{"id":330,"date":"2026-03-20T06:47:54","date_gmt":"2026-03-20T06:47:54","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=330"},"modified":"2026-03-20T06:47:54","modified_gmt":"2026-03-20T06:47:54","slug":"doj-disrupts-3-million-device-iot-botnets-behind-record-31-4-tbps-global-ddos-attacks","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=330","title":{"rendered":"DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks"},"content":{"rendered":"<div>\n<p><span class=\"p-author\"><i class=\"icon-font icon-user\">\ue804<\/i><span class=\"author\">Ravie Lakshmanan<\/span><i class=\"icon-font icon-calendar\">\ue802<\/i><span class=\"author\">Mar 20, 2026<\/span><\/span><span class=\"p-tags\">Botnet \/ Network Security<\/span><\/p>\n<\/div>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEinuGXmHjiDQoCgH14v3lddFUEZQ96DLgTZ_Q8k7l7lpnGTX4zzeJ78e0MLRH8L3Bah3_zMnLI4kVNn3RDbnlzXpzchm5mg_1SDo0mCETmOylAS9qCPuMVRhtAfVWDzHUDwK2fRNiACoXo3oPWR8VV0E3m5svUSuDATtF4O_CIC05Vco5m3dN9MR9D7V-JP\/s1700-e365\/botnet-malware.jpg\" style=\"clear: left; display: block; float: left;  text-align: center;\"><\/a><\/div>\n<p>The U.S. Department of Justice (DoJ) on Thursday announced the disruption of command-and-control (C2) infrastructure used by several Internet of Things (IoT) botnets like AISURU, Kimwolf, <a href=\"https:\/\/foresiet.com\/blog\/mirai-botnet-jackskid-resurgence-nov-2025-iot-threats\/\" rel=\"noopener\" target=\"_blank\">JackSkid<\/a>, and Mossad as part of a court-authorized law enforcement operation.<\/p>\n<p>The effort also saw authorities from Canada and Germany targeting the operators behind these botnets, with a number of private sector firms, including Akamai, Amazon Web Services, Cloudflare, DigitalOcean, Google, Lumen, Nokia, Okta, Oracle, PayPal, SpyCloud, Synthient, Team Cymru, Unit 221B, and QiAnXin XLab assisting in the investigation efforts.<\/p>\n<p>\u00abThe four botnets launched distributed denial-of-service (DDoS) attacks targeting victims around the world,\u00bb the DoJ <a href=\"https:\/\/www.justice.gov\/usao-ak\/pr\/authorities-disrupt-worlds-largest-iot-ddos-botnets-responsible-record-breaking-attacks\" rel=\"noopener\" target=\"_blank\">said<\/a>. \u00abSome of these attacks measured approximately 30 Terabits per second, which were record-breaking attacks.\u00bb<\/p>\n<p>In a report last month, Cloudflare attributed AISURU\/Kimwolf to a massive 31.4 Tbps DDoS attack that occurred in November 2025 and lasted only 35 seconds. Towards the end of last year, the botnet is also assessed to have engaged in hyper-volumetric DDoS attacks that had an average size of 3 billion packets per second (Bpps), 4 Tbps, and 54 million requests per second (Mrps).<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/not-fast-enough-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhlXM830ruQd2xT6M7JNeNRjaFa1onD12WjSCHihTFMTzbyfT9h-irPmXy_h3E1HGSs6sdv7FTmnyNVTM5kmSb7BuUtZe8gKoTQt99P1sSzRcqqXpOJP6eoAOhR3DGb6qHx9kOZ_HBZUMmVnsnd0DM7QfUp81bgzTvvgLww6oqB-EhnDfWXH5pWCYhAsyLs\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>Independent security journalist Brian Krebs also <a href=\"https:\/\/krebsonsecurity.com\/2026\/02\/who-is-the-kimwolf-botmaster-dort\/\" rel=\"noopener\" target=\"_blank\">traced<\/a> the administrator of Kimwolf to a 23-year-old Jacob Butler (aka Dort) from Ottawa, Canada. Butler told Krebs he has not used the Dort persona since 2021 and claimed someone is impersonating him after compromising his old account.<\/p>\n<p><a name=\"more\"\/><\/p>\n<p>Butler also said, \u00abhe mostly stays home and helps his mom around the house because he struggles with autism and social interaction.\u00bb According to <a href=\"https:\/\/krebsonsecurity.com\/2026\/03\/feds-disrupt-iot-botnets-behind-huge-ddos-attacks\/\" rel=\"noopener\" target=\"_blank\">Krebs<\/a>, the other prime suspect is a 15-year-old residing in Germany. No arrests have been announced.<\/p>\n<p>The botnet has conscripted more than 2 million Android devices into its network, most of which are compromised, off-brand Android TVs. In all, the four botnets are estimated to have infected no less than 3 million devices worldwide, such as digital video recorders, web cameras, or Wi-Fi routers, of which hundreds of thousands are located in the U.S.<\/p>\n<p>\u00abThe Kimwolf and JackSkid botnets are accused of targeting and infecting devices which are traditionally &#8216;firewalled&#8217; from the rest of the internet. The infected devices were enslaved by the botnet operators,\u00bb the DoJ said. \u00abThe operators then used a &#8216;cybercrime as a service&#8217; model to sell access to the infected devices to other cyber criminals.\u00bb<\/p>\n<p>These infected devices were then used to conduct DDoS attacks against targets of interest across the world. Court documents allege that the four Mirai botnet variants have issued hundreds of thousands of DDoS attack commands &#8211;<\/p>\n<ul>\n<li>AISURU &#8211; &gt;200,000 DDoS attack commands<\/li>\n<li>Kimwolf &#8211; &gt;25,000 DDoS attack commands<\/li>\n<li>JackSkid &#8211; &gt;90,000 DDoS attack commands<\/li>\n<li>Mossad &#8211; &gt;1,000 DDoS attack commands<\/li>\n<\/ul>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fs-report-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWQgUDT06NQu9vGMPC7BWROmJABTIWg058l7oGKD-v3ZchC8_66xjbclOE9koChsRf5CEKgqrXTVrne_00PdGokh3brhvF-g33I4FYYpTukrvuNQWXZOVAfon6-2axyRoVJ4uOrXPqRhxfZUaJWEm-K9esUS3ql8VSVWAKLqyfhHLgMSXhkMTkcOtGSX7R\/s728-e100\/fs-report-d.png\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>\u00abKimwolf represented a fundamental shift in how botnets operate and scale. Unlike traditional botnets that scan the open internet for vulnerable devices, Kimwolf exploited a novel attack vector: residential proxy networks,\u00bb Tom Scholl, VP\/Distinguished Engineer at AWS, <a href=\"https:\/\/www.linkedin.com\/pulse\/aws-contributes-disruption-kimwolf-largest-botnet-ever-tom-scholl-ukbrc\/\" rel=\"noopener\" target=\"_blank\">said<\/a> in a post shared on LinkedIn.<\/p>\n<p>\u00abBy infiltrating home networks through compromised devices\u2014including streaming TV boxes and other IoT devices \u2014 the botnet gained access to local networks that are typically protected from external threats by home routers.\u00bb<\/p>\n<p>Akamai said the hyper-volumetric botnets generated attacks exceeding 30 Tbps, 14 billion packets per second, and 300 Mrps, adding that cybercriminals leveraged these botnets to launch hundreds of thousands of attacks and demand extortion payments from victims in some cases.<\/p>\n<p>\u00abThese attacks can cripple core internet infrastructure, cause significant service degradation for ISPs and their downstream customers, and even overwhelm high-capacity cloud-based mitigation services,\u00bb the web infrastructure company <a href=\"https:\/\/www.akamai.com\/blog\/security-research\/akamai-helps-disrupt-worlds-largest-iot-botnets\" rel=\"noopener\" target=\"_blank\">said<\/a>.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\ue804Ravie Lakshmanan\ue802Mar 20, 2026Botnet \/ Network Security The U.S. Department of Justice (DoJ) on Thursday announced the disruption of command-and-control (C2) infrastructure used by several Internet of Things (IoT) botnets&hellip;<\/p>\n","protected":false},"author":1,"featured_media":331,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[24,698,135,3,309,597,780,779,781,782],"class_list":["post-330","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-attacks","tag-botnets","tag-ddos","tag-disrupts","tag-doj","tag-global","tag-iot","tag-milliondevice","tag-record","tag-tbps"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=330"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/330\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/331"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}