U.S., German, and Canadian authorities dismantled command-and-control infrastructure used by the Aisuru, KimWolf, JackSkid, and Mossad botnets that had infected millions of IoT devices and launched hundreds of thousands of DDoS attacks. The takedown targeted virtual servers, domains, and other resources after record-setting assaults — including Aisuru’s 31.4 Tbps, 200 million RPS attack — to prevent further infections and attacks on victims such as the Department of Defense Information Network. #Aisuru #DoDIN
Keypoints
- International law enforcement dismantled C2 infrastructure for the Aisuru, KimWolf, JackSkid, and Mossad botnets.
- The operation targeted virtual servers, internet domains, and other infrastructure used to control infected IoT devices.
- Aisuru set a DDoS record with a 31.4 Tbps, 200 million requests per second attack against telecom targets.
- The botnets infected over three million devices and were sold to other criminals under a cybercrime-as-a-service model.
- Hundreds of thousands of attacks caused service degradation, financial losses, and risks to critical networks including the DoD Information Network.