US Dismantles Four Major Botnets Behind Massive DDoS Attacks

📰 Original title: US Takes Down Botnets Used in Record-Breaking Cyberattacks

đŸ€– IA: It's not clickbait ✅
đŸ‘„ Usuarios: It's not clickbait ✅

View full AI summary: https://killbait.com/en/us-dismantles-four-major-botnets-behind-massive-ddos-attacks/?redirpost=98298992-f264-465c-96b2-bc7f94018e12

#cybersecurity #botnets #cyberattacks #ddos

US Dismantles Four Major Botnets Behind Massive DDoS Attacks

The United States Department of Justice (DOJ), in collaboration with the Defense Criminal Investigative Service and international partners from Canada and Germany, has dismantled four of the world’s


KillBait Archive

US Takes Down #Botnets Used in Record-Breaking #Cyberattacks

The #Aisuru , #Kimwolf , #JackSkid , and #Mossad botnets had infected more than 3 million devices in total, many inside home networks, according to the US Justice Department.
#doj #privacy #security

https://www.wired.com/story/us-takes-down-botnets-used-in-record-breaking-cyberattacks/

US Takes Down Botnets Used in Record-Breaking Cyberattacks

The Aisuru, Kimwolf, JackSkid, and Mossad botnets had infected more than 3 million devices in total, many inside home networks, according to the US Justice Department.

WIRED

Feds Disrupt #IoT #Botnets Behind Huge #DDoS Attacks

#doj joined authorities in #Canada & #Germany in dismantling the online #infrastructure behind 4 highly disruptive botnets that compromised more than 3 million Internet of Things (IoT) devices, such as #routers & web #cameras. The feds say the 4 botnets — named #Aisuru , #Kimwolf , #JackSkid & #Mossad — are responsible for a series of recent record-smashing DDoS attacks capable of knocking nearly any target offline

https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/

Feds Disrupt IoT Botnets Behind Huge DDoS Attacks – Krebs on Security

US Shuts Down Four Botnets Responsible for Record-Breaking Cyberattacks

US, Canada and Germany dismantle Aisuru, Kimwolf, JackSkid and Mossad botnets that compromised 3 million IoT devices and launched record-breaking DDoS attacks.

The Daily Perspective
📱 VulnCheck 2026: 1% des CVE 2025 exploitĂ©es, React2Shell et la chaĂźne SharePoint « ToolShell » en tĂȘte
📝 Source: VulnCheck — Exploit Intelligence Report 2026.
📖 cyberveille : https://cyberveille.ch/posts/2026-03-09-vulncheck-2026-1-des-cve-2025-exploitees-react2shell-et-la-chaine-sharepoint-toolshell-en-tete/
🌐 source : https://wwv.vulncheck.com/hubfs/Research/2026-VulnCheck-Exploit-Intelligence-Report.pdf
#Botnets #Microsoft_SharePoint #Cyberveille
VulnCheck 2026: 1% des CVE 2025 exploitĂ©es, React2Shell et la chaĂźne SharePoint « ToolShell » en tĂȘte

Source: VulnCheck — Exploit Intelligence Report 2026. Ce rapport rĂ©trospectif et chiffrĂ© dresse le panorama de l’exploitation des vulnĂ©rabilitĂ©s en 2025 (500+ sources, 2 douzaines d’indices VulnCheck), en priorisant l’exploitation in‑the‑wild, la maturitĂ© des exploits et le comportement des attaquants. Chiffres clĂ©s et tendances 48 174 CVE publiĂ©es en 2025 (83% avec identifiant 2025) ; ~1% exploitĂ©es in‑the‑wild Ă  fin 2025. 14 400+ exploits pour des CVE 2025 (+16,5% YoY), mais >98% restent des PoC non weaponized ; 417 exploits weaponized (majoritairement privĂ©s/commerciaux). 884 vulnĂ©rabilitĂ©s ajoutĂ©es au VulnCheck KEV en 2025 (47,7% avec identifiant 2025) ; 28,96% exploitĂ©es le jour de la publication CVE ou avant. Ransomware: 39 CVE 2025 attribuĂ©es, 56,4% dĂ©couvertes via exploitation zero‑day ; 1/3 sans exploit public/commercial au 01/2026. MontĂ©e du bruit IA: prolifĂ©ration de faux/faux‑positifs PoC gĂ©nĂ©rĂ©s par IA, contaminant l’écosystĂšme (ex: premiers PoC React2Shell non fonctionnels largement relayĂ©s). VulnĂ©rabilitĂ©s phares 2025

CyberVeille
14,000 routers are infected by malware that's highly resistant to takedowns https://arstechni.ca/hwAw #distributedhashtables #Security #botnets #malware #routers #Biz&IT #Tech #ASUS
14,000 routers are infected by malware that's highly resistant to takedowns

Most of the devices are made by Asus and are located in the US.

Ars Technica
Botnet for profit: Jeanson James Ancheta - Negative PID

Early hackers were fuelled by curiosity and defiance of authority. Jeanson James Ancheta changed that forever.

Negative PID

Poland’s Central Bureau for Combating Cybercrime (CBZC) has announced the arrest of a 20-year-old suspect linked to global DDoS activity.

Authorities state that the attacks leveraged C2 stressers and CNC nodes within a multi-layered botnet architecture. Equipment used to host and distribute the DDoS tooling was seized during a search, effectively dismantling the setup.

From a defensive standpoint, this case highlights how botnet infrastructure is assembled - and how law enforcement intervenes once attribution is established.

What defensive signals best indicate stresser-based DDoS activity at scale?

Source: https://www.helpnetsecurity.com/2026/02/05/ddos-poland-suspect-arrested/

Join the discussion and follow @technadu for grounded infosec reporting.

#Infosec #DDoSDefense #Botnets #IncidentResponse #CyberOperations #TechNadu #ThreatAnalysis

Rustdesk durch Botnet-Angriffe immer wieder offline (Feb. 2026)

Kurze Information fĂŒr Blog-Leser die die Remote Desktop-Lösung Rustdesk einsetzen. Ein Blog-Leser hat mich darĂŒber informiert (danke), dass deren Server „momentan“ offline seien. Aussage war: „das


Borns IT- und Windows-Blog

Instead, threats are shifting to weaker networks and resilient rogue hosting providers, while botnet controller domains continue to rise đŸŒâŹ†ïž.

Read the full Botnet Spotlight here 👉 https://www.spamhaus.org/resource-hub/botnet-c-c/botnet-spotlight-pressure-rises-on-botnets-but-the-fight-is-far-from-over/

#Botnets #Malware #BulletproofHosts

2/2

Resources | Spotlight Botnet Threat Update July - December 2025

Learn more about the fight against botnet in the latest edition of the Botnet Spotlight.

The Spamhaus Project