Home OSINT News Signals
CYBER

DoJ Disrupts 3 Million-Device IoT Botnets Behind Record 31.4 Tbps Global DDoS Attacks

🕓 1 min read

EXCLUSIVE: GLOBAL CYBER POLICE SMASH 3 MILLION-DEVICE BOTNET ARMY BEHIND RECORD-SHATTERING ATTACKS

A sprawling criminal empire built on compromised smart TVs and routers has been dismantled. In a landmark international operation, the U.S. Department of Justice, with allies in Canada and Germany, has seized the command hubs for four massive IoT botnets—AISURU, Kimwolf, JackSkid, and Mossad. This cyber militia, controlling over 3 million enslaved devices, was responsible for the largest distributed denial-of-service attacks ever recorded, unleashing a staggering 31.4 Terabits per second of malicious traffic.

This was not amateur hour. These botnets operated a sophisticated "cybercrime as a service" model, selling access to their infected device army to other criminals for ransomware campaigns, data breach operations, and further malware distribution. The botnets uniquely targeted devices believed to be safe behind firewalls, including millions of off-brand Android TVs, turning everyday household electronics into weapons.

"The scale is unprecedented. We are talking about a fundamental vulnerability in the global digital fabric being exploited for profit and chaos," stated a senior cybersecurity official involved in the operation. The investigation, aided by tech giants like Google, Cloudflare, and PayPal, reveals a terrifying new normal: your smart camera or router could be part of the next record-breaking attack.

This matters because the malware that built these botnets is still out there. The disruption of command servers is a major blow, but the underlying zero-day exploits and phishing techniques used to infect devices remain active threats. Every unsecured IoT device is a potential soldier in the next botnet army, highlighting a critical failure in basic blockchain security principles for device integrity.

We predict a violent retaliation. The operators, including a suspect identified as a 23-year-old Canadian, have lost a major revenue stream from their crypto-powered crime service. The hunt for the teenage German suspect continues, but the criminal ecosystem they supplied will now scramble for new infrastructure, likely leading to a surge in aggressive new phishing and exploit campaigns.

Your connected world is the battlefield, and the war just entered a new, more volatile phase.

Telegram X LinkedIn
Back to News