EUA proíbem venda de roteadores estrangeiros no país
EUA proíbem venda de roteadores estrangeiros no país
The Internet Last Week
* IETF 125
https://www.ietf.org/meeting/125/
* Cuba power outage effects
https://noc.social/@cloudflareradar/116240190351546459
https://mastodon.social/@IODA/116246041272623316
https://infosec.exchange/@dougmadory/116240466331483809
https://mastodon.social/@netblocks/116240861464667713
* IoT DDoS botnets disrupted
https://www.justice.gov/usao-ak/pr/authorities-disrupt-worlds-largest-iot-ddos-botnets-responsible-record-breaking-attacks
* Unallocated IP4 /13 announced
https://infosec.exchange/@spamhaus/116250561577999852
https://bgp.he.net/net/102.224.0.0/13
https://stat.ripe.net/widget/routing-history#resource=102.224.0.0/13&starttime=2026-03-15
* CAs must perform DNSSEC validation
https://cabforum.org/2025/06/18/ballot-sc-085v2-require-validation-of-dnssec-when-present-for-caa-and-dcv-lookups/
https://infosec.exchange/@mnordhoff/116240122433847371
"The collection of millions of hacked computers known as Aisuru and Kimwolf have been used to launch some of the biggest distributed denial-of-service (DDoS) attacks ever seen. Now United States law enforcement agencies have wiped both of them off the internet, along with two of the other hordes of hijacked computers—known as botnets—in a single broad takedown.
On Thursday, the US Department of Justice, working with the cybercrime-fighting agency within the US Department of Defense known as the Defense Criminal Investigative Service, announced that it had dismantled four massive botnets in a single operation, removing the command-and-control servers used to commandeer the hacker-run armies of compromised devices known by the names JackSkid, Mossad, Aisuru, and Kimwolf. Together, operators of the four botnets had amassed more than 3 million devices, the Justice Department said, and often sold access to those devices to other criminal hackers as well as using them to target victims with overwhelming floods of attack traffic to knock websites and internet services offline.
Aisuru and Kimwolf, a distinct but Aisuru-related botnet, had together comprised more than a million devices, according to DDoS defense firm Cloudflare, with Aisuru infecting a variety of devices ranging from DVRs to network appliances to webcams, and its Kimwolf offshoot infecting Android devices including smart TVs and set-top boxes."
https://www.wired.com/story/us-takes-down-botnets-used-in-record-breaking-cyberattacks/
Força-tarefa global desmantela botnets que atacaram mais de 3 milhões de dispositivos
US Dismantles Four Major Botnets Behind Massive DDoS Attacks
📰 Original title: US Takes Down Botnets Used in Record-Breaking Cyberattacks
🤖 IA: It's not clickbait ✅
👥 Usuarios: It's not clickbait ✅
View full AI summary: https://killbait.com/en/us-dismantles-four-major-botnets-behind-massive-ddos-attacks/?redirpost=98298992-f264-465c-96b2-bc7f94018e12
US Takes Down #Botnets Used in Record-Breaking #Cyberattacks
The #Aisuru , #Kimwolf , #JackSkid , and #Mossad botnets had infected more than 3 million devices in total, many inside home networks, according to the US Justice Department.
#doj #privacy #security
https://www.wired.com/story/us-takes-down-botnets-used-in-record-breaking-cyberattacks/
Feds Disrupt #IoT #Botnets Behind Huge #DDoS Attacks
#doj joined authorities in #Canada & #Germany in dismantling the online #infrastructure behind 4 highly disruptive botnets that compromised more than 3 million Internet of Things (IoT) devices, such as #routers & web #cameras. The feds say the 4 botnets — named #Aisuru , #Kimwolf , #JackSkid & #Mossad — are responsible for a series of recent record-smashing DDoS attacks capable of knocking nearly any target offline
https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/
Source: VulnCheck — Exploit Intelligence Report 2026. Ce rapport rétrospectif et chiffré dresse le panorama de l’exploitation des vulnérabilités en 2025 (500+ sources, 2 douzaines d’indices VulnCheck), en priorisant l’exploitation in‑the‑wild, la maturité des exploits et le comportement des attaquants. Chiffres clés et tendances 48 174 CVE publiées en 2025 (83% avec identifiant 2025) ; ~1% exploitées in‑the‑wild à fin 2025. 14 400+ exploits pour des CVE 2025 (+16,5% YoY), mais >98% restent des PoC non weaponized ; 417 exploits weaponized (majoritairement privés/commerciaux). 884 vulnérabilités ajoutées au VulnCheck KEV en 2025 (47,7% avec identifiant 2025) ; 28,96% exploitées le jour de la publication CVE ou avant. Ransomware: 39 CVE 2025 attribuées, 56,4% découvertes via exploitation zero‑day ; 1/3 sans exploit public/commercial au 01/2026. Montée du bruit IA: prolifération de faux/faux‑positifs PoC générés par IA, contaminant l’écosystème (ex: premiers PoC React2Shell non fonctionnels largement relayés). Vulnérabilités phares 2025