Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
嗯,用户让我总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头,直接写描述。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是美国司法部联合加拿大和德国的执法机构,摧毁了四个大型僵尸网络(botnets)的基础设施。这些botnets控制了超过三百万个物联网设备,比如路由器和摄像头。他们通过这些设备发起了多次大规模的DDoS攻击,导致很多目标离线。 接下来,文章提到司法部执行了扣押令,针对多个美国注册的域名和虚拟服务器。政府指控这些botnet的操控者发起了数以万计的攻击,并向受害者勒索赎金。有些受害者损失了数万美元。 然后是具体的数据:Aisuru发起了超过20万次攻击,JackSkid至少9万次,Kimwolf超过2.5万次,Mossad大约1000次。执法行动旨在防止进一步感染和限制未来攻击的能力。 国际合作方面,FBI和DCIS合作,并得到了近20家科技公司的协助。此外,在加拿大和德国也采取了执法行动,但没有更多关于嫌疑人的细节。 最后,在2月,一个22岁的加拿大男子被指为Kimwolf的核心操作者,另一个15岁的德国人也被怀疑。 现在要将这些信息浓缩到100字以内。重点包括:四个botnets、影响三百万物联网设备、大规模DDoS攻击、国际合作摧毁基础设施、扣押令执行、勒索赎金、受害者损失、具体攻击次数、执法目的等。 可能需要省略一些细节,比如每个botnet的具体数据和国际合作的具体机构名称。确保涵盖主要事件:摧毁botnets、影响范围、攻击类型、执法行动及其目的。 </think> 美国司法部联合加拿大和德国执法机构摧毁了四个大型僵尸网络(botnets),这些网络控制了超三百万物联网设备并发起大规模DDoS攻击。行动中扣押了相关域名和服务器,并指控操控者通过勒索获利。 2026-3-20 01:0:7 Author: krebsonsecurity.com(查看原文) 阅读量:8 收藏

The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets — named Aisuru, Kimwolf, JackSkid and Mossad — are responsible for a series of recent record-smashing distributed denial-of-service (DDoS) attacks capable of knocking nearly any target offline.

Image: Shutterstock, @Elzicon.

The Justice Department said the Department of Defense Office of Inspector General’s (DoDIG) Defense Criminal Investigative Service (DCIS) executed seizure warrants targeting multiple U.S.-registered domains, virtual servers, and other infrastructure involved in DDoS attacks against Internet addresses owned by the DoD.

The government alleges the unnamed people in control of the four botnets used their crime machines to launch hundreds of thousands of DDoS attacks, often demanding extortion payments from victims. Some victims reported tens of thousands of dollars in losses and remediation expenses.

The oldest of the botnets — Aisuru — issued more than 200,000 attacks commands, while JackSkid hurled at least 90,000 attacks. Kimwolf issued more than 25,000 attack commands, the government said, while Mossad was blamed for roughy 1,000 digital sieges.

The DOJ said the law enforcement action was designed to prevent further infection to victim devices and to limit or eliminate the ability of the botnets to launch future attacks. The case is being investigated by the DCIS with help from the FBI’s field office in Anchorage, Alaska, and the DOJ’s statement credits nearly two dozen technology companies with assisting in the operation.

“By working closely with DCIS and our international law enforcement partners, we collectively identified and disrupted criminal infrastructure used to carry out large-scale DDoS attacks,” said Special Agent in Charge Rebecca Day of the FBI Anchorage Field Office.

Aisuru emerged in late 2024, and by mid-2025 it was launching record-breaking DDoS attacks as it rapidly infected new IoT devices. In October 2025, Aisuru was used to seed Kimwolf, an Aisuru variant which introduced a novel spreading mechanism that allowed the botnet to infect devices hidden behind the protection of the user’s internal network.

On January 2, 2026, the security firm Synthient publicly disclosed the vulnerability Kimwolf was using to propagate so quickly. That disclosure helped curtail Kimwolf’s spread somewhat, but since then several other IoT botnets have emerged that effectively copy Kimwolf’s spreading methods while competing for the same pool of vulnerable devices. According to the DOJ, the JackSkid botnet also sought out systems on internal networks just like Kimwolf.

The DOJ said its disruption of the four botnets coincided with “law enforcement actions” conducted in Canada and Germany targeting individuals who allegedly operated those botnets, although no further details were available on the suspected operators.

In late February, KrebsOnSecurity identified a 22-year-old Canadian man as a core operator of the Kimwolf botnet. Multiple sources familiar with the investigation told KrebsOnSecurity the other prime suspect is a 15-year-old living in Germany.


文章来源: https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/
如有侵权请联系:admin#unsafe.sh