Distributed denial-of-service (DDoS) attacks are reaching unprecedented scale, fueled by massive Internet of Things (IoT) botnets. In a major coordinated operation, international law enforcement agencies disrupted four botnets responsible for some of the largest attacks ever recorded, including traffic floods exceeding 30 terabits per second (Tbps). 

These botnets—Aisuru, KimWolf, JackSkid, and Mossad—infected millions of vulnerable IoT devices, turning everyday hardware like webcams and routers into cyber weapons. Many of these compromised devices were then offered through cybercrime-as-a-service platforms, enabling widespread DDoS attacks and extortion campaigns.
In this article, you’ll learn:
- How IoT botnets work
- Details about the four disrupted botnets
- Scale of modern DDoS attacks
- Cybercrime-as-a-service model explained
- Risk impact for organizations
- Detection and mitigation strategies
What Are IoT Botnets?
IoT botnets are networks of compromised connected devices controlled remotely by threat actors.
Commonly Infected Devices
- Digital video recorders (DVRs)
- IP cameras
- WiFi routers
- Smart home devices
- Network-attached storage (NAS)
- Industrial IoT endpoints
Key Insight:
Weak security and default credentials make IoT devices easy targets.
The Four Disrupted IoT Botnets
Authorities targeted four major botnets involved in global DDoS campaigns.
Botnets Identified
- Aisuru
- KimWolf
- JackSkid
- Mossad
These botnets collectively infected millions of devices worldwide.
Scale of the DDoS Attacks
The disrupted botnets were responsible for record-breaking traffic floods.
Attack Statistics
- Largest attacks exceeded 30 Tbps
- 200,000+ commands from Aisuru
- 90,000+ attacks from JackSkid
- 25,000+ attacks from KimWolf
- 1,000+ attacks from Mossad
Security Reality:
DDoS attacks are becoming faster, larger, and harder to mitigate.
Cybercrime-as-a-Service Model
Some botnets were offered as DDoS-for-hire services.
How It Works
- Operators infect IoT devices
- Build botnet infrastructure
- Sell access to customers
- Customers launch DDoS attacks
- Victims receive extortion demands
Threat Insight:
Attackers no longer need technical expertise to launch large-scale DDoS attacks.
How IoT Devices Were Compromised
Many devices targeted were not intended for direct internet exposure, yet were still exploited.
Common Attack Methods
- Default credentials
- Outdated firmware
- Exposed management interfaces
- Known vulnerabilities
- Weak authentication
Record-Breaking Attack Trends
DDoS activity increased dramatically.
2025 DDoS Statistics
- 47.1 million total attacks
- Network-layer attacks tripled
- 19 record-setting incidents
- Largest attack reached 31.4 Tbps
Key Takeaway:
DDoS attacks are shifting toward short-duration, high-intensity bursts.
Why Short Attacks Are Dangerous
Most attacks lasted under 10 minutes.
Impact of Short Bursts
- Harder manual response
- Automated mitigation required
- Minimal warning time
- High service disruption
Impact on Organizations
Victims reported significant operational and financial damage.
Consequences
- Website downtime
- Service outages
- Revenue loss
- Infrastructure overload
- Incident response costs
- Reputational damage
Some organizations reported tens of thousands of dollars in losses.
Law Enforcement Operation
Authorities executed a coordinated takedown.
Actions Taken
- Domain seizures
- Infrastructure shutdown
- Virtual server confiscation
- Botnet disruption
- Investigation of operators
- Targeting DDoS infrastructure
Risk Impact Analysis
| Risk Area | Impact |
|---|---|
| Availability | Service outages |
| Financial | Revenue loss |
| Infrastructure | Network saturation |
| Security | Botnet recruitment |
| Reputation | Customer trust damage |
| Operations | Incident response costs |
Detection Strategies
Indicators of IoT Botnet Activity
- Sudden outbound traffic spikes
- Unusual DNS requests
- Unexpected device communication
- Network saturation
- Repeated connection attempts
Mitigation Best Practices
For Organizations
- Deploy DDoS protection services
- Implement rate limiting
- Use Web Application Firewalls
- Monitor network traffic
- Segment IoT networks
- Disable unused ports
For IoT Device Owners
- Change default passwords
- Update firmware regularly
- Disable remote access
- Use network segmentation
- Monitor device activity
Framework Mapping
MITRE ATT&CK
- T1499 – Endpoint denial of service
- T1584 – Botnet infrastructure
- T1565 – Resource hijacking
NIST Cybersecurity Framework
- Identify: IoT asset inventory
- Protect: Access controls
- Detect: Traffic monitoring
- Respond: DDoS mitigation
- Recover: Service restoration
Why IoT Security Matters
IoT devices often lack:
- Regular updates
- Strong authentication
- Logging capabilities
- Security monitoring
This makes them ideal botnet candidates.
FAQs
What is an IoT botnet?
A network of compromised connected devices used to launch attacks.
What is a DDoS attack?
An attack that overwhelms a service with traffic.
How large were the attacks?
Some exceeded 30 terabits per second.
Why are IoT devices targeted?
They often have weak security and are always online.
How can organizations defend?
Use DDoS protection and secure IoT devices.
Are these attacks increasing?
Yes, DDoS attacks doubled in 2025.
Conclusion
The disruption of four major IoT botnets highlights the growing scale and sophistication of DDoS threats. With millions of compromised devices and record-breaking traffic floods, organizations must strengthen network resilience and IoT security.
Key priorities include:
- Securing IoT devices
- Deploying DDoS protection
- Monitoring traffic anomalies
- Implementing network segmentation
As IoT adoption grows, proactive security measures are essential to prevent devices from becoming part of global attack infrastructure.