Атакующий трафик вчера, сегодня, завтра: про актуальные реалии и DDoS-вызовы

Рассказываем про собственную статистику DDoS-атак за 2025 и первый квартал 2026 года — и через эту призму размышляем об эволюции DDoS как явления в целом.

https://habr.com/ru/companies/ddosguard/articles/1018462/

#ddos #ddosguard #защита_от_ddos #ботнет #aisuru #эволюция_ddos #тренды_ddos #статистика_ddos_2025 #статистика_ddos_2026 #модель_osi

Атакующий трафик вчера, сегодня, завтра: про актуальные реалии и DDoS-вызовы

Рассказываем про собственную статистику DDoS-атак за 2025 и первый квартал 2026 года — и через эту призму размышляем об эволюции DDoS как явления в целом. Предисловие: эволюция трафика и DDoS как...

Хабр

📢 Analyse technique des botnets basés sur Mirai : Aisuru, KimWolf, Satori et opérations de démantèlement
📝 ## 🌐 Contexte

Publié le 30 mars 2026 par Pulsedive Threat Research, cet...
📖 cyberveille : https://cyberveille.ch/posts/2026-03-30-analyse-technique-des-botnets-bases-sur-mirai-aisuru-kimwolf-satori-et-operations-de-demantelement/
🌐 source : https://blog.pulsedive.com/the-operations-of-the-swarm-inside-the-complex-world-of-mirai-based-botnets/
#Aisuru #DDoS #Cyberveille

Analyse technique des botnets basés sur Mirai : Aisuru, KimWolf, Satori et opérations de démantèlement

🌐 Contexte Publié le 30 mars 2026 par Pulsedive Threat Research, cet article constitue un primer technique sur l’écosystème des botnets modernes basés sur Mirai, avec un focus sur les familles Aisuru, KimWolf et Satori, ainsi que sur les actions de démantèlement menées par le DOJ américain le 19 mars 2026. 📈 Tendances générales Spamhaus a enregistré une hausse de 24 % des serveurs C2 de botnets sur la période juillet-décembre 2025 par rapport au semestre précédent, et de 26 % sur janvier-juin 2025. Les États-Unis ont dépassé la Chine comme pays hébergeant le plus de serveurs C2, une position que la Chine détenait depuis le troisième trimestre 2023.

CyberVeille

📢 Global crackdown dismantles Aisuru, KimWolf, JackSkid, and Mossad botnets behind major DDoS attack campaigns targeting millions of devices worldwide.

Read: https://hackread.com/crackdown-dismantles-4-botnets-ddos-attacks/

#CyberSecurity #CyberCrime #DDoS #Mossad #Aisuru #Botnet

Global Crackdown Dismantles 4 Botnets Behind Major DDoS Attacks

Global crackdown dismantles Aisuru, KimWolf, JackSkid and Mossad botnets behind major DDoS attack campaigns targeting millions of devices worldwide.

Hackread - Cybersecurity News, Data Breaches, AI and More

📢 Démantèlement mondial des botnets IoT AISURU, Kimwolf, JackSkid et Mossad par le DoJ
📝 ## 🌐 Contexte

Le 21 mars 2026, Security Affairs rapporte qu'une opératio...
📖 cyberveille : https://cyberveille.ch/posts/2026-03-21-demantelement-mondial-des-botnets-iot-aisuru-kimwolf-jackskid-et-mossad-par-le-doj/
🌐 source : https://securityaffairs.com/189710/cyber-crime/global-law-enforcement-operation-targets-aisuru-kimwolf-jackskid-botnet-operators.html
#AISURU #Android #Cyberveille

Démantèlement mondial des botnets IoT AISURU, Kimwolf, JackSkid et Mossad par le DoJ

🌐 Contexte Le 21 mars 2026, Security Affairs rapporte qu’une opération internationale coordonnée par le Département de Justice américain (DoJ) a ciblé l’infrastructure de commandement et contrôle (C2) de plusieurs botnets IoT majeurs : AISURU, Kimwolf, JackSkid et Mossad. L’opération a impliqué des autorités du Canada et de l’Allemagne, ainsi que des entreprises technologiques privées. 🎯 Botnets ciblés et ampleur Les quatre botnets ont infecté plus de 3 millions d’appareils dans le monde, principalement des équipements IoT (caméras, routeurs). Ils opéraient selon un modèle cybercrime-as-a-service, louant l’accès aux appareils compromis pour lancer des attaques DDoS massives :

CyberVeille

Ich finde es schwierig eine #Malware / ein #Botnet nach dem israelischen Geheimdienst #Mossad zu benennen

#Aisuru, #KimWolf & Co.: Behörden „stören“ vier gefährliche Botnets | Security https://www.heise.de/news/Aisuru-KimWolf-Co-Laenderuebergreifende-Aktion-gegen-vier-gefaehrliche-Botnets-11218668.html #DDoS #CyberCrime #JackSkid

Aisuru, KimWolf & Co.: Behörden „stören“ vier gefährliche Botnets

Über drei Millionen infizierte IT-Geräte wurden zuletzt für besonders mächtige DDoS-Attacken benutzt. Nun gab es angeblich eine Aktion gegen die Infrastruktur.

heise online

"The collection of millions of hacked computers known as Aisuru and Kimwolf have been used to launch some of the biggest distributed denial-of-service (DDoS) attacks ever seen. Now United States law enforcement agencies have wiped both of them off the internet, along with two of the other hordes of hijacked computers—known as botnets—in a single broad takedown.

On Thursday, the US Department of Justice, working with the cybercrime-fighting agency within the US Department of Defense known as the Defense Criminal Investigative Service, announced that it had dismantled four massive botnets in a single operation, removing the command-and-control servers used to commandeer the hacker-run armies of compromised devices known by the names JackSkid, Mossad, Aisuru, and Kimwolf. Together, operators of the four botnets had amassed more than 3 million devices, the Justice Department said, and often sold access to those devices to other criminal hackers as well as using them to target victims with overwhelming floods of attack traffic to knock websites and internet services offline.

Aisuru and Kimwolf, a distinct but Aisuru-related botnet, had together comprised more than a million devices, according to DDoS defense firm Cloudflare, with Aisuru infecting a variety of devices ranging from DVRs to network appliances to webcams, and its Kimwolf offshoot infecting Android devices including smart TVs and set-top boxes."

https://www.wired.com/story/us-takes-down-botnets-used-in-record-breaking-cyberattacks/

#CyberSecurity #Botnets #DDoS #Aisuru #Kimwolf

US Takes Down Botnets Used in Record-Breaking Cyberattacks

The Aisuru, Kimwolf, JackSkid, and Mossad botnets had infected more than 3 million devices in total, many inside home networks, according to the US Justice Department.

WIRED

RE: https://infosec.exchange/@jmeyer/116259050557048999

ICYMI: a story about pulling one thread linking multiple botnets — four of which were targeted by coordinated law enforcement actions this week, and an adjacent one for which our team publishes the C2 decryption scheme.

#aisuru #kimwolf #mossad #jackskid #cecilio

A day late, but I appreciate all new and regular faces that made it out last night.

I hope you all enjoy it as much as I do.

Thought I would leave some learned info:
- Death Valley had a rare flower blooming event
- Tipper is a Drum/bass music artist
- #HomeAssistant is cool

Since I don’t have twitter length restrictions, this article about my #network #security space was nice to read. It is about the #kimwolf #aisuru takedowns. A little bit like wack-a-mole but every little bit helps… I think.

https://www.justice.gov/usao-ak/pr/authorities-disrupt-worlds-largest-iot-ddos-botnets-responsible-record-breaking-attacks

Stay safe out there!

Feds Disrupt IoT Botnets Behind Huge DDoS Attacks – Krebs on Security

US Takes Down Botnets Used in Record-Breaking Cyberattacks

The Aisuru, Kimwolf, JackSkid, and Mossad botnets had infected more than 3 million devices in total, many inside home networks, according to the US Justice Department.

WIRED