Categories: Tech & Ai

US Takes Down Botnets Used in Record-Breaking Cyberattacks


The collection of millions of hacked computers known as Aisuru and Kimwolf have been used to launch some of the biggest distributed denial-of-service (DDoS) attacks ever seen. Now United States law enforcement agencies have wiped both of them off the internet along with two of the other hordes of hijacked computers—known as botnets—in a single broad takedown.

On Thursday, the US Department of Justice, working with the cybercrime-fighting agency within the US Department of Defense known as the Defense Criminal Investigative Service, announced that it had dismantled four massive botnets in a single operation, removing the command-and-control servers used to commandeer the hacker-run armies of compromised devices known by the names JackSkid, Mossad, Aisuru, and Kimwolf. Together, operators of the four botnets had amassed more than 3 million devices, the Justice Department said, and often sold access to those devices to other criminal hackers as well as using them to target victims with overwhelming floods of attack traffic to knock websites and internet services offline.

Aisuru and Kimwolf, a distinct but Aisuru-related botnet, had together comprised more than a million devices, according to DDoS defense firm Cloudflare, with Aisuru infecting a variety of devices ranging from DVRs to network appliances to webcams, and its Kimwolf offshoot infecting Android devices including smart TVs and set-top boxes. Cloudflare says the two botnets, working in conjunction, carried out a cyberattack against a Cloudflare customer last November that reached more than 30 terabits of data per second, nearly three times the size of the previous biggest such attack.

No arrests were immediately announced along with the takedowns, but a Justice Department statement noted that the US government was collaborating with Canadian and German authorities, “which targeted individuals who operated these botnets.”

“The United States is steadfast in our commitment to safeguarding critical internet infrastructure and fighting the cybercriminals who jeopardize its security, wherever they might live,” US attorney Michael J. Heyman wrote in a statement.

Of the four botnets taken out in the operation, Aisuru had gained the most notoriety, thanks to a series of record-breaking or near-record cyberattacks it carried out last fall. The botnet, whose use was rented out like many such “booter” services offering their brute-force disruptive capabilities to anyone willing to pay, has been most visibly against gaming services like Minecraft and independent cybersecurity journalist Brian Krebs. Krebs, who has extensively investigated the botnet underground and Aisuru in particular, came under repeated attack from the botnet last year.

Then in November, Cloudflare absorbed a recording-breaking combined attack from Aisuru and Kimwolf that lasted only 35 seconds but reached 31.4 terabits per second, a volume of attack traffic close to triple the size of any seen before. (The company hasn’t revealed which of its customers was hit with that attack.)

In a report on the state of the DDoS ecosystem, Cloudflare described the maximum attack traffic of the combined Aisuru and Kimwolf botnets as equivalent to “the combined populations of the UK, Germany, and Spain all simultaneously typing a website address and then hitting ‘enter’ at the same second.” The botnet was capable, Cloudflare’s analysts wrote, of “launching DDoS attacks that can cripple critical infrastructure, crash most legacy cloud-based DDoS protection solutions, and even disrupt the connectivity of entire nations.”

In fact, all four botnets disrupted by the US operation were variants of Mirai, an internet-of-things botnet that first appeared in 2016, broke records at the time for the size of the cyberattacks it enabled, and eventually was used in an attack on the domain-name service provider Dyn that took down 175,000 websites simultaneously for much of the United States. Mirai’s code base has since served as the starting point for a decade of other internet-of-things botnets.



Source link

Abigail Avery

Share
Published by
Abigail Avery

Recent Posts

Green Light for Fan Tokens: What the SEC/CFTC Ruling Means for Chiliz Crypto

The US SEC and CFTC have ended regulatory uncertainty around sports crypto, issuing joint guidance…

33 minutes ago

Google’s AI plans for Fitbit include your medical records

It's fair to say Fitbit has been through a few changes in the eight years…

46 minutes ago

73% of Institutional Investors Plan to Increase Crypto Holdings in 2026, Coinbase Survey

Institutional investors are accelerating crypto exposure while tightening risk controls, signaling a shift toward regulated…

48 minutes ago

Bitcoin Clears Key Supply Wall, But Weak Conviction Clouds Bull Market Outlook

Bitcoin's push to $74,000 demonstrated strength, but heavy profit-taking and low futures activity suggest…

2 hours ago

JPMorgan sees S&P 500 vulnerable as Brent tops $110

JPMorgan cuts its S&P 500 target and warns investors are dangerously complacent about Iran war…

3 hours ago

Amazon acquires Rivr, maker of a stair-climbing delivery robot

Rivr, a Zurich-based autonomous robotics startup known for its stair-climbing delivery robot, has been acquired…

3 hours ago