International joint action disrupts world’s largest DDoS botnets
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章内容,理解主要信息。 文章讲的是美国、德国和加拿大三国执法机构联手打击了四个僵尸网络(Aisuru、KimWolf、JackSkid、Mossad)的控制基础设施。这些僵尸网络利用物联网设备发动了大量DDoS攻击,甚至包括针对国防部网络的攻击。攻击规模很大,比如Aisuru在12月发起了31.4 Tbps的攻击。这些僵尸网络总共感染了超过300万台设备,并通过订阅模式出租给其他犯罪分子,用于勒索和破坏服务。 接下来,我需要将这些信息浓缩到100字以内。要抓住关键点:执法机构、僵尸网络名称、攻击目标、攻击规模、感染设备数量以及影响。 然后,组织语言,确保简洁明了。可能的结构是:执法机构采取行动打击僵尸网络,用于控制IoT设备并发动大规模DDoS攻击,导致严重后果。 最后检查字数是否符合要求,并确保没有使用“这篇文章”等开头词。 </think> 美、德、加三国执法机构联合打击了Aisuru等四个僵尸网络的控制基础设施,这些网络曾利用物联网设备发起大规模DDoS攻击,包括针对美国国防部网络的攻击。行动旨在切断其通信能力,防止进一步感染和攻击。 2026-3-20 08:17:24 Author: www.bleepingcomputer.com(查看原文) 阅读量:8 收藏

Botnet

Authorities from the United States, Germany, and Canada have taken down Command and Control (C2) infrastructure used by the Aisuru, KimWolf, JackSkid, and Mossad botnets to infect Internet of Things (IoT) devices.

The joint law enforcement action also targeted virtual servers, internet domains, and other infrastructure used by the four botnets to launch hundreds of thousands of massive Distributed Denial of Service (DDoS) attacks against victims worldwide in recent months, including IP addresses owned by the Department of Defense Information Network (DoDIN).

For instance, in December, the Aisuru botnet set a new record with a DDoS attack that peaked at 31.4 Tbps and 200 million requests per second as part of a broader campaign targeting multiple companies, most of which were in the telecommunications sector.

Aisuru was also behind a previous DDoS record of 29.7 Tbps, while an incident originating from 500,000 IP addresses(which Microsoft attributed to the same botnet) peaked at 15.72 Tbps in November.

"This operation, in coordination with other international law enforcement actions, is intended to disrupt communications associated with the Aisuru, KimWolf, JackSkid, and Mossad botnets, preventing further infection to victim devices and limiting or eliminating the ability of the botnets to launch future attack," the Justice Department said.

"Court documents allege that the Aisuru botnet issued more than 200,000 DDoS attack commands, the KimWolf botnet issued more than 25,000 DDoS attack commands, the JackSkid botnet launched more than 90,000 DDoS attack commands and the Mossad botnet launched more than 1,000 DDoS attack commands."

According to the U.S. Justice Department, these botnets have collectively infected and ensnared over three million IoT devices, including web cameras, digital video recorders, and WiFi routers, many of them located in the United States.

The botnet operators sold access to other cybercriminals under a cybercrime-as-a-service model, enabling them to launch DDoS attacks that resulted in tens of thousands of dollars in losses and remediation costs.

"These attacks can cripple core internet infrastructure, cause significant service degradation for ISPs and their downstream customers, and even overwhelm high-capacity cloud-based mitigation services," said cybersecurity and cloud computing company Akamai, which was one of the private sector firms involved in the joint action.

"Cybercriminals used these botnets to launch hundreds of thousands of attacks, in some cases demanding extortion payments from victims."

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/aisuru-kimwolf-jackskid-and-mossad-botnets-disrupted-in-joint-action/
如有侵权请联系:admin#unsafe.sh