DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks
好的,我现在要帮用户总结这篇文章的内容。用户的要求是用中文总结,控制在100字以内,不需要特定的开头,直接描述文章内容。 首先,我需要快速浏览文章,抓住主要信息。文章讲的是美国司法部宣布破坏了几个物联网僵尸网络的命令控制基础设施,包括AISURU、Kimwolf、JackSkid和Mossad。这些僵尸网络用于发动DDoS攻击,峰值达到30Tbps。加拿大和德国的执法机构也参与了行动,并且有多个私营企业协助调查。 接下来,我需要将这些关键点浓缩到100字以内。要确保涵盖主要的僵尸网络名称、攻击类型、峰值数据以及国际合作和私营企业的参与。 可能会遇到的问题是如何在有限的字数内准确传达所有重要信息而不遗漏关键点。因此,我需要选择最核心的信息进行总结,比如僵尸网络的数量、攻击类型、峰值数据以及国际合作的重要性。 最后,检查字数是否符合要求,并确保语言简洁明了。 </think> 美国司法部宣布破坏多个物联网僵尸网络(如AISURU、Kimwolf、JackSkid和Mossad)的命令控制基础设施,这些僵尸网络用于发动大规模DDoS攻击,峰值达30Tbps。加拿大和德国执法机构及多家私营企业参与行动。 2026-3-20 06:25:0 Author: thehackernews.com(查看原文) 阅读量:10 收藏

Global DDoS Attacks

The U.S. Department of Justice (DoJ) on Thursday announced the disruption of command-and-control (C2) infrastructure used by several Internet of Things (IoT) botnets like AISURU, Kimwolf, JackSkid, and Mossad as part of a court-authorized law enforcement operation.

The effort also saw authorities from Canada and Germany targeting the operators behind these botnets, with a number of private sector firms, including Akamai, Amazon Web Services, Cloudflare, DigitalOcean, Google, Lumen, Nokia, Okta, Oracle, PayPal, SpyCloud, Synthient, Team Cymru, Unit 221B, and QiAnXin XLab assisting in the investigation efforts.

"The four botnets launched distributed denial-of-service (DDoS) attacks targeting victims around the world," the DoJ said. "Some of these attacks measured approximately 30 Terabits per second, which were record-breaking attacks."

In a report last month, Cloudflare attributed AISURU/Kimwolf to a massive 31.4 Tbps DDoS attack that occurred in November 2025 and lasted only 35 seconds. Towards the end of last year, the botnet is also assessed to have engaged in hyper-volumetric DDoS attacks that had an average size of 3 billion packets per second (Bpps), 4 Tbps, and 54 million requests per second (Mrps).

Independent security journalist Brian Krebs also traced the administrator of Kimwolf to a 23-year-old Jacob Butler (aka Dort) from Ottawa, Canada. Butler told Krebs he has not used the Dort persona since 2021 and claimed someone is impersonating him after compromising his old account.

Butler also said, "he mostly stays home and helps his mom around the house because he struggles with autism and social interaction." According to Krebs, the other prime suspect is a 15-year-old residing in Germany. No arrests have been announced.

The botnet has conscripted more than 2 million Android devices into its network, most of which are compromised, off-brand Android TVs. In all, the four botnets are estimated to have infected no less than 3 million devices worldwide, such as digital video recorders, web cameras, or Wi-Fi routers, of which hundreds of thousands are located in the U.S.

"The Kimwolf and JackSkid botnets are accused of targeting and infecting devices which are traditionally 'firewalled' from the rest of the internet. The infected devices were enslaved by the botnet operators," the DoJ said. "The operators then used a 'cybercrime as a service' model to sell access to the infected devices to other cyber criminals."

These infected devices were then used to conduct DDoS attacks against targets of interest across the world. Court documents allege that the four Mirai botnet variants have issued hundreds of thousands of DDoS attack commands -

  • AISURU - >200,000 DDoS attack commands
  • Kimwolf - >25,000 DDoS attack commands
  • JackSkid - >90,000 DDoS attack commands
  • Mossad - >1,000 DDoS attack commands

"Kimwolf represented a fundamental shift in how botnets operate and scale. Unlike traditional botnets that scan the open internet for vulnerable devices, Kimwolf exploited a novel attack vector: residential proxy networks," Tom Scholl, VP/Distinguished Engineer at AWS, said in a post shared on LinkedIn.

"By infiltrating home networks through compromised devices — including streaming TV boxes and other IoT devices — the botnet gained access to local networks that are typically protected from external threats by home routers."

Lumen Black Lotus Labs, in a statement shared with The Hacker News, said it has null-routed nearly 1,000 of the C2 servers used by AISURU and then Kimwolf. According to data gathered by the cybersecurity company, JackSkid averaged over 150,000 daily victims in the first two weeks of March 2026, hitting 250,000 on March 8. Mossad averaged over 100,000 daily victims during the same period.

"The problem is, there are just so many devices out there that are vulnerable that two things happened – first, Kimwolf proved to be incredibly resilient," Ryan English, security researcher at Lumen's Black Lotus Labs, said. "The second problem was that multiple new botnets started to emulate the technique of using the vulnerability to grow very large, very fast."

Akamai said the hyper-volumetric botnets generated attacks exceeding 30 Tbps, 14 billion packets per second, and 300 Mrps, adding that cybercriminals leveraged these botnets to launch hundreds of thousands of attacks and demand extortion payments from victims in some cases.

"These attacks can cripple core internet infrastructure, cause significant service degradation for ISPs and their downstream customers, and even overwhelm high-capacity cloud-based mitigation services," the web infrastructure company said.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/doj-disrupts-3-million-device-iot.html
如有侵权请联系:admin#unsafe.sh