By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Online Tech Guru
  • News
  • PC/Windows
  • Mobile
  • Apps
  • Gadgets
  • More
    • Gaming
    • Accessories
    • Editor’s Choice
    • Press Release
Reading: US Takes Down Botnets Used in Record-Breaking Cyberattacks
Best Deal
Font ResizerAa
Online Tech GuruOnline Tech Guru
  • News
  • Mobile
  • PC/Windows
  • Gaming
  • Apps
  • Gadgets
  • Accessories
Search
  • News
  • PC/Windows
  • Mobile
  • Apps
  • Gadgets
  • More
    • Gaming
    • Accessories
    • Editor’s Choice
    • Press Release
Get Ready for a Year of Chaotic Weather in the US

Get Ready for a Year of Chaotic Weather in the US

News Room News Room 20 March 2026
FacebookLike
InstagramFollow
YoutubeSubscribe
TiktokFollow
  • Subscribe
  • Privacy Policy
  • Contact
  • Terms of Use
© Foxiz News Network. Ruby Design Company. All Rights Reserved.
Online Tech Guru > News > US Takes Down Botnets Used in Record-Breaking Cyberattacks
News

US Takes Down Botnets Used in Record-Breaking Cyberattacks

News Room
Last updated: 20 March 2026 01:03
By News Room 5 Min Read
Share
US Takes Down Botnets Used in Record-Breaking Cyberattacks
SHARE

The collection of millions of hacked computers known as Aisuru and Kimwolf have been used to launch some of the biggest distributed denial-of-service (DDoS) attacks ever seen. Now United States law enforcement agencies have wiped both of them off the internet along with two of the other hordes of hijacked computers—known as botnets—in a single broad takedown.

On Thursday, the US Department of Justice, working with the cybercrime-fighting agency within the US Department of Defense known as the Defense Criminal Investigative Service, announced that it had dismantled four massive botnets in a single operation, removing the command-and-control servers used to commandeer the hacker-run armies of compromised devices known by the names JackSkid, Mossad, Aisuru, and Kimwolf. Together, operators of the four botnets had amassed more than 3 million devices, the Justice Department said, and often sold access to those devices to other criminal hackers as well as using them to target victims with overwhelming floods of attack traffic to knock websites and internet services offline.

Aisuru and Kimwolf, a distinct but Aisuru-related botnet, had together comprised more than a million devices, according to DDoS defense firm Cloudflare, with Aisuru infecting a variety of devices ranging from DVRs to network appliances to webcams, and its Kimwolf offshoot infecting Android devices including smart TVs and set-top boxes. Cloudflare says the two botnets, working in conjunction, carried out a cyberattack against a Cloudflare customer last November that reached more than 30 terabits of data per second, nearly three times the size of the previous biggest such attack.

No arrests were immediately announced along with the takedowns, but a Justice Department statement noted that the US government was collaborating with Canadian and German authorities, “which targeted individuals who operated these botnets.”

“The United States is steadfast in our commitment to safeguarding critical internet infrastructure and fighting the cybercriminals who jeopardize its security, wherever they might live,” US attorney Michael J. Heyman wrote in a statement.

Of the four botnets taken out in the operation, Aisuru had gained the most notoriety, thanks to a series of record-breaking or near-record cyberattacks it carried out last fall. The botnet, whose use was rented out like many such “booter” services offering their brute-force disruptive capabilities to anyone willing to pay, has been most visibly against gaming services like Minecraft and independent cybersecurity journalist Brian Krebs. Krebs, who has extensively investigated the botnet underground and Aisuru in particular, came under repeated attack from the botnet last year.

Then in November, Cloudflare absorbed a recording-breaking combined attack from Aisuru and Kimwolf that lasted only 35 seconds but reached 31.4 terabits per second, a volume of attack traffic close to triple the size of any seen before. (The company hasn’t revealed which of its customers was hit with that attack.)

In a report on the state of the DDoS ecosystem, Cloudflare described the maximum attack traffic of the combined Aisuru and Kimwolf botnets as equivalent to “the combined populations of the UK, Germany, and Spain all simultaneously typing a website address and then hitting ‘enter’ at the same second.” The botnet was capable, Cloudflare’s analysts wrote, of “launching DDoS attacks that can cripple critical infrastructure, crash most legacy cloud-based DDoS protection solutions, and even disrupt the connectivity of entire nations.”

In fact, all four botnets disrupted by the US operation were variants of Mirai, an internet-of-things botnet that first appeared in 2016, broke records at the time for the size of the cyberattacks it enabled, and eventually was used in an attack on the domain-name service provider Dyn that took down 175,000 websites simultaneously for much of the United States. Mirai’s code base has since served as the starting point for a decade of other internet-of-things botnets.

Share This Article
Facebook Twitter Copy Link
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Best Electric Mountain Bikes (2026): Specialized, Cannondale, Salsa

Best Electric Mountain Bikes (2026): Specialized, Cannondale, Salsa

News Room News Room 20 March 2026
FacebookLike
InstagramFollow
YoutubeSubscribe
TiktokFollow

Trending

Crimson Desert Sets Huge Steam Concurrent Player Count Minutes After Launch

Crimson Desert looks set to hit big Steam concurrent player numbers after it broke into…

20 March 2026

OpenAI is planning a desktop ‘superapp’

OpenAI is working on a desktop “superapp” that merges its ChatGPT app, the Codex AI…

20 March 2026

The Fight to Hold AI Companies Accountable for Children’s Deaths

His mother, Megan Garcia, is also a lawyer and one of the first parents to…

20 March 2026
Gaming

Respawn, PlayStation Studios and EA Full Circle among first speakers for Develop:Brighton 2026

Respawn, PlayStation Studios and EA Full Circle among first speakers for Develop:Brighton 2026

The organiser of Develop:Brighton, Tandem Events, has revealed the first speakers for this year's show. The 2026 conference is set to feature talks from the likes of Respawn Entertainment, PlayStation…

News Room 20 March 2026

Your may also like!

Lina Khan was right | The Verge
News

Lina Khan was right | The Verge

News Room 19 March 2026
Balatro publisher Playstack boasts “hit ratio” of over 85%
Gaming

Balatro publisher Playstack boasts “hit ratio” of over 85%

News Room 19 March 2026
A New Game Turns the H-1B Visa System Into a Surreal Simulation
News

A New Game Turns the H-1B Visa System Into a Surreal Simulation

News Room 19 March 2026
Google’s new Android sideloading includes a mandatory waiting period
News

Google’s new Android sideloading includes a mandatory waiting period

News Room 19 March 2026

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site.

Read our privacy policy for more information.

Quick Links

  • Subscribe
  • Privacy Policy
  • Contact
  • Terms of Use
Advertise with us

Socials

Follow US
Welcome Back!

Sign in to your account

Lost your password?