EUA proĂbem venda de roteadores estrangeiros no paĂs
EUA proĂbem venda de roteadores estrangeiros no paĂs
The Internet Last Week
* IETF 125
https://www.ietf.org/meeting/125/
* Cuba power outage effects
https://noc.social/@cloudflareradar/116240190351546459
https://mastodon.social/@IODA/116246041272623316
https://infosec.exchange/@dougmadory/116240466331483809
https://mastodon.social/@netblocks/116240861464667713
* IoT DDoS botnets disrupted
https://www.justice.gov/usao-ak/pr/authorities-disrupt-worlds-largest-iot-ddos-botnets-responsible-record-breaking-attacks
* Unallocated IP4 /13 announced
https://infosec.exchange/@spamhaus/116250561577999852
https://bgp.he.net/net/102.224.0.0/13
https://stat.ripe.net/widget/routing-history#resource=102.224.0.0/13&starttime=2026-03-15
* CAs must perform DNSSEC validation
https://cabforum.org/2025/06/18/ballot-sc-085v2-require-validation-of-dnssec-when-present-for-caa-and-dcv-lookups/
https://infosec.exchange/@mnordhoff/116240122433847371
"The collection of millions of hacked computers known as Aisuru and Kimwolf have been used to launch some of the biggest distributed denial-of-service (DDoS) attacks ever seen. Now United States law enforcement agencies have wiped both of them off the internet, along with two of the other hordes of hijacked computersâknown as botnetsâin a single broad takedown.
On Thursday, the US Department of Justice, working with the cybercrime-fighting agency within the US Department of Defense known as the Defense Criminal Investigative Service, announced that it had dismantled four massive botnets in a single operation, removing the command-and-control servers used to commandeer the hacker-run armies of compromised devices known by the names JackSkid, Mossad, Aisuru, and Kimwolf. Together, operators of the four botnets had amassed more than 3 million devices, the Justice Department said, and often sold access to those devices to other criminal hackers as well as using them to target victims with overwhelming floods of attack traffic to knock websites and internet services offline.
Aisuru and Kimwolf, a distinct but Aisuru-related botnet, had together comprised more than a million devices, according to DDoS defense firm Cloudflare, with Aisuru infecting a variety of devices ranging from DVRs to network appliances to webcams, and its Kimwolf offshoot infecting Android devices including smart TVs and set-top boxes."
https://www.wired.com/story/us-takes-down-botnets-used-in-record-breaking-cyberattacks/
Força-tarefa global desmantela botnets que atacaram mais de 3 milhÔes de dispositivos
US Dismantles Four Major Botnets Behind Massive DDoS Attacks
đ° Original title: US Takes Down Botnets Used in Record-Breaking Cyberattacks
đ€ IA: It's not clickbait â
đ„ Usuarios: It's not clickbait â
View full AI summary: https://killbait.com/en/us-dismantles-four-major-botnets-behind-massive-ddos-attacks/?redirpost=98298992-f264-465c-96b2-bc7f94018e12
US Takes Down #Botnets Used in Record-Breaking #Cyberattacks
The #Aisuru , #Kimwolf , #JackSkid , and #Mossad botnets had infected more than 3 million devices in total, many inside home networks, according to the US Justice Department.
#doj #privacy #security
https://www.wired.com/story/us-takes-down-botnets-used-in-record-breaking-cyberattacks/
Feds Disrupt #IoT #Botnets Behind Huge #DDoS Attacks
#doj joined authorities in #Canada & #Germany in dismantling the online #infrastructure behind 4 highly disruptive botnets that compromised more than 3 million Internet of Things (IoT) devices, such as #routers & web #cameras. The feds say the 4 botnets â named #Aisuru , #Kimwolf , #JackSkid & #Mossad â are responsible for a series of recent record-smashing DDoS attacks capable of knocking nearly any target offline
https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/
Source: VulnCheck â Exploit Intelligence Report 2026. Ce rapport rĂ©trospectif et chiffrĂ© dresse le panorama de lâexploitation des vulnĂ©rabilitĂ©s en 2025 (500+ sources, 2 douzaines dâindices VulnCheck), en priorisant lâexploitation inâtheâwild, la maturitĂ© des exploits et le comportement des attaquants. Chiffres clĂ©s et tendances 48âŻ174 CVE publiĂ©es en 2025 (83% avec identifiant 2025) ; ~1% exploitĂ©es inâtheâwild Ă fin 2025. 14âŻ400+ exploits pour des CVE 2025 (+16,5% YoY), mais >98% restent des PoC non weaponized ; 417 exploits weaponized (majoritairement privĂ©s/commerciaux). 884 vulnĂ©rabilitĂ©s ajoutĂ©es au VulnCheck KEV en 2025 (47,7% avec identifiant 2025) ; 28,96% exploitĂ©es le jour de la publication CVE ou avant. Ransomware: 39 CVE 2025 attribuĂ©es, 56,4% dĂ©couvertes via exploitation zeroâday ; 1/3 sans exploit public/commercial au 01/2026. MontĂ©e du bruit IA: prolifĂ©ration de faux/fauxâpositifs PoC gĂ©nĂ©rĂ©s par IA, contaminant lâĂ©cosystĂšme (ex: premiers PoC React2Shell non fonctionnels largement relayĂ©s). VulnĂ©rabilitĂ©s phares 2025