publicly available reporting from thehackernews.com.

Follow the latest cybersecurity developments, threat intelligence and breaking updates from across the Middle East.

spot_img

Related articles

Recent articles

Hospice Care Fraud Exposes Multi-Billion Dollar Crisis in Healthcare Accountability

Hospice Care Fraud Exposes Multi-Billion Dollar Crisis in Healthcare Accountability A troubling surge in fraudulent activities within the hospice care sector, designed to provide end-of-life...

Vantage Capital Strengthens Egypt’s Manufacturing Sector with $45 Million Investment in MIDO, a Top Specialty Coatings Producer

Vantage Capital Strengthens Egypt's Manufacturing Sector with $45 Million Investment in MIDO, a Top Specialty Coatings Producer Vantage Capital, recognized as Africa's largest mezzanine debt...

Cybersecurity Must Rethink Defense Strategies as Autonomous Agents Emerge in 2026

Cybersecurity Must Rethink Defense Strategies as Autonomous Agents Emerge in 2026 In March 2026, San Francisco once again took center stage in the cybersecurity landscape...

UAE and Saudi Arabia Advance AI-Driven Fraud Prevention Amid Rising Threats

UAE and Saudi Arabia Advance AI-Driven Fraud Prevention Amid Rising Threats As fraudsters increasingly leverage artificial intelligence (AI) to enhance their schemes, organizations are finding...