Home OSINT News Signals
CYBER

International Law Enforcement Dismantles Four Major IoT Botnets Responsible for Record DDoS Attacks

🕓 1 min read

In a significant international cybersecurity operation, authorities from the United States, Canada, and Germany have successfully disrupted the core infrastructure of four prolific botnets. These networks, comprising over three million compromised Internet of Things (IoT) devices like routers and web cameras, were responsible for launching some of the largest distributed denial-of-service (DDoS) attacks on record. The dismantled botnets, identified as Aisuru, Kimwolf, JackSkid, and Mossad, possessed the capability to overwhelm and knock nearly any online target offline, posing a severe threat to global digital infrastructure.

The U.S. Department of Justice (DOJ) announced that the operation, led by the Defense Criminal Investigative Service (DCIS) of the Department of Defense Office of Inspector General, involved executing seizure warrants for multiple U.S.-registered domains, virtual servers, and other critical infrastructure. This infrastructure was directly implicated in orchestrating DDoS attacks against internet addresses owned by the U.S. Department of Defense. The government alleges that the unnamed operators behind these botnets used their vast networks of compromised devices to launch hundreds of thousands of DDoS attacks, frequently coupling these assaults with extortion demands, leading to significant financial losses and remediation costs for victims.

The scale of the botnets' operations was staggering. According to official statements, the Aisuru botnet, the oldest of the four, issued more than 200,000 attack commands. JackSkid was responsible for at least 90,000 attacks, while Kimwolf launched over 25,000. The Mossad botnet, though smaller in comparison, was still blamed for approximately 1,000 digital sieges. This enforcement action was strategically designed to sever the command-and-control (C2) links to the infected IoT devices, preventing further infections and crippling the botnets' ability to launch future attacks.

The investigation was spearheaded by the DCIS with crucial assistance from the FBI's field office in Anchorage, Alaska. The DOJ also credited nearly two dozen technology companies for their collaborative support in the takedown operation. "By working closely with DCIS and our international law enforcement partners, we collectively identified and disrupted criminal infrastructure used to carry out large-scale DDoS attacks," stated Special Agent in Charge Rebecca Day. This operation underscores the critical importance of public-private and cross-border cooperation in combating the escalating threat posed by IoT-based cybercrime, highlighting a proactive model for future defensive actions against similarly sophisticated botnets.

Telegram X LinkedIn
Back to News