In a significant international cybersecurity operation, authorities from the United States, Germany, and Canada have successfully disrupted the command and control (C2) infrastructure of four prolific botnets: Aisuru, KimWolf, JackSkid, and Mossad. These botnets were primarily responsible for compromising Internet of Things (IoT) devices and orchestrating massive Distributed Denial of Service (DDoS) attacks. The joint action targeted not only the C2 servers but also associated virtual servers, internet domains, and other critical infrastructure used to sustain these malicious networks. This coordinated takedown aims to sever communication channels between the botnets and their enslaved devices, preventing further infections and crippling their capacity to launch future attacks. The operation highlights the growing global resolve to combat cybercrime that leverages insecure IoT ecosystems.
The scale of the threat posed by these botnets was immense. In recent months, they were linked to hundreds of thousands of DDoS attacks targeting victims worldwide, including critical infrastructure. Notably, IP addresses belonging to the U.S. Department of Defense Information Network (DoDIN) were among the targets. The Aisuru botnet, in particular, demonstrated unprecedented offensive power. In December, it set a new record with a DDoS attack peaking at 31.4 Terabits per second (Tbps) and 200 million requests per second, primarily targeting telecommunications companies. This shattered its own previous record of 29.7 Tbps. Microsoft had previously attributed a separate November attack, peaking at 15.72 Tbps and originating from 500,000 IP addresses, to the same botnet family, underscoring its persistent and evolving threat.
This law enforcement victory is part of a broader, ongoing international effort to dismantle cybercriminal infrastructure. By targeting the foundational C2 architecture, authorities have moved beyond merely mitigating individual attacks to disabling the bots' core command system. This approach is more effective in the long term, as it prevents botnet herders from regaining control of their compromised devices. However, security experts caution that the underlying vulnerabilities in countless IoT devices remain unpatched. Device owners and manufacturers must prioritize security updates and strong authentication to prevent these devices from being easily recruited into the next generation of botnets. The operation serves as both a warning to threat actors and a call to action for the global community to secure the expanding IoT landscape.



